59,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
30 °P sammeln
  • Broschiertes Buch

The dominance of the United States (US) military means that traditional threats, short of weapons of mass destruction, currently pose little risk to US sovereignty. Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased US military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms. Additionally, international law does not adequately provide response mechanisms for the United States in case of a computer network at-tack. The United States needs to establish policy…mehr

Produktbeschreibung
The dominance of the United States (US) military means that traditional threats, short of weapons of mass destruction, currently pose little risk to US sovereignty. Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased US military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms. Additionally, international law does not adequately provide response mechanisms for the United States in case of a computer network at-tack. The United States needs to establish policy directives and diplomatic initiatives to secure its information sovereignty for the future. This study examines the history of technology and sovereignty, which reveals a model for the evolution of international law. Specifically, the history of sea, air, and space provides examples on past issues of sovereignty. A three-stage pat-tern of international law emerges. Under the assumption that sovereignty issues related to information warfare will follow the same path, the current state of sovereignty regarding information is established. To focus the study, a functional outline for international convention, the International Regime for Information Security (IRIS), is advanced. IRIS balances US domestic privacy needs with US national security demands. Specifically, technology issues regarding digital identification and encryption are weighed against civil liberties and intelligence needs. After examining the advantages and disadvantages of the IRIS regime, this study recommends its use as a model for a future international convention on information warfare. Within an IRIS-type regime, compromise between civil liberty advocates and intelligence service organizations are necessary. Through digital identification and universally strong encryption, privacy and security concerns will be satisfied.