What is JacketFlap

  • JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans.
    Join now (it's free).

Sort Blog Posts

Sort Posts by:

  • in
    from   

Suggest a Blog

Enter a Blog's Feed URL below and click Submit:

Most Commented Posts

In the past 7 days

Recent Comments

Recently Viewed

JacketFlap Sponsors

Spread the word about books.
Put this Widget on your blog!
  • Powered by JacketFlap.com

Are you a book Publisher?
Learn about Widgets now!

Advertise on JacketFlap

MyJacketFlap Blogs

  • Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.

Blog Posts by Tag

In the past 7 days

Blog Posts by Date

Click days in this calendar to see posts by day or month
new posts in all blogs
Viewing: Blog Posts Tagged with: defense, Most Recent at Top [Help]
Results 1 - 4 of 4
1. Ominous synergies: Iran’s nuclear weapons and a Palestinian state

“Defensive warfare does not consist of waiting idly for things to happen. We must wait only if it brings us visible and decisive advantages. That calm before the storm, when the aggressor is gathering new forces for a great blow, is most dangerous for the defender.”
–Carl von Clausewitz, Principles of War (1812)

For Israel, long beleaguered on many fronts, Iranian nuclear weapons and Palestinian statehood are progressing at approximately the same pace. Although this simultaneous emergence is proceeding without any coordinated intent, the combined security impact on Israel will still be considerable. Indeed, this synergistic impact could quickly become intolerable, but only if the Jewish State insists upon maintaining its current form of “defensive warfare.”

Iran and Palestine are not separate or unrelated hazards to Israel. Rather, they represent intersecting, mutually reinforcing, and potentially existential perils. It follows that Jerusalem must do whatever it can to reduce the expected dangers, synergistically, on both fronts. Operationally, defense must still have its proper place. Among other things, Israel will need to continually enhance its multilayered active defenses. Once facing Iranian nuclear missiles, a core component of the synergistic threat, Israel’s “Arrow” ballistic missile defense system would require a fully 100% reliability of interception.

There is an obvious problem. Any such needed level of reliability would be unattainable. Now, Israeli defense planners must look instead toward conceptualizing and managing long-term deterrence.

Even in the best of all possible strategic environments, establishing stable deterrence will present considerable policy challenges. The intellectual and doctrinal hurdles are substantially numerous and complex; they could quite possibly become rapidly overwhelming. Nonetheless, because of the expectedly synergistic interactions between Iranian nuclear weapons and Palestinian independence, Israel will soon need to update and further refine its overall strategy of deterrence.

Following the defined meaning of synergy, intersecting risks from two seemingly discrete “battle fronts,” or separate theatres of conflict, would actually be greater than the simple sum of their respective parts.

One reason for better understanding this audacious calculation has to do with expected enemy rationality. More precisely, Israel’s leaders will have to accept that certain more-or-less identifiable leaders of prospectively overlapping enemies might not always be able to satisfy usual standards of rational behavior.

With such complex considerations in mind, Israel must plan a deliberate and systematic move beyond the country’s traditionally defensive posture of deliberate nuclear ambiguity. By preparing to shift toward more prudentially selective and partial kinds of nuclear disclosure, Israel might better ensure that its still-rational enemies would remain subject to Israeli nuclear deterrence. Over time, such careful preparations could even prove indispensable.

Israeli planners will also need to understand that the efficacy or credibility of the country’s nuclear deterrence posture could vary inversely with enemy judgments of Israeli nuclear destructiveness. In these circumstances, however ironic, enemy perceptions of a too-large or too-destructive Israeli nuclear deterrent force, or of an Israeli force that is plainly vulnerable to first-strike attacks, could undermine this posture.

Israel’s adversaries, Iran especially, must consistently recognize the Jewish State’s nuclear retaliatory forces as penetration capable. A new state of Palestine would be non-nuclear itself, but could still present an indirect nuclear danger to Israel.

Israel does need to strengthen its assorted active defenses, but Jerusalem must also do everything possible to improve its core deterrence posture. In part, the Israeli task will require a steadily expanding role for advanced cyber-defense and cyber-war.

Above all, Israeli strategic planners should only approach the impending enemy threats from Iran and Palestine as emergently synergistic. Thereafter, it would become apparent that any combined threat from these two sources will be more substantial than the mere arithmetic addition of its two components. Nuanced and inter-penetrating, this prospectively combined threat needs to be assessed more holistically as a complex adversarial unity. Only then could Jerusalem truly understand the full range of existential harms now lying latent in Iran and Palestine.

