search for books and compare prices
Tables of Contents for Information Warfare
Chapter/Section Title
Page #
Page Count
Foreword
xi
 
Acknowledgments
xiii
 
Introduction
xv
 
Information Warfare: A New Framework for Analysis
1
40
Types of Information Warfare Strategies and Activities
3
2
The Probability of Various Information Warfare Strategies Being Implemented
5
4
The Anatomy of a National Information Warfare Defense Structure
9
8
Putting International Treaties into Perspective
17
3
The Military Side of Information Warfare
20
7
Civilian Law Enforcement and Information Warfare
27
2
The Impact of Information Warfare on Private Companies
29
3
Information Warfare Will Result in Civilian Casualties
32
3
Conclusions and an Agenda for Action
35
6
Measuring the Economic Impact of Information Warfare
41
24
The Nature of the Economic Impact of Information Warfare Attacks
43
3
The Immediate Economic Impact of Information Warfare Attacks
46
5
The Short-Term Economic Impact of Information Warfare Attacks
51
6
The Long-Term Economic Impact of Disruption
57
4
There Is No Day After in Cyberwar
61
1
Conclusions and an Agenda for Action
62
3
The Electronic Doomsday Scenario: How Ten People Could Cause $1 Trillion in Economic Disruption
65
32
The PH2 Team
66
2
The Conception of PH2
68
1
Day 1: The Launch of PH2
69
1
Day 2: The Big Bug Bite
70
1
Day 3: Is It War Yet?
71
1
Day 4: A Russian Connection?
72
1
Day 5: Chaos Realized
72
1
Day 6: It Isn't Over Yet
72
1
Day 7: Attacks in Germany and Japan
73
2
Day 8: A German Bank Goes Down
75
1
Day 9: Wall Street Denial-of-Service Attack
75
1
Day 10: Middle East Conflict Brews, Wrong Number in Australia
76
3
Day 11: The Tiger Prowls
79
1
Day 12: Our Asian Daughters
80
2
Day 13: Tonya Strikes
82
1
Day 14: The Shambles of Electronic Commerce
83
1
Day 15: Busy Signal in London
84
2
Day 16: Target NASDAQ
86
1
Day 17: PH2 Realized
87
1
Day 18: Stock Brokerage Take-Down
88
2
Day 19: NASDAQ Foiled, Microsoft Hit
90
2
Day 20: Information Warfare, Guns, and Bombs
92
1
Day 21: Vulnerability and Exposure
93
1
Day 22: Santa Claus Hits
94
1
Day 23: Merry Christmas
94
1
The Aftermath of Information Warfare Attacks
95
2
Preparing to Fight Against Major Threats
97
26
Assessing the Preparedness for Information Warfare in the United States
99
6
Assessing the Preparedness for Information Warfare of Other Governments
105
2
Assessing the Preparedness for Information Warfare of Terrorists and Criminals
107
1
Assessing the Preparedness for Information Warfare of Industry Groups
108
2
Traditional Diplomacy and Information Warfare
110
2
The Role of International Organizations
112
1
The Role of the Global Military Alliances
113
2
Martial Law and Cyberspace
115
2
The Super Cyber Protection Agency
117
1
Preparation from a Global Viewpoint
118
1
Conclusions and an Agenda for Action
119
4
Information Warfare Strategies and Tactics from a Military Perspective
123
28
The Context of Military Tactics
124
1
Offensive and Defensive Ruinous Information Warfare Strategies and Tactics
125
5
Offensive and Responsive Containment Information Warfare Strategies and Tactics
130
5
Defensive Preventive Information Warfare Strategies and Tactics
135
4
Random and Sustained Terrorist Information Warfare Strategies and Tactics
139
4
Sustained and Random Rogue Information Warfare Strategies and Tactics
143
3
Amateur Rogue Information Warfare Strategies and Tactics
146
1
Conclusions and an Agenda for Action
147
4
Information Warfare Strategies and Tactics from a Corporate Perspective
151
22
Overview of Defensive Strategies for Private Companies
152
2
