Wars of Disruption and Resilience
Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security
CHRIS C. DEMCHAK
Series: Studies in Security and International Affairs
Copyright Date: 2011
Published by: University of Georgia Press
Pages: 304
https://www.jstor.org/stable/j.ctt46np69
Search for reviews of this book
Book Info
Wars of Disruption and Resilience
Book Description:

Increasingly, the power of a large, complex, wired nation like the United States rests on its ability to disrupt would-be cyber attacks and to be resil­ient against a successful attack or recurring campaign. Addressing the con­cerns of both theorists and those on the national security front lines, Chris C. Demchak presents a unified strategy for survival in an interconnected, ever-messier, more surprising cybered world and examines the institutional adaptations required of our defense, intelligence, energy, and other critical sectors for national security. Demchak introduces a strategy of "security resilience" against surprise attacks for a cybered world that is divided between modern, digitally vulner­able city-states and more dysfunctional global regions. Its key concepts build on theories of international relations, complexity in social-technical systems, and organizational-institutional adaptation. Demchak tests the strategy for reasonableness in history's few examples of states disrupting rather than conquering and being resilient to attacks, including ancient Athens and Sparta, several British colonial wars, and two American limited wars. She applies the strategy to modern political, social, and technical challenges and presents three kinds of institutional adaptation that predicate the success of the security resilience strategy in response. Finally, Demchak discusses implications for the future including new forms of cyber aggression like the Stuxnet worm, the rise of the cyber-command concept, and the competition between the U.S. and China as global cyber leaders. Wars of Disruption and Resilience offers a blueprint for a national cyber-power strategy that is long in time horizon, flexible in target and scale, and practical enough to maintain the security of a digitized nation facing violent cybered conflict.

eISBN: 978-0-8203-4137-8
Subjects: Political Science, History
You do not have access to this book on JSTOR. Try logging in through your institution for access.
Log in to your personal account or through your institution.
Table of Contents
Export Selected Citations Export to NoodleTools Export to RefWorks Export to EasyBib Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley...) Export a Text file (For BibTex)
Select / Unselect all
  1. Front Matter
    Front Matter (pp. i-vi)
  2. Table of Contents
    Table of Contents (pp. vii-viii)
  3. PREFACE
    PREFACE (pp. ix-xvi)
  4. ACKNOWLEDGMENTS
    ACKNOWLEDGMENTS (pp. xvii-xx)
  5. CHAPTER ONE Globalization and Spread of Cybered Conflict
    CHAPTER ONE Globalization and Spread of Cybered Conflict (pp. 1-79)

    Cyberspace enables cooperation and conflict in nearly equal measure. In today’s open, near-free, digitally enabled globalization, new and old enemies from unempowered individuals to national-level leaders can use easy access to international systems to engage in conflict, or economics, or both. Barriers to entry have particularly fallen for bad actors seeking to exploit distant populations using cyberspace connections. Each set of actors today at their own chosen scale of organization can reach far, deep, and wide into other nations at little near-term physical cost or physical risk to themselves. At their whim, distant or hidden bad actors can also use...

  6. CHAPTER TWO History’s Experiments in Security Resilience
    CHAPTER TWO History’s Experiments in Security Resilience (pp. 80-173)

    History does not offer directly equivalent examples of the open-cybered world. If all those appropriate, legal, and sensible institutional responses to multifaceted surprise were in place and nurtured properly, one can argue that a given set of allied city-states would be at about the best place one can be to disrupt and be resilient against threats to tightly linked critical systems inside their respective borders. This discussion seeks to show the reasonableness of a security resilience strategy by rereading historical case studies. The intent is to see to what extent successful and unsuccessful leaders instinctively employed elements of a security...

  7. CHAPTER THREE Challenges in a New Strategy for Cybered Threats
    CHAPTER THREE Challenges in a New Strategy for Cybered Threats (pp. 174-223)

    Cybered conflict is a uniquely modern form of competition due to the globally open and easily accessible cyberspace. Modern city-states have much in common with their predecessors in Athens, Florence, and even the reluctant colonialists in London in terms of threats, save that today’s threatening bad neighbors, nonstate raiders, and large aggressive states will inevitably use cybered means to attack. The lessons of previous city-states are applicable in that they reinforce the need for knowledge development well in advance. Florence did not have such knowledge and was constantly paying exorbitant funds to escape the consequences of its inaccurate and incomplete...

  8. CHAPTER FOUR Institutional Design for Cybered Power and National Security
    CHAPTER FOUR Institutional Design for Cybered Power and National Security (pp. 224-269)

    Any book on international security in a time of cybered conflict needs to deal directly with the asymmetric knowledge challenges that enable offense advantages—scale, proximity, and precision. Cybered conflict requires a uniquely modern, highly informed, rapid way of fighting that accommodates the topology for the international system. Success in the face of surprise in large, dispersed, complex systems is crucially based on knowledge at the right moment, in the right form, and used in the most accurate and timely way. In particular, international security is no longer purely external, and any successful strategy must necessarily explain its prerequisites in...

  9. CHAPTER FIVE Disruption and Resilience for National Security and Power in a Cybered World
    CHAPTER FIVE Disruption and Resilience for National Security and Power in a Cybered World (pp. 270-290)

    History tells us much about human social tendencies, a good deal about prior experiments in social control and security, and only a little about today’s circumstances of multiply netted, chronic, violent, and gray threats to westernized city-states from turbulent, densely populated, dysfunctional regions of the world. In recorded history, such serious security threats induced conquest, neglect, brutal internal suppression, or annihilation (the ultimate submission of one side).¹ Today westernized nations would neither seek nor accept these outcomes. Yet one cannot allow the offensive advantages of a global cybered world—scale, precision, and proximity—to disable critical functions of modern nations...

  10. BIBLIOGRAPHY
    BIBLIOGRAPHY (pp. 291-322)
  11. INDEX
    INDEX (pp. 323-331)
University of Georgia Press logo