NEW

eBook Conflict in the 21st Century: The Impact of Cyber Warfare, Social Media, and Technology, 1st Edition

  • Nicholas Michael Sambaluk
  • Published By:
  • ISBN-10: 1440860017
  • ISBN-13: 9781440860010
  • DDC: 355.0203
  • 368 Pages | eBook
  • Original Copyright 2019 | Published/Released October 2019
  • This publication's content originally published in print form: 2019
  • Price:  Sign in for price

About

Overview

Cyber warfare, social media, and the latest military weapons are transforming the character of modern conflicts. This book explains how, through overview essays written by an award-winning author of military history and technology topics, plus entries dealing with specific examples of digital and physical technologies, categorized by their relationship to cyber warfare, social media, and physical technology. Individually, these technologies are having a profound impact on modern conflicts; cumulatively, they are dynamically transforming the character of conflicts in the modern world. The book begins with a comprehensive overview essay on cyber warfare and a large section of A-Z reference entries related to this topic. The same detailed coverage is given to both social media and technology as they relate to conflict in the 21st century. Each section also includes an expansive bibliography for further research on these topics. The book ends with a detailed chronology.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
About the Editor.
Contents.
List of Entries by Section.
Preface.
Cyber Warfare.
A.
1: Advanced Persistent Threat.
2: APT1 Report.
3: Army Cyber Institute (ACI).
4: Assange, Julian.
B.
5: Botnet.
C.
6: Code Red Worm.
7: Computer Emergency Response Team (CERT).
8: Computer Network Attack (CNA).
9: Computer Network Defense (CND).
10: Covert Channels.
11: CrowdStrike.
12: Crypto Phone.
13: Cyber Caliphate.
14: Cyber Pearl Harbor.
15: CyberBerkut.
16: Cyberweapons.
D.
17: Distributed Denial-of-Service (DDoS) Attack.
E.
18: Electronic Frontier Foundation (EFF).
19: Encryption.
20: Estonia, 2007 Cyber Assault on.
21: EternalBlue Exploit.
22: Exploit.
F.
23: Facial Recognition Software.
G.
24: Gaza War, 2008–2009.
25: Georgia, 2008 Cyber Assault on.
26: GhostNet.
27: Government Communications Headquarters (GCHQ).
28: The Great Cannon.
H.
29: Hacktivism.
I.
30: Intellipedia.
31: International Mobile Subscriber Identity-Catcher (IMSI-Catcher).
32: iSIGHT.
33: K.
34: Klein, Mark.
L.
35: Libicki, Martin C..
M.
36: Malware.
37: Mandiant.
38: Manning, Chelsea/Manning, Bradley.
39: MonsterMind.
40: MSBlast.
41: Multinational Cyber Defense Capability Development (MN CD2).
N.
42: National Cybersecurity Center.
43: National Security Agency (NSA).
44: Nimda.
45: NIPRNet.
46: Nth Order Attacks.
O.
47: Oghab 2.
48: The Onion Router (TOR).
49: Operation Ababil.
50: Operation Aurora.
51: Operation Buckshot Yankee.
52: Operation Byzantine Hades.
53: Operation Olympic Games.
54: Operation Orchard.
55: Operation Rolling Tide.
56: Operation Shady RAT.
57: Operation Titan Rain.
P.
58: People's Liberation Army Unit 61398.
59: People's Liberation Army Unit 61486/“Putter Panda”.
R.
60: Rid, Thomas.
61: Rogers, Michael S..
62: Russian Business Network (RBN).
S.
63: Sandworm.
64: Script Kiddies.
65: Security Information and Event Management (SIEM) Tools.
66: Shamoon.
67: SIPRNet.
68: Skygrabber.
69: Snake, Cyber Actions against Ukraine, 2014.
70: Sony Hack, 2014.
71: SQL Slammer.
72: Stiennon, Richard.
73: Stuxnet.
74: Supervisory Control and Data Acquisition (SCADA).
75: Syrian Electronic Army (SEA).
T.
76: Tallinn Manual.
77: TAXII.
78: 10th Fleet.
79: Trusted Integrated Circuits (TRUST).
80: 24th Air Force.
U.
81: Ukraine Power Grid Cyberattack, December 2015.
82: USCYBERCOM.
V.
83: Virtual Control System Environment (VCSE).
84: Vulnerability.
W.
85: WannaCry Virus.
Z.
86: Zero-Day Vulnerability.
87: Cyber Warfare Bibliography.
Social Media.
A.
88: Al-Furqan.
89: #AllEyesOnISIS.
90: Anonymous.
91: Army Knowledge Online (AKO).
B.
92: Battle Command Knowledge System (BCKS).
93: Blogs.
94: Boko Haram.
95: #BringBackOurGirls.
C.
96: China, Blocking of Social Media by.
97: CompanyCommand.com.
D.
98: Dabiq.
99: Dawn of Glad Tidings Campaign.
100: Doctrine Man.
101: Doxing.
F.
102: Facebook, Use of.
103: FireChat.
104: Forum Infiltration.
105: FrontlineSMS.
H.
106: HARMONIEWeb.
107: Hashtag Hijacking.
I.
108: Instagram, Use of.
109: ISIS Recruitment and War Crimes.
110: ISIS Trolling Day.
J.
111: John Q. Public.
M.
112: Mappr App.
113: MySpace, U.S. Military Personnel Usage of.
O.
114: Operational Security, Impact of Social Media on.
P.
115: PlatoonLeader.com.
R.
116: Recorded Future.
S.
117: Shekau, Abubakar.
118: Small Wars Journal.
119: Snowden, Edward.
120: Social Media and the Arab Spring.
121: Social Media Intelligence (SOCMINT).
122: Soft War.
123: Surespot App.
T.
124: Telegram App.
125: Think Again, Turn Away Campaign.
126: TroopTube.
127: Trusted Flagger (YouTube).
128: Twitter, Use of.
129: Twitter Account Hunting.
U.
130: U.S. Military Use of Social Media.
W.
131: War on Terrorism and Social Media.
132: Web 2.0.
133: WhatsApp.
134: WikiLeaks, Impact of.
Y.
135: YouTube, Use of.
Z.
136: Zello App.
137: Social Media Bibliography.
Technology.
A.
138: Additive Manufacturing (3D Printing).
139: Anti-Satellite Weapon (ASAT).
140: Anti-Ship Cruise Missile (ACSM).
B.
141: Body Armor, Modern.
142: Boston Dynamics BigDog.
143: Boston Dynamics Handle Robot.
144: BrahMos-II.
145: The Cloud.
C.
146: Counter Unmanned Aerial Systems (C-UAS).
D.