Armed with such a suitably enhanced understanding, Israel could meaningfully hope to grapple with these unprecedented perils. Operationally, inter alia, this would mean taking much more seriously Carl von Clausewitz’s early warnings on “waiting idly for things to happen.” Interestingly, long before the Prussian military theorist, ancient Chinese strategist Sun-Tzu had observed in The Art of War, “Those who excel at defense bury themselves away below the lowest depths of the earth. Those who excel at offense move from above the greatest heights of Heaven. Thus, they are able to preserve themselves and attain complete victory.”

Unwittingly, Clausewitz and Sun-Tzu have left timely messages for Israel. Facing complex and potentially synergistic enemies in Iran and Palestine, Jerusalem will ultimately need to take appropriate military initiatives toward these foes. More or less audacious, depending upon what area strategic developments should dictate, these progressive initiatives may not propel Israel “above the greatest heights of Heaven,” but they could still represent Israel’s very best remaining path to long-term survival.

Headline image credit: Iranian Missile Found in Hands of Hezbollah by Israel Defense Forces (IDF). CC BY-NC 2.0 via Flickr.

The post Ominous synergies: Iran’s nuclear weapons and a Palestinian state appeared first on OUPblog.

0 Comments on Ominous synergies: Iran’s nuclear weapons and a Palestinian state as of 1/12/2015 6:34:00 AM
Add a Comment
2. Cyber attacks: electric shock

By Alfred Rolington


Cyber attacks on Iran have been well publicised in the press and on Western television. General William Shelton, a top American cyber general, has now turned these attacks around saying that these events are giving Iran a strategic and tactical cyber advantage creating a very serious “force to be reckoned with.”

Since 2010, Iran’s infrastructure has been attacked hundreds of times by cyber viruses. To date the most documented and best known cyber attacks have been aimed at Iran and are known as cyber worms called Stuxnet. These electronic worms were used to attack Iranian nuclear power plants and connected systems. General Shelton, who heads up Air Force Space Command and Air Force cyber operations, gave a briefing to reporters in January 2013, where he said that the 2010 Stuxnet virus attack on Iran’s Natanz uranium processing plant had generated considered responses from Iran that have led to improved offensive and defensive cyber-capabilities.

In December 2012, the Stuxnet virus returned and hit computer and energy operations and companies in the southern Hormozgan region. Shelton claimed that Iran’s improved cyber defense capability had helped Iran protect it against subsequent attacks on oil terminals and other manufacturing plants. This new capability, he believed, will subsequently be used by Iran against its enemies in the near future. “They are going to be a force to be reckoned with,” said General Shelton, “with the potential capabilities that they will develop over the years.” At present he stated that America had over six thousand cyber specialists employed to monitor, analyse and counter cyber attacks, and he was intending to employ another thousand specialists over the next twelve months to improve America’s effectiveness in this vital area.

Moreover, assassinations and assassination attempts in conjunction with cyber attacks are thought to be part of an integrated plan of attacks on Iran’s nuclear research and manufacturing capabilities. A year ago on 11 January 2012, Ahmadi Roshan, a 32-year-old Iranian scientist, and his driver were both killed when a motorcyclist attached a bomb to their car as they were driving. So far these attacks, which seem to form part of the broader cyber-related strategy aimed at Iran’s nuclear program, have successfully killed five Iranian nuclear scientists in the last two years according to FARS, a Tehran news agency. However, in January 2013, the Iranian Intelligence Minister Heydar Moslehi claimed that his organisation had stopped a number of attempts to kill nuclear scientists so it is uncertain which reports are accurate.

These attacks on Iran’s electronic systems represent only a very small amount of the current cyber attack and threat capability. Increasingly, all governments and corporations must respond to the cyber reality. With an interconnected world, cyber attacks on infrastructure have become frequent and damaging. Cyber crime is costing businesses billions of pounds although they tend to keep quiet about the attacks. (The BBC reported that UK cyber crime costs £27bn a year.) Efforts to get a grip on the problem had been hampered by firms who don’t want to admit they had been the victims of attacks for fear of “reputational damage”. Baroness Neville-Jones, Prime Minister David Cameron, and Foreign Secretary William Hague met the bosses of some of Britain’s biggest businesses, including Barclays, HSBC, Tesco and BA, to urge them to take the problem more seriously.

