The government of the People’s Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China‘s capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.
Has the Stuxnet worm ushered in a new era of cyberwar, or is it simply the latest iteration of familiar strategic instruments? Has the Internet irrevocably shifted the balance between individuals and states, or will governments adapt to regain the upper hand? Does the real threat to cybersystems lie within cyberspace, or in the real world? Cyberwar has become a permanent feature of the strategic landscape, but we might hardly know it.
Enemies of America who have no hope of competing with conventional U.S. military forces, Wayne Michael Hall warns in the opening pages of this timely book, will instead seize upon the strategies, tactics, and tools of asymmetric warfare to win future conflicts. A retired brigadier general in the U.S. Army with thirty years of experience in intelligence, Hall has written the book primarily for the military community and civilians interested in or responsible for homeland security. He explains the notion of knowledge warfare as our adversaries’ principal asymmetric strategy and information operations as their tactic du jour, and then offers a wealth of ideas on how to deal aggressively with these threats in the twenty-first century.
Along with knowledge war and information operations, the book discusses deception, information superiority, and knowledge management. It also recommends ways for the country to prepare for knowledge war through merging the country’s brainpower and technology in Knowledge Advantage centers, developing a joint information-operations proving ground where leaders train their staffs in a cyber-world environment, and developing an internet replicator to prepare for conflict in cyberspace. The book is published in cooperation with the Association of the U.S. Army. 272 pages. Notes. Index. Hardcover. 6 x 9 inches.
Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.
Warfare and conflict are no longer just about the clash of uniformed armies and their cutting-edge technology. Conflict in the Information Age is about ideas, values, aspirations, fears and the struggle of people for identity. How will humankind define and wage war in the Infosphere? This book is about a journey into a new place that we have yet to define. It is offered by thinkers in the forefront of American and British government, academic, military, and private industry. Here are some of the issues examined:
• Is Infowar real?
• Who will defend cyberspace?
• What are Information Operations?
• Can and should the military patrol the information highway?
• What are the legal, ethical and moral issues?
• Will information decrease or add to the fog of war?
•Can we safely outsource national security?
• What did Kosovo teach us?
• How would Sun Tzu have employed information war?
• How real is the Insider Threat?
• What is the psychology of future war?
• Will technology be master or servant?
• Can perceptions be managed in peace, crisis and war?
• Who should protect critical infrastructures and how?
• What is the information content in National Security Strategy?