The Information Revolution and National Security


Book Description

The effects of the information revolution are particularly profound in the realm of national security strategy. They are creating new opportunities for those who master them. The U.S. military, for instance, is exploring ways to seize information superiority during conflicts and thus gain decisive advantages over its opponents. But the information revolution also creates new security threats and vulnerabilities. No nation has made more effective use of the information revolution than the United States, but none is more dependent on information technology. To protect American security, then, military leaders and defense policymakers must understand the information revolution. The essays in this volume are intended to contribute to such an understanding. They grew from a December 1999 conference co-sponsored by the U.S. Army War College Strategic Studies Institute and the University of Pittsburgh Matthew B. Ridgway Center for International Security Studies. The conference brought together some of the foremost members of the academic strategic studies community with representatives of the U.S. Government and U.S. military. As could be expected when examining a topic as complex as the relationship between the information revolution and national security, the presentations and discussions were far-ranging, covering such issues as the global implications of the information revolution, the need for a national information security strategy, and the role of information in U.S. military operations. While many more questions emerged than answers, the conference did suggest some vital tasks that military leaders and defense policymakers must undertake.




Cyberpower and National Security


Book Description

This book creates a framework for understanding and using cyberpower in support of national security. Cyberspace and cyberpower are now critical elements of international security. United States needs a national policy which employs cyberpower to support its national security interests.




Information Revolution


Book Description

A strategic model for identifying, evaluating, and improving information use "Fundamentally changes how you look at the role of information technology and takes it to the leadership level, which is the only way for business performance to be maximized in this global economy." --Ron Milton, Executive Vice President, Computerworld "Information Revolution is truly a must-read for those who generate, support, and make decisions for their respective organizations. By the way, that would be everybody." --Bob Schwartz, Vice President and Chief Information Officer, Panasonic Corporation of North America "As this book clearly describes, information management advances both through evolution and intelligent design. The ideas herein will help any organization avoid extinction!" --Thomas H. Davenport, President's Distinguished Professor and Director of Research, Babson College "This model captures the best practices from the early stage of Business Intelligence development through the most sophisticated environments where the value and nature of information is unquestioned. All of us should strive to reach the final level. And now we have the ultimate guide to help us get there." --Claudia Imhoff, President, Intelligent Solutions, Inc. "Managing a successful Business Intelligence effort requires a long-term view and this means leaders must have a methodology to guide them as they navigate their organization through the BI evolution. Information Revolution provides the prag-matic road map all executives can understand and follow." --Irving Tyler, Chief Information Officer, Quaker Chemical Corporation "Information Revolution is the perfect blend of 'what,' 'how,' and especially 'why.' This book is a must-read for those driven to excel in this information-based world, instead of being another 'me, too' along for the ride." --Bruce Barnes, former chief information officer, Nationwide Financial Services "Information Revolution provides a powerful framework for assessing the current state of your company's systems and its decision making capabilities. It then presents a clear process for moving your systems and your company toward an adaptive and innovative enterprise." --Michael Hugos, Chief Information Officer, Network Services Company




Small Wars, Big Data


Book Description

How a new understanding of warfare can help the military fight today’s conflicts more effectively The way wars are fought has changed starkly over the past sixty years. International military campaigns used to play out between large armies at central fronts. Today's conflicts find major powers facing rebel insurgencies that deploy elusive methods, from improvised explosives to terrorist attacks. Small Wars, Big Data presents a transformative understanding of these contemporary confrontations and how they should be fought. The authors show that a revolution in the study of conflict--enabled by vast data, rich qualitative evidence, and modern methods—yields new insights into terrorism, civil wars, and foreign interventions. Modern warfare is not about struggles over territory but over people; civilians—and the information they might choose to provide—can turn the tide at critical junctures. The authors draw practical lessons from the past two decades of conflict in locations ranging from Latin America and the Middle East to Central and Southeast Asia. Building an information-centric understanding of insurgencies, the authors examine the relationships between rebels, the government, and civilians. This approach serves as a springboard for exploring other aspects of modern conflict, including the suppression of rebel activity, the role of mobile communications networks, the links between aid and violence, and why conventional military methods might provide short-term success but undermine lasting peace. Ultimately the authors show how the stronger side can almost always win the villages, but why that does not guarantee winning the war. Small Wars, Big Data provides groundbreaking perspectives for how small wars can be better strategized and favorably won to the benefit of the local population.







Economic Security: Neglected Dimension of National Security ?


