| |
| |
List of Figures | |
| |
| |
Acknowledgments | |
| |
| |
| |
Introduction | |
| |
| |
| |
What Does Conquest Mean in Cyberspace? | |
| |
| |
| |
Precis | |
| |
| |
| |
Hostile Conquest as Information Warfare | |
| |
| |
| |
An Ideal-Type Definition of Information Warfare | |
| |
| |
| |
Control at One Layer Is Not Control at Another | |
| |
| |
| |
Applying the Ideal-Type Definition | |
| |
| |
| |
There Is No Forced Entry in Cyberspace | |
| |
| |
| |
Information Warfare Only Looks Strategic | |
| |
| |
| |
IW Strategy and Terrorism | |
| |
| |
| |
Conclusions | |
| |
| |
| |
Information Warfare as Noise | |
| |
| |
| |
Disinformation and Misinformation | |
| |
| |
| |
Defenses against Noise | |
| |
| |
| |
Redundancy | |
| |
| |
| |
Filtration | |
| |
| |
| |
What Tolerance for Noise? | |
| |
| |
| |
Tolerance in Real Environments | |
| |
| |
| |
Castles and Agoras | |
| |
| |
| |
Hopping from Agoras to Castles? | |
| |
| |
| |
Castling Foes | |
| |
| |
| |
Concluding Observations | |
| |
| |
| |
Can Information Warfare Be Strategic? | |
| |
| |
| |
Getting In | |
| |
| |
| |
Mucking Around | |
| |
| |
| |
Spying | |
| |
| |
| |
Denial of Service | |
| |
| |
| |
Corruption | |
| |
| |
| |
Distraction | |
| |
| |
| |
Countermeasures | |
| |
| |
| |
Redundancy | |
| |
| |
| |
Learning | |
| |
| |
| |
Damage Assessment | |
| |
| |
| |
Prediction | |
| |
| |
| |
Intelligence Is Necessary | |
| |
| |
| |
Intelligence Alone Is Hardly Sufficient | |
| |
| |
| |
Is Information Warfare Ready for War? | |
| |
| |
| |
The Paradox of Control | |
| |
| |
| |
Other Weaponization Criteria | |
| |
| |
| |
Conclusions | |
| |
| |
| |
Information Warfare against Command and Control | |
| |
| |
| |
The Sources of Information Overload | |
| |
| |
| |
Its Effect on Conventional Information Warfare Techniques | |
| |
| |
| |
Coping Strategies | |
| |
| |
| |
Who Makes Decisions in a Hierarchy? | |
| |
| |
| |
Responses to Information Overload | |
| |
| |
| |
Know the Enemy's Information Architecture | |
| |
| |
| |
Elements of Information Culture | |
| |
| |
| |
Elements of Nodal Architecture | |
| |
| |
| |
Injecting Information into Adversary Decision Making | |
| |
| |
| |
Ping, Echo, Flood, and Sag | |
| |
| |
| |
Ping and Echo | |
| |
| |
| |
Flood and Sag | |
| |
| |
| |
Conclusions | |
| |
| |
| |
Friendly Conquest in Cyberspace | |
| |
| |
| |
A Redefinition of Conquest | |
| |
| |
| |
The Mechanisms of Coalitions | |
| |
| |
| |
The Particular Benefits of Coalitions | |
| |
| |
| |
Information and Coalitions | |
| |
| |
| |
The Cost of Coalitions in Cyberspace | |
| |
| |
| |
Enterprise Architectures and Influence | |
| |
| |
| |
Alliances with Individuals | |
| |
| |
| |
The Special Case of Cell Phones | |
| |
| |
| |
Alliances of Organizations | |
| |
| |
| |
Ecologies of Technological Development | |
| |
| |
| |
DoD's Global Information Grid (GIG) | |
| |
| |
| |
Merging the Infrastructures of Allies | |
| |
| |
| |
Conclusions | |
| |
| |
| |
Friendly Conquest Using Global Systems | |
| |
| |
| |
Geospatial Data | |
| |
| |
| |
Coping with Commercial Satellites | |
| |
| |
| |
Manipulation through Cyberspace | |
| |
| |
| |
Getting Others to Play the Game | |
| |
| |
| |
Some Conclusions about Geospatial Services | |
| |
| |
| |
National Identity Systems | |
| |
| |
| |
Two Rationales for a National Identity System | |
| |
| |
| |
Potential Parameters for a Notional System | |
| |
| |
| |
Constraints from and Influences over Foreign Systems | |
| |
| |
| |
Compare, Contrast, and Conclude | |
| |
| |
| |
Retail Conquest in Cyberspace | |
| |
| |
| |
Information Trunks and Leaves | |
| |
| |
| |
Where Does Cheap Information Come From? | |
| |
| |
| |
Surveillance in Cyberspace | |
| |
| |
| |
Making Information Global | |
| |
| |
| |
Privacy | |
| |
| |
| |
Amalgamating Private Information | |
| |
| |
| |
Using the Information | |
| |
| |
| |
General Coercion | |
| |
| |
| |
Specific Coercion | |
| |
| |
| |
Persuasion | |
| |
| |
| |
Some Limits of Retail Warfare in Cyberspace | |
| |
| |
| |
Using Retail Channels to Measure Wholesale Campaigns | |
| |
| |
| |
Conclusions | |
| |
| |
| |
From Intimacy, Vulnerability | |
| |
| |
| |
Do the Walls Really Come Down? | |
| |
| |
| |
Intimacy as a Target | |
| |
| |
| |
The Fecklessness of Friends | |
| |
| |
| |
Betrayal | |
| |
| |
| |
Conclusions | |
| |
| |
| |
Talking Conquest in Cyberspace | |
| |
| |
| |
Four Layers of Communications | |
| |
| |
| |
Human Conversation in Layers | |
| |
| |
| |
Cyberspace in Layers | |
| |
| |
| |
Complexity Facilitates Conquest | |
| |
| |
| |
Complexity and Hostile Conquest | |
| |
| |
| |
Complexity and Friendly Conquest | |
| |
| |
| |
Semantics | |
| |
| |
| |
Pragmatics | |
| |
| |
| |
Lessons? | |
| |
| |
| |
Managing Conquest in Cyberspace | |
| |
| |
| |
Conducting Hostile Conquest in Cyberspace | |
| |
| |
| |
Warding Off Hostile Conquest in Cyberspace | |
| |
| |
| |
Byte Bullies | |
| |
| |
| |
Headless Horsemen | |
| |
| |
| |
Perfect Prevention | |
| |
| |
| |
Total Transparency | |
| |
| |
| |
Nasty Neighborhoods | |
| |
| |
| |
Exploiting Unwarranted Influence | |
| |
| |
| |
Against Unwarranted Influence | |
| |
| |
| |
In Microsoft's Shadow | |
| |
| |
| |
Microsoft and Computer Security | |
| |
| |
| |
Conclusions | |
| |
| |
| |
Why Cyberspace Is Likely to Gain Consequence | |
| |
| |
| |
More Powerful Hardware and Thus More Complex Software | |
| |
| |
| |
Cyberspace in More Places | |
| |
| |
| |
Fuzzier Borders between Systems | |
| |
| |
| |
Accepted Cryptography | |
| |
| |
| |
Privatized Trust | |
| |
| |
| |
The Possible Substitution of Artificial for Natural Intelligence | |
| |
| |
| |
Conclusions | |
| |
| |
Index | |