Forewords to the Second Edition |
|
xix | |
Foreword to the First Edition |
|
xxvii | |
Preface |
|
xxix | |
Acknowledgments |
|
xxxi | |
Authors |
|
xxxiii | |
Introduction |
|
xxxv | |
1 Introduction to Global Information Warfare |
|
1 | (26) |
|
|
1 | (2) |
|
|
3 | (1) |
|
Four Generations of Warfare |
|
|
4 | (1) |
|
Introduction to Global Information Warfare |
|
|
4 | (3) |
|
Information Warfare Will Flit You in Your Pocketbook |
|
|
7 | (2) |
|
|
9 | (1) |
|
IW Broadly Encompasses Many Levels and Functions |
|
|
10 | (1) |
|
|
10 | (5) |
|
Going beyond Three Blind Men Describing an Elephant: IW Terms of Reference |
|
|
15 | (7) |
|
Command and Control Warfare (C2W) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (2) |
|
Information Operations (10) |
|
|
20 | (2) |
|
Information Warfare Is a Powerful Approach for Attaining and Maintaining a Competitive Advantage |
|
|
22 | (2) |
|
Coherent Knowledge-Based Operations (CKO) |
|
|
24 | (1) |
|
Network-Centric Business (NCB) |
|
|
24 | (1) |
|
Knowledge Management (KM) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
2 From Information Warfare to Information Operations and Cyber Warfare |
|
27 | (28) |
|
Description of Information Warfare |
|
|
28 | (1) |
|
Current DoD Definition of Information Operations |
|
|
28 | (3) |
|
|
31 | (1) |
|
Russian View of Information Operations |
|
|
31 | (6) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (2) |
|
Chinese View of Information Warfare |
|
|
37 | (4) |
|
|
41 | (4) |
|
Cyber Warfare Approaches of Some Other Nations |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (3) |
3 War Stories from the Digital Battlefield |
|
55 | (20) |
|
|
69 | (1) |
|
|
70 | (5) |
4 Pre 9/11 |
|
75 | (14) |
|
|
80 | (4) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Impact of the Attacks on September 11, 2001 |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (2) |
5 Effect of 9/11 and US Homeland Security (DHS) |
|
89 | (30) |
|
|
90 | (1) |
|
Effect of 9/11 on US Government and Homeland Security |
|
|
90 | (1) |
|
Reaction to the World Trade Center and Pentagon Attacks |
|
|
91 | (2) |
|
US Homeland Security (DHS) Overview |
|
|
91 | (1) |
|
Homeland Security Act of 2002 |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
93 | (20) |
|
|
95 | (1) |
|
US Citizenship and Immigration Services |
|
|
95 | (3) |
|
US Customs and Border Protection |
|
|
98 | (1) |
|
|
98 | (1) |
|
Federal Emergency Management Agency |
|
|
98 | (1) |
|
Federal Law Enforcement Training Center |
|
|
98 | (1) |
|
US Immigration and Customs Enforcement |
|
|
98 | (1) |
|
Transportation Security Administration |
|
|
98 | (1) |
|
|
98 | (4) |
|
|
102 | (1) |
|
National Protection and Programs Directorate |
|
|
102 | (1) |
|
Science and Technology Directorate |
|
|
102 | (7) |
|
Domestic Nuclear Detection Office |
|
|
109 | (1) |
|
|
109 | (1) |
|
Office of Intelligence and Analysis |
|
|
109 | (1) |
|
Office of Operations Coordination and Planning |
|
|
109 | (1) |
|
|
109 | (4) |
|
Air Force Information Warfare Center |
|
|
113 | (4) |
|
|
117 | (1) |
|
|
117 | (2) |
6 Nation-State Defensive and Offensive Information Warfare Capabilities: North America |
|
119 | (28) |
|
|
119 | (4) |
|
|
119 | (2) |
|
|
121 | (1) |
|
Communications Security Establishment Canada |
|
|
121 | (1) |
|
Canadian Cyber Incident Response Centre |
|
|
121 | (1) |
|
|
122 | (1) |
|
Canadian Forces Information Operations Group |
|
|
122 | (1) |
|
Canadian Forces Network Operations Centre |
|
|
122 | (1) |
|
Canadian Forces Electronic Warfare Centre |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
Defence Research and Development Canada |
|
|
122 | (1) |
|
|
123 | (1) |
|
Cyber Storm Biannual Exercise Series |
|
|
123 | (1) |
|
|
123 | (23) |
|
|
123 | (1) |
|
|
123 | (3) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (5) |
|
|
127 | (2) |
|
Navy Information Operations Organizations |
|
|
129 | (1) |
|
Air Force Intelligence, Surveillance and Reconnaissance Agency |
