Cyberwars in the Middle East / / Ahmed Al-Rawi.

Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
VerfasserIn:
Place / Publishing House:New Brunswick, NJ : : Rutgers University Press, , [2021]
©2021
Year of Publication:2021
Language:English
Series:War Culture
Online Access:
Physical Description:1 online resource (194 p.) :; 22 b-w images, 12 tables
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781978810143
lccn 2020052863
ctrlnum (DE-B1597)596592
(OCoLC)1259591222
collection bib_alma
record_format marc
spelling Al-Rawi, Ahmed, author. aut http://id.loc.gov/vocabulary/relators/aut
Cyberwars in the Middle East / Ahmed Al-Rawi.
New Brunswick, NJ : Rutgers University Press, [2021]
©2021
1 online resource (194 p.) : 22 b-w images, 12 tables
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
War Culture
Frontmatter -- Contents -- Preface and Acknowledgments -- Introduction -- 1 Toward a Theoretical Framework of Cyberwars -- 2 Cyberwars and International Politics -- 3 U.S. Cyberoperations in the Middle East -- 4 Russian Trolls, Islam, and the Middle East -- 5 Cyberwars and Regional Politics -- 6 Arab Hackers and Electronic Armies -- Conclusion -- Appendix: Selected List of Arab Hacking Groups -- Notes -- References -- Index -- About the Author
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022)
Cyberspace Political aspects Middle East.
Hacking Middle East.
Information warfare Middle East.
HISTORY / General. bisacsh
middle east, cybersecurity, hacking, hackers, communication, politics, policies, influence, structural realism theory, political disruption, Algeria, Algerian hackers, horizontal leadership, surveillance, internal politics, opposition, ideology, government, cyber-attacks, regional politics, Arab, Russia, trolls, Islam, international, international politics.
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English 9783110754001
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 9783110753776 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE History 2021 English 9783110754087
Title is part of eBook package: De Gruyter EBOOK PACKAGE History 2021 9783110753851 ZDB-23-DEG
Title is part of eBook package: De Gruyter Rutgers University Press Complete eBook-Package 2021 9783110739138
https://doi.org/10.36019/9781978810143
https://www.degruyter.com/isbn/9781978810143
Cover https://www.degruyter.com/document/cover/isbn/9781978810143/original
language English
format eBook
author Al-Rawi, Ahmed,
Al-Rawi, Ahmed,
spellingShingle Al-Rawi, Ahmed,
Al-Rawi, Ahmed,
Cyberwars in the Middle East /
War Culture
Frontmatter --
Contents --
Preface and Acknowledgments --
Introduction --
1 Toward a Theoretical Framework of Cyberwars --
2 Cyberwars and International Politics --
3 U.S. Cyberoperations in the Middle East --
4 Russian Trolls, Islam, and the Middle East --
5 Cyberwars and Regional Politics --
6 Arab Hackers and Electronic Armies --
Conclusion --
Appendix: Selected List of Arab Hacking Groups --
Notes --
References --
Index --
About the Author
author_facet Al-Rawi, Ahmed,
Al-Rawi, Ahmed,
author_variant a a r aar
a a r aar
author_role VerfasserIn
VerfasserIn
author_sort Al-Rawi, Ahmed,
title Cyberwars in the Middle East /
title_full Cyberwars in the Middle East / Ahmed Al-Rawi.
title_fullStr Cyberwars in the Middle East / Ahmed Al-Rawi.
title_full_unstemmed Cyberwars in the Middle East / Ahmed Al-Rawi.
