Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Daniel Ventre
Cyberwar and Information Warfare
Cover
Title Page
Copyright
Introduction
List of Acronyms
Chapter 1. Cyberwar and its Borders
1.1. The seduction of cyberwar
1.2. Desirable, vulnerable and frightening information
1.3. Conflict and its dimensions
1.4. The Helm and space
1.5. Between knowledge and violence
1.6. Space, distance and paths
1.7. The permanency of war
1.8. No war without borders
1.9. The enemy and the sovereign
1.10. Strengths and weaknesses
1.11. Bibliography
Chapter 2. War of Meaning, Cyberwar and Democracies
2.1. Introduction
2.2. Informational environment, a new operating space for strategy
2.2.1. War and information: stakes for the West
2.2.1.1. Information society and 21st Century conflicts
2.2.1.2. Informational environment and cyberspace
2.2.1.3. Emergence of non-state controlled actors
2.2.1.4. The West perceived negatively by the non-western wor
2.2.1.5. A thought to be renewed on the concept of subversion
2.2.1.6. The debate on the use of force
2.2.1.7. The rejection of death in the West
2.2.1.8. Soldier-citizen and individual freedom of expression
2.2.2. Strategy in the information environment
2.2.2.1. The global nature of the State’s strategy in resolving crises
2.2.2.2. Comprehensive approach and military strategy
2.2.2.3. About the influence strategy of Western democracies
2.2.2.4. The return to ideologies
2.2.2.5. War of meaning and strategic communication
2.2.2.6. NATO and strategic communication(s) in Afghanistan
2.2.3. Winning the battle of legitimacies
2.2.3.1. Creating legitimacy out of a military intervention
2.2.3.2. The asymmetry of ethics
2.2.3.3. Why fight?
2.2.3.4. Necessary domestic adherence
2.2.3.5. Sensitizing domestic public opinion
2.2.3.6. What is propaganda today?
2.2.3.7. The Internet: new battlefield for propaganda
2.2.3.8. Communication or propaganda
2.3. Influence strategy: defeating and limiting armed force physical involvement
2.3.1. Describing the aggressor
2.3.1.1. What is an enemy?
2.3.1.2. Redefining the enemy
2.3.1.3. Understanding the adversary and its human environment
2.3.2. Armed forces and the information environment
2.3.2.1. New wars
2.3.2.2. Understanding to influence and act
2.3.2.3. Information operations
2.3.2.4. From command and control warfare to the battle of perception
2.3.3. The need for moral force
2.3.3.1. Political action and armed forces
2.3.3.2. Defining the counter-cause
2.3.3.3. Image-emotion control, condition of the partial success of communication
2.3.3.4. Vital protection of information in conflicts
2.3.3.5. Preventative strategy and counter-influence actions
2.4. Conclusion
2.5. Bibliography
Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise
3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise
3.2.1. Strategic surprise
3.2.2. Perception of surprise
3.2.3. Perception of the possibility of surprise
3.3. Strategic surprise and information warfare
3.4. Concluding remarks: surprise in strategic studies
3.5. Bibliography
Chapter 4. Cyberconflict: Stakes of Power
4.1. Stakes of power
4.1.1. Power relations
4.1.1.1. Cyberattack
4.1.1.2. Cyberdefense
4.1.1.3. Cyberwar
4.1.1.4. Confrontations in the information dimension (CID)
4.1.2. Expression of sovereignty
4.1.3. Cyberpower
4.1.4. Measuring and locating power
4.1.4.1. Cyberspace, place of conflict
4.1.4.2. Measurement criteri
4.1.4.3. The concept of vital space
4.1.4.4. The gravity model
4.1.4.5. The Second World
4.1.4.6. Speed as a determiner of power
4.1.5. Limits of exercising power
4.1.6. The Monroe doctrine
4.1.7. Globalization
4.1.8. Shock theories
4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies
4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons
4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons
