Throughout the centuries much debate has been made over the practice of War, the procedures that create the circumstances which lead to its employment, and the questioning of its inevitability in the contemporary world. Traditional warfighting has changed in the 1990s due to the rapid development of ICTs, leading into a whole new generation of warfare. The military must adapt or fail. Exponential increases in the availability of information are leading to an era of cheap information available to anyone, anywhere and the emergence of Network Centric Operations. This will vastly change the nature of the battlespaces and the nature of war itself. This whole procedure goes under the name of “Force Transformation” and has as an utter goal the Dominance over the Full Spectrum of Operations. So, the question to ponder is “Can Transformation be managed and if yes, how?”
Another release in our popular “Computer World: Books for IT Leaders” series, Information Warfare explains the methodologies behind hacks and cyber attacks and provides defensive strategies and counter measures designed to help companies survive infrastructure attacks, military conflicts, competitive intelligence gathering, economic warfare, and corporate espionage. The authors are renowned industry experts–Michael Erbschloe has connections with the government and is known for his analysis of The Love Bug.
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
In Wiki at War, James Jay Carafano explains why these and other Internet-born initiatives matter and how they are likely to affect the future face of war, diplomacy, and domestic politics.
“The war for winning dominance over social networks and using that dominance to advantage is already underway,” Carafano writes in this extremely timely analysis of the techno-future of information and the impact of social networking via the Internet. Drawing on his extensive knowledge of history and defense strategy, Carafano creates a cogent analysis of what is truly new about the “new media,” and what is simply a recasting of human warfare in contemporary forms.
Wiki at War is written in a lively, accessible style that will make this technological development comprehensible and engaging for general readers without sacrificing the book’s usefulness to specialists. Outlining the conditions under which a difference in degree becomes a difference in kind, detailing how ancient wisdom can still apply to national security decisions, and examining the conditions under which new expertise is required to wage effective diplomacy or successful military strategy, Carafano casts in stark relief the issues that face political, military, and social leaders in trying to manage and control information, in both the international and domestic arenas. Wiki at War affords stimulating thought about and definitive discussion of this vital emerging topic.
Dr. Berg P. Hyacinthe (PhD, Florida State University; LLD Candidate, Assas School of Law, CERSA-CNRS, La Sorbonne) is internationally recognized as an eminent and multidisciplinary scientific investigator. A U.S. patent holder featured in Harvard’s Smithsonian/NASA Astrophysics Data System, Dr. Hyacinthe recently served as Assistant Professor and Scientific Advisor to Taibah University’s Strategic Science & Advanced Technology Unit. Dr. Hyacinthe held several positions at County and State levels of the U.S Government in the Information Technology arena. He has been featured in conferences held at the U.S. Naval Postgraduate School, Monterey (author); Defence Academy of the United Kingdom, Shrivenham (invited session Chair); and National Defence College, Helsinki (session Chair). In CYBER WARRIORS AT WAR, he draws on the triangular relationship between technology, law, and Information Age warfare to propose solutions against potential charges of having committed Information Operations (IO) war crimes and/or IO crimes against humanity. According to Dr. Hyacinthe, the success of pre-emptive strikes and decisive military operations depends profoundly upon both reliable human intelligence and the versatile skills of 21st century “cyber warriors” whose IO activities are conducted through modern warfare’s pentagonal synchrony – land, sea, air, cyberspace, and outer space. Unfortunately, these operations are commonly effectuated under a legal reasoning that is ambiguous in important ways: a threat to the national security of the United States of America and to the entire international community. Hence, as this Essay argues, the evolution of modern computer systems as weapons of war compels wary jurists to turn to the laws that should govern development and use of lethal information technologies. Further, this Essay examines how certain military operations within Information Warfare (IW) require new legal framework, and recounts specific events involving various types of IW conduct and cyber attack: an interesting exposé to jurists, military personnel, policymakers, and the growing and diverse body of information professionals around the world.
A former top-level National Security Agency insider goes behind the headlines to explore America’s next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon‘s secret communications systems.
Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a “glass house,” all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.
The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we’ve done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.
In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.