Decoding the Virtual Dragon


Book Description

This work expands on "Dragon Bytes", the author's earlier work on Chinese information warfare (IW) activities from 1999-2003. It explains how Chinese IW concepts since 2003 fit into the strategic outlook practices, and activities of the People's Liberation Army (PLA). It offers IW explanations directly from the pens of Chinese experts. The Chinese authors discuss the application or relation of IW to strategic thought, the transformation plans of the People's Liberation Army (PLA), the revolution in military affairs (RMA), and the revolution in knowledge warfare and cognition.







Securing Freedom in the Global Commons


Book Description

This will be the first book to attempt to take a 'holistic' approach to security in the Commons (outer space, the atmosphere, the oceans, cyberspace, etc) in that it examines in detail each domain of the commons, identifying and assessing the current and future threats to free international access to the domain.




The Dragon Extends its Reach


Book Description

China has evolved from a nation with local and regional security interests to a major economic and political power with global interests, investments, and political commitments. It now requires a military that can project itself around the globe, albeit on a limited scale, to secure its interests. Therefore, as Larry M. Wortzel explains, the Chinese Communist Party leadership has charged the People’s Liberation Army (PLA) with new and challenging missions that require global capabilities. Advances in technology and the development of indigenous weapons platforms in China, combined with reactions to modern conflicts, have produced a military force very different from that which China has fielded in the past. Wortzel presents a clear and sobering picture of the PLA’s modernization effort as it expands into space and cyberspace, and as it integrates operations in the traditional domains of war. This book will appeal to the specialist in security and foreign policy issues in Asia as well as to the person interested in arms control, future warfare, and global military strategies. The book puts China’s military growth into historical context for readers of recent military and diplomatic history.




Contemporary Military Innovation


Book Description

This book explores contemporary military innovation, with a particular focus on the balance between anticipation and adaption. The volume examines contemporary military thought and the doctrine that evolved around the thesis of a transformation in the character of war. Known as the Information-Technology Revolution in Military Affairs (IT-RMA), this innovation served as an intellectual foundation for the US defence transformation from the 1990s onwards. Since the mid-1990s, professional ideas generated within the American defence milieu have been further disseminated to military communities across the globe, with huge impact on the conduct of warfare. With chapters written by leading scholars in this field, this work sheds light on RMAs in general and the IT-RMA in the US, in particular. The authors analyse how military practice and doctrines were developed on the basis of the IT-RMA ideas, how they were disseminated, and the implications of them in several countries and conflicts around the world. This book will be of much interest to students of strategic studies, defence studies, war and technology, and security studies in general.




Cyber Denial, Deception and Counter Deception


Book Description

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.




Information Warfare


Book Description

Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?




Smart Diplomacy: Exploring China-india Synergy


Book Description

'Suryanarayana’s approach to the subject matter of China-India diplomatic synergy is heavily policy-oriented, and well-supported by policy sources. The book traces the trajectory of remarks and actions by Chinese and Indian decision-makers by collecting primary and, more uniquely, internal sources from historical and contemporary records. Personal correspondence between relevant Chinese and Indian personnel and Suryanarayana further deepens the credibility of the book’s analysis.'Pacific AffairsThis book explores the diplomatic, political, strategic, and ideological cross-currents in the fragile but promising state-to-state relationship between China and India. Set in a geopolitical context ten years after the two Asian neighbours had agreed to fashion a Strategic and Cooperative Partnership for Peace and Prosperity, the analysis is focused on the promise as well as the portents. Looking ahead, the author envisions a sunrise idea of Sino-Indian Smart Zone as a possible post-modern scenario.




Surviving Cyberwar


Book Description

This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.




China's Cyber Warfare


Book Description

The turn of the century was accompanied by two historically significant phenomena. One was the emergence of computer networks as a vital component of advanced militaries and interdependent global economic systems. The second concerned China’s rise on the global stage through economic reforms that led to sustained growth and military modernization. At the same time, Chinese government policies and actions have drawn international criticisms including persistent allegations of online espionage, domestic Internet censorship, and an increased military capability, all of which utilize computer networks. These threat perceptions are heightened by a lack of transparency. Unlike the United States or the North Atlantic Treaty Organization, China does not articulate its strategic doctrine. Further, open source material on this topic is often contradictory, cursory, and unclear due, in part, to the absence of consensus on cyber-related terminology and the infancy of this field. With a focus on the period 1998 to 2016, this book identifies and analyzes the strategic context, conceptual framework, and historical evolution of China’s cyber warfare doctrine.