skip to main content
research-article
Free Access

From blitzkrieg to bitskrieg: the military encounter with computers

Published:01 October 2011Publication History
Skip Abstract Section

Abstract

Expect more cyberwarfare on the conventional battlefield and less against civilian infrastructure…assuming containment is possible.

References

  1. Adams, J. The Next World War. Simon & Schuster, New York, 1998.Google ScholarGoogle Scholar
  2. Arquilla, J. et al. Cyberwar is coming! Comparative Strategy 12, 2 (Apr.--June 1993), 141--165.Google ScholarGoogle Scholar
  3. Arquilla, J. et al. Swarming & the Future of Conflict. RAND Corp. Santa Monica, CA, 2000.Google ScholarGoogle Scholar
  4. Barnaby, F. The Automated Battlefield. Free Press, New York, 1986Google ScholarGoogle Scholar
  5. Baum, D. Battle lessons. The New Yorker (Jan. 2005).Google ScholarGoogle Scholar
  6. Bellin, D. Computers in Battle. Harcourt, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Biddle, S. Afghanistan & the Future of Warfare. Strategic Studies Institute, Carlisle, PA, 2002.Google ScholarGoogle Scholar
  8. Blank, S. Web War I. Comparative Strategy 27, 3 (Apr.--June 2008).Google ScholarGoogle Scholar
  9. Briscoe, C.H. et al. Weapon of Choice. Combat Studies Institute, Fort Leavenworth, KS, 2004.Google ScholarGoogle Scholar
  10. Broad, W. et al. Israel tests called crucial in Iran nuclear setback. The New York Times (Jan. 16, 2011).Google ScholarGoogle Scholar
  11. Cebrowski, A. et al. Network-centric warfare. Naval Proceedings (Jan. 1998).Google ScholarGoogle Scholar
  12. Clarke, R. Cyber War. HarperCollins, New York, 2010.Google ScholarGoogle Scholar
  13. Clayton, M. Computer worm as guided missile? The Christian Science Monitor (Oct. 4, 2010).Google ScholarGoogle Scholar
  14. de Landa, M. War in the Age of Intelligent Machines. MIT Press, Cambridge, MA, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Denning, D. Information Warfare and Security. Addison-Wesley, Boston, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Dixon, N. et al. Company Command. West Point, NY, 2005.Google ScholarGoogle Scholar
  17. Dunnigan, J. Digital Soldiers. St. Martin's Press, New York, 1996.Google ScholarGoogle Scholar
  18. Gorman, S. et al. Cyber combat: Act of war. The Wall Street Journal (May 31, 2011).Google ScholarGoogle Scholar
  19. Gross, M. A declaration of cyberwar. Vanity Fair (Apr. 2011).Google ScholarGoogle Scholar
  20. Hayden, M.V. The future of things 'cyber.' Strategic Studies Quarterly 5, 1 (Spring 2011).Google ScholarGoogle Scholar
  21. Hoover, J.N. Air Force to tackle supply-chain security. InformationWeek (Aug. 20, 2010).Google ScholarGoogle Scholar
  22. Laqueur, W. Postmodern terrorism. Foreign Affairs 75, 5 (Sept.--Oct. 1996).Google ScholarGoogle Scholar
  23. Libicki, M.C. Conquest in Cyberspace. Cambridge University Press, New York, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Libicki, M.C. Cyberdeterrence and Cyberwar. RAND Corp., Santa Monica, CA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Molander, R. et al. Strategic Information Warfare. RAND Corp., Santa Monica, CA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Morgan, P. Deterrence. Sage Publications, Thousand Oaks, CA, 1977.Google ScholarGoogle Scholar
  27. Owens, W. Lifting the Fog of War. Farrar, Straus and Giroux, New York, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Pape, R. Bombing to Win. Cornell University Press, Ithaca, NY, 1996.Google ScholarGoogle Scholar
  29. Quester, G. Offense and Defense in the International System. Wiley, New York, 1977.Google ScholarGoogle Scholar
  30. Robinson, B. Love/hate relationship with NMCI. Federal Computer Week (Sept. 10, 2007).Google ScholarGoogle Scholar
  31. Rona, T. Weapons Systems and Information War. Boeing, Seattle, 1976.Google ScholarGoogle Scholar
  32. Sanger, D. et al. Iran fights malware attacking computers. The New York Times (Sept. 26, 2010).Google ScholarGoogle Scholar
  33. Schelling, T. Arms and Influence. Yale University Press, New Haven, 1966.Google ScholarGoogle Scholar
  34. Singer, P.W. Wired for War. Penguin, New York, 2009.Google ScholarGoogle Scholar
  35. Snyder, J. The Ideology of the Offensive. Cornell University Press, Ithaca, NY, 1989.Google ScholarGoogle Scholar
  36. Sommer, P. and Brown, I. Reducing Systemic Cybersecurity Risk. Organization for Economic Cooperation and Development, Paris, France, 2011.Google ScholarGoogle Scholar
  37. Stanton, D. Horse Soldiers. Scribner, New York, 2009.Google ScholarGoogle Scholar
  38. Thomas, T. The threat of information operations: A Russian perspective. In War in the Information Age, R. Pfaltzgraff and R. Shultz, Eds. Brassey's, London, 1997.Google ScholarGoogle Scholar
  39. Thornburgh, N. The invasion of the Chinese cyber spies. Time (Aug. 29, 2005).Google ScholarGoogle Scholar
  40. Vistica, G. We're in the middle of a cyberwar. Newsweek (Sept. 20, 1999).Google ScholarGoogle Scholar
  41. Walzer, M. Just and Unjust Wars. Basic Books, New York, 1977.Google ScholarGoogle Scholar

Index Terms

  1. From blitzkrieg to bitskrieg: the military encounter with computers

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 54, Issue 10
                October 2011
                126 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/2001269
                Issue’s Table of Contents

                Copyright © 2011 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 October 2011

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Popular
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format