The new era in U.S. national security : challenges of the information age /: challenges of the information age. (2019)
- Record Type:
- Book
- Title:
- The new era in U.S. national security : challenges of the information age /: challenges of the information age. (2019)
- Main Title:
- The new era in U.S. national security : challenges of the information age
- Further Information:
- Note: Jack A. Jarmon.
- Authors:
- Jarmon, Jack A, 1951-
- Contents:
- <span style="font-weight:bold;">Preface ; ; <span style="font-weight:bold;">1. The National Security Establishment ; <span style="font-style:italic;">The United State and the World Stage ; <span style="font-style:italic;">A Brief History of the Structure ; <span style="font-style:italic;">The New Reorganization ; <span style="font-style:italic;">Budgeting, and Planning in Support of Policy ; <span style="font-style:italic;">Striking a Balance between Domestic and Foreign Affairs ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">2. Policies and Process and the New Geopolitics ; <span style="font-style:italic;">Evolution of Strategy ; <span style="font-style:italic;">An Era of New Weaponry and Geopolitics ; <span style="font-style:italic;">The Role of the Private Sector ; <span style="font-style:italic;">The Status and Future of DHS ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">3. Irregular Warfare and Information Age Weapons ; <span style="font-style:italic;">Asymmetric Warfare ; <span style="font-style:italic;">A World of Weapons ; <span style="font-style:italic;">The Phenomenon of Social Media ; <span style="font-style:italic;">The Weaponization of Social Media ; <span style="font-style:italic;">Audience Mapping, Targeted Messaging, and &ldquo;Kompromat&rdquo; ; <span style="font-style:italic;">The Weaponization of Information ; <span style="font-style:italic;">Conclusion ; ; <span<span style="font-weight:bold;">Preface ; ; <span style="font-weight:bold;">1. The National Security Establishment ; <span style="font-style:italic;">The United State and the World Stage ; <span style="font-style:italic;">A Brief History of the Structure ; <span style="font-style:italic;">The New Reorganization ; <span style="font-style:italic;">Budgeting, and Planning in Support of Policy ; <span style="font-style:italic;">Striking a Balance between Domestic and Foreign Affairs ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">2. Policies and Process and the New Geopolitics ; <span style="font-style:italic;">Evolution of Strategy ; <span style="font-style:italic;">An Era of New Weaponry and Geopolitics ; <span style="font-style:italic;">The Role of the Private Sector ; <span style="font-style:italic;">The Status and Future of DHS ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">3. Irregular Warfare and Information Age Weapons ; <span style="font-style:italic;">Asymmetric Warfare ; <span style="font-style:italic;">A World of Weapons ; <span style="font-style:italic;">The Phenomenon of Social Media ; <span style="font-style:italic;">The Weaponization of Social Media ; <span style="font-style:italic;">Audience Mapping, Targeted Messaging, and &ldquo;Kompromat&rdquo; ; <span style="font-style:italic;">The Weaponization of Information ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">4. Conflict and Economics ; <span style="font-style:italic;">Technology, the Information Age, and the Costs of War ; <span style="font-style:italic;">Global Economics and Migration ; <span style="font-style:italic;">The Rise of Kleptocracy ; <span style="font-style:italic;">Non-Asymmetric Warfare ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">5. A Vast and Contested Domain ; <span style="font-style:italic;">Information Technology vs Operational Technology ; <span style="font-style:italic;">National Critical Infrastructure ; <span style="font-style:italic;">The Election Infrastructure ; <span style="font-style:italic;">Big Data ; <span style="font-style:italic;">Machine learning ; <span style="font-style:italic;">Artificial Intelligence & Autonomous Weapons Systems ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">6. Cyberspace and Conflict ; <span style="font-style:italic;">What is Cyberspace? ; <span style="font-style:italic;">The Inception ; <span style="font-style:italic;">The Militarization ; <span style="font-style:italic;">The Malware ; <span style="font-style:italic;">Advanced Persistent Threat (APT) ; <span style="font-style:italic;">The Onion Router (TOR) ; <span style="font-style:italic;">The Deep and Dark Web ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">7. China ; <span style="font-style:italic;">The Belt and Road Initiative ; <span style="font-style:italic;">A Cyber Cold War ; <span style="font-style:italic;">&ldquo;Kill with a Borrowed Sword&rdquo; ; <span style="font-style:italic;">The Great Firewall and the Great Cannon ; <span style="font-style:italic;">A Sprawling National Security Environment ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">8. Russia ; <span style="font-style:italic;">Cold War 2.0 ; <span style="font-style:italic;">The Merger of Politics and Criminality ; <span style="font-style:italic;">Active Measures and Cyberwarriors ; <span style="font-style:italic;">Ukraine, 2014 ; <span style="font-style:italic;">United States, 2016 ; <span style="font-style:italic;">Tactical Nuclear Weapons ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">9. The Maritime Supply Chain ; <span style="font-style:italic;">Vast, Diverse, and Anarchic ; <span style="font-style:italic;">Containerization ; <span style="font-style:italic;">Targeting, Screening, Scanning, and Inspecting ; <span style="font-style:italic;">Trusted Shippers and Layered Defenses ; <span style="font-style:italic;">Calculating the Dangers and the Risk ; <span style="font-style:italic;">An Opaque and Expanding Environment ; <span style="font-style:italic;">Choke Points ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">10. Politics, Crime, and Terror ; <span style="font-style:italic;">Crime and Terrorism: Differences and Similarities ; <span style="font-style:italic;">Crime and Terrorism: The Nexus ; <span style="font-style:italic;">West Toward Chechnya and Russia ; <span style="font-style:italic;">The Tri-Border Area (TBA) ; <span style="font-style:italic;">Chinese Triads ; <span style="font-style:italic;">Conclusion ; ; <span style="font-weight:bold;">11. Chemical, Biological, Radiological & Nuclear Threats ; <span style="font-weight:bold;font-style:italic;">Chemical Warfare ; <span style="font-style:italic;">Resurgence in Chemical Weapons ; <span style="font-style:italic;">Chemical Agents ; <span style="font-style:italic;">Threats and Countermeasures ; <span style="font-style:italic;">Non-Terrorist Threats ; <span style="font-weight:bold;font-style:italic;">Biological Threats ; <span style="font-style:italic;">Biological Agents <span style="font-weight:bold;font-style:italic;"> ; <span style="font-style:italic;">Synthe … (more)
- Edition:
- Second edition
- Publisher Details:
- Lanham : Rowman & Littlefield Publishers
- Publication Date:
- 2019
- Extent:
- 1 online resource, illustrations (black and white), maps (black and white)
- Subjects:
- 355.033073
National security -- United States - Languages:
- English
- ISBNs:
- 9781538121610
- Related ISBNs:
- 9781538121597
9781538121603 - Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.486898
- Ingest File:
- 03_044.xml