did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780833026637

Changing Role of Information Warfare The Changing Role of Information in Warfare

by ; ;
  • ISBN13:

    9780833026637

  • ISBN10:

    0833026631

  • Format: Paperback
  • Copyright: 5/4/1999
  • Publisher: RAND Corporation
  • Purchase Benefits
List Price: $65.00

Summary

Advanced information technologies will have a profound effect on our national security. Driven by the need to understand this revolution and to take steps towards defending against information attack, the editors provided this thorough examination of information warfare, with implications for the U.S. and other countries.

Table of Contents

Preface iii
Figures
xiii
Tables
xv
Acknowledgments xvii
Abbreviations xix
Foreword 1(6)
Andrew W. Marshall
Introduction
7(10)
Zalmay Khalilzad
John White
Structure of the Book
11(3)
Information Technology and Society
11(1)
U.S. Opportunities and Vulnerabilities
12(1)
Issues and Lessons for Decisionmakers
13(1)
References
14(3)
PART I: SOCIETY AND THE INTERNATIONAL SYSTEM 17(138)
The American Military Enterprise in the Information Age
19(26)
Carl H. Builder
Introduction: The Social and Military Perspectives
19(1)
The Roots of Revolution
20(4)
Historical Patterns
24(2)
Cultural Factors
26(2)
What Is the Enterprise?
28(4)
Adapting to the Information Revolution
32(3)
Applying New Technologies to Old Enterprises
35(2)
The Future Enterprise of the Military
37(5)
Bibliography
42(3)
Right Makes Might: Freedom and Power in the Information Age
45(30)
David C. Gompert
Introduction
45(5)
Information Technology and World Politics
45(3)
Implications
48(2)
Information Technology Needs Freedom
50(9)
Knowledge and Economic Freedom
50(5)
Knowledge and Political Freedom
55(1)
Economic Freedom and Political Freedom
56(3)
National Power Needs Information Technology
59(7)
Information Technology and Military Capabilities
59(3)
Freedom as Vulnerability
62(3)
The Changing Profile of Power
65(1)
Power as Partners
66(7)
Power, Integration, and Common Success
66(3)
Integrating Rising Powers
69(1)
The Future of the Core
70(3)
Bibliography
73(2)
Networks, Netwar, and Information-Age Terrorism
75(38)
John Arquilla
David Ronfeldt
Michele Zanini
A New Terrorism (with Old Roots)
75(3)
Recent Views About Terrorism
78(2)
The Advent of Netwar---Analytical Background
80(10)
Definition of Netwar
82(1)
More About Organizational Design
83(4)
Caveats About the Role of Technology
87(1)
Swarming, and the Blurring of Offense and Defense
88(1)
Networks Versus Hierarchies: Challenges for Counternetwar
89(1)
Middle Eastern Terrorism and Netwar
90(11)
Middle Eastern Terrorist Groups: Structure and Actions
92(5)
Middle Eastern Terrorist Groups and the Use of Information Technology
97(3)
Summary Comment
100(1)
Terrorist Doctrines---The Rise of a ``War Paradigm''
101(4)
The Coercive-Diplomacy Paradigm
101(1)
The War Paradigm
102(1)
The New World Paradigm
103(1)
The Paradigms and Netwar
104(1)
References
105(8)
Information and War: is It a Revolution?
113(42)
Jeremy Shapiro
Introduction: Al-Khafji
113(1)
The Meaning of Revolution
114(3)
Possible Revolutions
117(25)
Social Revolution
118(5)
Political Revolution
123(6)
Military Revolution
129(13)
Evolutionary and Revolutionary Proposals
142(4)
Conclusion: Implications of a False Revolution
146(2)
References
148(7)
PART II: U.S. OPPORTUNITIES AND VULNERABILITIES 155(170)
Information and Warfare: New Opportunities for U.S. Military Forces
157(22)
Edward Harshberger
David Ochmanek
Information in Warfare: A Simple Taxonomy
158(4)
Knowing the Enemy
158(1)
Knowing Yourself
159(1)
Knowing the Ground, Knowing the Weather
160(1)
Controlling Forces
160(1)
Speed and Decisiveness
161(1)
A Two-Sided Game
162(1)
Future Victory: New Opportunities
162(14)
Military Advances in Information Technology
163(7)
How New Information Capabilities Might Affect U.S. Military Operations
170(6)
Conclusions
176(2)
References
178(1)
U.S. Military Opportunities: Information-Warfare Concepts of Operation
179(38)
Brian Nichiporuk
Introduction
179(4)
What Do We Mean By ``Information Warfare''?
180(1)
The Importance of Offensive Information Warfare
181(2)
Emerging Asymmetric Strategies
183(8)
Increasing Niche Capabilities
184(4)
Enemy Strategies That Target Key U.S. Vulnerabilities
188(2)
Political Constraints on U.S. Force Deployments
190(1)
Developing Operational Concepts for Future Offensive Information Warfare
191(20)
Information-Based Deterrence
193(5)
Preserving Strategic Reach
198(4)
Counterstrike
202(5)
Counter-C41SR
207(4)
Comparing the Four CONOPs
211(2)
References
213(4)
