Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies creat
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
This book explores Australia's prospective cyber-warfare requirements and challenges. It describes the current state of planning and thinking within the Australian Defence Force with respect to Network Centric Warfare, and discusses the vulnerabilities that accompany the use by Defence of the National Information Infrastructure (NII), as well as Defence's responsibility for the protection of the NII. It notes the multitude of agencies concerned in various ways with information security, and argues that mechanisms are required to enhance coordination between them. It also argues that Australia has been laggard with respect to the development of offensive cyber-warfare plans and capabilities. Finally, it proposes the establishment of an Australian Cyber-warfare Centre responsible for the planning and conduct of both the defensive and offensive dimensions of cyber-warfare, for developing doctrine and operational concepts, and for identifying new capability requirements. It argues that the matter is urgent in order to ensure that Australia will have the necessary capabilities for conducting technically and strategically sophisticated cyber-warfare activities by the 2020s. The Foreword has been contributed by Professor Kim C. Beazley, former Minister for Defence (1984--90), who describes it as 'a timely book which transcends old debates on priorities for the defence of Australia or forward commitments, (and) debates about globalism and regionalism', and as 'an invaluable compendium' to the current process of refining the strategic guidance for Australia's future defence policies and capabilities.
Strategic Information Warfare reports on the findings of an exercise-based analysis of the information warfare problem. The RAND team was joined in this study effort by senior exercise participants from the national security community and the information system and telecommunications industries. Multiple groups of participants went through a series of CyberWar exercises based on a methodology known as "The Day After..." - which was originally developed by RAND to explore a variety of emerging nuclear proliferation threats and related counterproliferation issues. Using this same methodology, the authors identify the defining features of strategic information warfare, discuss the implications for strategic defense, and recommend a set of potential initiatives to minimize the likelihood of a cyberspace warfare crisis. Strategic information warfare is a very new concept. It is the emerging face of CyberWar - a phenomenon that once was largely hypothetical.
'Information War, ' in all of its actual and semantic variations, is a very hot topic these days. The subject has received considerable attention in a variety of forums: serious analysis for professionals, popularized accounts for lay audiences, pop futurology, and post-Cold War melodramas. The national security bureaucracy is currently very active in this arena, with all of the military services and various civilian agencies and their supporting analytical organizations (including RAND) establishing centers for information warfare, writing position papers, and generally grappling with the problem of how to cope with the information revolution and its consequences. There is good news and bad news in the surge of interest in information warfare. The good news is that the public discussion could heighten the awareness of policy-makers to information-related issues and possibly help focus policy-level debates. Recognizing the importance of using information effectively in war is hardly news-Sun Tzu, for example, covered the subject over 2000 years ago. Moreover, there have been continuing, well established efforts in the national security community in many critical information-related areas electronic combat, computer and communications security, intelligence collection of all sorts, etc.-that long predate the current interest in information warfare.
This volume shows how to mitigate attacks on organizational decision-making and predict the impact of attacks on robustness, quality, and timeliness of an organization. Moreover, this book explains how to manage, in real time, the processes of attacking enemy organizations or defending friendly ones. By integrating artificial intelligence, game theory, control theory, management science, organizational science, and cognitive modeling, this resource helps professionals rethink the relations between organization, warfare, and information.
Nation-states and violent nonstate actors (VNSAs)-- including terrorists and insurgents-- rely on positive perceptions (or at least acceptance) among key constituencies in order to muster support necessary for achieving their strategic objectives. As illustrated in the chapters of this volume, the information domain requires a sophisticated strategic communications ability in order to influence the policy and behavior of states as well as the hearts and minds of citizens. A core objective of this volume is to help develop a deeper understanding of this ongoing struggle for what some have called strategic influence, and particularly how states can counter the role that ideologies, the media and the Internet play in radicalizing new agents of terrorism.