Abstract
Many nations are engaged in a global Total War between two macro-ideals of the liberal world order (freedom, liberty) and authoritarian order. A key vision of each side is to establish and sustain their ideals. A key objective is to establish and sustain the greatest influence in a multipolar global power system. A key tactic is information dominance. A key target is the social contract to engage and bring about an effect on an entire population. A key medium through which to sustain information dominance and attack targets is cyberspace. Cyberspace and cybersecurity interweave into the social fabric, including civil liberties (opting out of the digital world), privacy (the right to be unobserved and the right to be forgotten), automated resolution of moral dilemmas (autonomous vehicle choosing who to hit), financial security (wealth representation being bits on a hard drive), socio-political deception (detecting fake news on which we base life decisions), and physical safety (loss of life and property from adverse cyber-physical events). As we look to the future of cybersecurity, we have hard choices that affect the way we live (Willett in INCOSE Int Symp [25]). This chapter provides Total War as one context to understand the critical nature of cybersecurity and consider a cybersecurity grand strategy and innovation for the defense of global freedom and personal liberty.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Derived from the US Navy definition of information dominance.
- 2.
Identity Politics (Stanford Encyclopedia of Philosophy), last accessed 19-Mar-2021.
- 3.
Open Future—Can liberal democracies survive identity politics?|Open Future|The Economist, Francis Fukuyama, last accessed 19-Mar-2021.
- 4.
What is gaslighting? Examples and how to respond (medicalnewstoday.com), last accessed 29-Mar-2021.
- 5.
Lies, Gaslighting and Propaganda by G. Alex Sinha: SSRN, last accessed 29-Mar-2021.
- 6.
ISO Strategy 2030,
- 7.
Ibid.
References
Alvarez RM (2016) Computational social science: discovery and prediction. Anal Methods Soc Res
Adler MJ (1987) We hold these truths: understanding the ideas and ideals of the constitution. Macmillan, New York
Busemeyer J, Bruza P (2014) Quantum models of cognition and decision
Copley Gregory R (2020) The new total war of the 21st century and the trigger of the fear pandemic. The International Strategic Studies Association
Dove R, Willett KD (2020) Techno-social contracts for security orchestration in the future of systems engineering. INCOSE Int Symp
Durant WA (1968) The lessons of history. Simon and Shuster, New York
Farrell H, Newman AL (2019) Weaponizing Interdependence: how global economic networks shape state coercion. Int Secur 44(1)
Fears R The wisdom of history. The Great Courses
Fukuyama F (2011) The origins of political order: from prehuman times to the french revolution (Book 1). Profile Books, London
Fukuyama F (2014) Political order and political decay: from the industrial revolution to the globalization of democracy (Book 2). Farrar, Straus and Giroux, New York
Fukuyama F (2018) Identity—the demand for dignity and the politics of resentment. Profile Books, London
Liang Q, Wang X (1999) Unrestricted warfare: China's master plan to destroy America
Luman RR (2008) Unrestricted warfare symposium. Johns Hopkins University Applied Physics Lab
McLeod J, Lively KJ (2006) Social structure and personality
NATO (2005) Media (Dis)information—Security. Defence Education Enhancement Programe (DEEP). https://www.nato.int/nato_static_fl2014/assets/pdf/2020/5/pdf/2005-deepportal4-information-warfare.pdf. Accessed 20 Oct 2021
Olenski S (2018) 7 Ways to up your chances of going viral on social media. Forbes
Pillsbury M (2016) The hundred-year marathon: China's secret strategy to replace America as the global superpower
Ricks TE (2020) First principles: what America’s founders learned from the Greeks and Romans and how that shaped our country. Harper Audio, New York
Sawyer RD (1996) One hundred unorthodox strategies. Westview Press
Sawyer RD (1993) The seven military classics of ancient China
Shiller RJ (2019) Narrative economics—how stories go viral & drive major economic events. Princeton University Press
Steil B (2018) The marshall plan: dawn of the cold war. The Oxford University Press
Thomas TL (2009) The dragon’s quantum leap. Foreign Military Studies Office
Thomas TL (2004) Chinese information war theory and practice. Foreign Military Studies Office
Willett KD (2020) Toward architecting the future of systems security. INCOSE Int Symp
Willett KD (2020) Systems engineering the conditions of the possibility. INCOSE INSIGHT, 23(4)
Yukalov VI, Sornette D (2008) Quantum decision theory as quantum theory of measurement
Yukalov VI, Sornette D (2012) Quantum decision-making by social agents
Yukalov VI, Yukalova EP, Sornette D (2013) Utility rate equations of group population dynamics in biological and social systems
Yukalov VI, Sornette D (2014) Manipulating decision-making of typical agents
Yukalov VI, Yukalova EP, Sornette D (2018) Information processing by networks of quantum decision makers
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Willett, K.D. (2022). Total War. In: Adlakha-Hutcheon, G., Masys, A. (eds) Disruption, Ideation and Innovation for Defence and Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-06636-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-06636-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06635-1
Online ISBN: 978-3-031-06636-8
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)