Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World

Georgetown University Press
1
Free sample

In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes.

Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.

Read more

About the author

Derek S. Reveron is a professor of national security affairs and the EMC Informationist Chair at the US Naval War College. He is the author of Exporting Security: International Engagement, Security Cooperation, and the Changing Face of the US Military and coauthor of Human Security in a Borderless World.

Read more

Reviews

4.0
1 total
Loading...

Additional Information

Publisher
Georgetown University Press
Read more
Published on
Sep 11, 2012
Read more
Pages
256
Read more
ISBN
9781589019195
Read more
Language
English
Read more
Genres
History / Military / General
Political Science / Security (National & International)
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Doug Stanton
“A thrilling action ride of a book” (The New York Times Book Review)—from Jerry Bruckheimer in theaters everywhere January 19, 2018—the New York Times bestselling, true-life account of a US Special Forces team deployed to dangerous, war-ridden Afghanistan in the weeks following 9/11.

Previously published as Horse Soldiers, 12 Strong is the dramatic account of a small band of Special Forces soldiers who secretly entered Afghanistan following 9/11 and rode to war on horses against the Taliban. Outnumbered forty to one, they pursued the enemy army across the mountainous Afghanistan terrain and, after a series of intense battles, captured the city of Mazar-i-Sharif. The bone-weary American soldiers were welcomed as liberators as they rode into the city. Then the action took a wholly unexpected turn.

During a surrender of six hundred Taliban troops, the Horse Soldiers were ambushed by the would-be POWs. Dangerously overpowered, they fought for their lives in the city’s immense fortress, Qala-i-Janghi, or the House of War. At risk were the military gains of the entire campaign: if the soldiers perished or were captured, the entire effort to outmaneuver the Taliban was likely doomed.

“A riveting story of the brave and resourceful American warriors who rode into Afghanistan after 9/11 and waged war against Al Qaeda” (Tom Brokaw), Doug Stanton’s account touches the mythic. The soldiers on horses combined ancient strategies of cavalry warfare with twenty-first-century aerial bombardment technology to perform a seemingly impossible feat. Moreover, their careful effort to win the hearts of local townspeople proved a valuable lesson for America’s ongoing efforts in Afghanistan. With “spellbinding...action packed prose...The book reads more like a novel than a military history...the Horse Soldier’s secret mission remains the US military’s finest moment in what has since arguably been a muddled war” (USA TODAY).
Derek S. Reveron
Safe from the battlefields of Europe and Asia, the United States led the post–World War II global economic recovery through international assistance and foreign direct investment. With an ardent decolonization agenda and a postwar legitimacy, the United States attempted to construct a world characterized by cooperation. When American optimism clashed with Soviet expansionism, the United States started on a path to global hegemony.

In US Foreign Policy and Defense Strategy, the authors analyze the strategic underpinnings of hegemony, assess the national security establishment that sustains dominance, consider the impact on civil-military relations, and explore the intertwining relationships between foreign policy, defense strategy, and commercial activities. Eschewing conventional analyses, the volume not only identifies drivers and continuities in foreign policy, but it also examines how the legacy of the last sixty-five years will influence future national security policy that will be characterized by US leadership in an increasingly competitive world.

From civil-military relations to finance, and from competing visions of how America should make war to its philosophy of securing peace through reconstruction and reconciliation, US Foreign Policy and Defense Strategy offers unique insights into the links between military and commercial power as it charts the rise of a historical rarity: the incidental superpower. This accessibly written book is suitable for students and general readers as well as scholars.

Jon R. Lindsay
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Jon R. Lindsay
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Derek S. Reveron
Safe from the battlefields of Europe and Asia, the United States led the post–World War II global economic recovery through international assistance and foreign direct investment. With an ardent decolonization agenda and a postwar legitimacy, the United States attempted to construct a world characterized by cooperation. When American optimism clashed with Soviet expansionism, the United States started on a path to global hegemony.

In US Foreign Policy and Defense Strategy, the authors analyze the strategic underpinnings of hegemony, assess the national security establishment that sustains dominance, consider the impact on civil-military relations, and explore the intertwining relationships between foreign policy, defense strategy, and commercial activities. Eschewing conventional analyses, the volume not only identifies drivers and continuities in foreign policy, but it also examines how the legacy of the last sixty-five years will influence future national security policy that will be characterized by US leadership in an increasingly competitive world.

From civil-military relations to finance, and from competing visions of how America should make war to its philosophy of securing peace through reconstruction and reconciliation, US Foreign Policy and Defense Strategy offers unique insights into the links between military and commercial power as it charts the rise of a historical rarity: the incidental superpower. This accessibly written book is suitable for students and general readers as well as scholars.

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.