Skip to main content

Cyber Conflict: Disruption and Exploitation in the Digital Age

  • Chapter
Current and Emerging Trends in Cyber Operations
  • 535 Accesses

Abstract

In August of 1986, a former astronomer-turned-systems-administrator, on his second day on the job, attempted to determine what was causing a 75-cent discrepancy in a UNIX accounting system at the Lawrence Berkeley National Laboratory. Over the course of the next ten months, Clifford Stoll and his coworkers would trace the anomaly to a hacker in Germany who was using computers to steal information from the United States and sell it to the Soviet Union’s KGB (Stoll 2005). This incident represents one of the earliest examples of cyber espionage and pioneered many of the tactics, techniques, and procedures used in cyber incident response actions today. More importantly, this event demonstrated the ability of nation-states or their proxies to leverage emerging network technologies to gather intelligence and to potentially disrupt the services and systems of competitor states. It was one of the groundbreaking events in a phenomenon we will collectively call ‘cyber conflict.’

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Scott Applegate

About this chapter

Cite this chapter

Applegate, S. (2015). Cyber Conflict: Disruption and Exploitation in the Digital Age. In: Lemieux, F. (eds) Current and Emerging Trends in Cyber Operations. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137455550_2

Download citation

Publish with us

Policies and ethics