Abstract
In August of 1986, a former astronomer-turned-systems-administrator, on his second day on the job, attempted to determine what was causing a 75-cent discrepancy in a UNIX accounting system at the Lawrence Berkeley National Laboratory. Over the course of the next ten months, Clifford Stoll and his coworkers would trace the anomaly to a hacker in Germany who was using computers to steal information from the United States and sell it to the Soviet Union’s KGB (Stoll 2005). This incident represents one of the earliest examples of cyber espionage and pioneered many of the tactics, techniques, and procedures used in cyber incident response actions today. More importantly, this event demonstrated the ability of nation-states or their proxies to leverage emerging network technologies to gather intelligence and to potentially disrupt the services and systems of competitor states. It was one of the groundbreaking events in a phenomenon we will collectively call ‘cyber conflict.’
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Editor information
Editors and Affiliations
Copyright information
© 2015 Scott Applegate
About this chapter
Cite this chapter
Applegate, S. (2015). Cyber Conflict: Disruption and Exploitation in the Digital Age. In: Lemieux, F. (eds) Current and Emerging Trends in Cyber Operations. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137455550_2
Download citation
DOI: https://doi.org/10.1057/9781137455550_2
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55783-7
Online ISBN: 978-1-137-45555-0
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)