Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology

Over the last three years a number of significant, alleged cyber offensive operations have taken place: the North Korean operations against Sony Pictures in 2014; the BlackEnergy3 Virus which targeted Ukrainian power substations in 2015; and the cyber offensive operations that were designed to influ...

Full description

Bibliographic Details
Main Author: Carruthers, W.
Published: University of Salford 2018
Subjects:
700
Online Access:https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.758253
id ndltd-bl.uk-oai-ethos.bl.uk-758253
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-7582532019-03-05T15:24:22ZCovert action and cyber offensive operations : revisiting traditional approaches in light of new technologyCarruthers, W.2018Over the last three years a number of significant, alleged cyber offensive operations have taken place: the North Korean operations against Sony Pictures in 2014; the BlackEnergy3 Virus which targeted Ukrainian power substations in 2015; and the cyber offensive operations that were designed to influence recent presidential elections. This thesis will investigate whether these types of operations are new or similar to activities that took place in the twentieth century, especially during the Cold War, termed ‘covert action’. Focusing on the US and British experience, and using a comparative methodology, this study will compare covert action and cyber offensive operations. It will achieve this by addressing what covert action is and what forms it takes; this will then be employed in the analysis of cyber offensive operations. The thesis seeks to establish a clear relationship between these two forms of state tactics employed against state and non-state actors. It argues that although the two forms of behaviour are linked, there is a need to modify the existing understanding of covert action; this will allow, in turn, a clearer understanding of the nature of cyber offensive operations to be developed. It is concluded that there is a need to re-examine the organisational structures of covert action, including ethical dimensions, in relation to cyber operations.700University of Salfordhttps://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.758253http://usir.salford.ac.uk/48148/Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 700
spellingShingle 700
Carruthers, W.
Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
description Over the last three years a number of significant, alleged cyber offensive operations have taken place: the North Korean operations against Sony Pictures in 2014; the BlackEnergy3 Virus which targeted Ukrainian power substations in 2015; and the cyber offensive operations that were designed to influence recent presidential elections. This thesis will investigate whether these types of operations are new or similar to activities that took place in the twentieth century, especially during the Cold War, termed ‘covert action’. Focusing on the US and British experience, and using a comparative methodology, this study will compare covert action and cyber offensive operations. It will achieve this by addressing what covert action is and what forms it takes; this will then be employed in the analysis of cyber offensive operations. The thesis seeks to establish a clear relationship between these two forms of state tactics employed against state and non-state actors. It argues that although the two forms of behaviour are linked, there is a need to modify the existing understanding of covert action; this will allow, in turn, a clearer understanding of the nature of cyber offensive operations to be developed. It is concluded that there is a need to re-examine the organisational structures of covert action, including ethical dimensions, in relation to cyber operations.
author Carruthers, W.
author_facet Carruthers, W.
author_sort Carruthers, W.
title Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
title_short Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
title_full Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
title_fullStr Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
title_full_unstemmed Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
title_sort covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
publisher University of Salford
publishDate 2018
url https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.758253
work_keys_str_mv AT carruthersw covertactionandcyberoffensiveoperationsrevisitingtraditionalapproachesinlightofnewtechnology
_version_ 1718992470115614720