You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

Conquest in Cyberspace: National Security and Information Warfare » (1st Edition)

Book cover image of Conquest in Cyberspace: National Security and Information Warfare by Martin C. Libicki

Authors: Martin C. Libicki
ISBN-13: 9780521692144, ISBN-10: 0521692148
Format: Paperback
Publisher: Cambridge University Press
Date Published: April 2007
Edition: 1st Edition

Find Best Prices for This Book »

Author Biography: Martin C. Libicki

Martin C. Libicki, a Senior Policy Analyst at the RAND Corporation since 1998, works on the relationship between information technology and national security. He has written numerous monographs on the subject, notably What is Information Warfare, The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon, and Who Runs What in the Global Information Grid. Dr Libicki is also the editor of the RAND Textbook, New Challenges, New Tools for Defense Decisionmaking. His most recent assignments at RAND have been to develop a post-9/11 information technology strategy for the U.S. Department of Justice and DARPA's Terrorist Information Awareness program, conduct an information security analysis for the FBI, investigate targeting strategies of al Queda, and assess CIA's R&D venture, In-Q-Tel. He previously taught at the National Defense University. Dr Libicki received his Ph.D. from the University of California at Berkeley in 1978.

Book Synopsis

This book shows the risks and protections cyberspace offers for national security and information warfare.

Table of Contents

List of Figures     x
Acknowledgments     xi
Introduction     1
What Does Conquest Mean in Cyberspace?     4
Precis     10
Hostile Conquest as Information Warfare     15
An Ideal-Type Definition of Information Warfare     16
Control at One Layer Is Not Control at Another     24
Applying the Ideal-Type Definition     27
There Is No Forced Entry in Cyberspace     31
Information Warfare Only Looks Strategic     37
IW Strategy and Terrorism     43
Conclusions     49
Information Warfare as Noise     50
Disinformation and Misinformation     51
Defenses against Noise     55
Redundancy     55
Filtration     57
What Tolerance for Noise?     59
Tolerance in Real Environments     60
Castles and Agoras     62
Hopping from Agoras to Castles?     64
Castling Foes     66
Concluding Observations     71
Can Information Warfare Be Strategic?     73
Getting In     75
Mucking Around     79
Spying     79
Denial of Service     80
Corruption     81
Distraction     83
Countermeasures     84
Redundancy     84
Learning     85
Damage Assessment     87
Prediction     90
Intelligence Is Necessary     90
Intelligence Alone Is Hardly Sufficient     93
Is Information Warfare Ready for War?     95
The Paradox of Control     96
Other Weaponization Criteria     97
Conclusions     100
Information Warfare against Command and Control     102
The Sources of Information Overload     103
Its Effect on Conventional Information Warfare Techniques     105
Coping Strategies     107
Who Makes Decisions in a Hierarchy?     107
Responses to Information Overload     111
Know the Enemy's Information Architecture     116
Elements of Information Culture     117
Elements of Nodal Architecture     118
Injecting Information into Adversary Decision Making     118
Ping, Echo, Flood, and Sag     121
Ping and Echo     121
Flood and Sag     122
Conclusions     124
Friendly Conquest in Cyberspace      125
A Redefinition of Conquest     126
The Mechanisms of Coalitions     128
The Particular Benefits of Coalitions     130
Information and Coalitions     131
The Cost of Coalitions in Cyberspace     136
Enterprise Architectures and Influence     142
Alliances with Individuals     148
The Special Case of Cell Phones     151
Alliances of Organizations     155
Ecologies of Technological Development     155
DoD's Global Information Grid (GIG)     159
Merging the Infrastructures of Allies     164
Conclusions     166
Friendly Conquest Using Global Systems     169
Geospatial Data     170
Coping with Commercial Satellites     175
Manipulation through Cyberspace     178
Getting Others to Play the Game     180
Some Conclusions about Geospatial Services     182
National Identity Systems     182
Two Rationales for a National Identity System     183
Potential Parameters for a Notional System     184
Constraints from and Influences over Foreign Systems     187
Compare, Contrast, and Conclude     191
Retail Conquest in Cyberspace     193
Information Trunks and Leaves     194
Where Does Cheap Information Come From?     195
Surveillance in Cyberspace     198
Making Information Global     203
Privacy     204
Amalgamating Private Information     206
Using the Information     208
General Coercion     208
Specific Coercion     209
Persuasion     211
Some Limits of Retail Warfare in Cyberspace     214
Using Retail Channels to Measure Wholesale Campaigns     215
Conclusions     218
From Intimacy, Vulnerability     220
Do the Walls Really Come Down?     220
Intimacy as a Target     222
The Fecklessness of Friends     225
Betrayal     228
Conclusions     230
Talking Conquest in Cyberspace     231
Four Layers of Communications     232
Human Conversation in Layers     232
Cyberspace in Layers     236
Complexity Facilitates Conquest     240
Complexity and Hostile Conquest     241
Complexity and Friendly Conquest     242
Semantics     245
Pragmatics      249
Lessons?     255
Managing Conquest in Cyberspace     256
Conducting Hostile Conquest in Cyberspace     257
Warding Off Hostile Conquest in Cyberspace     262
Byte Bullies     262
Headless Horsemen     265
Perfect Prevention     268
Total Transparency     270
Nasty Neighborhoods     272
Exploiting Unwarranted Influence     276
Against Unwarranted Influence     281
In Microsoft's Shadow     282
Microsoft and Computer Security     285
Conclusions     289
Why Cyberspace Is Likely to Gain Consequence     291
More Powerful Hardware and Thus More Complex Software     292
Cyberspace in More Places     294
Fuzzier Borders between Systems     297
Accepted Cryptography     299
Privatized Trust     301
The Possible Substitution of Artificial for Natural Intelligence     303
Conclusions     306
Index     307

Subjects