|
|
130 | (2) |
|
|
132 | (4) |
|
The US Army 1st Information Operations Command |
|
|
133 | (1) |
|
Joint Special Operations University (JSOU) |
|
|
133 | (1) |
|
United States Army Communications-Electronics Research, Development and Engineering Center (CERDEC) |
|
|
134 | (1) |
|
Air Force Institute of Technology Center for Cyberspace Research (CCR) |
|
|
134 | (2) |
|
US Air Force Air War College (AWC), Air University |
|
|
136 | (6) |
|
|
142 | (2) |
|
|
144 | (3) |
|
Exercise Combined Endeavor Series |
|
|
144 | (1) |
|
Cyber Guard Exercise Series |
|
|
145 | (1) |
|
Cyber Flag Exercise Series |
|
|
145 | (1) |
|
Cyber Shield Exercise Series |
|
|
145 | (1) |
|
Cyber Storm Exercise Series |
|
|
146 | (1) |
|
|
146 | (1) |
7 Nation-State Defensive and Offensive Information Warfare Capabilities: Middle East Nation-States |
|
147 | (10) |
|
|
147 | (4) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Passive Civil Defense Committee |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (4) |
|
|
151 | (2) |
|
|
153 | (1) |
|
National Cyber Defense Authority |
|
|
153 | (1) |
|
National Information Security Authority |
|
|
153 | (1) |
|
Computer Services Directorate's (Lotem) (Telecommunications and Information Technology Unit) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Israel Defense Forces (IDF) Unit 8200 |
|
|
154 | (1) |
|
|
154 | (1) |
|
Israeli Cyber Experimentation Center |
|
|
154 | (1) |
|
Institute for National Security Studies (INSS) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (2) |
8 Nation-State Defensive and Offensive Information Warfare Capabilities: Asia Pacific Region |
|
157 | (28) |
|
|
157 | (5) |
|
|
157 | (2) |
|
|
159 | (2) |
|
Australian Security Intelligence Organisation |
|
|
159 | (1) |
|
Cyber Security Operations Centre |
|
|
159 | (1) |
|
Australian Cyber Security Centre (ACSC) |
|
|
160 | (1) |
|
|
161 | (1) |
|
Royal Australian Air Force (RAAF) Aerospace Operational Support Group |
|
|
161 | (1) |
|
|
161 | (1) |
|
Defence Science and Technology Organisation |
|
|
161 | (1) |
|
DSTO Cyber and Electronic Warfare Division |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (9) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (2) |
|
The Academy of Military Sciences |
|
|
164 | (1) |
|
National Defense University |
|
|
165 | (1) |
|
Wuhan Communications Command Academy |
|
|
165 | (1) |
|
National University of Defense Technology |
|
|
165 | (1) |
|
Information Engineering University |
|
|
166 | (1) |
|
Research Funding Programs |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
168 | (2) |
|
Technical Reconnaissance Bureaus (TRB) |
|
|
169 | (1) |
|
Information Warfare Militia |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (5) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Data Security Council of India |
|
|
173 | (1) |
|
Defence Information Assurance and Research Agency (DIARA) |
|
|
173 | (1) |
|
Defense Intelligence Agency |
|
|
173 | (1) |
|
|
173 | (1) |
|
Territorial Army (TA) Battalions for Cyber Warfare |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
Military College of Telecommunications Engineering (MCTE) |
|
|
174 | (1) |
|
The Prabhu Goel Research Centre for Computer and Internet |
|
|
|
|
174 | (1) |
|
Cyber Laboratories Program |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (4) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Ministry of People's Armed Forces |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (2) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Pakistan National Response Center for Cyber Crime |
|
|
181 | (1) |
|
Inter-Services Intelligence Directorate |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (3) |
9 Nation-State Defensive and Offensive Information Warfare Capabilities: Europe |
|
185 | (18) |
|
|
185 | (5) |
|
|
185 | (2) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (3) |
|
|
190 | (1) |
|
|
191 | (1) |
|
Alliance for Cyber Security |
|
|
191 | (1) |
