ID | 132419 |
Title Proper | Cyber actions by state actors |
Other Title Information | motivation and utility |
Language | ENG |
Author | Brantly, Aaron F |
Publication | 2014. |
Summary / Abstract (Note) | Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence situations and events. Covert action is and has been a staple of the state system. A dark and nefarious tool often banished to philosophical and intellectual exile, covert action is in truth an oft-used method of achieving utility that is frequently overlooked by academics. Modern scholars contend that, for utility to be achieved, activities such as war and diplomacy must be conducted transparently. Examined here is the construction of utility for a subset of covert action: cyber attacks. |
`In' analytical Note | International Journal of Intelligence and Counterintelligence Vol.27, No.3; Fall 2014: p.465-484 |
Journal Source | International Journal of Intelligence and Counterintelligence Vol.27, No.3; Fall 2014: p.465-484 |
Key Words | State Actors ; Cyber Attack ; Cyber Warfare ; Warfare Diplomacy ; Cyber Diplomacy ; Influence Situations ; State System ; Intellectual Exile ; Intellectual Policy ; Security Dilemma ; Realism ; Neo-Liberalism ; Interdependencies ; Conflict ; Cyber Conflict ; Political Motivation ; State Policies |