Graduate level writing is a must. Utilize resources based off of resource document provided. Please follow and answer questions in document provided. Minimum of 6 different citations.
Please write out a well-structured, well-cited, and well-argued essay based on the following two-part question.
Part 1 (Discursive): What do we know about cyber conflict? Be sure to include and discuss the dynamics, methods, capabilities, power, theory, and empirical evidence to answer this question.
Part 2 (Argumentative): Based on what we know, paint a picture of the next 10 years of international cyber relations. What could happen based on what we know? Be sure to look at multi-layers when answering this question (international, state, non-state).
Notes for essay:
Part 1 will used to give an intro and lit review/material.
Part 2 will be the argument portion.
Conclusion
*Please use resource document for citing.
**If any other sources are utilized, please let know before hand.
Resources
John Arquilla and David Ronfeldt, Cyberwar is Coming!, 1993, reprinted in In Athena’s Camp, 1997, http://www.rand.org/pubs/reprints/RP223.html.
Thomas Rid, Think Again: Cyberwar, Foreign Policy, March/April 2012, http://www.foreignpolicy.com/articles/2012/02/27/cyberwar.
John Arquilla, Cyberwar Is Already Upon Us, Foreign Policy, March/April 2012, http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_upon_us.
Lee, Robert and Thomas Rid. 2014. “OMG Cyber!” The RUSI Jounal,
https://www.tandfonline.com/doi/pdf/10.1080/03071847.2014.969932
Craig Timberg, Net of Insecurity, The Washington Post, May 30 and 31, 2015, http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/
http://www.washingtonpost.com/sf/business/2015/05/31/net-of-insecurity-part-2/
http://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/
Joseph S. Nye, Cyber Power, Belfer Center, Harvard, May 2010; http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf.
Bruce Schneier, The Battle for Power on the Internet, The Atlantic, Oct. 24, 2013,
http://m.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the- internet/280824/.
Joseph S. Nye, Jr., The Regime Complex for Managing Global Cyber Activities, Global Commission on Internet Governance, May 2014, http://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf.
John B. Sheldon, Deciphering Cyberpower: Strategic Purpose in Peace and War, Strategic Studies Quarterly, Summer 2011, http://www.au.af.mil/au/ssq/2011/summer/sheldon.pdf.
A Giant Cage, Special Report on China’s Internet, The Economist, April 6, 2013, http://www.economist.com/news/special-report/21574628-internet-was-expectedhelp-democratise-china-instead-it-has-enabled.
Carson, A. and Yarhi-Milo, K., 2017. Covert communication: The intelligibility and credibility of signaling in secret. Security Studies, 26(1), pp.124-156.
Rid, Thomas. 2011. “Cyberwar Will Not Take Place.” Journal of Strategic Studies. First Article: 1-28.
Stone, John. 2012. “Cyber War Will Take Place!” Journal of Strategic Studies 36 (1): 101-108.
McGraw, Gary. 2013. “Cyber War is Inevitable (Unless We Build Security In).” Journal of Security Studies 36 (1): 109-119.
Goodman, Will. 2010. “Cyber Deterrence: Tougher in Theory than in Practice?” Strategic Studies Quarterly
Gartzke, Erik. 2013. “The Myth of Cyberwar: Bringing War on the Internet Back Down to Earth.” ?, International Security 38 (2): 41-72.
Rid, Thomas and Peter McBurney. 2012. “Cyber Weapons.” The RUSI Journal 157 (1): 6-13.
Peterson, Dale. 2013. “Offensive Cyber Weapons: Construction, Development, and Employment.” Journal of Strategic Studies
Danielle Kehl, Andi Wilson, and Kevin Bankston, Doomed to Repeat History? Lessons from the Crypto Wars of the 1990s, June 2015, New America, https://www.newamerica.org/cybersecurity-initiative/policy-papers/doomed-torepeat-history-lessons-from-the-crypto-wars-of-the-1990s/.
Peter Bergen et al., Do NSA’s Bulk Surveillance Programs Stop Terrorists?, New America, Jan. 2014, https://na-production.s3.amazonaws.com/documents/DoNSAs-Bulk-Surveillance-Programs-Stop-Terrorists.pdf
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. and Walker, R.B., 2014. “After Snowden: Rethinking the impact of surveillance.” International political sociology, 8 (2): 121-144.
Robert S. Litt, Privacy, Technology and National Security: An Overview of Intelligence Collection, July 18, 2013, http://www.dni.gov/index.php/newsroom/speeches-and-interviews/195-speechesinterviews-2013/896-privacy,-technology-and-national-security-an-overview-ofintelligence-collection.
Robyn Greene et al., Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity, 2014. http://newamerica.net/publications/policy/surveillance_costs_the_nsas_impact_on _the_economy_internet_freedom_cybersecurity
Tim Maurer et al., Technological Sovereignty: Missing the Point? An Analysis of European Proposals after June 5, 2013, New America Foundations Open Policy Institute and the Global Public Policy Institute, http://www.newamerica.org/downloads/Technological_Sovereignty_Report.pdf
Even, Siman-Tov, and Biboni. 2016. “Structuring Israel’s Cyber Defense.” INSS publication.
Rid, Thomas and Ben Buchanan. 2014, “Attributing Cyber Attacks.” Journal of Strategic Studies
Jason Healey, Beyond Attribution: Seeking National Responsibility for Cyberattacks, Atlantic Council Issue Brief, 2011, https://www.fbiic.gov/public/2012/mar/National_Responsibility_for_CyberAttacks,_ 2012.pdf.