Strategy: Context and Adaptation from Archidamus to Airpower (Transforming War)

Rating: 
Amazon Price: $39.95 $39.95 (as of November 24, 2017 21:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How does one engage in the study of strategy? Strategy: Context and Adaptation from Archidamus to Airpower argues that strategy is not just concerned with amassing knowledge; it is also about recognizing our imperfect understanding of the environment and respecting the complex nature of adaptation to the unforeseen or unexpected. In essence, the strongest strategists are those who commit to an education that cultivates a more holistic and adaptive way of thinking. With that thought in mind, the contributors to Strategy, each a current or former professor at the School of Advanced Air and Space Studies, widely considered the Department of Defense’s premier school of strategy, offer ways of thinking strategically about a variety of subject matters, from classical history to cyber power.

Practitioners in the profession of arms, perhaps more than any other profession, must employ critical thinking where the application of power on land, at sea, in the air, and in space and cyberspace are concerned. Strategy examines various sub-disciplines regarding the use of power, and illuminates different approaches to thinking which have implications beyond the implementation of force.

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

Rating: 
Amazon Price: $36.95 $36.93 You save: $0.02 (%). (as of November 25, 2017 06:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.

Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber — attacks — predominantly from the United States.
Continue reading “China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain”

Strategic Cyber Deterrence: The Active Cyber Defense Option

Amazon Price: $40.00 $38.39 You save: $1.61 (4%). (as of November 25, 2017 00:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors’ advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors’ objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.

The Nature of War in the Information Age: Clausewitzian Future Strategy History

The Nature of War in the Information Age: Clausewitzian Future (Strategy and History)There has been a great deal of speculation recently concerning the likely impact of the ‘Information Age‘ on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.

Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of ‘Information Power' and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.

Price: $45.95

Click here to buy from Amazon

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

Rating: 
Amazon Price: N/A (as of November 25, 2017 02:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber — attacks — predominantly from the United States.
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors — Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West — address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.