0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Paperback): Robert Chesney, Max Smeets Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Paperback)
Robert Chesney, Max Smeets; Foreword by Amy Zegart; Contributions by Robert Chesney, Max Smeets, …
R907 Discovery Miles 9 070 Ships in 9 - 15 working days

A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R751 Discovery Miles 7 510 Ships in 12 - 17 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Political Risk - Facing the Threat of Global Insecurity in the Twenty-First Century (Paperback): Condoleezza Rice, Amy Zegart Political Risk - Facing the Threat of Global Insecurity in the Twenty-First Century (Paperback)
Condoleezza Rice, Amy Zegart 1
R343 R280 Discovery Miles 2 800 Save R63 (18%) Ships in 9 - 15 working days

'Smart. Informative. Overdue' Eric Schmidt, former CEO of Google Political risk - the probability that a political action could significantly affect an organisation - is changing fast, and it's more widespread than ever before. In the past, the chief concern used to be whether a foreign dictator would nationalise the country's oil industry. Today, political risk stems from a widening array of agents, from Twitter users and terrorists to hackers and insurgents. What's more, the very institutions and laws that are supposed to reduce uncertainty and risk often increase it instead. This means that in today's globalised world there are no 'safe' bets. Political risk affects companies and organisations of all sizes, operating everywhere from London to Lahore, even if they don't know it. Political Risk investigates and analyses this shifting landscape, suggests what businesses can do to navigate it, and explains how all of us can better understand these rapidly changing geopolitical dynamics.

Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Hardcover): Robert Chesney, Max Smeets Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Hardcover)
Robert Chesney, Max Smeets; Foreword by Amy Zegart; Contributions by Robert Chesney, Max Smeets, …
R3,301 Discovery Miles 33 010 Ships in 10 - 15 working days

A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.

Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations (Paperback): Herbert Lin, Amy Zegart Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations (Paperback)
Herbert Lin, Amy Zegart
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

"We are dropping cyber bombs. We have never done that before."-U.S. Defense Department official. A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called "digital combat power" and how the United States should incorporate that power into its national security strategy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Shield Sheen Xtreme (Strawberry) (750ml)
R97 Discovery Miles 970
Little Big Paw Turkey Wet Dog Food Tin…
R815 Discovery Miles 8 150
Not available
Sterile Wound Dressing
R5 Discovery Miles 50
Fast & Furious: 8-Film Collection
Vin Diesel, Paul Walker, … Blu-ray disc R649 R399 Discovery Miles 3 990
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
Merry Christmas
Mariah Carey, Walter Afanasieff, … CD R122 R112 Discovery Miles 1 120
Nuovo 1/2/3 Car Seat (Black)
R1,999 R1,399 Discovery Miles 13 990
The Walking Dead - Season 1 / 2 / 3 / 4
Andrew Lincoln Blu-ray disc  (1)
R288 Discovery Miles 2 880

 

Partners