Book contents
- Cyber Mercenaries
- Cyber Mercenaries
- Copyright page
- Contents
- Figures
- Preface
- Acknowledgments
- Abbreviations
- Part I Of Brokers and Proxies
- Part II Cyber Proxies Up Close
- 4 Cyber Proxies on a Tight Leash: The United States
- 5 Cyber Proxies on a Loose Leash: Iran and Syria
- 6 Cyber Proxies on the Loose: The Former Soviet Union
- 7 Change Over Time: China’s Evolving Relationships with Cyber Proxies
- Part III Implications
- Future Research
- Notes
- Index
6 - Cyber Proxies on the Loose: The Former Soviet Union
from Part II - Cyber Proxies Up Close
Published online by Cambridge University Press: 21 December 2017
- Cyber Mercenaries
- Cyber Mercenaries
- Copyright page
- Contents
- Figures
- Preface
- Acknowledgments
- Abbreviations
- Part I Of Brokers and Proxies
- Part II Cyber Proxies Up Close
- 4 Cyber Proxies on a Tight Leash: The United States
- 5 Cyber Proxies on a Loose Leash: Iran and Syria
- 6 Cyber Proxies on the Loose: The Former Soviet Union
- 7 Change Over Time: China’s Evolving Relationships with Cyber Proxies
- Part III Implications
- Future Research
- Notes
- Index
Summary
- Type
- Chapter
- Information
- Cyber MercenariesThe State, Hackers, and Power, pp. 94 - 106Publisher: Cambridge University PressPrint publication year: 2018