𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cyberwar and Information Warfare (Ventre/Cyberwar and Information Warfare) || Cyberwar and its Borders

✍ Scribed by Ventre, Daniel


Book ID
120513565
Publisher
John Wiley & Sons, Inc
Year
2013
Tongue
English
Weight
259 KB
Edition
1
Category
Article
ISBN
1848213042

No coin nor oath required. For personal study only.

✦ Synopsis


Chapter 1 Cyberwar And Its Borders / Francois-bernard Huyghe Huyghe, Francois-bernard 1 -- 1.1 The Seduction Of Cyberwar 2 -- 1.2 Desirable, Vulnerable And Frightening Information 4 -- 1.3 Conflict And Its Dimensions 6 -- 1.4 The Helm And Space 8 -- 1.5 Between Knowledge And Violence 11 -- 1.6 Space, Distance And Paths 13 -- 1.7 The Permanency Of War 16 -- 1.8 No War Without Borders 22 -- 1.9 The Enemy And The Sovereign 25 -- 1.10 Strengths And Weaknesses 27 -- 1.11 Bibliography 29 -- Chapter 2 War Of Meaning, Cyberwar And Democracies / Francois Chauvancy Chauvancy, Francois 31 -- 2.1 Introduction 31 -- 2.2 Informational Environment, A New Operating Space For Strategy 34 -- 2.2:1 War And Information: Stakes For The West 35 -- 2.2.2 Strategy In The Information Environment 44 -- 2.2.3 Winning The Battle Of Legitimacies 52 -- 2.3 Influence Strategy: Defeating And Limiting Armed Force Physical Involvement 59 -- 2.3.1 Describing The Aggressor 60 -- 2.3.2 Armed Forces And The Information Environment 65 -- 2.3.3 The Need For Moral Force 70 -- 2.4 Conclusion 78 -- 2.5 Bibliography 79 -- Chapter 3 Intelligence, The First Defense? Information Warfare And Strategic Surprise / Joseph Henrotin Henrotin, Joseph 83 -- 3.1 Information Warfare, Information And War 85 -- 3.2 Intelligence And Strategic Surprise 90 -- 3.2.1 Strategic Surprise 91 -- 3.2.2 Perception Of Surprise 94 -- 3.2.3 Perception Of The Possibility Of Surprise 95 -- 3.3 Strategic Surprise And Information Warfare 98 -- 3.4 Concluding Remarks: Surprise In Strategic Studies 106 -- 3.5 Bibliography 109 -- Chapter 4 Cyberconflict: Stakes Of Power / Daniel Ventre Ventre, Daniel 113 -- 4.1 Stakes Of Power 113 -- 4.1.1 Power Relations 116 -- 4.1.2 Expression Of Sovereignty 154 -- 4.1.3 Cyberpower 155 -- 4.1.4 Measuring And Locating Power 159 -- 4.1.5 Limits Of Exercising Power 175 -- 4.1.6 The Monroe Doctrine 179 -- 4.1.7 Globalization 181 -- 4.1.8 Shock Theories 181 -- 4.1.9 Naval And Maritime Power Strategy 184 -- 4.1.10 Air/space And Cybernetic Power: Analogies 194 -- 4.1.11 Cyberconflict/cyber Weapons, Chemical/biological Weapons: Comparisons 203 -- 4.1.12 Cyberconflict/cyber Weapons, Cold War, Nuclear Weapons: Comparisons 204 -- 4.1.13 Cyberconflict And New Wars 213 -- 4.2 The Stuxnet Affair 230 -- 4.3 Bibliography 240 -- Chapter 5 Operational Aspects Of A Cyberattack: Intelligence, Planning And Conduct / Eric Filiol Filiol, Eric 245 -- 5.1 Introduction 245 -- 5.2 Towards A Broader Concept Of Cyberwar 247 -- 5.2.1 War And Cyberwar: Common Ground 247 -- 5.2.2 New Orders In Cyberwar 249 -- 5.2.3 Who Are Cyberwarriors? 252 -- 5.2.4 Is Formalization Possible? 253 -- 5.3 Concept Of Critical Infrastructure 253 -- 5.3.1 Generalized Definition Of The Notion Of Critical Infrastructure 254 -- 5.3.2 System Interdependence 257 -- 5.4 Different Phases Of A Cyberattack 260 -- 5.4.1 Intelligence Phase 260 -- 5.4.2 Planning Phase 266 -- 5.4.3 Conduct Phase 267 -- 5.5 A Few Elementary Building Blocks 268 -- 5.5.1 General Tactical Framework 268 -- 5.5.2 Attacks On People 270 -- 5.5.3 Opinion Manipulation And Area Control 271 -- 5.5.4 Military Computer Attack In A Conventional Operation 273 -- 5.6 Example Scenario 273 -- 5.6.1 Tactical Scenario 274 -- 5.6.2 The Order Of Events 277 -- 5.6.3 Analysis 278 -- 5.7 Conclusion 281 -- 5.8 Bibliography 282 -- Chapter 6 Riots In Xinjiang And Chinese Information Warfare / Daniel Ventre Ventre, Daniel 285 -- 6.1 Xinjiang Region: An Explosive Context 287 -- 6.1.1 Ethnic Tensions, Extremism, Separatism, Terrorism And Violence In Xinjiang 287 -- 6.1.2 Xinjiang: A Strategic Region 291 -- 6.2 Riots, July 2009 291 -- 6.2.1 Chronology Of Facts 291 -- 6.2.2 Reasons For The Riots 295 -- 6.2.3 The Riots Faced With International Public Opinion 297 -- 6.3 Impacts On Chinese Cyberspace: Hacktivism And Site Defacing 303 -- 6.3.1 The Internet In Xinjiang: A Region Dependent On Information Systems? 303 -- 6.3.2 Website Defacement In A Crisis Context 305 -- 6.3.3 Defining The Dynamics Of The Relationship Between Political Events And Site Defacement 309 -- 6.4 Managing The Cyberspace Risk By The Chinese Authorities 339 -- 6.4.1 Inaccessible Sites 339 -- 6.4.2 Cutting Off Telephone Communications 344 -- 6.4.3 The Risks Of Cyberspace 345 -- 6.4.4 Dealing With The Media And Information Content 351 -- 6.4.5 After The Incidents: Communication, Reaction, Control, Legislation 353 -- 6.5 Chinese Information Warfare Through The Xinjiang Crisis 354 -- 6.5.1 Xinjiang, Land Of Information Warfare 355 -- 6.5.2 Chinese Information Warfare In The Prism Of Xinjiang Management Crisis Approaches 356 -- 6.6 Conclusion 361 -- 6.7 Bibliography 364 -- Chapter 7 Special Territories / Daniel Ventre Ventre, Daniel 367 -- 7.1 Hong Kong: Intermediate Zone 367 -- 7.1.1 Strategic And Political Situation In Hong Kong 367 -- 7.1.2 Hong Kong's Cyberspace 369 -- 7.1.3 A Framework Suited To Crises 371 -- 7.1.4 Hong Kong's Vulnerable Cyberspace 373 -- 7.1.5 The Google Affair 377 -- 7.2 North Korea: Unknown Figure Of Asymmetrical Threat 379 -- 7.2.1 Cyberattacks Blamedonnorthkorea 381 -- 7.2.2 North Korea's Capability In Cyberwar 385 -- 7.2.3 The Cheonan Affair 388 -- 7.2.4 In The Face Of North Korea: The Capabilities Of South Korea 390 -- 7.3 Bibliography 393. Edited By Daniel Ventre. Includes Bibliographical References And Index.


