Staff View
United States use of cyberweapons

Descriptive

TitleInfo
Title
United States use of cyberweapons
SubTitle
theory and practice
Name (type = personal)
NamePart (type = family)
Singh
NamePart (type = given)
Vijai T.
DisplayForm
Vijai T. Singh
Role
RoleTerm (authority = RULIB)
author
Name (type = personal)
NamePart (type = family)
Ferguson
NamePart (type = given)
Yale
DisplayForm
Yale Ferguson
Affiliation
Advisory Committee
Role
RoleTerm (authority = RULIB)
chair
Name (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB)
degree grantor
Name (type = corporate)
NamePart
Graduate School - Newark
Role
RoleTerm (authority = RULIB)
school
TypeOfResource
Text
Genre (authority = marcgt)
theses
OriginInfo
DateCreated (qualifier = exact)
2018
DateOther (qualifier = exact); (type = degree)
2018-01
CopyrightDate (encoding = w3cdtf); (qualifier = exact)
2018
Place
PlaceTerm (type = code)
xx
Language
LanguageTerm (authority = ISO639-2b); (type = code)
eng
Abstract (type = abstract)
In 2010, the Pentagon defined cyberspace as an area of warfare joining land, sea, air, and space as fair game for military action. At the time, the U.S. was focused on defending itself against cyberattacks from China and Russia; the countries they deem to be the biggest cyber threats. But, it was later revealed that China and Russia were also involved in offensive cyberwarfare, or the use of cyberweapons, to attack other countries. While cyberwarfare is not a new concern, the offensive strategy of cyberwarfare, specifically the deployment of cyberweapons, is a relatively new and important phenomenon. In this dissertation, I have used a three-prong approach to address the central question: under which conditions is the United States likely to deploy a cyberweapon in a first strike? My hypotheses are that in order for the U.S. to deploy a cyberweapon in a first strike: the target country has to be a perceived adversary that poses a threat; the target has to be in an area that is hard to access by other methods; the cyberweapon may be deployed in order to minimize collateral damage; the cyberweapon may be deployed to prevent or end a war. First, I empirically tested what I classified as 13 cases where the U.S. used or debated about using an offensive cyberweapon from 2001 – 2016. The cases were Stuxnet, Iraq (2007), Shotgiant (2007), Quantum (2008), Turbine (2010), Nitro Zeus, Libya (2011), Pakistan (2011), Syria, North Korea (2014), ISIS (2016), Russia (2016), and Iraq (2003). Next, I employed the poliheuristic theory of foreign policy-decision making to reconstruct the decision-making process for each case study. Then, I conducted 22 confidential, semi-structured interviews to gather information about these case studies as well as further insights about the decision-making process behind deploying a cyberweapon. My findings are that some key conditions affecting deployment were indeed threat, access and collateral damage. My research also appeared to reveal that the authorization process for deployment is similar to that for a nuclear strike process, although the decision-making process cannot be generalized.
Subject (authority = RUETD)
Topic
Global Affairs
Subject (authority = ETD-LCSH)
Topic
Information warfare--United States
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
Identifier
ETD_8624
PhysicalDescription
Form (authority = gmd)
electronic resource
InternetMediaType
application/pdf
InternetMediaType
text/xml
Extent
1 online resource (xvi, 496 p. : ill.)
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references
Note (type = statement of responsibility)
by Vijai T. Singh
RelatedItem (type = host)
TitleInfo
Title
Graduate School - Newark Electronic Theses and Dissertations
Identifier (type = local)
rucore10002600001
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Identifier (type = doi)
doi:10.7282/T3988B6H
Genre (authority = ExL-Esploro)
ETD doctoral
Back to the top

Rights

RightsDeclaration (ID = rulibRdec0006)
The author owns the copyright to this work.
RightsHolder (type = personal)
Name
FamilyName
Singh
GivenName
Vijai
MiddleName
T.
Role
Copyright Holder
RightsEvent
Type
Permission or license
DateTime (encoding = w3cdtf); (point = start); (qualifier = exact)
2018-01-05 23:58:32
AssociatedEntity
Name
Vijai Singh
Role
Copyright holder
Affiliation
Rutgers University. Graduate School - Newark
AssociatedObject
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
RightsEvent
DateTime (encoding = w3cdtf); (point = start); (qualifier = exact)
2020-01-08
DateTime (encoding = w3cdtf); (point = end); (qualifier = exact)
2022-01-31
Type
Embargo
Detail
Access to this PDF has been restricted at the author's request. It will be publicly available after January 31st, 2022.
Copyright
Status
Copyright protected
Availability
Status
Open
Reason
Permission or license
Back to the top

Technical

RULTechMD (ID = TECHNICAL1)
ContentModel
ETD
OperatingSystem (VERSION = 5.1)
windows xp
CreatingApplication
Version
1.4
ApplicationName
Mac OS X 10.11.6 Quartz PDFContext
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2018-01-10T06:56:52
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2018-01-10T06:56:52
Back to the top
Version 8.5.5
Rutgers University Libraries - Copyright ©2024