In this Book

summary
As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enables actors to change actual economic outcomes without the massive resource investment required for military force deployments.

Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values.

Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes.
 

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright, Dedication
  2. pp. i-vi
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. vii-viii
  3. restricted access
    • Download PDF Download
  1. List of Figures
  2. p. ix
  3. restricted access
    • Download PDF Download
  1. List of Tables
  2. p. x
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. xi-xii
  3. restricted access
    • Download PDF Download
  1. 1. Entering the Cyber Commons
  2. pp. 1-12
  3. restricted access
    • Download PDF Download
  1. 2. Interdependence
  2. pp. 13-44
  3. restricted access
    • Download PDF Download
  1. 3. Power
  2. pp. 45-80
  3. restricted access
    • Download PDF Download
  1. 4. Method Development
  2. pp. 81-120
  3. restricted access
    • Download PDF Download
  1. 5. Cyber Applications
  2. pp. 121-156
  3. restricted access
    • Download PDF Download
  1. 6. Case Study Analysis
  2. pp. 157-186
  3. restricted access
    • Download PDF Download
  1. 7. Framing Future Channels
  2. pp. 187-198
  3. restricted access
    • Download PDF Download
  1. Appendix
  2. pp. 199-226
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 227-238
  3. restricted access
    • Download PDF Download
  1. Bibliography
  2. pp. 239-254
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 255-268
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.