|
|
192 | (1) |
|
Strategic Reconnaissance Command |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Exercise Cyber Coalition 2013 |
|
|
193 | (1) |
|
Exercise Steadfast Jazz 2013 |
|
|
193 | (1) |
|
Exercise Combined Endeavor 2014 |
|
|
193 | (1) |
|
|
193 | (9) |
|
|
193 | (3) |
|
|
196 | (2) |
|
Centre for the Protection of National Infrastructure (CPNI) |
|
|
196 | (1) |
|
Land Information Assurance Group |
|
|
196 | (2) |
|
|
198 | (1) |
|
|
199 | (2) |
|
Defence Science and Technology Laboratory (DSTL) |
|
|
199 | (1) |
|
DSTL Also Runs the Centre for Defence Enterprise (CDE) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (1) |
10 Nation-State Defensive and Offensive Information Warfare Capabilities: The Russian Federation |
|
203 | (14) |
|
|
203 | (10) |
|
|
203 | (2) |
|
|
205 | (2) |
|
The Federal Security Service (Federal'naya Sluzhba Bezopasnosti) (FSB) |
|
|
205 | (1) |
|
Information Security Centre of the FSB, Military Unit (VCH) 64829 |
|
|
205 | (1) |
|
Ministry of Foreign Affairs: Department of Information Security |
|
|
205 | (1) |
|
|
206 | (1) |
|
Center for Information Technology and Systems of Executive Agencies |
|
|
206 | (1) |
|
Department for Combatting Crimes in the High Technology Sphere (Directorate K) |
|
|
206 | (1) |
|
Ministry of Internal Affairs: Department for Combating Extremism |
|
|
207 | (1) |
|
Center for Licensing, Certification and Protection of State Secrets (FSB) |
|
|
207 | (1) |
|
|
207 | (2) |
|
Foreign Intelligence Service (Sluzhba Vneshney Razvedki) |
|
|
208 | (1) |
|
Advanced Persistent Threat No. 28 (APT28) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (4) |
|
Strategic Rocket Forces Academy: Department of Electronic and Information Warfare |
|
|
209 | (1) |
|
National Research Nuclear University: Moscow Engineering Physics Institute |
|
|
210 | (1) |
|
Federal Protection Service (FSO) Academy |
|
|
210 | (1) |
|
Moscow State Technical University (Bauman): Department of Information and Control Systems |
|
|
210 | (1) |
|
Academy of the FSB: Institute of Cryptography, Telecommunications and Computer Science (IKSI) |
|
|
210 | (1) |
|
The Federal Service for Technical and Export Control |
|
|
210 | (1) |
|
Center for Special Development Ministry of Defense of the Russian Federation |
|
|
211 | (1) |
|
4th Central Research Institute of the Ministry of Defense |
|
|
211 | (1) |
|
18th Central Research Institute of the Ministry of Defense |
|
|
212 | (1) |
|
27th Central Scientific Research Institute of the Ministry of Defense |
|
|
212 | (1) |
|
Federal State Unitary Enterprise Scientific-Technical Center "Orion" of the FSB |
|
|
212 | (1) |
|
Russia State Humanities University: Faculty of Information Security |
|
|
213 | (1) |
|
|
213 | (2) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (2) |
11 International Organizations' Defensive and Offensive Information Warfare Capabilities |
|
217 | (8) |
|
|
217 | (2) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
European Defence Agency (EDA) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Cyber Europe Exercise Series |
|
|
219 | (1) |
|
|
219 | (4) |
|
NATO Policy on Cyber Defense |
|
|
220 | (1) |
|
|
220 | (1) |
|
NATO Smart Defence Initiative |
|
|
220 | (1) |
|
NATO Computer Incident Response Capability (NCIRC) |
|
|
220 | (1) |
|
NATO Communications and Information Systems School |
|
|
220 | (1) |
|
NATO School in Oberammergau |
|
|
221 | (1) |
|
|
221 | (1) |
|
NATO Communications and Information Agency |
|
|
221 | (1) |
|
|
221 | (2) |
|
Exercise Baltic Cyber Shield 2010 |
|
|
221 | (1) |
|
Exercise Locked Shields 2012 |
|
|
222 | (1) |
|
Exercise Locked Shields 2013 |
|
|
222 | (1) |
|
Exercise Locked Shields 2014 |
|
|
222 | (1) |
|
Cyber Coalition Exercises |
|
|
223 | (1) |
|
|
223 | (32) |
|
|
223 | (1) |
|
Exercise Cyber Atlantic 2011 |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
12 Nonstate Actors |
|
225 | (16) |
|
|
225 | (1) |
|
Information Warfare Tactics by Miscreants in General |
