Abstracts of articles on protecting computer networks.
ACLU to spy on Echelon (Oakes).
Advanced Technology Demonstration Network (ADTnet)
Air Force Computer Emergency Response Team (AFCERT).
Air Force Information Warfare Center
Anonymous communication on the Internet.
Army Counterintelligence Online.
Army dumps Microsoft, adopts Apple to avoid hackers. (Glave).
Australian Computer Emergency Response Team (AUSCERT).
Back Orifice: A security alert advisory.
Banks appease online terrorists. (Shelton)
The battlefield of the future: 21st century warfare issues.
Bibliography of readings on IW. (Shope)
Another bibliography on IW. (Sanz)
Still another useful bibliography.
Big brother covets the Internet. (Brandt)
Books on Telecommunication Networks.
British government site devoted to communications-electronics security.
Buffer overflow attacks. (Rothke)
Bugging: Types of technical surveillance devices.
Bulgaria and computer viruses. (Bennahum)
Carnivore and the 4th Amendment.
Carvinore can read everything.
Carnivore reviewed by the Justice Department.(McGuire)
CALEA: Communications Assistance for Law Enforcement Act.
CALEA: Communications Assistance for Law Enforcement Act---Text of the act.
Canadian government report on Information Operations.
Canadian government site devoted to information technology security.
Canadian information operations. (Bourque)
Center for Secure Information Systems (CSIS).
China strengthens laws on cybercrime.
A Chinese view of information warfare. (Mengxiong)
CIPHER: Electronic newsletter of the technical committee on privacy and security of the IEEE.
Class III information warfare: has it begun? (Schwartau)
Common criteria for information technology security.
Computer attacks utilizing large data packets. (Hannaford)
Computer crime bibliography. (Anderson)
Computer crime categories. (Carter)
Computer crime: The Department of Justice perspective.
Computer crime: An historical survey. (Overill)
Computer crime: An introduction. (Fraser)
Computer crime: How to invstigate. (Wright)
Computer crime and security survey.
Computer crime sentencing guidelines. (King)
Computer crime statistics. (Kabay)
Computer crime: What it costs.
Computer Emergency Response Team (CERT)
Computer espionage. (Defense Investigate Service)
Computer fraud and abuse act (USA).
Computer fraud: The risk to business.
Computer security information.
Computer security, law, and privacy.
Computer virus myths. (Rosenberger)
Computer virus warnings; How to tell the real from the hoaxes. (Ford)
Computer viruses in information warfare. (Cramer & Pratt)
Confidentiality of health-related information.
Considering the Net as an intelligence tool. (Wilson)
Cornerstones of information warfare. (Fogleman & Widnall)
Corporations and cyber-terrorism.
Countering non-lethal information warfare. (Kluepfel)
Countering threats to information technology assets. (Lingerfelt)
Counterintelligence news digest.
Criminal threats to business on the Internet. (Anderson)
Critical infrastructure protection. (Presidential Decision Directive)
Cryptographic terms: A glossary.
Cryptography and free speech. (Rosenoer)
Cuba's approach to information management. (Symmes)
Curent computer security concerns.
Cyber-attacks against NATO traced to China. (Brewin)
Cyber-attacks aimed at the USA.
Hiding cybercrimes. (Denning & Baugh)
Cybercrime: State and local resources needed to fight it.
Cybercrime: Civil libertarian problem with the solutions. (McCullagh)
Cybercrime, transnational crime, and intellectual property theft. (Saxton et al)
Cybercrime: New European commission.
Cyberlaw: Legal issues regarding information warfare.
Cybernation: The American infrastructure in the information age.
The cyber-posture of the national information infrastructure. (Ware)
Cyber responsibilities. (Donahue)
Cyber scare: Overstated computer threats. (Schmidt)
Cyberspace Electronic Security Act (CESA).
Combating Cyber Threats in the New Millennium.
Cyberterrorism --- Fact or fancy? (Pollitt)
Cyberterrorism in the future. (Collin)
Cyberterrorism: Is it a real threat?
Cyberterrorism: RAND Corporation report.
Cyber-terrorism: The shape of future conflict? (Rathmeil)
Cyber-terrorism: Various aspects. (Wade)
Cyberwar in Asia? (McGuire & Williams)
Cyberwar: How the USA may lose. (Dunlap)
More on Cyberwar: How the USA may lose. (Dunlap)
Cyberwar: US Army prepares offensive techniques. (Messmer)
Cyberwar and netwar: New modes, old concepts, of conflict. (Arquilla & Ronfeldt)
The dangers of concentrating on IW. (DiNardo & Hughes)
Defending against computer attacks. (Libicki)
Defending against cyberterrorism. (Lesser)
Defending against cyberterrorism: A Japanese view. (Miyawaki)
Defending cyberspace and other metaphors. (Libicki)
Defending information networks from attack. (Leopold)
Defending against IW attack. (Kopp)
Defending the USA from cyber attack. (Minihan )
Defense Advanced Research Projects Agency (DARPA) views the future. (Fernandez)
Defense Intelligence Agency (DIA): A brief history.