Participating in Defensive Preventive Information Warfare Planning
154
4
Surviving Offensive Ruinous and Containment Information Warfare Attacks
158
4
Surviving Terrorist Information Warfare Attacks
162
3
Countering Rogue Information Warfare Attacks
165
3
Dealing with Amateur Rogue Information Warfare Attacks
168
3
Conclusions and an Agenda for Action
171
2
Strategies and Tactics from a Terrorist and Criminal Perspective
173
24
Why Terrorists and Rogues Have an Advantage in Information Warfare
174
2
The Future Computer-Literate Terrorist and Criminal
176
1
Selecting Information Warfare Targets
177
8
Targets that Appeal to Both Terrorists and Rogue Criminals
185
1
Targets that Appeal to Terrorists, but Not Rogue Criminals
186
3
Targets that Appeal to Rogue Criminals, but Not Terrorists
189
1
Working from the Inside of Information Warfare Targets
190
2
Avoiding Pursuit and Capture
192
1
Fund Raising for Terrorist and Rogue Criminal Information Warriors
193
1
Conclusions and an Agenda for Action
194
3
The Arms Dealers and Industrial Mobilization in Information Warfare
197
32
Mobilization Requirements for Technology Companies in Information Warfare
198
2
The Top Technology Companies that Can Provide Information Warfare Expertise
200
2
Aerospace and Defense Companies that Can Provide Information Warfare Expertise
202
3
Computer System Manufacturers that Can Provide Information Warfare Expertise
205
3
ZiLOGComputer Networking Product Companies that Can Provide Information Warfare Expertise
208
1
Telecommunications Systems Companies that Can Provide Information Warfare Expertise
209
3
Telecommunications Service Providers that Can Provide Information Warfare Support
212
5
Software Producers that Can Provide Information Warfare Expertise
217
5
Computer Services and Consulting Firms that Can Provide Information Warfare Expertise
222
2
Internet Service Providers that Can Provide Support to Information Warriors
224
1
Cooperation Between Governments and Technology Companies in Information Warfare
225
1
Conclusions and an Agenda for Action
226
3
Civilian Casualties in Information Warfare
229
60
Why the Cyber Masses Are at Risk
231
1
Circumstances with the Highest Potential Impact for Individual Citizens
232
2
Conclusions and an Agenda for Action
234
3
The New Terrorist Profile: The Curious Nerd Is Moving to the Dark Side
237
30
The New Techno-Terrorists and Criminals
238
4
Computer Crimes and Terrorist Attacks
242
7
Where Information Warriors Will Come From
249
3
Understanding Why People Become Cyberwarriors
252
2
Motivations for Warriors in the New Frontier
254
1
The Alienation of Computer Geeks
255
1
Affinity Within the Pocket Protector Sect
256
1
Why Cybercrime and Terrorism Can Be Fun and Profitable
257
4
Will Americans Make Good Terrorists and Cyber Soldiers of Fortune?
261
1
Gender, Race, and Nationality in Information Warfare Careers
262
2
Conclusions and an Agenda for Action
264
3
Law Enforcement: Being Behind the Technology Curve and How to Change That
267
16
The Good Guys: Poorly Paid and Under-Trained
269
2
Computers and Beyond: New Requirements for Cops and Special Agents
271
5
The Challenge of Developing Cyber Cops
276
2
Working for Big Brother: The New Information Highway Patrol
278
2
Terrorist and Criminal Profiling in Cyberspace
280
1
Conclusions and Agenda for Action
280
3
Final Words for Policy Makers, Military Planners, and Corporate Executives
283
6
Cutting Through the Rhetoric
284
1
Funding National Defense
285
1
Risk Management in the Corporate Environment
286
1
Ecommerce and Information Warfare
286
1
Closing Comments
287
2
Glossary
289
10
Index
299