The new era in U.S. national security : challenges of the information age
著者
書誌事項
The new era in U.S. national security : challenges of the information age
Rowman & Littlefield, c2020
2nd ed
- : pbk
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Previous ed.: 2014
Includes bibliographical references and index
内容説明・目次
内容説明
The first edition of The New Era in U.S. National Security relied upon both primary and secondary sources on national security, as well as the author’s first-hand knowledge. In addition to academic sources, chief executive officers of fortune 500 firms, experts on national security within and outside government, investment bankers, and experts in cybersecurity, transnational crime, supply chain logistics, and public policy were interviewed and quoted in the text. These same sources and their reassessments are available for the second edition.
The topics covered in the book are emerging issues. Currently, the most reliable body of literature is the property of private entities and classified government documents, which are largely not available to students. By contrast, most course texts are readers that offer a selection of views on diverse but relevant topics, but most have a mere few chapters on new security challenges. Without an informative core text and reference guide, students have to rely upon these compendia, popular news articles, and electronic media for study and research.
The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging “Second Cold War” era.
目次
Preface
1. The National Security Establishment
The United State and the World Stage
A Brief History of the Structure
The New Reorganization
Budgeting, and Planning in Support of Policy
Striking a Balance between Domestic and Foreign Affairs
Conclusion
2. Policies and Process and the New Geopolitics
Evolution of Strategy
An Era of New Weaponry and Geopolitics
The Role of the Private Sector
The Status and Future of DHS
Conclusion
3. Irregular Warfare and Information Age Weapons
Asymmetric Warfare
A World of Weapons
The Phenomenon of Social Media
The Weaponization of Social Media
Audience Mapping, Targeted Messaging, and “Kompromat”
The Weaponization of Information
Conclusion
4. Conflict and Economics
Technology, the Information Age, and the Costs of War
Global Economics and Migration
The Rise of Kleptocracy
Non-Asymmetric Warfare
Conclusion
5. A Vast and Contested Domain
Information Technology vs Operational Technology
National Critical Infrastructure
The Election Infrastructure
Big Data
Machine learning
Artificial Intelligence & Autonomous Weapons Systems
Conclusion
6. Cyberspace and Conflict
What is Cyberspace?
The Inception
The Militarization
The Malware
Advanced Persistent Threat (APT)
The Onion Router (TOR)
The Deep and Dark Web
Conclusion
7. China
The Belt and Road Initiative
A Cyber Cold War
“Kill with a Borrowed Sword”
The Great Firewall and the Great Cannon
A Sprawling National Security Environment
Conclusion
8. Russia
Cold War 2.0
The Merger of Politics and Criminality
Active Measures and Cyberwarriors
Ukraine, 2014
United States, 2016
Tactical Nuclear Weapons
Conclusion
9. The Maritime Supply Chain
Vast, Diverse, and Anarchic
Containerization
Targeting, Screening, Scanning, and Inspecting
Trusted Shippers and Layered Defenses
Calculating the Dangers and the Risk
An Opaque and Expanding Environment
Choke Points
Conclusion
10. Politics, Crime, and Terror
Crime and Terrorism: Differences and Similarities
Crime and Terrorism: The Nexus
West Toward Chechnya and Russia
The Tri-Border Area (TBA)
Chinese Triads
Conclusion
11. Chemical, Biological, Radiological & Nuclear Threats
Chemical Warfare
Resurgence in Chemical Weapons
Chemical Agents
Threats and Countermeasures
Non-Terrorist Threats
Biological Threats
Biological Agents
Synthetic Biology
Biosecurity Policy
Radiological and Nuclear Threats
What is radioactivity?
So, You Want to Build a Bomb?
The Dirty Bomb Alternative
Controlling proliferation
Conclusion
「Nielsen BookData」 より