πŸ“œ SIMILAR VOLUMES


Cyberwar and Information Warfare (Ventre
✍ Ventre, Daniel πŸ“‚ Article πŸ“… 2013 πŸ› John Wiley & Sons, Inc 🌐 English βš– 828 KB

Chapter 1 Cyberwar And Its Borders / Francois-bernard Huyghe Huyghe, Francois-bernard 1 -- 1.1 The Seduction Of Cyberwar 2 -- 1.2 Desirable, Vulnerable And Frightening Information 4 -- 1.3 Conflict And Its Dimensions 6 -- 1.4 The Helm And Space 8 -- 1.5 Between Knowledge And Violence 11 -- 1.6 Space

Cyberwar and Information Warfare (Ventre
✍ Ventre, Daniel πŸ“‚ Article πŸ“… 2013 πŸ› John Wiley & Sons, Inc 🌐 English βš– 295 KB

Chapter 1 Cyberwar And Its Borders / Francois-bernard Huyghe Huyghe, Francois-bernard 1 -- 1.1 The Seduction Of Cyberwar 2 -- 1.2 Desirable, Vulnerable And Frightening Information 4 -- 1.3 Conflict And Its Dimensions 6 -- 1.4 The Helm And Space 8 -- 1.5 Between Knowledge And Violence 11 -- 1.6 Space

Information Warfare
✍ Paul Jones and Jay Ulfelder πŸ“‚ Article πŸ“… 1998 πŸ› Council on Foreign Relations 🌐 English βš– 316 KB
Information Warfare And Security
✍ Denning, Dorothy πŸ“‚ Article πŸ“… 2000 πŸ› Taylor and Francis Group 🌐 English βš– 72 KB