4.1.13. Cyberconflict and new wars
4.1.13.1. Is cyberwar actually war?
4.1.13.2. Cyberwar, new war?
4.1.13.3. Wars and technologies
4.1.13.4. Hybrid wars
4.2. The Stuxnet affair
4.3. Bibliography
Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct
5.1. Introduction
5.2. Towards a broader concept of cyberwar
5.2.1. War and cyberwar: common ground
5.2.2. New orders in cyberwar
5.2.2.1. Obliterating space
5.2.2.2. Obliterating time
5.2.2.3. Obliterating proof
5.2.3. Who are cyberwarriors?
5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure
5.3.1. Generalized definition of the notion of critical infrastructure
5.3.1.1. The human element
5.3.1.2. External elements
5.3.2. System interdependence
5.4. Different phases of a cyberattack
5.4.1. Intelligence phase
5.4.1.1. Technical intelligence
5.4.1.2. Human intelligence
5.4.2. Planning phase
5.4.3. Conduct phase
5.5. A few “elementary building blocks”
5.5.1. General tactical framework
5.5.2. Attacks on people
5.5.3. Opinion manipulation and area control
5.5.4. Military computer attack in a conventional operation
5.6. Example scenario
5.6.1. Tactical scenario
5.6.1.1. General situation
5.6.1.2. Environment and INT situation24
5.6.1.3. Geographical situation
5.6.2. The order of events
5.6.2.1. Phase 1: before September 22nd
5.6.2.2. Phase 2: from September 22nd to the 24th
5.6.2.3. Phase 3: from September 24th to the 28th
5.6.3. Analysis
5.7. Conclusion
5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare? 285
6.1. Xinjiang region: an explosive context
6.1.1. Ethnic tensions, extremism, separatism, terrorism and violence in Xinjiang
6.1.2. Xinjiang: a strategic region
6.2. Riots, July 2009
6.2.1. Chronology of facts
6.2.2. Reasons for the riots
6.2.3. The riots faced with international public opinion
6.3. Impacts on Chinese cyberspace: hacktivism and site defacing
6.3.1. The Internet in Xinjiang: a region dependent on information systems?
6.3.2. Website defacement in a crisis context
6.3.3. Defining the dynamics of the relationship between “political events” and “site defacement”
6.3.3.1. Defacements on the .cn domain
6.3.3.2. Defacements on .hk domains
6.3.3.3. Defacements on the .tw domain
6.3.3.4. Defacements on the .mo domain
6.3.3.5. Defacements on the .tr domain
6.3.3.6. Defacements on the .jp domain
6.3.3.7. Defacements on the .au domain
6.3.3.8. Involved hacktivists
6.3.3.9. Content of the claims
6.4. Managing the “cyberspace” risk by the Chinese authorities
6.4.1. Inaccessible sites
6.4.2. Cutting off telephone communications
6.4.3. The risks of cyberspace
6.4.4. Dealing with the media and information content
6.4.5. After the incidents: communication, reaction, control, legislation
6.5. Chinese information warfare through the Xinjiang crisis
6.5.1. Xinjiang, land of information warfare
6.5.2. Chinese information warfare in the prism of Xinjiang management crisis approaches
6.5.2.1. Speed and reactivity
6.5.2.2. The public national opinion as a sensitive system
6.5.2.3. Cyberspace permeability: ultimate control impossible?
6.6. Conclusion
6.7. Bibliography
Chapter 7. Special Territories
7.1. Hong Kong: intermediate zone
7.1.1. Strategic and political situation in Hong Kong
7.1.2. Hong Kong’s cyberspace
7.1.3. A framework suited to crises
7.1.4. Hong Kong’s vulnerable cyberspace
7.1.5. The Google affair
7.2. North Korea: unknown figure of asymmetrical threat
7.2.1. Cyberattacks blamed on North Korea
7.2.2. North Korea’s capability in cyberwar
7.2.3. The Cheonan affair
7.2.3.1. The cybernetic dimension of the Cheonan affair
7.2.4. In the face of North Korea: the capabilities of South Korea
7.3. Bibliography
Conclusion
List of Authors
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Cyberwar and Information Warfare
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset