did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781403987174

Cyberwar, Netwar And the Revolution in Military Affairs

by ; ; ;
  • ISBN13:

    9781403987174

  • ISBN10:

    1403987173

  • Format: Hardcover
  • Copyright: 2006-09-04
  • Publisher: Palgrave Macmillan
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $119.99 Save up to $101.43
  • Buy New
    $119.39
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

The end of the Cold War, the Revolution in Military Affairs, 9/11 and the War on Terror have radically altered the nature of conflict and security in the twenty-first century. This book considers how developments in technology could and are effecting the prosecution of war and what the changing nature of warfare means for human rights and civil society.

Author Biography

EDWARD F. HALPIN is Director of the Praxis Centre at Leeds Metropolitan University. He has researched human and child rights for many years, including work for the European Parliament Scientific and Technical Options Assessment (STOA) Unit. He co-edited the book Human Rights and the Internet (Palgrave Macmillan) and has published many articles in this subject area. In addition to working on social informatics within the School of Information Management, he is involved in teaching peace and conflict resolution in the School of Applied Global Ethics at Leeds Metropolitan University.

PHILIPPA TREVORROW is a graduate from the University of Exeter and works as a Research Officer in the School of Information Management at Leeds Metropolitan University. She has been involved with work in the Praxis Centre for the last 2 years, including issues on peace and conflict resolution, youth citizenship and E-government.

DAVID C. WEBB is Professor of Engineering Modelling, Head of the Centre for Applied Research in Engineering and Director of the Praxis Centre at Leeds Metropolitan University. He obtained a DPhil in Space Physics in 1975 from the University of York and, after periods as a post-doctoral researcher at Bell Laboratories and the University of York, joined the Directorate of Scientific and Technical Intelligence at the MoD in London in 1978. He moved to the Computer Unit at Leeds Metropolitan University in 1979 and then into the School of Engineering in the early 1980s. He has published widely on the application of engineering modelling and on nuclear disarmament and the militarization of space. He is currently working with colleagues in the Praxis Centre on the Study of Information and Technology in Peace, Conflict Resolution and Human Rights.

STEVE WRIGHT is a Visiting Professor at Leeds Metropolitan University, Chair of Privacy International and the former Director of the Omega Foundation. His recent EU research tracked the armourers of the torturers. Wright is best known for his European Parliamentary report highlighting the US global telecommunications interception network - Echelon.

