{"title":"国家、代理和(远程)进攻性网络行动","authors":"Tim Maurer","doi":"10.1093/oxfordhb/9780198800682.013.35","DOIUrl":null,"url":null,"abstract":"This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"States, Proxies, and (Remote) Offensive Cyber Operations\",\"authors\":\"Tim Maurer\",\"doi\":\"10.1093/oxfordhb/9780198800682.013.35\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.\",\"PeriodicalId\":336846,\"journal\":{\"name\":\"The Oxford Handbook of Cyber Security\",\"volume\":\"103 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Oxford Handbook of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oxfordhb/9780198800682.013.35\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
States, Proxies, and (Remote) Offensive Cyber Operations
This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.