Chapter 1 Cyberwar And Its Borders / Francois-bernard Huyghe Huyghe, Francois-bernard 1 -- 1.1 The Seduction Of Cyberwar 2 -- 1.2 Desirable, Vulnerable And Frightening Information 4 -- 1.3 Conflict And Its Dimensions 6 -- 1.4 The Helm And Space 8 -- 1.5 Between Knowledge And Violence 11 -- 1.6 Space
Cyberwar and Information Warfare (Ventre/Cyberwar and Information Warfare) || Intelligence, the First Defense? Information Warfare and Strategic Surprise
โ Scribed by Ventre, Daniel
- Book ID
- 120513566
- Publisher
- John Wiley & Sons, Inc
- Year
- 2013
- Tongue
- English
- Weight
- 295 KB
- Edition
- 1
- Category
- Article
- ISBN
- 1848213042
No coin nor oath required. For personal study only.
โฆ Synopsis
Chapter 1 Cyberwar And Its Borders / Francois-bernard Huyghe Huyghe, Francois-bernard 1 -- 1.1 The Seduction Of Cyberwar 2 -- 1.2 Desirable, Vulnerable And Frightening Information 4 -- 1.3 Conflict And Its Dimensions 6 -- 1.4 The Helm And Space 8 -- 1.5 Between Knowledge And Violence 11 -- 1.6 Space, Distance And Paths 13 -- 1.7 The Permanency Of War 16 -- 1.8 No War Without Borders 22 -- 1.9 The Enemy And The Sovereign 25 -- 1.10 Strengths And Weaknesses 27 -- 1.11 Bibliography 29 -- Chapter 2 War Of Meaning, Cyberwar And Democracies / Francois Chauvancy Chauvancy, Francois 31 -- 2.1 Introduction 31 -- 2.2 Informational Environment, A New Operating Space For Strategy 34 -- 2.2:1 War And Information: Stakes For The West 35 -- 2.2.2 Strategy In The Information Environment 44 -- 2.2.3 Winning The Battle Of Legitimacies 52 -- 2.3 Influence Strategy: Defeating And Limiting Armed Force Physical Involvement 59 -- 2.3.1 Describing The Aggressor 60 -- 2.3.2 Armed Forces And The Information Environment 65 -- 2.3.3 The Need For Moral Force 70 -- 2.4 Conclusion 78 -- 2.5 Bibliography 79 -- Chapter 3 Intelligence, The First Defense? Information Warfare And Strategic Surprise / Joseph Henrotin Henrotin, Joseph 83 -- 3.1 Information Warfare, Information And War 85 -- 3.2 Intelligence And Strategic Surprise 90 -- 3.2.1 Strategic Surprise 91 -- 3.2.2 Perception Of Surprise 94 -- 3.2.3 Perception Of The Possibility Of Surprise 95 -- 3.3 Strategic Surprise And Information Warfare 98 -- 3.4 Concluding Remarks: Surprise In Strategic Studies 106 -- 3.5 Bibliography 109 -- Chapter 4 Cyberconflict: Stakes Of Power / Daniel Ventre Ventre, Daniel 113 -- 4.1 Stakes Of Power 113 -- 4.1.1 Power Relations 116 -- 4.1.2 Expression Of Sovereignty 154 -- 4.1.3 Cyberpower 155 -- 4.1.4 Measuring And Locating Power 159 -- 4.1.5 Limits Of Exercising Power 175 -- 4.1.6 The Monroe Doctrine 179 -- 4.1.7 Globalization 181 -- 4.1.8 Shock Theories 181 -- 4.1.9 Naval And Maritime Power Strategy 184 -- 4.1.10 Air/space And Cybernetic Power: Analogies 194 -- 4.1.11 Cyberconflict/cyber Weapons, Chemical/biological Weapons: Comparisons 203 -- 4.1.12 Cyberconflict/cyber Weapons, Cold War, Nuclear Weapons: Comparisons 204 -- 4.1.13 Cyberconflict And New Wars 213 -- 4.2 The Stuxnet Affair 230 -- 4.3 Bibliography 240 -- Chapter 5 Operational Aspects Of A Cyberattack: Intelligence, Planning And Conduct / Eric Filiol Filiol, Eric 245 -- 5.1 Introduction 245 -- 5.2 Towards A Broader Concept Of Cyberwar 247 -- 5.2.1 War And Cyberwar: Common Ground 247 -- 5.2.2 New Orders In Cyberwar 249 -- 5.2.3 Who Are Cyberwarriors? 