Skip to main content
  • 344 Accesses

Abstract

Many nations are engaged in a global Total War between two macro-ideals of the liberal world order (freedom, liberty) and authoritarian order. A key vision of each side is to establish and sustain their ideals. A key objective is to establish and sustain the greatest influence in a multipolar global power system. A key tactic is information dominance. A key target is the social contract to engage and bring about an effect on an entire population. A key medium through which to sustain information dominance and attack targets is cyberspace. Cyberspace and cybersecurity interweave into the social fabric, including civil liberties (opting out of the digital world), privacy (the right to be unobserved and the right to be forgotten), automated resolution of moral dilemmas (autonomous vehicle choosing who to hit), financial security (wealth representation being bits on a hard drive), socio-political deception (detecting fake news on which we base life decisions), and physical safety (loss of life and property from adverse cyber-physical events). As we look to the future of cybersecurity, we have hard choices that affect the way we live (Willett in INCOSE Int Symp [25]). This chapter provides Total War as one context to understand the critical nature of cybersecurity and consider a cybersecurity grand strategy and innovation for the defense of global freedom and personal liberty.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Derived from the US Navy definition of information dominance.

  2. 2.

    Identity Politics (Stanford Encyclopedia of Philosophy), last accessed 19-Mar-2021.

  3. 3.

    Open Future—Can liberal democracies survive identity politics?|Open Future|The Economist, Francis Fukuyama, last accessed 19-Mar-2021.

  4. 4.

    What is gaslighting? Examples and how to respond (medicalnewstoday.com), last accessed 29-Mar-2021.

  5. 5.

    Lies, Gaslighting and Propaganda by G. Alex Sinha: SSRN, last accessed 29-Mar-2021.

  6. 6.

    ISO Strategy 2030,

  7. 7.

    Ibid.

References

  1. Alvarez RM (2016) Computational social science: discovery and prediction. Anal Methods Soc Res

    Google Scholar 

  2. Adler MJ (1987) We hold these truths: understanding the ideas and ideals of the constitution. Macmillan, New York

    Google Scholar 

  3. Busemeyer J, Bruza P (2014) Quantum models of cognition and decision

    Google Scholar 

  4. Copley Gregory R (2020) The new total war of the 21st century and the trigger of the fear pandemic. The International Strategic Studies Association

    Google Scholar 

  5. Dove R, Willett KD (2020) Techno-social contracts for security orchestration in the future of systems engineering. INCOSE Int Symp

    Google Scholar 

  6. Durant WA (1968) The lessons of history. Simon and Shuster, New York

    Google Scholar 

  7. Farrell H, Newman AL (2019) Weaponizing Interdependence: how global economic networks shape state coercion. Int Secur 44(1)

    Google Scholar 

  8. Fears R The wisdom of history. The Great Courses

    Google Scholar 

  9. Fukuyama F (2011) The origins of political order: from prehuman times to the french revolution (Book 1). Profile Books, London

    Google Scholar 

  10. Fukuyama F (2014) Political order and political decay: from the industrial revolution to the globalization of democracy (Book 2). Farrar, Straus and Giroux, New York

    Google Scholar 

  11. Fukuyama F (2018) Identity—the demand for dignity and the politics of resentment. Profile Books, London

    Google Scholar 

  12. Liang Q, Wang X (1999) Unrestricted warfare: China's master plan to destroy America

    Google Scholar 

  13. Luman RR (2008) Unrestricted warfare symposium. Johns Hopkins University Applied Physics Lab

    Google Scholar 

  14. McLeod J, Lively KJ (2006) Social structure and personality

    Google Scholar 

  15. NATO (2005) Media (Dis)information—Security. Defence Education Enhancement Programe (DEEP). https://www.nato.int/nato_static_fl2014/assets/pdf/2020/5/pdf/2005-deepportal4-information-warfare.pdf. Accessed 20 Oct 2021

  16. Olenski S (2018) 7 Ways to up your chances of going viral on social media. Forbes

    Google Scholar 

  17. Pillsbury M (2016) The hundred-year marathon: China's secret strategy to replace America as the global superpower

    Google Scholar 

  18. Ricks TE (2020) First principles: what America’s founders learned from the Greeks and Romans and how that shaped our country. Harper Audio, New York

    Google Scholar 

  19. Sawyer RD (1996) One hundred unorthodox strategies. Westview Press

    Google Scholar 

  20. Sawyer RD (1993) The seven military classics of ancient China

    Google Scholar 

  21. Shiller RJ (2019) Narrative economics—how stories go viral & drive major economic events. Princeton University Press

    Google Scholar 

  22. Steil B (2018) The marshall plan: dawn of the cold war. The Oxford University Press

    Google Scholar 

  23. Thomas TL (2009) The dragon’s quantum leap. Foreign Military Studies Office

    Google Scholar 

  24. Thomas TL (2004) Chinese information war theory and practice. Foreign Military Studies Office

    Google Scholar 

  25. Willett KD (2020) Toward architecting the future of systems security. INCOSE Int Symp

    Google Scholar 

  26. Willett KD (2020) Systems engineering the conditions of the possibility. INCOSE INSIGHT, 23(4)

    Google Scholar 

  27. Yukalov VI, Sornette D (2008) Quantum decision theory as quantum theory of measurement

    Google Scholar 

  28. Yukalov VI, Sornette D (2012) Quantum decision-making by social agents

    Google Scholar 

  29. Yukalov VI, Yukalova EP, Sornette D (2013) Utility rate equations of group population dynamics in biological and social systems

    Google Scholar 

  30. Yukalov VI, Sornette D (2014) Manipulating decision-making of typical agents

    Google Scholar 

  31. Yukalov VI, Yukalova EP, Sornette D (2018) Information processing by networks of quantum decision makers

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keith D. Willett .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Willett, K.D. (2022). Total War. In: Adlakha-Hutcheon, G., Masys, A. (eds) Disruption, Ideation and Innovation for Defence and Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-06636-8_6

Download citation

Publish with us

Policies and ethics