In the "information age, " information systems may serve as both weapons and targets. Although the media have paid a good deal of attention to information warfare, most treatments so far are overly broad and without analytical foundations. In this book Gregory Rattray offers a comprehensive analysis of strategic information warfare waged via digital means as a distinct concern for the United States and its allies.
Rattray begins by analyzing salient features of information infrastructures and distinguishing strategic information warfare from other types of information-based competition, such as financial crime and economic espionage. He then establishes a conceptual framework for the successful conduct of strategic warfare in general, and of strategic information warfare in particular. Taking a historical perspective, he examines U.S. efforts to develop air bombardment capabilities in the period between World Wars I and II and compares them to U.S. efforts in the 1990s to develop the capability to conduct strategic information warfare. He concludes with recommendations for strengthening U.S. strategic information warfare defenses.
In the "information age, " information systems may serve as both weapons and targets. Although the media have paid a good deal of attention to information warfare, most treatments so far are overly broad and without analytical foundations. In this book Gregory Rattray offers a comprehensive analysis of strategic information warfare waged via digital means as a distinct concern for the United States and its allies.
Rattray begins by analyzing salient features of information infrastructures and distinguishing strategic information warfare from other types of information-based competition, such as financial crime and economic espionage. He then establishes a conceptual framework for the successful conduct of strategic warfare in general, and of strategic information warfare in particular. Taking a historical perspective, he examines U.S. efforts to develop air bombardment capabilities in the period between World Wars I and II and compares them to U.S. efforts in the 1990s to develop the capability to conduct strategic information warfare. He concludes with recommendations for strengthening U.S. strategic information warfare defenses.
Everyone is talking about our increased vulnerability to information warfare. Gregory J. Rattray puts this danger in an analytic and historical context that tells us what we can and should do about it. -- Joseph S. Nye, Dean, Kennedy School of Government, Harvard University This excellent analysis is essential reading for anyone concerned with the defense posture of the United States. All those with a stake in the security of the information infrastructure should read it. There is nothing else like it. -- Dorothy Denning, Department of Computer Science, Georgetown University One of the most thoughtful and thorough books on the subject so far. -- Seymour E. Goodman, Professor of International Affairs and Computing, Georgia Tech This book is the first comprehensive exploration of the strategic significance of information system vulnerability. Important reading for anyone trying to understand the full potential of cyber warfare. -- Ashton B. Carter, Ford Foundation Professor of Science and International Affairs, Harvard University, Kennedy School of Government, and Co-Director, Harvard-Stanford Preventive Defense Project
Gregory J. Rattray is currently the Commander of the 23rd Information Operations Squadron responsible for U. S. Air Force information warfare tactics and target development. He as previously assigned to Headquarters Air Force as the Deputy Chief, Defensive Information Warfare Division. He is a Term Member of the Council on Foreign Relations.
"This excellent analysis is essential reading for anyone concerned with the defense posture of the United States. All those with a stake in the security of the information infrastructure should read it. There is nothing else like it." - Dorothy Denning, Georgetown University"
![]() |
Ask a Question About this Product More... |
![]() |