The Information Revolution and Psychological Effects
217(36)
Stephen T. Hosmer
Objectives and Instruments of Psychological Effects
217(2)
U.S. and Enemy Experience with Psychological Effects
219(12)
U.S. -Caused Psychological Effects at the Strategic Level: Air Attacks on Enemy Strategic Targets
219(2)
U.S. -Caused Psychological Effects at the Operational and Tactical Levels
221(3)
Enemy-Caused Psychological Effects at the Strategic Level
224(6)
Enemy-Caused Psychological Effects at the Operational and Tactical Levels
230(1)
Advanced Technological Systems and Psychological Effects
231(11)
Impact of Advanced Systems on Future War-Fighting Capabilities
231(1)
Implications for Future U.S. -Caused Psychological Effects
232(4)
Implications for Future Enemy-Caused Psychological Effects
236(6)
The Need to Manage Future Psychological Effects
242(5)
Managing Psychological Effects in a Changing Information Environment
242(3)
Managing the Psychological Effects of Future Military Operations
245(2)
Conclusion
247(1)
References
248(5)
U.S. Strategic Vulnerabilities: Threats Against Society
253(30)
Roger C. Molander
Peter A. Wilson
Robert H. Anderson
What is SIW?
253(3)
U.S. Strategic Infrastructure Vulnerabilities and Threats
256(7)
Information and Communications
259(1)
Physical Distribution
260(1)
Energy
261(1)
Banking and Finance
262(1)
Vital Human Services
263(1)
The Need for New Decisionmaking Frameworks
263(1)
An Evolving Series of Frameworks
264(1)
An Initial Formulation
264(16)
Key Dimensions of the SIW Environment
266(1)
Key Strategy and Policy Issues
267(4)
Current State of First-Generation SIW
271(4)
Alternative First-Generation SIW End States
275(2)
Alternative Action Plans
277(3)
Conclusions
280(1)
References
280(3)
Implications of Information Vulnerabilities for Military Operations
283(42)
Glenn C. Buchan
An Overview of Air Force Operations and Their Dependence on Information: Present and Future
284(3)
Disrupting Air Force Operations
287(9)
Potential Threats
287(3)
Potential Vulnerabilities
290(6)
Direct Impacts of Information Disruption
296(2)
Operational Implications
298(15)
Major Conflicts
298(9)
Lesser Operations
307(6)
Reducing Vulnerabilities and Coping with Their Effects
313(8)
Why Intelligence Assessments and Warning Concepts Are Largely Irrelevant
313(4)
How to Defend and Recover
317(4)
Conclusions
321(1)
References
322(3)
PART III: ISSUES, STRATEGIES, AND LESSONS FOR DECISIONMAKERS 325(127)
Military Organization in the Information Age: Lessons from the World of Business
327(34)
Francis Fukuyama
Abram N. Shulsky
The Importance of Organization in a Time of Revolutionary Change
327(3)
The Effects of the ``Information Revolution'' on Corporate Organization
330(10)
Flattening: Creating Shorter Data Paths
331(4)
``Informating''
335(3)
Concentrating on ``Core Competencies''
338(2)
Implications for the U.S. Armed Forces
340(17)
Organizational Structures
342(2)
Creating a Learning Institution
344(5)
Personnel Policy: ``Freedom to Fail''
349(3)
Personnel Policy: Distribution of Skills in the Organization
352(1)
``Revolution in Business Affairs'': Procurement
353(4)
Organizational Structure Must Reflect Objectives
357(1)
Exogenous Political Constraints
358(1)
References
359(2)
Arms Control, Export Regimes, and Multilateral Cooperation
361(18)
Lynn E. Davis
Past Accomplishments
362(5)
Arms Control
362(2)
Export Control Regimes
364(2)
Multilateral Cooperation
366(1)
Information Systems and Technologies
367(8)
Arms Control
367(4)
Export Controls
371(3)
Multilateral Cooperation
374(1)
A Strategy During This Time of Uncertainty
375(2)
References
377(2)
Ethics and Information Warfare
379(24)
John Arquilla
Concepts and Definitions
380(6)
The Concepts of Just War Theory
381(3)
Defining Information Warfare
384(2)
Just War Theory and Information Warfare
386(5)
Jus ad Bellum
387(1)
Jus in Bello
388(3)
Some Guidelines for Policy
391(7)
Policy Toward Going to War
392(2)
On Just Warfighting
394(4)
Closing Thoughts
398(1)
References
398(5)
Defense in a Wired World: Protection, Deterrence, and Prevention
403(34)
Zalmay Khalilzad
The Threat
406(4)
The Attacks
410(2)
Strategies of Defense: Protection, Deterrence, and Prevention
412(21)
Protection
413(5)
Deterrence
418(8)
Prevention
426(7)
Toward a National Strategy for Information-Warfare Defense
433(1)
References
434(3)
Conclusion: the changing Role of Information in Warfare
437(15)
Martin Libicki
Jeremy Shapiro
Trend or Fad?
438(2)
Perfect Security?
440(2)
National Policy Issues
442(5)
Air Force Policy Issues
447(4)
A Timeless Lesson of Information Warfare
451(1)
References
452

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program