This book explains what network-centric warfare is, and how it works, using concrete historical naval examples rather than the usual abstractions. It argues that navies invented this style of warfare over the last century, led by the Royal Navy, and that the wars of that century, culminating in the Cold War, show how networked warfare worked – and did not work.These wars also illustrate what net-on-net warfare means; most exponents of the new style of war assume that the United States will enjoy a monopoly on it. This account is important to all the services; it is naval because navies were the first to use network-centric approaches (the book does take national air defense into account, because air defense systems deeply influenced naval development). This approach is probably the only way a reader can get a realistic feeling for what the new style of war offers, and also for what is needed to make it work. Thus the book concentrates on the tactical picture which the network is erected to help form and to disseminate, rather than, as is usual, the communications network itself.This approach makes it possible to evaluate different possible contributions to a network-centric system, because it focuses on what the warriors using the picture really want and need.Without such a focus, the needs of networked warfare reduce simply to the desire for more and more information, delivered at greater and greater speeds. Although it concentrates on naval examples, this book is of vital importance to all the services. It is the first book about network-centric warfare to deal in concrete examples, and the first to use actual history to illuminate current operational concepts.It also offers considerable new light on the major naval battles of the World Wars, hence ought to be of intense interest to historians. For example, it offers a new way of understanding the naval revolution wrought in the pre-1914 Royal Navy by Admiral Sir John Fisher.
At its current rate, technological development has outpaced corresponding changes in international law. Proposals to remedy this deficiency have been made, in part, by members of the Shanghai Cooperation Organization (led by the Russian Federation), but the United States and select allies have rejected these proposals, arguing that existing international law already provides a suitable comprehensive framework necessary to tackle cyber-warfare. Cyber-Attacks and the Exploitable Imperfections of International Law does not contest (and, in fact, supports) the idea that contemporary jus ad bellum and jus in bello, in general, can accommodate cyber-warfare. However, this analysis argues that existing international law contains significant imperfections that can be exploited; gaps, not yet filled, that fail to address future risks posed by cyber-attacks.
Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Whos really in control of whats happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internets challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. Its a book about the fate of one idea–that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Googles struggles with the French government and Yahoos capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBays struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local. * Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers * Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics * Supplies examinations of both the domestic and international efforts to combat cybercrime * Serves an ideal text for first-year undergraduate students in criminal justice programs
This book presents a framework to reconceptualize Internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace.