Jump to ratings and reviews
Rate this book

There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar

Rate this book
The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.

176 pages, Kindle Edition

First published March 23, 2015

36 people are currently reading
88 people want to read

About the author

Richard Stiennon

14 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
17 (38%)
4 stars
17 (38%)
3 stars
4 (9%)
2 stars
5 (11%)
1 star
1 (2%)
Displaying 1 - 4 of 4 reviews
Profile Image for Sam Elliott.
12 reviews1 follower
December 23, 2015
Great read for InfoSec pros. Thoughtfully approached, well researched, and references modern cyber security practices. Plus it is scary as hell.
1,370 reviews23 followers
March 12, 2024
Very interesting book about how, before they are released into the wild, various software and software-controlled systems need to be designed in a security-first way to avoid creating multiple back-doors that can be utilized by opposition in the future.

What is true for banks and other users of modern IT infrastructure is also true when it comes to military. And exposure of plethora of military systems to open networks creates special types of risks where control of these systems can be taken over using almost the same means used by today's cyber criminals when accessing the bank systems or personal electronic data.

After a very good introduction to Internet and how military started to adopt it, especially rise of Network Centric Warfare approach, author starts to meander in the middle of the book and then moves to basically describing how large corporation ITs handle the threats coming from the cyberspace. I say meander because what starts like description of very palpable danger when it comes to all networked weapon systems and how they can be intercepted and hijacked, comes down to very narrow approach to handle all the known and unknown/predicted threats. While this might apply to IT infrastructure of command and control, I think it is very unlikely same mechanisms would work for control of weapon systems, especially in the field. Military hardware always walks the thin line between the danger and level of it, criticality you might say. If danger is one off, it does not play much of a role in the long term, and let us not forget all cyber threats are one-offs. Once identified (since to be successful these means are always very narrow and custom built) although they might cause losses they are quickly handled and wont pose any threat in the future. Field conditions further complicate things because on the battlefield you do not want to open system but then you also need to receive information from somewhere and be able to function even in case of heavy jamming.

While entry chapter is rather dramatic I am glad that author shows that any cyber operation will be in role of support not in direct action (all the ships destroyed in first chapter are destroyed by missiles and torpedoes, not just by the fact their GPS is not working).

Other excellent point author talks about is the way hardware (chips, motherboards, electronics in general) can be secretly modified to enable third parties to seriously affect the actual planes and vehicles using them. Methods of controlling the logistic supply chains to prevent this were very interesting and something new to me.

Interesting book, that starts with the very intriguing field of hijacking high technology weapons but then does not provide any insights how that problem could be solved and goes back to more standard IT infrastructure protection that is applicable only for standard company/corporate computer network protection (basically command and control military counterpart). It is not downplaying the seriousness of this danger but I was truly waiting to see what would be the author's suggestion for the in the field handling of weapon hijacking and interference (there is also excellent chapter on cyberwar and electronic warfare).

Interesting, recommended.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.