The context for this book lies in the trust relationships that American military professions must retain with the society they serve if they are to remain professions. Of course, the alternative without such trust is for the Services simply to revert to the character and behavior of a government occupation, a big bureaucracy like the Internal Revenue Service or the Department of Agriculture. But to remain professions, one of the constant challenges the Stewards of the Professions must address is "how different and how separate" they are to be from the society they serve. Stated differently,...
The context for this book lies in the trust relationships that American military professions must retain with the society they serve if they are to re...
U. S. Army War College Press Strategic Studies Institute
Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known publicly to have occurred. The discovery of the Stuxnet malware in July 2010, and its analysis over the next several months, was widely believed to have been a landmark event in cybersecurity, because it showed that cyberattacks against industrial control systems, hypothesized for a long time, are actually possible. After Stuxnet, there were public...
Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carryi...