Skip to content

Conquest in Cyberspace National Security and Information Warfare

Best in textbook rentals since 2012!

ISBN-10: 0521692148

ISBN-13: 9780521692144

Edition: 2007

Authors: Martin C. Libicki

List price: $34.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Martin Libicki, an internationally known analyst of information systems from a national defense perspective, investigates the entire spectrum of cyberspace from hostile power (computer hacking) to friendly power (e.g. linking systems together in mutual relationships).
Customers also bought

Book details

List price: $34.99
Copyright year: 2007
Publisher: Cambridge University Press
Publication date: 4/16/2007
Binding: Paperback
Pages: 336
Size: 5.75" wide x 8.75" long x 0.75" tall
Weight: 0.990
Language: English

List of Figures
Acknowledgments
Introduction
What Does Conquest Mean in Cyberspace?
Precis
Hostile Conquest as Information Warfare
An Ideal-Type Definition of Information Warfare
Control at One Layer Is Not Control at Another
Applying the Ideal-Type Definition
There Is No Forced Entry in Cyberspace
Information Warfare Only Looks Strategic
IW Strategy and Terrorism
Conclusions
Information Warfare as Noise
Disinformation and Misinformation
Defenses against Noise
Redundancy
Filtration
What Tolerance for Noise?
Tolerance in Real Environments
Castles and Agoras
Hopping from Agoras to Castles?
Castling Foes
Concluding Observations
Can Information Warfare Be Strategic?
Getting In
Mucking Around
Spying
Denial of Service
Corruption
Distraction
Countermeasures
Redundancy
Learning
Damage Assessment
Prediction
Intelligence Is Necessary
Intelligence Alone Is Hardly Sufficient
Is Information Warfare Ready for War?
The Paradox of Control
Other Weaponization Criteria
Conclusions
Information Warfare against Command and Control
The Sources of Information Overload
Its Effect on Conventional Information Warfare Techniques
Coping Strategies
Who Makes Decisions in a Hierarchy?
Responses to Information Overload
Know the Enemy's Information Architecture
Elements of Information Culture
Elements of Nodal Architecture
Injecting Information into Adversary Decision Making
Ping, Echo, Flood, and Sag
Ping and Echo
Flood and Sag
Conclusions
Friendly Conquest in Cyberspace
A Redefinition of Conquest
The Mechanisms of Coalitions
The Particular Benefits of Coalitions
Information and Coalitions
The Cost of Coalitions in Cyberspace
Enterprise Architectures and Influence
Alliances with Individuals
The Special Case of Cell Phones
Alliances of Organizations
Ecologies of Technological Development
DoD's Global Information Grid (GIG)
Merging the Infrastructures of Allies
Conclusions
Friendly Conquest Using Global Systems
Geospatial Data
Coping with Commercial Satellites
Manipulation through Cyberspace
Getting Others to Play the Game
Some Conclusions about Geospatial Services
National Identity Systems
Two Rationales for a National Identity System
Potential Parameters for a Notional System
Constraints from and Influences over Foreign Systems
Compare, Contrast, and Conclude
Retail Conquest in Cyberspace
Information Trunks and Leaves
Where Does Cheap Information Come From?
Surveillance in Cyberspace
Making Information Global
Privacy
Amalgamating Private Information
Using the Information
General Coercion
Specific Coercion
Persuasion
Some Limits of Retail Warfare in Cyberspace
Using Retail Channels to Measure Wholesale Campaigns
Conclusions
From Intimacy, Vulnerability
Do the Walls Really Come Down?
Intimacy as a Target
The Fecklessness of Friends
Betrayal
Conclusions
Talking Conquest in Cyberspace
Four Layers of Communications
Human Conversation in Layers
Cyberspace in Layers
Complexity Facilitates Conquest
Complexity and Hostile Conquest
Complexity and Friendly Conquest
Semantics
Pragmatics
Lessons?
Managing Conquest in Cyberspace
Conducting Hostile Conquest in Cyberspace
Warding Off Hostile Conquest in Cyberspace
Byte Bullies
Headless Horsemen
Perfect Prevention
Total Transparency
Nasty Neighborhoods
Exploiting Unwarranted Influence
Against Unwarranted Influence
In Microsoft's Shadow
Microsoft and Computer Security
Conclusions
Why Cyberspace Is Likely to Gain Consequence
More Powerful Hardware and Thus More Complex Software
Cyberspace in More Places
Fuzzier Borders between Systems
Accepted Cryptography
Privatized Trust
The Possible Substitution of Artificial for Natural Intelligence
Conclusions
Index