Jump to ratings and reviews
Rate this book

Offensive Cyber Operations: Understanding Intangible Warfare

Rate this book
Cyber-warfare is often discussed, but rarely truly seen. When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime. Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict. Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations. By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel. Offensive cyber operations are the latest incarnation of intangible warfare--conflict waged through non-physical means, such as the information space or the electromagnetic spectrum. Not all offensive operations are created equal. Some are slow-paced, clandestine infiltrations requiring discipline and patience for a big payoff; others are short-lived attacks meant to create temporary tactical disruptions. This book first seeks to understand the possibilities, before turning to look at some of the most prolific actors: the United States, Russia, China and Iran. Each has their own unique take, advantages and challenges when attacking networks for effect.

328 pages, Unknown Binding

Published April 22, 2022

19 people are currently reading
160 people want to read

About the author

Daniel Moore

153 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (18%)
4 stars
17 (53%)
3 stars
7 (21%)
2 stars
1 (3%)
1 star
1 (3%)
Displaying 1 - 3 of 3 reviews
Profile Image for Lojicholia .
181 reviews2 followers
August 29, 2022
This book is divisible into roughly two parts:

The first part lays out a new model for discussing and qualitatively understanding cyberwar and cyberwarefare. The author talks at length about how cyberwar is likely impossible, since it is mostly a domain of warfare itself and unlikely to lead to an enemy’s capitulation. However, the author lays out what delineates cyber warfare from intelligence operations, and roughly aligns his models with DoD’s Cyber Threat Framework.

The second part is a capabilities discussion of major players in the cyber domain, and how they align their doctrine with their orders of battle. The author profiles US, Russian, Chinese, and Iranian threat actors, and discusses their doctrines and ideologies vis-a-vis their efficacy and tactics in the cyber (and larger information) domain.

I think the author’s models are interesting, if a little hair splitting, and I wish I had seen more on promotion of presence based operations to event based operations; what is an 0day today is tomorrow’s old day after all. Also, the author switches from calling the tactical operation “an event operation” to an “event based attack” mid way thru. Having said that, the author’s model for warfare determination is fascinating to me, and I’d love to see that in my Threat Intel tools, even if it’s only of utility to certain players.

All told, very interesting discussion of cyber (and by extension, intangible warfare), even if I didn’t agree with all of it and wished it had some more depth in places
5 reviews
December 26, 2024
Very academic and therefore slow to drudge through much of the text. Chapters 5-8 seem the most practical with each analyzing the OCO capabilities of the U.S., Russia, China, and Iran, respectively. There was no chapter dedicated to North Korea but the author acknowledged the value of such future analysis in the conclusion chapter.
2 reviews
July 10, 2023
Builds an interesting framework from which to view Offensive Cyber. Can be a bit arduous at times but is a great introductory book for practitioners and academics.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.