title_auth Cyberwars in the Middle East /
title_alt Frontmatter --
Contents --
Preface and Acknowledgments --
Introduction --
1 Toward a Theoretical Framework of Cyberwars --
2 Cyberwars and International Politics --
3 U.S. Cyberoperations in the Middle East --
4 Russian Trolls, Islam, and the Middle East --
5 Cyberwars and Regional Politics --
6 Arab Hackers and Electronic Armies --
Conclusion --
Appendix: Selected List of Arab Hacking Groups --
Notes --
References --
Index --
About the Author
title_new Cyberwars in the Middle East /
title_sort cyberwars in the middle east /
series War Culture
series2 War Culture
publisher Rutgers University Press,
publishDate 2021
physical 1 online resource (194 p.) : 22 b-w images, 12 tables
contents Frontmatter --
Contents --
Preface and Acknowledgments --
Introduction --
1 Toward a Theoretical Framework of Cyberwars --
2 Cyberwars and International Politics --
3 U.S. Cyberoperations in the Middle East --
4 Russian Trolls, Islam, and the Middle East --
5 Cyberwars and Regional Politics --
6 Arab Hackers and Electronic Armies --
Conclusion --
Appendix: Selected List of Arab Hacking Groups --
Notes --
References --
Index --
About the Author
isbn 9781978810143
9783110754001
9783110753776
9783110754087
9783110753851
9783110739138
callnumber-first U - Military Science
callnumber-subject U - General Military Science
callnumber-label U163
callnumber-sort U 3163 A37 42021
geographic_facet Middle East.
url https://doi.org/10.36019/9781978810143
https://www.degruyter.com/isbn/9781978810143
https://www.degruyter.com/document/cover/isbn/9781978810143/original
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 355 - Military science
dewey-full 355.4
dewey-sort 3355.4
dewey-raw 355.4
dewey-search 355.4
doi_str_mv 10.36019/9781978810143
oclc_num 1259591222
work_keys_str_mv AT alrawiahmed cyberwarsinthemiddleeast
status_str n
ids_txt_mv (DE-B1597)596592
(OCoLC)1259591222
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021
Title is part of eBook package: De Gruyter EBOOK PACKAGE History 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE History 2021
Title is part of eBook package: De Gruyter Rutgers University Press Complete eBook-Package 2021
is_hierarchy_title Cyberwars in the Middle East /
container_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
_version_ 1806144126299668480
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05974nam a22007935i 4500</leader><controlfield tag="001">9781978810143</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20221201113901.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">221201t20212021nju fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2020052863</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781978810143</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.36019/9781978810143</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)596592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1259591222</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">U163</subfield><subfield code="b">.A37 2021</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.A37 2021</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Al-Rawi, Ahmed, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberwars in the Middle East /</subfield><subfield code="c">Ahmed Al-Rawi.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Brunswick, NJ : </subfield><subfield code="b">Rutgers University Press, </subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (194 p.) :</subfield><subfield code="b">22 b-w images, 12 tables</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">War Culture</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface and Acknowledgments -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">1 Toward a Theoretical Framework of Cyberwars -- </subfield><subfield code="t">2 Cyberwars and International Politics -- </subfield><subfield code="t">3 U.S. Cyberoperations in the Middle East -- </subfield><subfield code="t">4 Russian Trolls, Islam, and the Middle East -- </subfield><subfield code="t">5 Cyberwars and Regional Politics -- </subfield><subfield code="t">6 Arab Hackers and Electronic Armies -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Appendix: Selected List of Arab Hacking Groups -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">References -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Author</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects</subfield><subfield code="z">Middle East.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield><subfield code="z">Middle East.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">Middle East.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">middle east, cybersecurity, hacking, hackers, communication, politics, policies, influence, structural realism theory, political disruption, Algeria, Algerian hackers, horizontal leadership, surveillance, internal politics, opposition, ideology, government, cyber-attacks, regional politics, Arab, Russia, trolls, Islam, international, international politics.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="z">9783110754001</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021</subfield><subfield code="z">9783110753776</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE History 2021 English</subfield><subfield code="z">9783110754087</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE History 2021</subfield><subfield code="z">9783110753851</subfield><subfield code="o">ZDB-23-DEG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Rutgers University Press Complete eBook-Package 2021</subfield><subfield code="z">9783110739138</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.36019/9781978810143</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781978810143</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781978810143/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-073913-8 Rutgers University Press Complete eBook-Package 2021</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075408-7 EBOOK PACKAGE History 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_HICS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_HICS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEG</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2021</subfield></datafield></record></collection>