The Next World War

Computers Are the Weapons and the Front Line Is Everywhere

James Adams

Publisher: Simon and Schuster, 1998, 366 pages

ISBN: 0-684-83452-9

Keywords: Information Security

Last modified: Aug. 4, 2021, 2:59 p.m.

It is a silent, invisible, and deadly weapons system. It can paralyze an entire nation without a single soldier being sent to war. We glimpsed its potential on television when surgical strikes on radar sites, electric power plants, and command networks crippled Iraqi forces during the Gulf War. Now, in The Next World War, James Adams shows how a new chapter in military history is being written as the Information Age comes to the battlefield: to bigger and stronger, now add smarter.

As increasingly sophisticated computers and microtechnology have become available, the concept of "conventional" warfare has changed. Technology has already made its way to the front lines: soldiers are now equipped, for example, with new "smart" technologies such as handheld computers that allow them to e-mail their commanders. There are devices that can sense an enemy's presence before the enemy is visible, by detecting body heat or by communication with satellites overhead. Robotic "bugs" can even be sent in swarms to sabotage weapons or subdue enemy soldiers.

But the most significant and important use of information warfare won't be on the battlefield. The most devastating weapons will be those that target an enemy's infrastructure — air-control systems, electrical grids, and communication networks, to name just a few potential targets. "Trojan horse" chips or viruses designed to accept and respond commands from U.S. military intelligence can be installed in computers being sold overseas, making them vulnerable to attack. By hacking into computer systems, the United States could override programmed commands and thus shut down air traffic control systems, and open floodgates and bridges. Misinformation could even be broadcast, for example, by using imaging technology to simulate a television appearance by an enemy nation's leaders. This type of combat puts civilians at more risk than ever, as financial, communication, transportation, and other infrastructure systems become prime military targets. And information warfare puts the United States — a nation increasingly dependent on technology — in a position of both definitive advantage and extreme vulnerability.

In The Next World War, James Adams draws on impressive research as well as his lifetime of reporting on intelligence and military affairs to give us a chilling scenario of how wars will be fought in the new millennium — and how much closer to home they might strike.

    • Introduction
  • Part 1
    • One: War in the Infosphere
    • Two: A Desert Myth
    • Three: The Challenge of the Chip
    • Four: The Gang That Couldn't Shoot Straight
    • Five: Riding the Tiger
    • Six: Trial by Strength
    • Seven: The March of the Revolutionaries
  • Part 2
    • Eight: From Double Tap to Double Click
    • Nine: Fly on the Wall: Weapons and Wasps
    • Ten: Set Tennis Balls to Stun
    • Eleven: The Wrong Hands
    • Twelve: The Back Door's Open
    • Thirteen: Venimus, Vidimus, Dolavimus (We Came, We Saw, We Hacked)
    • Fourteen: Big Ears and Noddies
    • Fifteen: Puzzles and Mysteries
  • Part 3
    • Sixteen: The New Arms Race
    • Seventeen: A Mole in the Oval Office
    • Eighteen: It's the Economy, Stupid
    • Nineteen: Every Picture Tells a Story
    • Twenty: Morality and Megabytes
    • Conclusion

Reviews

The Next World War

Reviewed by Roland Buresund

OK ***** (5 out of 10)

Last modified: May 21, 2007, 3:18 a.m.

An interesting view on information warfare.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required