Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational Capabilities

Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational CapabilitiesOwing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy’s afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC’s Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD’s network-centric operational concept and the Department of the Navy’s (DON’s) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval ‘mission assurance’.

Price: $130.25

Click here to buy from Amazon

Wiki at War: Conflict in a Socially Networked World

Wiki at War: Conflict in a Socially Networked WorldIn 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.

WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
In Wiki at War, James Jay Carafano explains why these and other Internet-born initiatives matter and how they are likely to affect the future face of war, diplomacy, and domestic politics.
“The war for winning dominance over social networks and using that dominance to advantage is already underway,” Carafano writes in this extremely timely analysis of the techno-future of information and the impact of social networking via the Internet. Drawing on his extensive knowledge of history and defense strategy, Carafano creates a cogent analysis of what is truly new about the “new media,” and what is simply a recasting of human warfare in contemporary forms.
Wiki at War is written in a lively, accessible style that will make this technological development comprehensible and engaging for general readers without sacrificing the book’s usefulness to specialists. Outlining the conditions under which a difference in degree becomes a difference in kind, detailing how ancient wisdom can still apply to national security decisions, and examining the conditions under which new expertise is required to wage effective diplomacy or successful military strategy, Carafano casts in stark relief the issues that face political, military, and social leaders in trying to manage and control information, in both the international and domestic arenas. Wiki at War affords stimulating thought about and definitive discussion of this vital emerging topic.

Price: $24.95

Click here to buy from Amazon

 

Cyber Warfare and Cyber Terrorism (Premier Reference)

Cyber Warfare and Cyber Terrorism (Premier Reference)Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.

Price: $165.00

Click here to buy from Amazon

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability – CRS Report

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability - CRS ReportIn September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide.

From the perspective of many national security and technology observers, the emergence of the Stuxnet worm is the type of risk that threatens to cause harm to many activities deemed critical to the basic functioning of modern society. The Stuxnet worm covertly attempts to identify and exploit equipment that controls a nation’s critical infrastructure. A successful attack by a software application such as the Stuxnet worm could result in manipulation of control system code to the point of inoperability or long-term damage. Should such an incident occur, recovery from the damage to the computer systems programmed to monitor and manage a facility and the physical equipment producing goods or services could be significantly delayed. Depending on the severity of the attack, the interconnected nature of the affected critical infrastructure facilities, and government preparation and response plans, entities and individuals relying on these facilities could be without life sustaining or comforting services for a long period of time. The resulting damage to the nation’s critical infrastructure could threaten many aspects of life, including the government’s ability to safeguard national security interests.

Iranian officials have claimed that Stuxnet caused only minor damage to its nuclear program, yet the potential impact of this type of malicious software could be far-reaching. The discovery of the Stuxnet worm has raised several issues for Congress, including the effect on national security, what the government’s response should be, whether an international treaty to curb the use of malicious software is necessary, and how such a treaty could be implemented. Congress may also consider the government’s role in protecting critical infrastructure and whether new authorities may be required for oversight.

Price: $0.99

Click here to buy from Amazon

Network-Centric Warfare: How Navies Learned to Fight Smarter Through Three World Wars

Network-Centric Warfare: How Navies Learned to Fight Smarter Through Three World WarsOver the past decade, the United States has moved toward a new style of warfare, called network centric, that uses an almost real-time, shared picture of a military situation as the basis for operations. To explain what network-centric warfare is and how it works, defense analyst Norman Friedman uses specific historical examples of actual combat rather than the abstractions common to other books on the subject. He argues that navies invented this style of warfare and that twentieth-century wars, culminating in the Cold War, show how networked warfare worked and did not work and illustrate what net-on-net warfare means. The book builds on Friedman s personal experience in an early application of network-centric warfare that developed the method of targeting the Tomahawk anti-ship missile.To give readers a realistic feeling for what the new style of warfare offers and what is needed to make it work, the book concentrates on the tactical picture, not the communications network itself. Friedman s focus on what the warriors really want and need makes it possible to evaluate the various contributions to a network-centric system. Without such a focus, Friedman notes, the needs of networked warfare reduce simply to the desire for more and more information, delivered at greater and greater speeds. The information he provides is valuable to all the services, and students of history will appreciate the light it sheds on new ways of understanding old conflicts.

Price: $32.95

Click here to buy from Amazon