Strategic Warfare in Cyberspace
Dublin Core
Title
Description
Main Argument: This book develops an analytical framework for understanding cyberwar in the realm of military strategy. Rattray details how cyberwar is conducted and how computer systems can be penetrated and disrupted. He then proceeds by comparing the development of cyberwar technologies to the development of airpower in the World War II era. Rattray particularly emphasizes that military doctrine and organization was "locked-in" to a single understanding of airpower, which limited the effectiveness of bombing campaigns against Nazi Germany. The author emphasizes lessons that this experience gives toward the development of contemporary cyberwar policy.
Style: Scholarly textbook
Sourcing: Footnoted scholarly works
Structure: Divided into 6 sections, including a section defining acronyms
Context in discussion: Rattray takes a scholarly approach to military strategy, whereas military leaders speak and write about the specific steps their departments are going to take. While many people compare cyberwar to the cold war (e.g. being in a cyber-arms race), Rattray uses World War II as a means to look at actual cybersecurity strategies.
Context in website: The audience for this text is scholars of military strategy and policymakers. This is an important book for understanding the military side of cyberwar policy. General Keith Alexander’s speech about the role of U.S. Cyber Command in cyber policy is also focused on the military in a potential or current cyberwar.
Creator
Credentials:
Senior Vice President of Security for BITS Financial Round Table
Ph.D., Fletcher School of Law and Diplomacy of Tufts University
Masters, Harvard University
B.S., U.S. Air Force Academy