Networks and netwars: the future of terror, crime, and militancy
"Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
Rand
2001
|
Schlagworte: | |
Zusammenfassung: | "Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves>"--Rand abstract. |
Beschreibung: | "Prepared for the Office of the Secretary of Defense.". - Includes bibliographical references |
Beschreibung: | xiv, 375 p. ill. : 23 cm |
ISBN: | 0833030302 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV014514726 | ||
003 | DE-604 | ||
005 | 20021119 | ||
007 | t | ||
008 | 020603s2001 xxua||| t||| 00||| eng d | ||
010 | |a 2001041739 | ||
020 | |a 0833030302 |9 0-8330-3030-2 | ||
035 | |a (OCoLC)47200374 | ||
035 | |a (DE-599)BVBBV014514726 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-29 |a DE-634 |a DE-11 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 303.6/25 |2 21 | |
084 | |a MD 8920 |0 (DE-625)122569: |2 rvk | ||
084 | |a 8 |2 ssgn | ||
088 | |a MR-1382 | ||
245 | 1 | 0 | |a Networks and netwars |b the future of terror, crime, and militancy |c edited by John Arquilla and David Ronfeldt |
264 | 1 | |a Santa Monica, CA |b Rand |c 2001 | |
300 | |a xiv, 375 p. |b ill. : 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "Prepared for the Office of the Secretary of Defense.". - Includes bibliographical references | ||
520 | 3 | |a "Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves>"--Rand abstract. | |
650 | 7 | |a Activisme |2 gtt | |
650 | 7 | |a Internet |2 gtt | |
650 | 7 | |a Terrorisme |2 gtt | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Information warfare | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 1 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Arquilla, John |e Sonstige |4 oth | |
700 | 1 | |a Ronfeldt, David F. |d 1941- |e Sonstige |0 (DE-588)124320465 |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-009886194 |
Datensatz im Suchindex
_version_ | 1804129316536057856 |
---|---|
any_adam_object | |
author_GND | (DE-588)124320465 |
building | Verbundindex |
bvnumber | BV014514726 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | MD 8920 |
ctrlnum | (OCoLC)47200374 (DE-599)BVBBV014514726 |
dewey-full | 303.6/25 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.6/25 |
dewey-search | 303.6/25 |
dewey-sort | 3303.6 225 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie Politologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03679nam a2200541zc 4500</leader><controlfield tag="001">BV014514726</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20021119 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020603s2001 xxua||| t||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2001041739</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833030302</subfield><subfield code="9">0-8330-3030-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)47200374</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014514726</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.6/25</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MD 8920</subfield><subfield code="0">(DE-625)122569:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">MR-1382</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Networks and netwars</subfield><subfield code="b">the future of terror, crime, and militancy</subfield><subfield code="c">edited by John Arquilla and David Ronfeldt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">Rand</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 375 p.</subfield><subfield code="b">ill. : 23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the Office of the Secretary of Defense.". - Includes bibliographical references</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves>"--Rand abstract.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Activisme</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorisme</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arquilla, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ronfeldt, David F.</subfield><subfield code="d">1941-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)124320465</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009886194</subfield></datafield></record></collection> |
id | DE-604.BV014514726 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:03:12Z |
institution | BVB |
isbn | 0833030302 |
language | English |
lccn | 2001041739 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009886194 |
oclc_num | 47200374 |
open_access_boolean | |
owner | DE-12 DE-29 DE-634 DE-11 |
owner_facet | DE-12 DE-29 DE-634 DE-11 |
physical | xiv, 375 p. ill. : 23 cm |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Rand |
record_format | marc |
spelling | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt Santa Monica, CA Rand 2001 xiv, 375 p. ill. : 23 cm txt rdacontent n rdamedia nc rdacarrier "Prepared for the Office of the Secretary of Defense.". - Includes bibliographical references "Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves>"--Rand abstract. Activisme gtt Internet gtt Terrorisme gtt Terrorismus Cyberterrorism Information warfare Terrorismus (DE-588)4059534-1 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Information warfare (DE-588)4461975-3 s DE-604 Cyberspace (DE-588)4266146-8 s Terrorismus (DE-588)4059534-1 s Arquilla, John Sonstige oth Ronfeldt, David F. 1941- Sonstige (DE-588)124320465 oth |
spellingShingle | Networks and netwars the future of terror, crime, and militancy Activisme gtt Internet gtt Terrorisme gtt Terrorismus Cyberterrorism Information warfare Terrorismus (DE-588)4059534-1 gnd Cyberspace (DE-588)4266146-8 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4266146-8 (DE-588)4461975-3 |
title | Networks and netwars the future of terror, crime, and militancy |
title_auth | Networks and netwars the future of terror, crime, and militancy |
title_exact_search | Networks and netwars the future of terror, crime, and militancy |
title_full | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt |
title_fullStr | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt |
title_full_unstemmed | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt |
title_short | Networks and netwars |
title_sort | networks and netwars the future of terror crime and militancy |
title_sub | the future of terror, crime, and militancy |
topic | Activisme gtt Internet gtt Terrorisme gtt Terrorismus Cyberterrorism Information warfare Terrorismus (DE-588)4059534-1 gnd Cyberspace (DE-588)4266146-8 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Activisme Internet Terrorisme Terrorismus Cyberterrorism Information warfare Cyberspace |
work_keys_str_mv | AT arquillajohn networksandnetwarsthefutureofterrorcrimeandmilitancy AT ronfeldtdavidf networksandnetwarsthefutureofterrorcrimeandmilitancy |