Chapters: Internet Censorship in the People’s Republic of China, Green Dam Youth Escort (绿坝·花季护航), Blocking of Wikipedia by the People’s Republic of China, List of Websites Blocked in the People’s Republic of China, Golden Shield Project, War of Internet Addiction, List of Words Censored by Search Engines in the People’s Republic of China, History of Internet Censorship in the People’s Republic of China, Very Erotic Very Violent, 50 Cent Party, List of Internet Phenomena in the People’s Republic of China, Big Mama, Elgoog. Excerpt: 50 Cent Party (Chinese : ; pinyin : W máo D ng), also called 50 Cent Army , refers to paid astroturfing internet commentators working for the People’s Republic of China , whose role is posting comments favorable towards the government policies to skew the public opinion on various Internet message boards. They are named after the 50 Chinese cents, or 5 mao, they are paid per such post, other names are red vests , red vanguard and the Five Mao Party . Conservative estimates put the strength of the 50 Cents Army at tens of thousands while other estimates put their numbers as high as 280,000 300,000. Their activities were described by Chinese President Hu Jintao as “a new pattern of public-opinion guidance”. They operate primarily in Chinese, but English language posts appear as well. Their effect is most felt at the domestic Chinese-language websites, bulletin board systems , and chatrooms . Their role is to steer the discussion away from anti-party articulations, politically sensitive or “unacceptable” content and advance the party line of the Communist Party of China . It has been argued that it is not so much censorship but a public relations tactic. According to the Indian Daily News and Analysis , “to this day, anyone who posts a blatantly propagandist pro-Communist …
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies.
In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities.
This is an indispensable guide to one of the key topics in security studies today.
There has been a great deal of speculation recently concerning the likely impact of the ‘Information Age‘ on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.
Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of ‘Information Power’ and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.
Amazon Price:$49.95$37.46You save:$12.49 (25%)(as of December 14, 2019 10:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012.
This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as
Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects.
. Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play.
. Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
. Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
. Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent