Skip to Main Content
Cyber Operations
book

Cyber Operations

by Jerry M. Couretas
April 2024
Intermediate to advanced content levelIntermediate to advanced
320 pages
8h 58m
English
Wiley
Content preview from Cyber Operations

Section ICyber Operations Summary

I.1 Introduction

Section I provides examples that span the current history and development of cyber operations. This progression spans from early hactivism to current political uses of social media platforms. Section I also includes examples from simple, experimental hacks, to nation‐state operators performing cyberspace espionage and information operations (IO) (Table I.1).

As shown in Table I.1, cyber operations have often included a nation‐state interest, starting with “The Cuckoo’s Egg” (Stoll, 2005) documenting the Former Soviet Union (FSU) use of hackers to attempt to steal U.S. military secrets near the end of the Cold War (Chapter 4). The near success described in “The Cuckoo’s Egg,” in the late 1980s, likely inspired Russian operators to continue their cyber collection pursuits, eventually succeeding with Operation Moonlight Maze in the mid‐ to late 1990s.

During this hacking and experimentation period of networked computers, we also looked at potentially damaging hacks (Chapter 9). For example, the Jester Worm (1997), the Slammer Worm (2003), and the Sobig Worm (2003) were examples of critical infrastructure denial capabilities. These hacks produced effects that included shutting down telephony systems, nuclear reactors, trains, telephones, and air traffic control systems.

While hackers have provided worst‐case scenarios by literally shutting off critical parts of our infrastructure, nation‐states have also leveraged their hackers ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition

Jeffrey Caruso
Cyber Threat Hunting

Cyber Threat Hunting

Nadhem AlFardan
Practical Cyber Intelligence

Practical Cyber Intelligence

Adam Tilmar Jakobsen

Publisher Resources

ISBN: 9781119712091Purchase Link