252 -- 5.2.4 Is Formalization Possible? 253 -- 5.3 Concept Of Critical Infrastructure 253 -- 5.3.1 Generalized Definition Of The Notion Of Critical Infrastructure 254 -- 5.3.2 System Interdependence 257 -- 5.4 Different Phases Of A Cyberattack 260 -- 5.4.1 Intelligence Phase 260 -- 5.4.2 Planning Phase 266 -- 5.4.3 Conduct Phase 267 -- 5.5 A Few Elementary Building Blocks 268 -- 5.5.1 General Tactical Framework 268 -- 5.5.2 Attacks On People 270 -- 5.5.3 Opinion Manipulation And Area Control 271 -- 5.5.4 Military Computer Attack In A Conventional Operation 273 -- 5.6 Example Scenario 273 -- 5.6.1 Tactical Scenario 274 -- 5.6.2 The Order Of Events 277 -- 5.6.3 Analysis 278 -- 5.7 Conclusion 281 -- 5.8 Bibliography 282 -- Chapter 6 Riots In Xinjiang And Chinese Information Warfare / Daniel Ventre Ventre, Daniel 285 -- 6.1 Xinjiang Region: An Explosive Context 287 -- 6.1.1 Ethnic Tensions, Extremism, Separatism, Terrorism And Violence In Xinjiang 287 -- 6.1.2 Xinjiang: A Strategic Region 291 -- 6.2 Riots, July 2009 291 -- 6.2.1 Chronology Of Facts 291 -- 6.2.2 Reasons For The Riots 295 -- 6.2.3 The Riots Faced With International Public Opinion 297 -- 6.3 Impacts On Chinese Cyberspace: Hacktivism And Site Defacing 303 -- 6.3.1 The Internet In Xinjiang: A Region Dependent On Information Systems? 303 -- 6.3.2 Website Defacement In A Crisis Context 305 -- 6.3.3 Defining The Dynamics Of The Relationship Between Political Events And Site Defacement 309 -- 6.4 Managing The Cyberspace Risk By The Chinese Authorities 339 -- 6.4.1 Inaccessible Sites 339 -- 6.4.2 Cutting Off Telephone Communications 344 -- 6.4.3 The Risks Of Cyberspace 345 -- 6.4.4 Dealing With The Media And Information Content 351 -- 6.4.5 After The Incidents: Communication, Reaction, Control, Legislation 353 -- 6.5 Chinese Information Warfare Through The Xinjiang Crisis 354 -- 6.5.1 Xinjiang, Land Of Information Warfare 355 -- 6.5.2 Chinese Information Warfare In The Prism Of Xinjiang Management Crisis Approaches 356 -- 6.6 Conclusion 361 -- 6.7 Bibliography 364 -- Chapter 7 Special Territories / Daniel Ventre Ventre, Daniel 367 -- 7.1 Hong Kong: Intermediate Zone 367 -- 7.1.1 Strategic And Political Situation In Hong Kong 367 -- 7.1.2 Hong Kong's Cyberspace 369 -- 7.1.3 A Framework Suited To Crises 371 -- 7.1.4 Hong Kong's Vulnerable Cyberspace 373 -- 7.1.5 The Google Affair 377 -- 7.2 North Korea: Unknown Figure Of Asymmetrical Threat 379 -- 7.2.1 Cyberattacks Blamedonnorthkorea 381 -- 7.2.2 North Korea's Capability In Cyberwar 385 -- 7.2.3 The Cheonan Affair 388 -- 7.2.4 In The Face Of North Korea: The Capabilities Of South Korea 390 -- 7.3 Bibliography 393. Edited By Daniel Ventre. Includes Bibliographical References And Index.
๐ SIMILAR VOLUMES
Chapter 1 Cyberwar And Its Borders / Francois-bernard Huyghe Huyghe, Francois-bernard 1 -- 1.1 The Seduction Of Cyberwar 2 -- 1.2 Desirable, Vulnerable And Frightening Information 4 -- 1.3 Conflict And Its Dimensions 6 -- 1.4 The Helm And Space 8 -- 1.5 Between Knowledge And Violence 11 -- 1.6 Space
In war as in business, surprise can be a powerful strategic weapon. This article draws parallels between military and business planning, and explores the role of strategic intelligence in achieving and preempting surprise in the commercial marketplace. Sherman Kent (1949) defined strategic intellige