Cyberwars in the Middle East

Cyberwars in the Middle East
Author :
Publisher : Rutgers University Press
Total Pages : 135
Release :
ISBN-10 : 9781978810129
ISBN-13 : 1978810121
Rating : 4/5 (121 Downloads)

Book Synopsis Cyberwars in the Middle East by : Ahmed Al-Rawi

Download or read book Cyberwars in the Middle East written by Ahmed Al-Rawi and published by Rutgers University Press. This book was released on 2021-07-16 with total page 135 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.


Cyberwars in the Middle East Related Books

Cyberwars in the Middle East
Language: en
Pages: 135
Authors: Ahmed Al-Rawi
Categories: History
Type: BOOK - Published: 2021-07-16 - Publisher: Rutgers University Press

GET EBOOK

Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bott
The Politics of Cybersecurity in the Middle East
Language: en
Pages: 312
Authors: James Shires
Categories: Political Science
Type: BOOK - Published: 2021-11 - Publisher: Oxford University Press, USA

GET EBOOK

Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the fi
Inside Cyber Warfare
Language: en
Pages: 236
Authors: Jeffrey Carr
Categories: Computers
Type: BOOK - Published: 2009-12-15 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

What people are saying about Inside Cyber Warfare "The necessary handbook for the 21st century." --Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microso
The Perfect Weapon
Language: en
Pages: 402
Authors: David E. Sanger
Categories: Political Science
Type: BOOK - Published: 2018-06-19 - Publisher: Crown

GET EBOOK

NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, N
Cyber War Will Not Take Place
Language: en
Pages: 235
Authors: Thomas Rid
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Oxford University Press, USA

GET EBOOK

A fresh and refined appraisal of today's top cyber threats