Table of Contents

List of Tables x
Preface ix
Gary Chapman, Diego Latella and Professor Carlo Schaerf
Notes on the Contributors xiii
Glossary xvii
Part I: Cyberwar, Netwar and the Revolution in Military Affairs: Defining the Issues
1 Defining the Issues
3(9)
Dr Philippa Trevorrow, Dr Steve Wright, Professor David Webb and Dr Edward Halpin
2 Virtual Violence and Real War: Playing War in Computer Games: The Battle with Reality
12(20)
Martin Bayer
2.1 Introduction
12(1)
2.2 Gaming platforms
13(2)
2.3 Definition and historical context
15(2)
2.4 Computer game genres
17(4)
2.5 Realism versus reality
21(4)
2.6 Games and professional military simulations
25(2)
2.7 Conclusion
27(5)
3 Strategic Information Warfare: An Introduction
32(19)
Gian Piero Siroli
3.1 Introduction
32(1)
3.2 Context
33(2)
3.3 Critical infrastructures
35(2)
3.4 Vulnerabilities
37(4)
3.5 Actors: how and who
41(2)
3.6 Open questions and comments
43(2)
3.7 Conclusions
45(6)
Part II: Implications of the Problem
4 Virtuous Virtual War
51(21)
Jari Rantapelkonen
4.1 Introduction
51(1)
4.2 Theory, information technology and accident
52(3)
4.3 War on terrorism - the state of emergency
55(1)
4.4 The necessity and problematics of an enemy
56(2)
4.5 War on Afghanistan - from postmodern moments to information isolation
58(2)
4.6 Battle for the strategic truth
60(1)
4.7 War on Iraq - differences in perceptions
61(6)
4.8 The fog of peace
67(5)
5 Risks of Computer-Related Technology
72(10)
Dr Peter G. Neumann
5.1 Introduction
72(6)
5.2 Roles of technology
78(4)
6 Missile Defence - The First Steps Towards War in Space?
82(16)
Professor David Webb
6.1 The military use of space
82(2)
6.2 Anti-satellite (ASAT) programmes
84(3)
6.3 Current US developments
87(2)
6.4 Missile defence
89(3)
6.5 The possibility of space weapons control
92(6)
7 Technology as a Source of Global Turbulence?
98(15)
Dr Stefan Fritsch
7.1 Introduction
98(1)
7.2 Realistic and neorealistic approaches to technology
99(1)
7.3 Interdependent globalism
100(2)
7.4 Technology and IR/IPE from a constructivist point of view
102(1)
7.5 Arguments for a broader perspective on technology
103(1)
7.6 Multidimensional effects of technology
104(2)
7.7 Conclusion
106(7)
8 Nuclear Weapons and the Vision of Command and Control
113(26)
Dr Bruce D. Larkin
8.1 The White House and the Department of Defense (DoD)
114(1)
8.2 The White House Communications Agency
115(1)
8.3 Crisis experience: the attempted assassination of President Ronald Reagan
116(1)
8.4 Crisis experience: The September 11 attack
117(2)
8.5 The Global Command and Control System (GCCS) (as defined by the DoD)
119(1)
8.6 GCCS-T: the top secret provision for nuclear operations
120(1)
8.7 Ongoing transformation of command and control systems
121(2)
8.8 War experience: the Iraq War (2003—...)
123(1)
8.9 Is GCCS sufficiently reliable for nuclear operations?
124(1)
8.10 Is SIPRNET sufficiently secure for nuclear operations?
125(5)
8.11 Assessment
130(9)
9 Information Warfare and the Laws of War
139
Geoffrey Darnton
9.1 Introduction
139(2)
9.2 Information Warfare (IW)
141(3)
9.3 Laws of war
144(7)
9.4 Key issues
151(6)
Part III: Country Perspectives
10 RMA: The Russian Way
157(16)
Fanourios Pantelogiannis
10.1 Historical overview
157(2)
10.2 The current Russian RMA and its international consequences
159(7)
10.3 Conclusion and evaluation
166(1)
10.4 Perspectives
167(6)
11 An Overview of the Research and Development of Information Warfare in China
173(26)
Chris Wu
11.1 Introduction
173(1)
11.2 Theoretical research on Information Warfare in China
174(8)
11.3 Current IW development in China
182(7)
11.4 IW tactics that could be used by Beijing to attack Taiwan
189(2)
11.5 Combination of US and Taiwanese resistance to IW from Beijing
191(1)
11.6 The possibility of IW between China and the USA
191(2)
11.7 Conclusion
193(6)
Part IV: What is Being Done - or Must Be Done?
12 A Bridge Too Far?
199(20)
Mike Moore
12.1 Global engagement
201(3)
12.2 A space Pearl Harbor?
204(2)
12.3 Space cop
206(2)
12.4 The security dilemma
208(2)
12.5 A mind experiment
210(2)
12.6 Velvet glove, steel fist
212(1)
12.7 Unintended consequences
213(3)
12.8 'Last, best hope'
216(3)
13 Threat Assessment and Protective Measures: Extending the Asia-Europe Meeting IV Conclusions on Fighting International Terrorism and Other Instruments to Cyber Terrorism
219(9)
Massimo Mauro
13.1 Introduction
219(1)
13.2 The Asia-Europe Meeting (ASEM) framework
219(1)
13.3 Cyber terrorism: an urban legend?
220(2)
13.4 A taxonomy of real cyber threats
222(2)
13.5 Advanced defensive methods and different regional priorities
224(1)
13.6 International and regional cooperation against cyber terrorism
224(1)
13.7 Concluding statement
225(3)
14 Policy Laundering, and Other Policy Dynamics
228(14)
Dr Gus Hosein
14.1 Introduction
228(2)
14.2 At the international level: the Council of Europe and the G8
230(2)
14.3 At the national level
232(2)
14.4 The international-national dance: traffic data retention
234(2)
14.5 Democratic challenges and international opportunities
236(3)
14.6 Concluding remarks
239(3)
15 Conclusion
242(4)
Dr Steve Wright, Dr Philippa Trevorrow, Professor David Webb and Dr Edward Halpin
Index 246

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program