List of Tables |
|
x | |
Preface |
|
ix | |
|
Gary Chapman, Diego Latella and Professor Carlo Schaerf |
|
|
Notes on the Contributors |
|
xiii | |
Glossary |
|
xvii | |
Part I: Cyberwar, Netwar and the Revolution in Military Affairs: Defining the Issues |
|
|
|
3 | (9) |
|
Dr Philippa Trevorrow, Dr Steve Wright, Professor David Webb and Dr Edward Halpin |
|
|
|
2 Virtual Violence and Real War: Playing War in Computer Games: The Battle with Reality |
|
|
12 | (20) |
|
|
|
|
12 | (1) |
|
|
13 | (2) |
|
2.3 Definition and historical context |
|
|
15 | (2) |
|
|
17 | (4) |
|
2.5 Realism versus reality |
|
|
21 | (4) |
|
2.6 Games and professional military simulations |
|
|
25 | (2) |
|
|
27 | (5) |
|
3 Strategic Information Warfare: An Introduction |
|
|
32 | (19) |
|
|
|
|
32 | (1) |
|
|
33 | (2) |
|
3.3 Critical infrastructures |
|
|
35 | (2) |
|
|
37 | (4) |
|
|
41 | (2) |
|
3.6 Open questions and comments |
|
|
43 | (2) |
|
|
45 | (6) |
Part II: Implications of the Problem |
|
|
|
51 | (21) |
|
|
|
|
51 | (1) |
|
4.2 Theory, information technology and accident |
|
|
52 | (3) |
|
4.3 War on terrorism - the state of emergency |
|
|
55 | (1) |
|
4.4 The necessity and problematics of an enemy |
|
|
56 | (2) |
|
4.5 War on Afghanistan - from postmodern moments to information isolation |
|
|
58 | (2) |
|
4.6 Battle for the strategic truth |
|
|
60 | (1) |
|
4.7 War on Iraq - differences in perceptions |
|
|
61 | (6) |
|
|
67 | (5) |
|
5 Risks of Computer-Related Technology |
|
|
72 | (10) |
|
|
|
|
72 | (6) |
|
|
78 | (4) |
|
6 Missile Defence - The First Steps Towards War in Space? |
|
|
82 | (16) |
|
|
|
6.1 The military use of space |
|
|
82 | (2) |
|
6.2 Anti-satellite (ASAT) programmes |
|
|
84 | (3) |
|
6.3 Current US developments |
|
|
87 | (2) |
|
|
89 | (3) |
|
6.5 The possibility of space weapons control |
|
|
92 | (6) |
|
7 Technology as a Source of Global Turbulence? |
|
|
98 | (15) |
|
|
|
|
98 | (1) |
|
7.2 Realistic and neorealistic approaches to technology |
|
|
99 | (1) |
|
7.3 Interdependent globalism |
|
|
100 | (2) |
|
7.4 Technology and IR/IPE from a constructivist point of view |
|
|
102 | (1) |
|
7.5 Arguments for a broader perspective on technology |
|
|
103 | (1) |
|
7.6 Multidimensional effects of technology |
|
|
104 | (2) |
|
|
106 | (7) |
|
8 Nuclear Weapons and the Vision of Command and Control |
|
|
113 | (26) |
|
|
|
8.1 The White House and the Department of Defense (DoD) |
|
|
114 | (1) |
|
8.2 The White House Communications Agency |
|
|
115 | (1) |
|
8.3 Crisis experience: the attempted assassination of President Ronald Reagan |
|
|
116 | (1) |
|
8.4 Crisis experience: The September 11 attack |
|
|
117 | (2) |
|
8.5 The Global Command and Control System (GCCS) (as defined by the DoD) |
|
|
119 | (1) |
|
8.6 GCCS-T: the top secret provision for nuclear operations |
|
|
120 | (1) |
|
8.7 Ongoing transformation of command and control systems |
|
|
121 | (2) |
|
8.8 War experience: the Iraq War (2003—...) |
|
|
123 | (1) |
|
8.9 Is GCCS sufficiently reliable for nuclear operations? |
|
|
124 | (1) |
|
8.10 Is SIPRNET sufficiently secure for nuclear operations? |
|
|
125 | (5) |
|
|
130 | (9) |
|
9 Information Warfare and the Laws of War |
|
|
139 | |
|
|
|
|
139 | (2) |
|
9.2 Information Warfare (IW) |
|
|
141 | (3) |
|
|
144 | (7) |
|
|
151 | (6) |
Part III: Country Perspectives |
|
|
|
157 | (16) |
|
|
|
|
157 | (2) |
|
10.2 The current Russian RMA and its international consequences |
|
|
159 | (7) |
|
10.3 Conclusion and evaluation |
|
|
166 | (1) |
|
|
167 | (6) |
|
11 An Overview of the Research and Development of Information Warfare in China |
|
|
173 | (26) |
|
|
|
|
173 | (1) |
|
11.2 Theoretical research on Information Warfare in China |
|
|
174 | (8) |
|
11.3 Current IW development in China |
|
|
182 | (7) |
|
11.4 IW tactics that could be used by Beijing to attack Taiwan |
|
|
189 | (2) |
|
11.5 Combination of US and Taiwanese resistance to IW from Beijing |
|
|
191 | (1) |
|
11.6 The possibility of IW between China and the USA |
|
|
191 | (2) |
|
|
193 | (6) |
Part IV: What is Being Done - or Must Be Done? |
|
|
|
199 | (20) |
|
|
|
|
201 | (3) |
|
12.2 A space Pearl Harbor? |
|
|
204 | (2) |
|
|
206 | (2) |
|
12.4 The security dilemma |
|
|
208 | (2) |
|
|
210 | (2) |
|
12.6 Velvet glove, steel fist |
|
|
212 | (1) |
|
12.7 Unintended consequences |
|
|
213 | (3) |
|
|
216 | (3) |
|
13 Threat Assessment and Protective Measures: Extending the Asia-Europe Meeting IV Conclusions on Fighting International Terrorism and Other Instruments to Cyber Terrorism |
|
|
219 | (9) |
|
|
|
|
219 | (1) |
|
13.2 The Asia-Europe Meeting (ASEM) framework |
|
|
219 | (1) |
|
13.3 Cyber terrorism: an urban legend? |
|
|
220 | (2) |
|
13.4 A taxonomy of real cyber threats |
|
|
222 | (2) |
|
13.5 Advanced defensive methods and different regional priorities |
|
|
224 | (1) |
|
13.6 International and regional cooperation against cyber terrorism |
|
|
224 | (1) |
|
13.7 Concluding statement |
|
|
225 | (3) |
|
14 Policy Laundering, and Other Policy Dynamics |
|
|
228 | (14) |
|
|
|
|
228 | (2) |
|
14.2 At the international level: the Council of Europe and the G8 |
|
|
230 | (2) |
|
14.3 At the national level |
|
|
232 | (2) |
|
14.4 The international-national dance: traffic data retention |
|
|
234 | (2) |
|
14.5 Democratic challenges and international opportunities |
|
|
236 | (3) |
|
|
239 | (3) |
|
|
242 | (4) |
|
Dr Steve Wright, Dr Philippa Trevorrow, Professor David Webb and Dr Edward Halpin |
|
|
Index |
|
246 | |