Sold Out
Book Categories |
v
CONTENTS
Preface ..................................................... iii
Figures ..................................................... vii
Tables...................................................... ix
Summary ................................................... xi
Acknowledgments............................................. xxiii
Chapter One
WHAT IS "STRATEGIC INFORMATION WARFARE?" ................ 1
Introduction .............................................. 1
Study Background.......................................... 2
Defense-Oriented Tasking from OASD(C3I) ....................... 3
Chapter Two
METHODOLOGY .......................................... 5
The "Day After . . ." Exercise Methodology ........................ 5
The Exercise Design Process .................................. 6
Exercise History ........................................... 8
Chapter Three
THE CHANGING FACE OF WAR ............................... 11
Chapter Four
DEFINING FEATURES OF STRATEGIC INFORMATION WARFARE ...... 15
Low Entry Cost ............................................ 17
Feature Description ....................................... 17
How This Feature Was Explored in the Exercise .................. 18
Participants' Reactions/Perspectives .......................... 18
Next Steps/Step Three ..................................... 18
Blurred Traditional Boundaries ................................ 19
Feature Description ....................................... 19
How This Feature Was Explored in the Exercise .................. 20
Participants' Reactions/Perspectives ..........................20
Next Steps/Step Three ..................................... 21
Perception Management ..................................... 22
Feature Description ....................................... 22
How This Feature Was Explored in the Exercise .................. 23
Participants' Reactions/Perspectives .......................... 23
Next Steps/Step Three ..................................... 23
Strategic Intelligence........................................ 24
Feature Description ....................................... 24
How This Feature Was Explored in the Exercise .................. 25
Participants' Reactions/Perspectives .......................... 25
Next Steps/Step Three ..................................... 25
Tactical Warning and Attack Assessment ......................... 26
Feature Description ....................................... 26
How This Feature Was Explored in the Exercise .................. 27
Participants' Reactions/Perspectives .......................... 27
Next Steps/Step Three ..................................... 28
Building and Sustaining Coalitions ............................. 28
Feature Description ....................................... 28
How This Feature Was Explored in the Exercise .................. 29
Participants' Reactions/Perspectives .......................... 29
Next Steps/Step Three ..................................... 30
Vulnerability of the U.S. Homeland ............................. 30
Feature Description ....................................... 30
How This Feature Was Explored in the Exercise .................. 31
Participants' Reactions/Perspectives .......................... 31
Next Steps/Step Three ..................................... 32
Chapter Five
ISSUES OF STRATEGIC INFORMATION WARFARE ................. 35
Risk Assessment ........................................... 35
National Military Strategy .................................... 36
National Security Strategy .................................... 38
U.S. Government Role ....................................... 39
Chapter Six
CONCLUSIONS............................................ 41
Leadership: Who Should Be in Charge? .......................... 41
Risk Assessment ........................................... 41
Government's Role ......................................... 42
National Security Strategy .................................... 42
National Military Strategy .................................... 42
ADDITIONAL READING: THREATS AND VULNERABILITIES............. 43
Appendix
A. METHODOLOGY .......................................... 45
B. SUMMARY OF GROUP DELIBERATIONS FOR STEP THREE ........... 47
C. EXERCISE................................................ 53
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionStrategic Information Warfare: A New Face of War
X
This Item is in Your InventoryStrategic Information Warfare: A New Face of War
X
You must be logged in to review the productsX
X
X
Add Strategic Information Warfare: A New Face of War, Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national insti, Strategic Information Warfare: A New Face of War to the inventory that you are selling on WonderClubX
X
Add Strategic Information Warfare: A New Face of War, Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national insti, Strategic Information Warfare: A New Face of War to your collection on WonderClub |