|
Showing 1 - 17 of
17 matches in All Departments
With billions of computers in existence, cyberspace, 'the virtual
world created when they are connected,' is said to be the new
medium of power. Computer hackers operating from anywhere can enter
cyberspace and take control of other people's computers, stealing
their information, corrupting their workings, and shutting them
down. Modern societies and militaries, both pervaded by computers,
are supposedly at risk. As Conquest in Cyberspace explains,
however, information systems and information itself are too easily
conflated, and persistent mastery over the former is difficult to
achieve. The author also investigates how far 'friendly conquest'
in cyberspace extends, such as the power to persuade users to adopt
new points of view. He discusses the role of public policy in
managing cyberspace conquests and shows how the Internet is
becoming more ubiquitous and complex, such as in the use of
artificial intelligence.
With billions of computers in existence, cyberspace, 'the virtual
world created when they are connected,' is said to be the new
medium of power. Computer hackers operating from anywhere can enter
cyberspace and take control of other people's computers, stealing
their information, corrupting their workings, and shutting them
down. Modern societies and militaries, both pervaded by computers,
are supposedly at risk. As Conquest in Cyberspace explains,
however, information systems and information itself are too easily
conflated, and persistent mastery over the former is difficult to
achieve. The author also investigates how far 'friendly conquest'
in cyberspace extends, such as the power to persuade users to adopt
new points of view. He discusses the role of public policy in
managing cyberspace conquests and shows how the Internet is
becoming more ubiquitous and complex, such as in the use of
artificial intelligence.
The Secretary of the Treasury has applied his attention to the
subject of manufactures; and particularly to the means of promoting
such as will tend to render the United States independent on
foreign nations for military and essential supplies.
In the weeks leading up to Desert Storm, anxious analysts tried to
forecast the course of the war by counting what the coalition and
Iraq each brought to the battlefield: they have this many men, we
have that many men; they have this much armor, we have that much
armor; their air fleet is this big; ours is that big. Few doubted
which side would prevail in battle, but many analysts were not so
sure the war could be won swiftly and with acceptable casualties.
The Department of Defense has been successfully exploiting rapidly
developing advances in information technology for military gain. On
tomorrow's multidimensional battlefield - or "battlespace" - the
increased density, acuity, and connectivity of sensors and many
other information devices may allow U. S. Armed Forces to see
almost everything worth seeing in real or near-real time. Such
enhanced vision of the battlespace is no doubt a significant
military advantage, but a question remains: How to we achieve
dominant battlefield knowledge, namely the ability to understand
what we see and act on it decisively? The papers collected here
address the most critical aspects of that problem - to wit: If the
United States develops the means to acquire dominant battlespace
knowledge (DBK), how might that affect the way it goes to war, the
circumstances under which force can and will be used, the purposes
for its employment, and the resulting alterations of the global
geomilitary environment? Of particular interest is how the authors
view the influence of DBK in light of the shift from global and
regional stability issues that marks the post-Cold War world. While
no definitive answer has yet emerged, it is clear that the
implications of so profound a change in military technology are
critical to the structure and function of the U.S. Armed Forces. In
working toward a definitive answer, the authors of this volume make
an important contribution to a debate whose resolution will shape
the decades to come. Ervin J. Rokke Lieutenant General, United
States Air Force President, National Defense University
Information warfare, as any casual observer of the Pentagon can
attest, remains a hot-button topic in the military community. Thus
does war follow commerce into cyberspace, pitting foes against one
another for control of this clearly critical high ground. But does
this facile comparison have a basis in reality? In this
iconoclastic spirit, the six essays in this book are characterized
by a continuing search for the meaning of information warfare.
The Internet is a new battleground between governments that censor
online content and those who advocate freedom for all to browse,
post, and share information online. This report examines how
Internet freedom may transform state-society relations in
nondemocratic regimes, using case studies of China, Egypt, Russia,
and Syria, and also draws parallels between Internet freedom and
Radio Free Europe programs during the Cold War.
As the need to identify known and suspected combatants has elevated
the importance of biometrics in the Department of Defense (DoD),
RAND researchers assessed how current activities are supporting end
users and how DoD is preparing to focus biometrics on different
missions. As overseas contingency operations wind down, DoD's
biometrics program must move in a new direction, and continued
funding must be justified in new ways.
The Global Force Management Data Initiative was launched to improve
aggregation of unclassified force-structure data. Aggregation,
though, raised concerns about classification because the system
might be attractive to a potential adversary. The authors develop a
framework for evaluating classification decisions to determine
that, while overall classification is not indicated, the inclusion
of some data will require careful consideration.
Passwords are proving less and less capable of protecting computer
systems from abuse. Multifactor authentication (MFA) which combines
something you know (e.g., a PIN), something you have (e.g., a
token), and/or something you are (e.g., a fingerprint) is
increasingly being required. This report investigates why
organizations choose to adopt or not adopt MFA and where they
choose to use it.
The protection of cyberspace, the information medium, has become a
vital national interest because of its importance both to the
economy and to military power. An attacker may tamper with networks
to steal information for the money or to disrupt operations. Future
wars are likely to be carried out, in part or perhaps entirely, in
cyberspace. It might therefore seem obvious that maneuvering in
cyberspace is like maneuvering in other media, but nothing would be
more misleading. Cyberspace has its own laws; for instance, it is
easy to hide identities and difficult to predict or even understand
battle damage, and attacks deplete themselves quickly. Cyberwar is
nothing so much as the manipulation of ambiguity. The author
explores these topics in detail and uses the results to address
such issues as the pros and cons of counterattack, the value of
deterrence and vigilance, and other actions governments can take to
protect themselves in the face of deliberate cyberattack. For more
than 60 years, decisionmakers in the public and private sectors
have turned to the RAND Corporation for objective analysis and
effective solutions that address the challenges facing the nation
and the world.
All terrorist groups eventually end. But how? Most modern groups
have ended because they joined the political process or local
police and intelligence agencies arrested or killed key members.
This has significant implications for dealing with al Qa'ida and
suggests fundamentally rethinking post-9/11 U.S. counterterrorism
strategy: Policing and intelligence, not military force, should
form the backbone of U.S. efforts against al Qa'ida.All terrorist
groups end. But how do they end? Most groups since 1968 have ended
because they joined the political process or are defeated by police
and intelligence services. This has significant implications for
countering al Qa'ida.
Libicki et al. argue that information collection requirements and
systems for counterinsurgency are important because the community
that conducts counterinsurgency crosses national and institutional
boundaries and because the indigenous population plays a large role
in determining the outcome of an insurgency. They then demonstrate
what this focus implies for counterinsurgency requirements,
collection, networking, and systems design.
Governments spend billions to protect against terrorism. Might it
help to understand what al Qaeda would achieve with each specific
attack? This book examines various hypotheses of terrorist
targeting: is it (1) to coerce, (2) to damage economies, (3) to
rally the faithful, or (4) a decision left to affiliates? This book
analyzes past attacks, post hoc justifications, and expert opinion
to weigh each hypothesis.
|
|