Book Description

On August 24-25, 2010, the National Defense University held a conference titled “Economic Security: Neglected Dimension of National Security?” to explore the economic element of national power. This special collection of selected papers from the conference represents the view of several keynote speakers and participants in six panel discussions. It explores the complexity surrounding this subject and examines the major elements that, interacting as a system, define the economic component of national security.




The Information Revolution in Military Affairs in Asia


Book Description

The contributors to this volume seek to explore the multi-dimensional (institutional, cultural, technological, and political) environments of several Asian states to determine the amenability of those host environments for the adoption/adaptation of the Revolution in Military Affairs (RMS).




Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




The Second Information Revolution


Book Description

Thanks to inexpensive computers and data communications, the speed and volume of human communication are exponentially greater than they were even a quarter-century ago. Not since the advent of the telephone and telegraph in the nineteenth century has information technology changed daily life so radically. We are in the midst of what Gerald Brock calls a second information revolution. Brock traces the complex history of this revolution, from its roots in World War II through the bursting bubble of the Internet economy. As he explains, the revolution sprang from an interdependent series of technological advances, entrepreneurial innovations, and changes to public policy. Innovations in radar, computers, and electronic components for defense projects translated into rapid expansion in the private sector, but some opportunities were blocked by regulatory policies. The contentious political effort to accommodate new technology while protecting beneficiaries of the earlier regulated monopoly eventually resulted in a regulatory structure that facilitated the explosive growth in data communications. Brock synthesizes these complex factors into a readable economic history of the wholesale transformation of the way we exchange and process information. Table of Contents: Acknowledgments Abbreviations 1. Introduction The Promise of Regulation Conceptual Framework 2. The First Information Revolution The Development of Telegraph Services The Telephone and State Regulation Radio and Federal Regulation 3. Technological Origins of the Second Information Revolution, 1940-1950 Radar The Transistor Electronic Digital Computers 4. The SAGE Project I. THE SEPARATE WORLDS OF COMPUTERS AND COMMUNICATIONS, 1950-1968 5. The Early Semiconductor Industry The Creation of a Competitive Market Innovation and the Integrated Circuit Falling Prices, Rising Output 6. The Early Commercial Computer Industry Vacuum-Tube and Transistor Computers The System/360 and IBM Dominance Alternatives to IBM Computers 7. The Regulated Monopoly Telephone Industry Antitrust and the 1956 Consent Decree Microwave Technology and Potential Long Distance Competition Central Office Switches Terminal Equipment II. BOUNDARY DISPUTES AND LIMITED COMPETITION, 1969-1984 8. Data Communications Packet-Switching and the Arpanet Network Protocols and Interconnection Local Area Networks and Ethernet 9. From Mainframes to Microprocessors Intel and the Microprocessor Personal Computers and Workstations 10. The Computer-Communications Boundary Computer-Assisted Messages: Communications or Data Processing? Smart Terminals: Teletypewriters or Computers? Interconnection of Customer-Owned Equipment with the Telephone Network The Deregulation of Terminal Equipment The Deregulation of Enhanced Services 11. Fringe Competition in Long Distance Telephone Service Competition in Specialized Services Competition in Switched Services The Transition to Optical Fiber 12. Divestiture and Access Charges The Divestiture Access Charges The Enhanced Service Provider Exemption III. INTERCONNECTED COMPETITION AND INTEGRATED SERVICES, 1985-2002 13. Mobile Telephones and Spectrum Reform Early Land Mobile Telephones Cellular Spectrum Allocation Cellular Licensing Problems Spectrum Institutional Reform PCS and Auctions 14. Local Competition and the Telecommunications Act of 1996 Competitive Access Providers Interconnection: CAP to CLEC The Telecommunications Act of 1996 Implementation of the Telecommunications Act of 1996 15. The Internet and the World Wide Web The Commercial Internet and Backbone Interconnection The Development of the Web The New Economy Financial Boom and Bust Real Growth in Telecommunication and Price Benefits 16. Conclusion Technological Progress and Policy Evolution The Process of Institutional Change Final Comment References Index Reviews of this book: The Second Information Revolution is important reading for anyone who needs to understand the functioning of American telecommunications, either to be able to analyse today's financial markets or to understand or influence public policy in this area. --Wendy M. Grossman, Times Higher Education Supplement [UK] Reviews of this book: Brock traces a phenomenon he refers to as the 'second information revolution.' According to Brock, there have been two times in history when information technology has dramatically changed daily life. The first 'information revolution' occurred with the advent of the telephone and telegraph, which made communication less expensive and more readily available. The second information revolution is currently in progress...A concise, thorough, and well-written history of the transformation in exchanging and processing of information. --K. A. Coombs, Choice