Preface xiii Section I Cyber Operations Introduction 1 I.1 Phases of Cyber Operations 3 1 Cyber Operations 9 1.1 Cyber Operations Introduction 9 1.2 Early Internet and Cyber Operations 15 1.3 Cyber Operations' Stage Descriptions 18 1.4 Cyber Operations Wrap-up 22 2 ISIS and Web-Based Insurgency 27 2.1 Introduction 27 2.2 Cyber-Based Irregular Operations 30 2.
3 ISIS and Web-Based Insurgency Wrap-up 31 3 Cyber and Crime 37 3.1 Cyber and Crime 37 4 Nation-State Cyber Operations 61 4.1 Nation State Cyber Operations 61 5 Russian Cyber Operations 75 5.1 Russian Cyber Operations 75 6 Chinese Cyber Operations 99 6.1 Chinese Cyber Operations 99 7 DPRK Cyber Operations 117 7.1 DPRK Cyber Operations 117 8 Iranian Cyber Operations 133 8.1 Iranian Cyber Operations 133 9 Independent Cyber Operators 155 9.1 Independent Cyber Operations 155 Section I Cyber Operations Summary 169 I.
1 Introduction 169 I.2 Phases of Cyber Operations 171 Section II Introduction to Cyber Effects 177 II.1 Cyber Effects Introduction 177 II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects 177 II.1.2 Wrap-up 178 10 Strategic Cyber Effects 181 10.1 Strategic Cyber Effects 181 11 Strategic Cyber Effects (2) 185 11.
1 Critical Infrastructure Strategic Cyber Effects 185 12 Tactical Cyber Effects 195 12.1 Cyber Tactical Effects 195 13 Cyber Crime Effects 205 13.1 Criminal Cyber Effects 205 Section II Cyber Effects Conclusions 219 II.1 Cyber Effects Overview 219 II.2 Cyber Effects' Wrap-up 220 Section III Cyberspace Environment and Tools Introduction 223 14 Criminal Cyber Operations and Tools 227 14.1 Criminal Cyber Operations and Tools 227 15 Russian Cyber Operations and Tools 239 15.1 Russian Cyber Operations and Tools 239 16 Iran, China, and DPRK Cyber Operations and Tools 251 16.1 China, DPRK, and Iran Cyber Operations and Tools 251 17 Strategic Cyber Technologies -- ICS/SCADA, Election Machines, and Crypto Currencies 261 17.
1 Strategic Cyber Technologies 261 18 Cyber Case Studies Conclusion 271 Section III Cyberspace Environment and Tools Conclusion 275 III.A Appendix I -- Tool Examples 278 Bibliography 278 CCS Glossary 281 Index 295.