Cover image for Information Warfare.
Information Warfare.
Title:
Information Warfare.
Author:
Ventre, Daniel.
ISBN:
9781118381540
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (270 pages)
Series:
Iste
Contents:
Cover -- Information Warfare -- Title Page -- Copyright Page -- Table of Contents -- Abbreviations -- Introduction -- Chapter 1. The United States -- 1.1 Information warfare in the 1990s -- 1.1.1. Points of view from security experts -- 1.1.2. US Air Force doctrine: AFDD 2-5 (1998) -- 1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998) -- 1.1.4. Components of information warfare -- 1.2. Information warfare in the 2000s -- 1.2.1. Dictionary of the Department of Defense -- 1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006) -- 1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006) -- 1.3. Other important concepts and reflections -- 1.3.1. Cyberspace and superiority of information -- 1.3.2. The "value" of information -- 1.3.3. Information system -- 1.3.4. Command and control warfare: C2W -- 1.3.5. Effect-Based Operations (EBOs) -- 1.3.6. Information-in-warfare -- 1.3.7. The OODA loop -- 1.3.8. Fourth generation warfare -- 1.3.9. Noosphere -- 1.3.10. RMA -- 1.3.11. C4ISR -- 1.3.12. Network centric warfare (NCW) -- 1.3.13. ISR: intelligence, surveillance, reconnaissance -- 1.3.14. Cyberwar -- 1.3.15. Netwar -- 1.3.16. Spin doctoring -- 1.3.17. Intelligence -- 1.3.18. Information operations -- 1.4. Loss of information control -- 1.5. American concerns -- Chapter 2. China -- 2.1. The concept of "information warfare": a genesis -- 2.1.1. General Wang Pufeng: one of the pioneers -- 2.1.2. Colonel Wang Baocun -- 2.1.3. Colonels Qiao Liang and Wang Xiangsui: out of bounds war -- 2.1.4. General Dai Qingmin and Wang Baocun -- 2.1.5. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui -- 2.1.6. 2004 white book on national defense -- 2.1.7. Sun Tzu and information warfare -- 2.1.8. How to implement the theories.

2.2. The American perspective on Chinese information warfare, modernization and informatization of the PLA -- 2.2.1. Interpretation problems -- 2.2.2. The impenetrability of China -- 2.2.3. Information warfare -- 2.2.4. Why is China intensifying the modernization of its armies? -- 2.2.5. Technologies for army modernization -- 2.2.6. In search of interpretations: the concept of "shashoujian" -- 2.2.7. 2008 DoD report concerning Chinese military power -- 2.3. Relations between Beijing and Taipei -- 2.3.1. The assassin's mace against the strategy of the scorpion -- 2.3.2. Cyber-attacks against Taiwan: psychological effects -- 2.3.3. Taiwan and information warfare -- Chapter 3. India -- 3.1. Entry into information society -- 3.1.1. Has India entered the age of information? -- 3.1.2. Security of information systems -- 3.2. Information warfare: development and adoption of the doctrine -- 3.2.1. The military doctrine -- 3.2.2. Official parties -- 3.2.3. Adoption of the information warfare doctrine -- 3.3. Understanding attacks against Indian cyberspace -- 3.3.1. Indian site defacements: statistics -- 3.3.2. Cyber crime or acts of aggression/acts of war? -- 3.4. Indian hackers -- Chapter 4. Japan -- 4.1. Japanese cyberspace flaws -- 4.1.1. Theft of defense classified data -- 4.1.2. Loss/theft of sensitive or confidential data -- 4.2. The challenges of cyberspace security -- 4.2.1. Relations between civilian and the military worlds -- 4.2.2. Cyber crime or act of information warfare? -- 4.2.3. Optimal security? -- 4.2.4. The challenges of non-traditional security -- 4.3. Information warfare: a specific Japanese approach? -- Chapter 5. Russia -- 5.1. Estonia-Russia: information warfare? -- 5.1.1. Reconstitution of facts -- 5.2. Doctrines and components of the "information warfare" concept -- 5.2.1. The development of the Russian military.

5.2.2. Intellectual information warfare -- 5.2.3. Control of an individual's physical dimensions -- 5.3. Potential players of information warfare -- 5.3.1. Government agencies -- 5.3.2. The military -- 5.3.3. Hackers -- 5.4. The Russia-Georgia conflict: new information warfare? -- 5.4.1. Operations in Russian and Georgian cyberspace -- 5.4.2. The introduction of "cyberwar" and "information warfare" in the conflict -- 5.4.3. Comments on "cyber attacks" -- 5.4.4. Isolated cyber attacks or information warfare operations? -- 5.4.5. Formulating the right questions -- Chapter 6. Singapore -- 6.1. Regional and global economic ambition -- 6.2. Challenges to security -- 6.3. Cyberspace and national security -- 6.3.1. Protected computers -- 6.3.2. Terrorism -- 6.3.3. Internet content as a source of threat -- 6.3.4. Data-mining to help security -- 6.4. Singapore armed forces in the information age -- 6.4.1. Towards modernization of armies -- 6.4.2. IKC2: Singapore's version of network centric warfare -- 6.5. Players in information warfare -- 6.5.1. Defense sector agencies -- 6.5.2. Universities and defense -- 6.5.3. Training for information warfare -- 6.6. International cooperation and cyberspace protection -- Chapter 7. Identifying Aggressors and Acts of Aggression -- 7.1. Statistical data -- 7.1.1. China: CNCERT/CC reports -- 7.1.2. Hong Kong: HKCERT/CC report -- 7.1.3. Japan: JPCERT/CC reports -- 7.1.4. South Korea: KrCERT/CC 2005 report -- 7.2. Attacks against personal information and information warfare -- 7.2.1. Characteristics of attacks against personal information -- 7.2.2. Personal data in information warfare -- 7.2.3. Attacks against personal data as a method of aggression -- 7.3. Classification of CNA type aggressions -- 7.3.1. Problems and limitations of attacks -- 7.3.2. Methods of attacks.

7.3.3. being able to define the origin of attacks with accuracy? -- 7.4. The players in CNA type aggressions -- 7.4.1. The hacker -- 7.4.2. The sponsors -- 7.4.3. Targets -- 7.5. One weapon amongst others: the virus -- 7.6. Understanding the possible strategies of attackers -- 7.6.1. Use of information warfare -- 7.6.2. Stigmergy -- 7.6.3. Swarming -- 7.6.4. Open source models as a guerilla warfare model -- 7.6.5. Psychological maneuvers or how to lie on a grand scale -- 7.6.6. The role of Internet sites in information warfare -- 7.6.7. Using blogs? -- 7.6.8. Website defacement and semantic attacks -- 7.6.9. What is cyber terrorism? -- 7.6.10. Use of web applications by insurgents -- 7.6.11. Questioning the relations between political context and cyber attacks -- Chapter 8. An Information Warfare Law? -- 8.1. Warfare and the law -- 8.2. Engaging in and conducting a war -- 8.3. Protecting combatants and non combatants -- 8.4. The challenges of information warfare for international law -- Conclusion -- Bibliography -- Index -- Blank Page.
Abstract:
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: