There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon
Invest your time also for just couple of minutes to review an e-book There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, By Richard Stiennon Reading a book will never ever reduce and also waste your time to be pointless. Reviewing, for some folks end up being a need that is to do every day such as spending time for eating. Now, what concerning you? Do you like to read a book? Now, we will certainly show you a brand-new publication entitled There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, By Richard Stiennon that could be a brand-new means to discover the expertise. When reviewing this publication, you could obtain something to constantly remember in every reading time, also detailed.
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon
Read and Download Ebook There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon
The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon- Amazon Sales Rank: #83516 in eBooks
- Published on: 2015-06-14
- Released on: 2015-06-14
- Format: Kindle eBook
About the Author Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the booming IT security industry. He is the author of Surviving Cyberwar (Government Institutes, 2010). He recently joined the advisory board of the Information Governance Initiative, and serves on the advisory boards of several security startups. He was Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering (Michigan) and his MA in War in the Modern World from King’s College, London.
Where to Download There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon
Most helpful customer reviews
5 of 5 people found the following review helpful. Enthralling read about the inevitability of a cyber 9/11 By Ben Rothke A point Richard Stiennon makes a number of times in There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwar; is that cyber Pearl Harbor is the wrong metaphor. He feels a more appropriate metaphor is cyber 9/11.At 135 pages, the book is a quick and enthralling read. And at the end you are left wondering if just perhaps, there has already been a cyber 9/11.Much of the book describes the working of network-centric warfare (NCW). The main theory of NCW is to remove the fog of war via a sensor grid and a combination of precision-guided weapons, intelligence, surveillance and reconnaissance, and command and control. It’s that move to NCW that Stiennon believes has set the stage for an inevitable cyberwar.The book details how the US has spent billions in a run up to NCW, but seems to have forgotten that its underlying infrastructure (Windows, GPS, drones, etc.), were all built on insecure software. With that, the Pentagon has had numerous wake up calls, from malware on top secret networks, the Snowden debacle and more. Yet the reality is that the Internet and most military networks, as the book points out in detail, are quote porous.Much of the book deals with China, and their overt and covert attempts to penetrate US systems, networks and any intellectual property they can get their hands on.Chapter 8 on Assurance is a particularly fascinating chapter. While China has made it eminently clear that their goal is world domination, US firms and the US government have no qualms about outsourcing the manufacturing of key components to China.A both fascinating and horrifying point the book makes is that the US does not have a comprehensive program to certify that integrated circuits going into US weapons systems don’t contain malicious circuits. While DARPA is working on such a program, it’s still in its infancy; leaving US systems and military equipment at risk.The book brings to light a fact about the Hainan Island incident; the April 2001 incident of a midair collision between a Navy EP-3E and Chinese J-8II fighter. The result was that the crew of the EP-3E were not able to sanitize all of their equipment in time, which enabled the Chinese to ultimately reverse engineer the secret operating system used on the plane. By doing that, the Chinese has a road map for decrypting Navy classified intelligence and operational data.A cyber 9/11 is inevitable, and as There Will Be Cyberwar shows, it might just be closer than we think.
4 of 5 people found the following review helpful. A Fascinating Read By Joseph Ponepinto The field of cyber espionage is evolving so quickly that most of us have little idea of how pervasive technology has become. Stiennon argues that given the abilities of technology, especially at the level of governments, cyberwar will be the next, inevitable method of combat. Considering the evidence he presents, it's pretty hard to disagree. The book is written in everyday language that is easy for either the executive or the layperson to understand. A must read if you care at all about the future of the internet and security.
