Details

Information Warfare


Information Warfare


2. Aufl.

von: Daniel Ventre

136,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 10.02.2016
ISBN/EAN: 9781119277316
Sprache: englisch
Anzahl Seiten: 352

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations.</p> <p>This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?</p> <p> </p>
<p>Introduction ix</p> <p><b>Chapter 1. The United States 1</b></p> <p>1.1. Information warfare in the 1990s 1</p> <p>1.1.1. Points of view from security experts 1</p> <p>1.1.2. US Air Force Doctrine: AFDD 2-5 (1998) 7</p> <p>1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998) 10</p> <p>1.1.4. Components of information warfare 14</p> <p>1.2. Information warfare in the 2000s 23</p> <p>1.2.1. Dictionary of the Department of Defense 23</p> <p>1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006) 24</p> <p>1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006) 26</p> <p>1.3. Information warfare in the 2010s 28</p> <p>1.4. Important concepts and reflections 43</p> <p>1.4.1. Information operations 44</p> <p>1.4.2. Information superiority 51</p> <p>1.4.3. The “value” of information 62</p> <p>1.4.4. Information system 65</p> <p>1.4.5. Command and control warfare: C2W 66</p> <p>1.4.6. Effect-based operations (EBOs) 68</p> <p>1.4.7. The OODA loop 69</p> <p>1.4.8. RMA 70</p> <p>1.4.9. C4ISR 72</p> <p>1.4.10. Network centric warfare (NCW) 73</p> <p>1.4.11. ISR: intelligence, surveillance, reconnaissance 74</p> <p>1.4.12. Cyberwar 75</p> <p>1.4.13. Netwar 89</p> <p><b>Chapter 2. China 91</b></p> <p>2.1. Significant publications 91</p> <p>2.2. Strategic and doctrinal thinking about information warfare. Genesis 96</p> <p>2.2.1. General Wang Pufeng: one of the pioneers 97</p> <p>2.2.2. Wang Baocun and Li Fei 100</p> <p>2.2.3. Wei Jincheng 104</p> <p>2.2.4. Colonels Qiao Liang and Wang Xiangsui: unrestricted warfare 105</p> <p>2.2.5. General Dai Qingmin and Wang Baocun 111</p> <p>2.2.6. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui 114</p> <p>2.2.7. 2004 White Paper on national defense 115</p> <p>2.3. Recent policies and strategies on information and cyber security 117</p> <p>2.3.1. The Science of Military Strategy 2013 118</p> <p>2.3.2. Defense White Paper 2013 118</p> <p>2.3.3 Sino-Russian cybersecurity agreement 2015 119</p> <p>2.3.4. PLA Daily editorial on 20 May 2015 121</p> <p>2.3.5. Defense White Paper of 26 May 2015 122</p> <p>2.3.6. The national cybersecurity bill of July 2015 125</p> <p>2.4. Reflections 125</p> <p>2.4.1. The American perspective on Chinese information warfare, modernization and informatization of the PLA 125</p> <p>2.4.2. Evolution of analyses and discourse about Chinese strategy 163</p> <p>2.4.3. China as a “victim” 172</p> <p>2.4.4. The strategy of active defense 173</p> <p><b>Chapter 3. Russia 177</b></p> <p>3.1. Military doctrines and national security strategies 180</p> <p>3.2. Information warfare in practice 185</p> <p>3.2.1. Cyber attacks against Estonia. Who is the culprit? 186</p> <p>3.2.2. The Russia–Georgia conflict 194</p> <p>3.2.3. Ukraine 214</p> <p>3.3. Comments 220</p> <p>3.3.1. Characteristics of the Russian idea of information warfare 220</p> <p>3.3.2. Aggressiveness 222</p> <p>3.3.3. Type of Cold War 223</p> <p>3.3.4. Challenges, objectives and targets 224</p> <p>3.3.5. Psychological information warfare 229</p> <p>3.3.6. Players of information warfare 233</p> <p>3.3.7. Hybrid warfare and information warfare 236</p> <p>3.3.8. Information warfare: what is new… 240</p> <p><b>Chapter 4. Concepts and Theories: Discussions 247</b></p> <p>4.1. Doctrines 247</p> <p>4.2. Information warfare: definitions, models 256</p> <p>4.2.1. The information environment 257</p> <p>4.2.2. Definitions and models for information warfare 261</p> <p>4.3. Information warfare or data warfare? 281</p> <p>4.3.1. Defining data 284</p> <p>4.3.2. Some theories about data 289</p> <p>4.3.3. Visualization 296</p> <p>4.3.4. Data warfare? 306</p> <p>Conclusion 325</p> <p>Index 329</p>
<b>Daniel Ventre</b> is an engineer for CNRS, a researcher for CESDIP (Centre de recherches sociologiques sur le droit et les institutions pénales), and in charge of courses at Télécom ParisTech and at the ESSEC Business School. He is the author of a number of articles and works, in France and abroad, on the themes of cyberwar, information warfare, cyberconflict, cybersecurity and cyberdefense.

Diese Produkte könnten Sie auch interessieren:

Computational Intelligence
Computational Intelligence
von: Diego Andina, Duc Truong Pham
PDF ebook
96,29 €
Advances in Modeling Agricultural Systems
Advances in Modeling Agricultural Systems
von: Petraq Papajorgji, Panos M. Pardalos
PDF ebook
149,79 €
From Combinatorics to Philosophy
From Combinatorics to Philosophy
von: Ernesto Damiani, Ottavio D'Antona, Vincenzo Marra, Fabrizio Palombi
PDF ebook
149,79 €