The information revolution and national security
Strategic Studies Institute, U.S. Army War College, 2000 - Computers - 141 pages
The effects of the information revolution are particularly profound in the realm of national security strategy. They are creating new opportunities for those who master them. The U.S. military, for instance, is exploring ways to seize information superiority during conflicts and thus gain decisive advantages over its opponents. But the information revolution also creates new security threats and vulnerabilities. No nation has made more effective use of the information revolution than the United States, but none is more dependent on information technology. To protect American security, then, military leaders and defense policymakers must understand the information revolution. The essays in this volume are intended to contribute to such an understanding. They grew from a December 1999 conference co-sponsored by the U.S. Army War College Strategic Studies Institute and the University of Pittsburgh Matthew B. Ridgway Center for International Security Studies. The conference brought together some of the foremost members of the academic strategic studies community with representatives of the U.S. Government and U.S. military. As could be expected when examining a topic as complex as the relationship between the information revolution and national security, the presentations and discussions were far-ranging, covering such issues as the global implications of the information revolution, the need for a national information security strategy, and the role of information in U.S. military operations. While many more questions emerged than answers, the conference did suggest some vital tasks that military leaders and defense policymakers must undertake.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
actors adapt affairs agencies Air Force American analysis asymmetric warfare attack battlefield Center CERT challenges command competitive intelligence computer security coordinate corporate create critical infrastructure cyber-terrorism databases deal deception decisionmaking Defense develop disruption e-mail economic electronic enemy example focus future Genoa global goal going groups hackers hierarchies human impact important Information Age information operations information revolution information strategy information systems information technologies information warfare intelligence community intelligence product Internet issues John Arquilla national security networks neutral NGOs nongovernmental open sources organizational organizations Pearl Harbor percent planning private sector problem response role Second SESSION signals skill revolution soft power strategic and tactical Strategic Studies Institute TAP-IN terrorism terrorists things threats traditional trying U.S. Army U.S. Government U.S. military understand United University of Pittsburgh virus vulnerabilities Washington World Politics