Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts and Technologies?

Five-Dimensional (Cyber) Warfighting: Can The Army After Next Be Defeated Through Complex Concepts and Technologies?With the end of the Cold War, U.S. national security perceptions concerning “Who is the threat?” have been thrown into free fall along with those governmental and military institutions meant to contend with it. Resulting from the spreading chaos and ambiguity in the nation-state system, which stem from the simultaneous processes of fragmentation and regionalization, a new question now needs to be asked—“What is the threat?” Increasingly, national security experts have argued that gray area phenomena,“. . . where control has shifted from legitimate governments to new half political, half-criminal powers,” will become the dominant threat.1 Such entities flourish in the growing failed-state operational environment where a condition of “not war–not crime” prevails and nation-state forces operating within it find themselves facing a severe capability gap.2 These entities disregard Western based “laws of war” and “rules of engagement” and are not concerned about such conventions as “legitimacy” or “public opinion.” Of further significance is the recognition that we are beginning the transition from the modern to the postmodern epoch in Western civilization. Past periods of transition such as this have historically witnessed the two collinear trends of the blurring of crime and war, along with shifts in social classes, economic modes, and motive sources which ultimately result in the fall of one civilization and its replacement by another more advanced one. 3 During the earlier shift from the medieval to the modern epoch, three new forms of social and political organization developed dynastic- (proto nation-) states, city-states, and city-leagues—as competitors to the then dominant feudal structure,4 in tandem with the domination of the battlefield by the non state soldier. Ultimately the early nation-state form and its mercenary armies won out over both these competitors and the preexisting civilization based upon Church, empire, and fief. As the shift to the post-modern epoch becomes more pronounced, we can expect similar competitors to the nation-state form and our modern civilization to emerge along with the accompanying non-state soldier. One such projected warmaking entity, “Black,” and its advanced means of waging war will be discussed in this paper. It is based upon an organizational structure far different than the classical hierarchy to which we are accustomed. Rather, it is nonlinear in function, composed of informational paths analogous to webs and nets, and basic units characterized as nodes and free floating cells.5 Such an organizational structure allows for the greater exploitation of postmechanical energy sources, advanced technologies, and new warfighting concepts which will come to dominate what we will term “war” in the decades to come.

Price: $14.95

Click here to buy from Amazon

Green Dam Youth Escort – Internet Censorship in the People’s Republic of China

Internet Censorship in the People's Republic of China, Green Dam Youth EscortChapters: Internet Censorship in the People’s Republic of China, Green Dam Youth Escort (绿坝·花季护航), Blocking of Wikipedia by the People’s Republic of China, List of Websites Blocked in the People’s Republic of China, Golden Shield Project, War of Internet Addiction, List of Words Censored by Search Engines in the People’s Republic of China, History of Internet Censorship in the People’s Republic of China, Very Erotic Very Violent, 50 Cent Party, List of Internet Phenomena in the People’s Republic of China, Big Mama, Elgoog. Excerpt: 50 Cent Party (Chinese : ; pinyin : W máo D ng), also called 50 Cent Army , refers to paid astroturfing internet commentators working for the People’s Republic of China , whose role is posting comments favorable towards the government policies to skew the public opinion on various Internet message boards. They are named after the 50 Chinese cents, or 5 mao, they are paid per such post, other names are red vests , red vanguard and the Five Mao Party . Conservative estimates put the strength of the 50 Cents Army at tens of thousands while other estimates put their numbers as high as 280,000 300,000. Their activities were described by Chinese President Hu Jintao as “a new pattern of public-opinion guidance”. They operate primarily in Chinese, but English language posts appear as well. Their effect is most felt at the domestic Chinese-language websites, bulletin board systems , and chatrooms . Their role is to steer the discussion away from anti-party articulations, politically sensitive or “unacceptable” content and advance the party line of the Communist Party of China . It has been argued that it is not so much censorship but a public relations tactic. According to the Indian Daily News and Analysis , “to this day, anyone who posts a blatantly propagandist pro-Communist …

Price: $19.99

Click here to buy from Amazon

Related articles

Stray Voltage: War in the Information Age

Stray Voltage: War in the Information AgeEnemies of America who have no hope of competing with conventional U.S. military forces, Wayne Michael Hall warns in the opening pages of this timely book, will instead seize upon the strategies, tactics, and tools of asymmetric warfare to win future conflicts. A retired brigadier general in the U.S. Army with thirty years of experience in intelligence, Hall has written the book primarily for the military community and civilians interested in or responsible for homeland security. He explains the notion of knowledge warfare as our adversaries’ principal asymmetric strategy and information operations as their tactic du jour, and then offers a wealth of ideas on how to deal aggressively with these threats in the twenty-first century.

Along with knowledge war and information operations, the book discusses deception, information superiority, and knowledge management. It also recommends ways for the country to prepare for knowledge war through merging the country’s brainpower and technology in Knowledge Advantage centers, developing a joint information-operations proving ground where leaders train their staffs in a cyber-world environment, and developing an internet replicator to prepare for conflict in cyberspace. The book is published in cooperation with the Association of the U.S. Army. 272 pages. Notes. Index. Hardcover. 6 x 9 inches.

Price: $36.95

Click here to buy from Amazon

Netcat Power Tools

Netcat Power ToolsOriginally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a “Swiss Army knife” utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat’s functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool’s many features, and by the end of this book, you’ll discover how Netcat can be one of the most valuable tools in your arsenal.

* Get Up and Running with Netcat Simple yet powerful…Don’t let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat’s port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat’s not the only game in town…Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.
* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.
* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems using Netat’s scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.

* Comprehensive introduction to the #4 most popular open source security tool available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily tasks

Price:

Click here to buy from Amazon

Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-ExploitationA complete guide to understanding and fighting advanced persistent threats—today’s most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today’s well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors’ FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Price: $40.00

Click here to buy from Amazon