In September 2012, a hacker called vorVzakone posted a message on a Russian online forum saying that a malevolent Trojan, called Project Blitzkrieg, was capable of attacking the American financial industry, that it had already critically affected up to five hundred American targets, and that it had stolen over five million dollars. “This attack combines both a technical, innovative backend with the tactics of a successful, organized cybercrime movement,” a McAfee report explained, adding that the next target would probably be investment banks.

Hackers, apparently working independently as criminal gangs, have grown in their specialization faster than most police and government intelligence organisations would have believed possible. Yet cyber hackers working for governments have targeted everything from computer systems to power plants from the US to Iran, Europe to China, Australia and beyond. These civil servant hackers are often employed by governments to help fulfill a strategy, to change information and publicity, or to gain information and bring systems down.

One example comes from Ray Boisvert, who recently retired from the post of Assistant Director of Intelligence for the Canadian Security Intelligence Service. He believes the current capabilities of most governments is not enough to counter the current cyber threats. He said that cyber threats were fundamentally undermining Canada’s “future prosperity as a nation.” He stated there is a lack of response on three levels. First from government and corporate policy-makers who do not, in his opinion, understand the technical complexities of digital telecommunications security. Second the government has not invested enough to protect Canada’s communications and electricity systems from cyber attacks. Third, he thought there was an inherent corporate shortsightedness regarding protecting Canada’s communications infrastructure.

The cyber issue is growing and will become a rising threat to governments and corporations. It may require a serious attack such as a massive electricity system shut down before a full government response is played out.

Alfred Rolington is the author of Strategic Intelligence for the 21st Century: The Mosaic Method, an industry insider’s assessment of current intelligence methods and offers a new strategic model, directed toward the police, military, and intelligence agencies. He was formerly CEO of Jane’s Information Group, responsible for such publications as Jane’s Defense Review and Jane’s Police Review, as well as CEO for Oxford Analytica. He has over thirty years’ experience of analytical publishing and media companies, producing information and intelligence for commerce, law enforcement, the, military and government. He has written about and given lectures on intelligence and strategic planning to Cambridge, Oxford, and Harvard Universities, and to organisations such as Thomson Reuters, the CIA, SIS (MI6), NATO Headquarters, and GCHQ.

Subscribe to the OUPblog via email or RSS.
Subscribe to only law and politics articles on the OUPblog via email or RSS.
Image credits: Information Systems Technician 2nd Class Ryan Allshouse uses the intrusion detection system to monitor unclassified network activity from the automated data processing workspace. As a work of the U.S. federal government, the image is in the public domain via Wikimedia Commons;  Maps and charts are scanned from “Atlas of the Middle East”, published in January 1993 by the U.S. Central Intelligence Agency. [Public domain], via Wikimedia Commons

The post Cyber attacks: electric shock appeared first on OUPblog.

0 Comments on Cyber attacks: electric shock as of 2/19/2013 9:17:00 AM
Add a Comment
3. Get Some Humor Here!

Humor is the affectionate communication of insight.
Leo Rosten


My grandson, Ricky, was going to the Senior Ball, and this was photo opportunity time on the front lawn for two of his grandparents. A neighbor yelled, "Get away from the garage sale sign!"


Then I yelled, "No, stay there!" And he did. Ricky and I both had the same insight at that moment. This would make a rather silly photo. I didn't ask him to lean on the sign, which made it an even better photo. Who would ever wear a tuxedo to a garage sale? Shop for bargains in a tux?   

Humor is the instinct for taking pain playfully.
Max Eastman


Ricky has gone through a lot of medical procedures in his life, but he has a rich sense of humor. I think that is partly due to all of the pain that he has experienced.   

If you could choose one characteristic that would get you through life, choose a sense of humor.
Jennifer Jones


0 Comments on Get Some Humor Here! as of 1/1/1900
Add a Comment
4. Friday Procrastination: Link Love

Happy Friday to all.  It finally feels like fall outside, the election is almost here, Halloween is a week away and despite all this- we are all at work.  So it goes.  Take some pleasure in the links below, in the fact that it is Friday and in the changing colors of the leaves outside.  Have a great weekend!

In Defense of Piracy

Mock campaign ads from familiar directors.

Substance over style? Maureen Dowd’s other approach.

Flikr photos by color.  I played with this for over an hour!

Inappropriate book cover swap.

The Muppets go noir.

Explore the Dubai boom.

My favorite building in NYC.

What is your hue IQ?

The vanishing night.

ShareThis

0 Comments on Friday Procrastination: Link Love as of 10/24/2008 8:38:00 PM
Add a Comment