3 of 4 people found the following review helpful. A mile wide and an inch deep, but with some good points. By Lemas Mitchell This book was written as a rebuttal to Thomas Rid's (sorry) book Cyber War Will Not Take Place.There are a lot of things that Richard Stiennon deals with that have been dealt with in other books-- just not all in one place. And so that is an advantage of reading this book. But it can (and should) be supplemented with some other texts that explore the points that he has made more deeply. After someone has gone through those types of books, it is more difficult to be surprised by the things detailed in this book.The book starts with a hypothetical report that is made by the US military after defeat in the Taiwan Strait. They are reevaluating what (the author predicts) went wrong. (The Chinese show up again and again as villains in these stories. And they are that in real life.)Of the things that the author notes that have already been noted in other places:1. (pps. 34, 36). There is a lot of back and forth between the development of technologies and then the development of attacks against the security of those technologies. And then the development of a new level of security in response to those attacks. And then....... This topic was taken up by Simon Singh in The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Security technology has been evolving as a cat and mouse game for a long time. Maybe even a couple of millennia.2. (p. 40). Stiennon calls the lack of development of defense systems shortsighted and would prefer that technologies were proactively developed instead of reactively developed. But that's a bit like saying that a medicine should be invented and all of its side effects should be accounted for before it is released. Sometimes the only way to obtain knowledge is as a result of a crisis. (That is how the US learned about the various techniques that it developed to avoid real estate bubbles in light of the housing crisis.) The retrospective nature of knowledge was taken up by Nassim Nicholas Taleb in his book The Black Swan: Second Edition: The Impact of the Highly Improbable: With a new section: "On Robustness and Fragility" (Incerto). Ironically enough, this book was even mentioned in Stiennon's book. But it seems that the author did not draw the obvious parallel. The only way to know how to deal with a Snowden or a Manning was because you learned about what happened after it did happen. The next Snowden will be something else unpredictable.3. Going further on the epistemic foundations of security development: This issue of knowledge as a result of feedback mechanisms was also taken up brilliantly by Thomas Sowell in his Knowledge And Decisions. Not only is a lot of knowledge only "foreseeable" after the fact, but dealing with what happens after the fact is the only way to learn from disasters. It may be that the US has to suffer a military defeat to be given the opportunity to learn a lot of things. i. Is Taiwan really worth all the blood and treasure that they were willing to expend on it (given that China shows no signs of becoming democratic--ever); ii. What did we do wrong that allowed this to happen in the first place?; iii. What is the cost of not upgrading the military's security in a timely manner?4. There is a slap at the nature of democratic government. Yes, there are perverse incentives when the government is in a constant state of flux. No, people don't always vote for what will serve their best interests. The Myth of the Rational Voter: Why Democracies Choose Bad Policies. But again: You cannot argue with people to whom democracy is a religion any more than you can argue with people for whom Islam is their religion. In the same way that Japanese learned that The Emperor was not divine with their WWII defeat, perhaps American people will learn that democracy is not the only way to do things when that is proven to not solve every problem and that you can't vote utopia into existence.5. We knew that the private sector does most things better than the State. That is old news. It could be found in any books by Milton Friedman (Capitalism and Freedom: Fortieth Anniversary Edition) or John Stossel. The fact that the private sector was more aggressive about protecting its source of income is not only unsurprising, but it's entirely predictable.6. There is something that is not explicitly stated, but is in the background in this book just the same: Sometimes decision making units reach the limits of what they are capable of. And that is not new. It was taken up by Joseph Tainter in The Collapse of Complex Societies (New Studies in Archaeology). (The same has also given presentations about how complex systems fail.) Given what we know about national variations in IQ, is it surprising that Western people would reach the limits of what they are capable of a bit faster than better organized Chinese?7. The trial and error nature of discovery is one that was detailed well in Tim Harford's Adapt: Why Success Always Starts with Failure. This failure of US intelligence agencies to get this right was portrayed negatively in this book, but it is exactly what you would expect given the size of that organization. And the fact that they are going to be slow learners is not unexpected given that they don't operate under the threat of going out of business and that the money that they lose is *someone else's* money.Of the book itself:1. There were several spelling mistakes as a result of the book's being self published.2. The topic was just a bit too technical. Most people won't understand it. If a reader read any two of the book that I noted earlier in the review, you could have deduced why predicting cyber attacks is next to impossible. And in that case, said reader would not have needed to read this book at all. But then......if someone had read none of those books and then came across this book the reasons for why cyber attacks are hard to predict would not have been brought across clearly from this writer's prose.3. The coverage of the (various) topics comes across as "a mile wide and an inch deep."4. The length of the average chapter was 7.6 pages, and the whole book can be read through in about 3 hours. Most of the references are links.Verdict: Recommended at the price of $1. The whole book only takes a few hours to go through, and there is really no one who can fail to get at least some information from it.
See all 10 customer reviews... There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard StiennonThere Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon PDF
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon iBooks
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon ePub
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon rtf
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon AZW
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar, by Richard Stiennon Kindle
Tidak ada komentar:
Posting Komentar