As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of Americaas debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iranas efforts to develop into a nuclear power in an area that lacks political stability, and the United States and China could soon find themselves in a global power tug-of-war. Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran explores the shifts in power that have initiated major transformational events around the world. Expert contributors identify the major challenges that now confront America as a result of these transformations. Filled with authoritative insights into how current and emerging situations will impact the United States, the book illustrates the policy problems and limited choices facing America. It also: Describes the information technology and social media tools that were instrumental in the Arab revolution Provides the insights of experts from the Intelligence Community on emerging issues that will soon impact America Illustrates the policy problems involved in addressing the challenges with Iran Explores the rapid growth of Chinaas economic wealth and military power This much-needed reference describes and analyzes the emergence of cyber power and its capabilities for cyber attack, cyber warfare, and cyber defense. It examines the information revolution and social media instruments, such as Facebook, Twitter, and YouTube, in terms of their role and impact on the Arab revolution. It also discusses the fallacy of the decline of the United States as a superpower in terms of its formation and distribution of power resources and its continued formidable military and national security strengths.... version of The U.S. Army/Marine Corps Counterinsurgency Field Manual, with a foreword by General David Petraeus, can be looked up, purchased, and downloaded within 2 minutes.38 Another book, Cyberpower and National Security from the ... These include an Energy Surety Microgrid presentation, 40 and in August 2011, the use of a supercomputer model to ... systems.41 Anyone wanting to attack computers can gather some information about the software used by the target(s)anbsp;...
|Title||:||Power, National Security, and Transformational Global Events|
|Author||:||Thomas A. Johnson|
|Publisher||:||CRC Press - 2012-08-28|