Friday, February 13, 2009

Conquest in Cyberspace or Learning Red Hat Linux

Conquest in Cyberspace: National Security and Information Warfare

Author: Martin C Libicki

With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.



Table of Contents:
List of Figures     x
Acknowledgments     xi
Introduction     1
What Does Conquest Mean in Cyberspace?     4
Precis     10
Hostile Conquest as Information Warfare     15
An Ideal-Type Definition of Information Warfare     16
Control at One Layer Is Not Control at Another     24
Applying the Ideal-Type Definition     27
There Is No Forced Entry in Cyberspace     31
Information Warfare Only Looks Strategic     37
IW Strategy and Terrorism     43
Conclusions     49
Information Warfare as Noise     50
Disinformation and Misinformation     51
Defenses against Noise     55
Redundancy     55
Filtration     57
What Tolerance for Noise?     59
Tolerance in Real Environments     60
Castles and Agoras     62
Hopping from Agoras to Castles?     64
Castling Foes     66
Concluding Observations     71
Can Information Warfare Be Strategic?     73
Getting In     75
Mucking Around     79
Spying     79
Denial of Service     80
Corruption     81
Distraction     83
Countermeasures     84
Redundancy     84
Learning     85
Damage Assessment     87
Prediction     90
Intelligence Is Necessary     90
Intelligence Alone Is Hardly Sufficient     93
Is Information Warfare Ready for War?     95
The Paradox of Control     96
Other Weaponization Criteria     97
Conclusions     100
Information Warfare against Command and Control     102
The Sources of Information Overload     103
Its Effect on Conventional Information Warfare Techniques     105
Coping Strategies     107
Who Makes Decisions in a Hierarchy?     107
Responses to Information Overload     111
Know the Enemy's Information Architecture     116
Elements of Information Culture     117
Elements of Nodal Architecture     118
Injecting Information into Adversary Decision Making     118
Ping, Echo, Flood, and Sag     121
Ping and Echo     121
Flood and Sag     122
Conclusions     124
Friendly Conquest in Cyberspace      125
A Redefinition of Conquest     126
The Mechanisms of Coalitions     128
The Particular Benefits of Coalitions     130
Information and Coalitions     131
The Cost of Coalitions in Cyberspace     136
Enterprise Architectures and Influence     142
Alliances with Individuals     148
The Special Case of Cell Phones     151
Alliances of Organizations     155
Ecologies of Technological Development     155
DoD's Global Information Grid (GIG)     159
Merging the Infrastructures of Allies     164
Conclusions     166
Friendly Conquest Using Global Systems     169
Geospatial Data     170
Coping with Commercial Satellites     175
Manipulation through Cyberspace     178
Getting Others to Play the Game     180
Some Conclusions about Geospatial Services     182
National Identity Systems     182
Two Rationales for a National Identity System     183
Potential Parameters for a Notional System     184
Constraints from and Influences over Foreign Systems     187
Compare, Contrast, and Conclude     191
Retail Conquest in Cyberspace     193
Information Trunks and Leaves     194
Where Does Cheap Information Come From?     195
Surveillance in Cyberspace     198
Making Information Global     203
Privacy     204
Amalgamating Private Information     206
Using the Information     208
General Coercion     208
Specific Coercion     209
Persuasion     211
Some Limits of Retail Warfare in Cyberspace     214
Using Retail Channels to Measure Wholesale Campaigns     215
Conclusions     218
From Intimacy, Vulnerability     220
Do the Walls Really Come Down?     220
Intimacy as a Target     222
The Fecklessness of Friends     225
Betrayal     228
Conclusions     230
Talking Conquest in Cyberspace     231
Four Layers of Communications     232
Human Conversation in Layers     232
Cyberspace in Layers     236
Complexity Facilitates Conquest     240
Complexity and Hostile Conquest     241
Complexity and Friendly Conquest     242
Semantics     245
Pragmatics      249
Lessons?     255
Managing Conquest in Cyberspace     256
Conducting Hostile Conquest in Cyberspace     257
Warding Off Hostile Conquest in Cyberspace     262
Byte Bullies     262
Headless Horsemen     265
Perfect Prevention     268
Total Transparency     270
Nasty Neighborhoods     272
Exploiting Unwarranted Influence     276
Against Unwarranted Influence     281
In Microsoft's Shadow     282
Microsoft and Computer Security     285
Conclusions     289
Why Cyberspace Is Likely to Gain Consequence     291
More Powerful Hardware and Thus More Complex Software     292
Cyberspace in More Places     294
Fuzzier Borders between Systems     297
Accepted Cryptography     299
Privatized Trust     301
The Possible Substitution of Artificial for Natural Intelligence     303
Conclusions     306
Index     307

Book review: The Anatomy of Hope or Cardio Free Diet

Learning Red Hat Linux

Author: Bill McCarty

New users are flocking to Linux literally by the millions. Yet most of these new users draw from Microsoft Windows as their primary computing experience; for them an operating system from the UNIX family is an unfamiliar experience. In Learning Red Hat Linux, Bill McCarty has written a book aimed specifically at this new audience.

Learning Red Hat Linux will guide any new user of Linux through the installing and use of Red Hat Linux, the free operating system that is shaking up the commercial world of software. It demystifies Linux in terms familiar to Windows users and gives readers only what they need to start being successful users of Linux.

Built around the popular Red Hat distribution of Linux, Learning Red Hat Linux takes the reader step by step through the process of installing and setting up a Red Hat Linux system, and provides a thorough but gentle introduction to the basics of using Red Hat Linux.

Because the book is written specifically for the enclosed CD, the reader needs nothing else to get started with this exciting new operating system.

Booknews

This second edition of a book/CD-ROM guide to installing and running Red Hat Linux on a PC has been upgraded to cover installation and configuration of Red Hat version 7.2, with improved sections on how to use the GNOME and KDE desktop environments and the use of the Red Hat Package Manager. The two CD-ROMs contain tools needed to install and configure a Red Hat Linux system. The book is written for first-time Linux users. McCarty teaches management information systems at Azusa Pacific University. Annotation c. Book News, Inc., Portland, OR (booknews.com)



No comments:

Post a Comment