LEADER 03466nam 2200601Ia 450 001 9910220108903321 005 20230421042330.0 010 $a1-282-45126-X 010 $a9786612451263 010 $a0-8330-4846-5 035 $a(CKB)1000000000015342 035 $a(EBL)475042 035 $a(OCoLC)609852630 035 $a(SSID)ssj0000366272 035 $a(PQKBManifestationID)12170243 035 $a(PQKBTitleCode)TC0000366272 035 $a(PQKBWorkID)10414268 035 $a(PQKB)11391074 035 $a(MiAaPQ)EBC475042 035 $a(EXLCZ)991000000000015342 100 $a19951222d1996 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aStrategic information warfare$b[electronic resource] $ea new face of war /$fRoger C. Molander, Andrew S. Riddile, Peter A. Wilson 210 $aSanta Monica, CA $cRAND$d1996 215 $a1 online resource (115 p.) 300 $a"National Defense Research Institute." 300 $a"Prepared for the Office of the Secretary of Defense." 311 $a0-8330-2352-7 327 $aCover; PREFACE; CONTENTS; FIGURES; TABLES; SUMMARY; ACKNOWLEDGMENTS; Chapter One - WHAT IS "STRATEGIC INFORMATION WARFARE?"; INTRODUCTION; STUDY BACKGROUND; DEFENSE-ORIENTED TASKING FROM OASD(C3I); Chapter Two - METHODOLOGY; THE "DAY AFTER . . ." EXERCISE METHODOLOGY; THE EXERCISE DESIGN PROCESS; EXERCISE HISTORY; Chapter Three - THE CHANGING FACE OF WAR; Chapter Four - DEFINING FEATURES OF STRATEGIC INFORMATION WARFARE; LOW ENTRY COST; BLURRED TRADITIONAL BOUNDARIES; PERCEPTION MANAGEMENT; STRATEGIC INTELLIGENCE; TACTICAL WARNING AND ATTACK ASSESSMENT; BUILDING AND SUSTAINING COALITIONS 327 $aChapter Five - ISSUES OF STRATEGIC INFORMATION WARFARERISK ASSESSMENT; NATIONAL MILITARY STRATEG; NATIONAL SECURITY STRATEGY; U.S. GOVERNMENT ROLE; Chapter Six - CONCLUSIONS; LEADERSHIP: WHO SHOULD BE IN CHARGE?; RISK ASSESSMENT; GOVERNMENT'S ROLE; NATIONAL SECURITY STRATEGY; NATIONAL MILITARY STRATEGY; ADDITIONAL READING: THREATS AND VULNERABILITIES; Appendix A - METHODOLOGY; Appendix B - SUMMARY OF GROUP DELIBERATIONS FOR STEP THREE; Appendix C - EXERCISE 330 $aFuture U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the Day After ... in which participants are presented with an information warfare crisis scenario and asked to advise the president on 606 $aInformation warfare 606 $aStrategy 615 0$aInformation warfare. 615 0$aStrategy. 676 $a355.343 700 $aMolander$b Roger C$01234211 701 $aRiddile$b Andrew S$01234212 701 $aWilson$b Peter A.$f1943-$01234213 712 02$aUnited States.$bDept. of Defense.$bOffice of the Secretary of Defense. 712 02$aNational Defense Research Institute (U.S.) 712 02$aRand Corporation. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910220108903321 996 $aStrategic information warfare$92866858 997 $aUNINA