Cyber Warriors At War

Cyber Warriors At War

2.5 2
by Dr. Berg P. Hyacinthe PhD
     
 
Dr. Berg P. Hyacinthe (PhD, Florida State University; LLD Candidate, Assas School of Law, CERSA-CNRS, La Sorbonne) is internationally recognized as an eminent and multidisciplinary scientific investigator. A U.S. patent holder featured in Harvard's Smithsonian/NASA Astrophysics Data System, Dr. Hyacinthe recently served as Assistant Professor and Scientific Advisor to

Overview

Dr. Berg P. Hyacinthe (PhD, Florida State University; LLD Candidate, Assas School of Law, CERSA-CNRS, La Sorbonne) is internationally recognized as an eminent and multidisciplinary scientific investigator. A U.S. patent holder featured in Harvard's Smithsonian/NASA Astrophysics Data System, Dr. Hyacinthe recently served as Assistant Professor and Scientific Advisor to Taibah University's Strategic Science & Advanced Technology Unit.
Dr. Hyacinthe held several positions at County and State levels of the U.S Government in the Information Technology arena. He has been featured in conferences held at the U.S. Naval Postgraduate School, Monterey (author); Defence Academy of the United Kingdom, Shrivenham (invited session Chair); and National Defence College, Helsinki (session Chair). In CYBER WARRIORS AT WAR, he draws on the triangular relationship between technology, law, and Information Age warfare to propose solutions against potential charges of having committed Information Operations (IO) war crimes and/or IO crimes against humanity.
According to Dr. Hyacinthe, the success of pre-emptive strikes and decisive military operations depends profoundly upon both reliable human intelligence and the versatile skills of 21st century "cyber warriors" whose IO activities are conducted through modern warfare's pentagonal synchrony - land, sea, air, cyberspace, and outer space. Unfortunately, these operations are commonly effectuated under a legal reasoning that is ambiguous in important ways: a threat to the national security of the United States of America and to the entire international community.
Hence, as this Essay argues, the evolution of modern computer systems as weapons of war compels wary jurists to turn to the laws that should govern development and use of lethal information technologies. Further, this Essay examines how certain military operations within Information Warfare (IW) require new legal framework, and recounts specific events involving various types of IW conduct and cyber attack: an interesting exposé to jurists, military personnel, policymakers, and the growing and diverse body of information professionals around the world.

Product Details

ISBN-13:
9781441581709
Publisher:
Xlibris Corporation
Publication date:
01/12/2010
Pages:
240
Product dimensions:
6.00(w) x 9.00(h) x 0.69(d)

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Cyber Warriors At War 2.5 out of 5 based on 0 ratings. 2 reviews.
Anonymous More than 1 year ago
I am not sure where to start. This book is not technical. Cyber warfare is poorly defined and who the cyber warriors are also ill-defined. Much of it seems to be political opinion leaning to the progressvie left. He implies that the Bush administration was involved in borderline illegalities. Also, that there are conservative political figures unfairly attacking the Obama administration. Then the current administration's attempt to investigate CIA activitity ordered by the past administration and threatening to prosecute agents for carrying out the policy of the former administration as being right and necessary is somewhat naive and trite. If it wasn't required for a course that I am taking, I would have thrown this book in the trash.
Anonymous More than 1 year ago
For the recent ABDULMUTALLAB incident involving "cyber-conditioned" see pp. 155-157 & 230; for the seven CIA officers recently killed in Afghanistan, see pp. 182-185 --demanding recognition of the ultimate human sacrifice downplayed by propagandists and profit-minded defense contractors; for the overexposed U.S.military drones recently pirated by Iraqi insurgents, exposing hidden vulnerabilities and "oversold" propaganda, see pp. 181-183; for warnings about the so-called "intelligence failure," threatening Obama's presidency, see pp. 85-89; for specific information given to the FBI and names of individuals involved, see pp. 155-159; for an established link between the "liquid explosives" attempted terrorist attack of August 10, 2006 in London, the polonium incident during the same period in London, the PETN-based attack on the Saudi Prince Mohammed bin Nayef, the Somali incident of November 2009, ABDULMUTALLAB incident, the report sent to the FBI on October 17, 2003 via its Tallahassee Office, as well as countermeasures taught in U.S. patent application# 60/700,700,708 filed in 2005, see pp. 147-159; notes 140 & 141. For the danger of ASAT weapons to the survival of Homo sapiens beyond Earth's capillary boundaries, see pp. 23; for warnings sent to President Obama vis-à-vis insider threats, fear-mongers, questionable "intelligence failures," and pending threats to U.S. national security due to deliberate attempts by rogue agents within the U.S. intelligence agency to conceal reports/warnings sent to their leadership, see p.152, p. 179 as well as notes 164 & 130 & 135. http://www2.xlibris.com/book_excerpt.asp?bookid=69210 This book is a must read!