Introduction. American Biodefense, from Boston to Baghdad 1. - 1. Science and Technology for National Security: Threats, Interests, and Ideas 13. - 2. Stereotypical Neglect of Military Research, Development, and Acquisition for Biodefense 36. - 3. Fatal Assumptions: Military Doctrine 71. - 4. An Unlikely Sponsor? The Rise of Civilian Biodefense 102. - Conclusion. Biodefense and Beyond: The Influence of Ideas on National Security 128
Biological weapons have threatened US national security since at least World War II. Historically, however, the US military has neglected research, development, acquisition, and doctrine for biodefense. Following September 11 and the anthrax letters of 2001, the United States started spending billions of dollars per year on medical countermeasures and biological detection systems. But most of this funding now comes from the Department of Health and Human Services rather than the Department of Defense. Why has the US military neglected biodefense and allowed civilian organizations to take the lead in defending the country against biological attacks? In American Biodefense, Frank L. Smith III addresses this puzzling and largely untold story about science, technology, and national security. Smith argues that organizational frames and stereotypes have caused both military neglect and the rise of civilian biodefense. In the armed services, influential ideas about kinetic warfare have undermined defense against biological warfare. The influence of these ideas on science and technology challenges the conventional wisdom that national security policy is driven by theats or bureaucratic interests. Given the ideas at work inside the US military, Smith explains how the lessons learned from biodefense can help solve other important problems that range from radiation weapons to cyber attacks--Front jacket flap
Verfügbarkeit an Ihrem Standort wird überprüft
Dieses Buch ist auch in Ihrer Bibliothek verfügbar:
Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.
Government, industry, and academia need better tools to explore threats, opportunities, and human interactions in cyberspace. The interactive exercises called cyber wargames are a powerful way to solve complex problems in a digital environment that involves both cooperation and conflict. Cyber Wargaming is the first book to provide both the theories and practical examples needed to successfully build, play, and learn from these interactive exercises. The contributors to this book explain what cyber wargames are, how they work, and why they offer insights that other methods cannot match. The lessons learned are not merely artifacts of these games - they also shed light on how people interpret and interact with cyberspace in real life. This book covers topics such as cyber action during conventional war, information effects in conflict scenarios, individual versus group decision-making, the intersection of cyber conflicts and nuclear crises, business resilience, emerging technologies, and more.