The new era in U.S. national security : challenges of the information age

書誌事項

The new era in U.S. national security : challenges of the information age

Jack A. Jarmon

Rowman & Littlefield, c2020

2nd ed

  • : pbk

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Previous ed.: 2014

Includes bibliographical references and index

内容説明・目次

内容説明

The first edition of The New Era in U.S. National Security relied upon both primary and secondary sources on national security, as well as the author’s first-hand knowledge. In addition to academic sources, chief executive officers of fortune 500 firms, experts on national security within and outside government, investment bankers, and experts in cybersecurity, transnational crime, supply chain logistics, and public policy were interviewed and quoted in the text. These same sources and their reassessments are available for the second edition. The topics covered in the book are emerging issues. Currently, the most reliable body of literature is the property of private entities and classified government documents, which are largely not available to students. By contrast, most course texts are readers that offer a selection of views on diverse but relevant topics, but most have a mere few chapters on new security challenges. Without an informative core text and reference guide, students have to rely upon these compendia, popular news articles, and electronic media for study and research. The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging “Second Cold War” era.

目次

Preface 1. The National Security Establishment The United State and the World Stage A Brief History of the Structure The New Reorganization Budgeting, and Planning in Support of Policy Striking a Balance between Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics The Role of the Private Sector The Status and Future of DHS Conclusion 3. Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of Weapons The Phenomenon of Social Media The Weaponization of Social Media Audience Mapping, Targeted Messaging, and “Kompromat” The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War “Kill with a Borrowed Sword” The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion

「Nielsen BookData」 より

ページトップへ