|
|
225 | (4) |
|
The Harsher Side of Activism |
|
|
229 | (1) |
|
|
229 | (1) |
|
9/11/01: A Date in Infamy |
|
|
230 | (1) |
|
Information Warfare Tactics by Terrorists |
|
|
230 | (1) |
|
What Do They Want to Achieve? |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Destruction or Alteration of Configuration Information for a System or Network |
|
|
236 | (1) |
|
Consumption of Precious Resources |
|
|
237 | (1) |
|
Physical Destruction or Modification of Network Elements |
|
|
237 | (1) |
|
Organized Criminal Groups |
|
|
238 | (1) |
|
Information Warfare Tactics by Activists |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
13 The History of Technology |
|
241 | (26) |
|
|
242 | (1) |
|
From Cave Warrior to Information Warrior |
|
|
243 | (1) |
|
From the Twentieth Century to Today: Technology and the Advent of High Technology |
|
|
244 | (2) |
|
Other Significant Twentieth-Century Technological Developments and Events |
|
|
246 | (1) |
|
|
247 | (1) |
|
High-Tech: A Product, a Process, or Both? |
|
|
247 | (1) |
|
The Trade Association: AEA |
|
|
248 | (1) |
|
The Consulting Group: RFA |
|
|
248 | (1) |
|
Information Provider: One Source |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Other Significant Twentieth-Century High-Technology Developments and Events |
|
|
251 | (1) |
|
|
252 | (3) |
|
The High-Technology-Driven Phenomenon |
|
|
255 | (1) |
|
Internet Service Providers |
|
|
255 | (1) |
|
Faster and More Massive High-Technology-Driven Communications |
|
|
256 | (3) |
|
The Beneficial Effect of Hacker Tools and Other Malicious Software on Network Security with Dual Roles as IW Tools |
|
|
257 | (31) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
Other High-Technology Tools in IW |
|
|
259 | (2) |
|
Welcome to Twenty-First-Century Technology |
|
|
261 | (1) |
|
|
262 | (2) |
|
|
264 | (3) |
14 Corporate and National Resilience |
|
267 | (20) |
|
|
268 | (2) |
|
|
270 | (4) |
|
How Do Organizations Reduce the Risks? |
|
|
274 | (1) |
|
Service Level Agreements (SLAB) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
Data Breaches in the Cloud: Who Is Responsible? |
|
|
276 | (1) |
|
What Do You Do in the Event of a Breach? |
|
|
276 | (1) |
|
Internet of Things (Also Known as the Internet of Everything) |
|
|
277 | (1) |
|
Cyber Physical Systems (CPS) |
|
|
277 | (1) |
|
|
278 | (1) |
|
Advanced Persistent Threat (APT) |
|
|
279 | (1) |
|
How Do You Make Your Organization More Resilient? |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
Employee Security Awareness |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (2) |
15 Awareness |
|
287 | (12) |
|
|
287 | (1) |
|
Establishing and Managing a GIW Awareness Program |
|
|
288 | (3) |
|
|
288 | (1) |
|
|
289 | (1) |
|
On a Group or Association Level |
|
|
289 | (1) |
|
|
289 | (1) |
|
An Awareness Program Incorporating GIW Aspects |
|
|
290 | (1) |
|
Profile of an Awareness Program |
|
|
290 | (1) |
|
Measuring the Cost and Effectiveness of an Awareness Program |
|
|
291 | (6) |
|
Example of a Security Education and Awareness Training |
|
|
291 | (1) |
|
SEATP Drivers and Flowcharts |
|
|
292 | (1) |
|
|
293 | (1) |
|
Data Collection and Metrics Management |
|
|
294 | (3) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
16 The Tallinn Manual |
|
299 | (20) |
|
|
317 | (1) |
|
|
317 | (2) |
17 A Look at the Future: The Crystal Ball |
|
319 | (12) |
|
Surviving into the Future |
|
|
321 | (1) |
|
New-Old Approach to Security: Defensive IW |
|
|
322 | (1) |
|
|
322 | (1) |
|
The Need for Enlightened and Dedicated Leadership |
|
|
322 | (5) |
|
|
323 | (4) |
|
|
324 | (1) |
|
New Challenges to Governance |
|
|
325 | (1) |
|
|
325 | (1) |
|
Transmuting International Terrorism |
|
|
326 | (1) |
|
|
326 | (1) |
|
Offensive-Defensive GIW Attacks |
|
|
327 | (1) |
|
The Future of the Internet |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
330 | (1) |
Appendix |
|
331 | (8) |
Index |
|
339 | |