Table of Contents

Introduction

List of Acronyms

Chapter 1. Cyberwar and its Borders

1.1. The seduction of cyberwar

1.2. Desirable, vulnerable and frightening information

1.3. Conflict and its dimensions

1.4. The Helm and space

1.5. Between knowledge and violence

1.6. Space, distance and paths

1.7. The permanency of war

1.8. No war without borders

1.9. The enemy and the sovereign

1.10. Strengths and weaknesses

1.11. Bibliography

Chapter 2. War of Meaning, Cyberwar and Democracies

2.1. Introduction

2.2. Informational environment, a new operating space for strategy

2.3. Influence strategy: defeating and limiting armed force physical involvement

2.4. Conclusion

2.5. Bibliography

Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise

3.1. Information warfare, information and war

3.2. Intelligence and strategic surprise

3.3. Strategic surprise and information warfare

3.4. Concluding remarks: surprise in strategic studies

3.5. Bibliography

Chapter 4. Cyberconflict: Stakes of Power

4.1. Stakes of power

4.2. The Stuxnet affair

4.3. Bibliography

Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct

5.1. Introduction

5.2. Towards a broader concept of cyberwar

5.3. Concept of critical infrastructure

5.4. Different phases of a cyberattack

5.5. A few “elementary building blocks”

5.6. Example scenario

5.7. Conclusion

5.8. Bibliography

Chapter 6. Riots in Xinjiang and Chinese Information Warfare

6.1. Xinjiang region: an explosive context ...

Get Cyberwar and Information Warfare now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.