Table of Contents
1 Cover
5 1 The United States, States and the False Claims of the End of the Global Internet 1.1. Introduction 1.2. The creation of the internet and the development of cyberspace by the United States 1.3. Cyberspace transformed by the arrival in force of states 1.4. Praxis of state coercion in cyberspace 1.5. The fragmentation of the global internet and the digital sovereignty of states 1.6. The strong constraint of interstate cooperation for all states 1.7. Conclusion 1.8. References
6 2 Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management 2.1. Introduction 2.2. Societal and institutional dynamics 2.3. Organizational and bureaucratic dynamics 2.4. Individual dynamics 2.5. Conclusion 2.6. References
7 3 Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question? 3.1. Introduction 3.2. A model designed and developed in response to the threats and challenges of the early 2010s 3.3. A strict separation of offensive and defensive functions and missions: an obstacle to better defense? 3.4. Conclusion 3.5. References
8 4 The Boundary Between Cybercrime and Cyberwar: An Uncertain No-Man’s Land 4.1. Introduction 4.2. The field of cybercrime up to the limits of the glass ceiling 4.3. War in cyberspace, cyber in war 4.4. Conclusion 4.5. References
9 5 Cyberdefense, the Digital Dimension of National Security 5.1. Introduction 5.2. Cyberdefense in the political and legal framework of digital security 5.3. The emergence of a coherent legal regime for cyberdefense 5.4. Conclusion 5.5. References
10 6 Omnipresence Without Omnipotence: The US Campaign Against Huawei in the 5G Era 6.1. Introduction 6.2. The unilateral American offensive against Huawei: a disruptive campaign causing significant collateral damage 6.3. The American diplomatic offensive: the limits of American rhetorical coercion of their partners and allies 6.4. The anti-Huawei offensive: a barometer of American power? 6.5. References
11 7 The Issue of Personal and Sovereign Data in the Light of an Emerging “International Law of Intelligence” 7.1. Introduction 7.2. The legal rules invoked in the collection of personal and sovereign data 7.3. Data localization in the light of international intelligence law 7.4. Conclusion 7.5. Appendix: the quadrants of intelligence law 7.6. Sources and references
12 8 International Cybersecurity Cooperation 8.1. Current attack trends 8.2. The multiple paths of international cooperation 8.3. The issue of attack attribution
13 9 Cyberdefense and Cybersecurity Regulations in the United States: From the Failure of the “Comprehensive Policy” to the Success of the Sectoral Approach 9.1. Introduction 9.2. The identification of a new threat and the impact of cyber on how US security and defense policies are designed 9.3. From the impact of cyber on policy to the impact of politics on cyber 9.4. From a comprehensive cyber policy to a sectoral approach: the success of an undeclared regulatory policy 9.5. Conclusion 9.6. References
15 Index