Skip to product information
1 of 1
Regular price £43.99 GBP
Regular price £57.00 GBP Sale price £43.99 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 8 days lead

Cyber Mercenaries
The State, Hackers, and Power

Cyber Mercenaries explores how and why states use hackers as proxies to project power through cyberspace.

Tim Maurer (Author)

9781107127609, Cambridge University Press

Hardback, published 18 January 2018

252 pages, 10 b/w illus. 4 tables
23.5 x 15.7 x 1.9 cm, 0.49 kg

'Tim Maurer has broken important new ground explaining how states project force in cyberspace through proxies, from government contractors to activists to mercenary hackers. He argues persuasively that states' dependence on proxy forces will increase, and that we will see new kinds of collaboration and even competition between state and non-state actors. His book is an important and urgent call to policymakers to start thinking about how to avoid new conflicts that will inevitably arise from these state-proxy relationships.' Shane Harris, author of @War: The Rise of the Military-Internet Complex

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Part I. Of Brokers and Proxies: 1. Cyber proxies: an introduction
2. Proxies: an instrument of power since ancient times
3. Cyber power: geopolitics and human rights
Part II. Cyber Proxies Up Close: 4. Cyber proxies on a tight leash: the United States
5. Cyber proxies on a loose leash: Iran and Syria
6. Cyber proxies on the loose: the former Soviet Union
7. Change over time: China's evolving relationships with cyber proxies
Part III. Implications: 8. The theory: state responsibility and cyber proxies
9. The practice: shaping cyber proxy relationships
10. Conclusion: cyber proxies, the future, and suggestions for further research
Future research
Notes.

Subject Areas: Computer fraud & hacking [URH], Criminal law & procedure [LNF], Laws of Specific jurisdictions [LN], International law [LB], Jurisprudence & general issues [LA], Law [L], Mercenaries [JWXN], International relations [JPS], Politics & government [JP], Society & social sciences [J]

View full details