Cyber

Graduate level writing is a must. Utilize resources based off of resource document provided.  Please follow and answer questions in document provided.  Minimum of 6 different citations.
Please write out a well-structured, well-cited, and well-argued essay based on the following two-part question.
Part 1 (Discursive): What do we know about cyber conflict? Be sure to include and discuss the dynamics, methods, capabilities, power, theory, and empirical evidence to answer this question.
Part 2 (Argumentative):  Based on what we know, paint a picture of the next 10 years of international cyber relations. What could happen based on what we know? Be sure to look at multi-layers when answering this question (international, state, non-state).
 
 
Notes for essay:
Part 1 will used to give an intro and lit review/material.
Part 2 will be the argument portion.
Conclusion
 
*Please use resource document for citing.
 
 
**If any other sources are utilized, please let know before hand.
 
Resources
 
John Arquilla and David Ronfeldt, Cyberwar is Coming!, 1993, reprinted in In Athena’s Camp, 1997, http://www.rand.org/pubs/reprints/RP223.html.
 
Thomas Rid, Think Again: Cyberwar, Foreign Policy, March/April 2012, http://www.foreignpolicy.com/articles/2012/02/27/cyberwar.
 
John Arquilla, Cyberwar Is Already Upon Us, Foreign Policy, March/April 2012, http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_upon_us.
 
Lee, Robert and Thomas Rid. 2014. “OMG Cyber!” The RUSI Jounal,
https://www.tandfonline.com/doi/pdf/10.1080/03071847.2014.969932
 
Craig Timberg, Net of Insecurity, The Washington Post, May 30 and 31, 2015, http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/
 
http://www.washingtonpost.com/sf/business/2015/05/31/net-of-insecurity-part-2/
http://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/
 
Joseph S. Nye, Cyber Power, Belfer Center, Harvard, May 2010; http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf.
 
Bruce Schneier, The Battle for Power on the Internet, The Atlantic, Oct. 24, 2013,
http://m.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the- internet/280824/.
 
Joseph S. Nye, Jr., The  Regime Complex for Managing Global  Cyber Activities, Global Commission on Internet Governance,  May  2014, http://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf.
 
John B. Sheldon, Deciphering Cyberpower:  Strategic Purpose in Peace  and  War, Strategic  Studies Quarterly, Summer 2011, http://www.au.af.mil/au/ssq/2011/summer/sheldon.pdf.
 
A Giant Cage, Special Report on China’s Internet,  The Economist, April  6, 2013, http://www.economist.com/news/special-report/21574628-internet-was-expectedhelp-democratise-china-instead-it-has-enabled.
 
Carson, A. and Yarhi-Milo, K., 2017.  Covert communication:  The  intelligibility and credibility of signaling  in  secret.  Security Studies,  26(1), pp.124-156.
 
Rid,  Thomas.  2011.  “Cyberwar  Will  Not  Take  Place.”  Journal  of  Strategic Studies. First Article: 1-28.
 
Stone, John.  2012.  “Cyber War  Will Take  Place!”  Journal  of  Strategic Studies 36 (1): 101-108.
 
McGraw, Gary. 2013.  “Cyber  War  is Inevitable  (Unless We  Build Security In).” Journal  of Security Studies 36 (1):  109-119.
 
Goodman,  Will. 2010. “Cyber Deterrence: Tougher  in Theory than  in Practice?”  Strategic  Studies Quarterly
Gartzke, Erik. 2013.  “The Myth of Cyberwar:  Bringing War  on the  Internet Back Down to Earth.”    ?,  International Security  38  (2):  41-72.
 
Rid,  Thomas and Peter McBurney.  2012. “Cyber Weapons.”  The RUSI Journal  157  (1): 6-13.
 
Peterson, Dale. 2013.  “Offensive Cyber  Weapons: Construction, Development, and Employment.”  Journal  of Strategic Studies
 
Danielle Kehl, Andi Wilson, and Kevin Bankston, Doomed to Repeat  History? Lessons  from the Crypto  Wars of the 1990s, June 2015, New America, https://www.newamerica.org/cybersecurity-initiative/policy-papers/doomed-torepeat-history-lessons-from-the-crypto-wars-of-the-1990s/.
 
Peter Bergen et  al., Do  NSA’s Bulk Surveillance Programs Stop Terrorists?, New America, Jan. 2014,  https://na-production.s3.amazonaws.com/documents/DoNSAs-Bulk-Surveillance-Programs-Stop-Terrorists.pdf
 
Bauman, Z.,  Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. and  Walker, R.B., 2014. “After Snowden: Rethinking  the impact  of surveillance.”  International political sociology,  8  (2): 121-144.
 
Robert S. Litt, Privacy, Technology  and National Security: An Overview of Intelligence  Collection, July 18, 2013, http://www.dni.gov/index.php/newsroom/speeches-and-interviews/195-speechesinterviews-2013/896-privacy,-technology-and-national-security-an-overview-ofintelligence-collection.
 
Robyn Greene et al., Surveillance Costs: The NSA’s Impact  on the  Economy, Internet Freedom  & Cybersecurity, 2014. http://newamerica.net/publications/policy/surveillance_costs_the_nsas_impact_on _the_economy_internet_freedom_cybersecurity
 
Tim  Maurer  et al., Technological Sovereignty:  Missing the Point?  An Analysis of European Proposals after June 5, 2013, New  America Foundations Open Policy Institute and  the  Global Public Policy Institute, http://www.newamerica.org/downloads/Technological_Sovereignty_Report.pdf
 
 
Even, Siman-Tov, and Biboni. 2016. “Structuring  Israel’s Cyber  Defense.”  INSS publication.
 
Rid, Thomas and Ben Buchanan. 2014, “Attributing Cyber Attacks.”  Journal of Strategic  Studies
 
Jason Healey, Beyond Attribution: Seeking National  Responsibility for Cyberattacks, Atlantic  Council  Issue Brief, 2011, https://www.fbiic.gov/public/2012/mar/National_Responsibility_for_CyberAttacks,_ 2012.pdf.
 
 
 
 
 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized