Item Details
Skip Navigation Links
   ActiveUsers:1848Hits:19261283Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID132419
Title ProperCyber actions by state actors
Other Title Informationmotivation and utility
LanguageENG
AuthorBrantly, Aaron F
Publication2014.
Summary / Abstract (Note)
Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence situations and events. Covert action is and has been a staple of the state system. A dark and nefarious tool often banished to philosophical and intellectual exile, covert action is in truth an oft-used method of achieving utility that is frequently overlooked by academics. Modern scholars contend that, for utility to be achieved, activities such as war and diplomacy must be conducted transparently. Examined here is the construction of utility for a subset of covert action: cyber attacks.
`In' analytical NoteInternational Journal of Intelligence and Counterintelligence Vol.27, No.3; Fall 2014: p.465-484
Journal SourceInternational Journal of Intelligence and Counterintelligence Vol.27, No.3; Fall 2014: p.465-484
Key WordsState Actors ;  Cyber Attack ;  Cyber Warfare ;  Warfare Diplomacy ;  Cyber Diplomacy ;  Influence Situations ;  State System ;  Intellectual Exile ;  Intellectual Policy ;  Security Dilemma ;  Realism ;  Neo-Liberalism ;  Interdependencies ;  Conflict ;  Cyber Conflict ;  Political Motivation ;  State Policies


 
 
Media / Other Links  Full Text