Defensive information warfare. (Alberts)
More on defensive information warfare. (Kaomea et al.)
Defining civil defense in the information age. (Round & Rudolph)
Digital search and seizure. (Center for Democracy and Technology)
Denial of service attacks and the UDP port.
Denial of service attacks and IRC.
The digital threat: United States national security and computers. (Devost)
DoD's automated intrusion detection system. (Frank)
The DoD's reaction to hacking. (Cummings)
DoD's vulnerability to information warfare. (Levin)
Dominant battlespace knowledge. (Johnson & Libicki)
ECHELON and other interception capabilities. (Campbell)
ECHELON: A global surveillance network. (Verton)
ECHELON: Lots of up-to-date information.
ECHELON: New Zealand's involvement. (Hager)
Economic/industrial espionage. (Venzke)
Economic Espionage Act of 1996.
Economic espionage: An information warfare perspective. (Cramer)
Economic espionage, technology transfers and national security. (Saxton et al.)
The economic impact of IW. (Saarelainen)
Electromagnetic and electronic systems: U.S./ Navy site.
Electromagnetic radiation and the brain: A bibliography. (Beck & Byrd)
Electromagnetic environmental effects. >BR>
Electromagnetic weapons of mass destruction. (Kopp)
Electronic civil disobedience. (Wray)
An electronic Pearl Harbor? Not likely. (Smith)
More on electronic Pearl Harbor.
Email: Which free services are secure?
Emission security assessments.
Emission security countermeasures.
EMP and TEMPEST hardening: U.S. Army document.
Encryption in crime and terrorism. (Denning & Baugh)
Encryption papers available online.
Errors that lead to computer security vulnerabilities.
E-strikes and cyber-sabotage: Civilian hackers go online to fight.
Ethics, law and computer security.
The ethics of information warfare. (Kuehl)
European Union directive on data protection.
The FBI's domestic counterterrorism program.
The FBI and electronic surveillance.
FBI's Congressional testimony on cybercrime.
The FBI's infrastructure protection and computer intrusion squad.
Federal Communications Law Journal.
Federal computer surveillance..
Federal guidelines for searching and seizing computers. (Robbins)
Federal Intrusion Detection Network (FIDNET). (Frank)
FIDNET: Civil liberties concerns.
Fighting computer viruses. (Kephart et al.)
Fighting Internet crime. (Lash)
Financial information networks: Protecting them from intrusion. (Stolfo)
Financial information networks: Vulnerability to hackers. (Winkler)
Firewalls---For PCs and networks.
Fleeet information warfare center.
Foes with grudge sludge Drudge. (Glave)
Forecasting model for Internet security attacks. (Korzyk & VanDyke)
Forum of Incident Response and Security Teams.
France changes policy regarding cryptography. (Oram)
A function model of information warfare. (Johnson)
Fundamentals of information warfare---An airman's view. (Foglerman)
The future of information security. (Libicki)
Generally-Accepted System Security Principles. (GASSP)
German government site devoted to information technology security [in Genman].
Global information security. (Libicki)
Governmental (USA) electronic surveillance activity.
The great cyberwar of 2002. (Arquilla)
Guerrilla warfare in cyberspace.
HAARP: Highfrequency Active Auroral Research Project.
Hacked Web pages: Another archive.
Hacker sentenced to prison: Press release of the Department of Justice.
Hackers: How should we respond? (Ludlow)
Hackers penetrate DoD computer systems.
Hackers who break into computer systems (Denning).
Hacking in 2000: Work for DoD.
Hacking as civil disobedience.
Hacking Nasdaq. (Oakes & Kahney).
Hacking: The digital underground.
Hacking the power grid. (Koprowski)
Hacking U.S. Government Web sites. (Mueller)
Hardwar, softwar wetwar operational objectives of information warfare. (Wilson)
The heads and tails of information. (Baklarz)
Hearing on current and projected national security threats. (Tenet)
HERF (High Energy Radio Frequency) weapons.
Higher education and information security. (Reynolds)
Human intelligence and covert action.
IE 5 security bug. (Louderback)
Improving the security of your site by breaking into it. (Farmer)
Induced fragility in information age warfare. (Fowler & Peterson)
Industrial espionage: Who's stealing your information. (Denning)
The uses of information. (Rendon)
The information age: Its impact and consequences. (Alberts & Papp)
Information assurance and the information society. (Luiijf)
Information insecurity. (Peters)
Information operations: Applying the principles of war. (Nelson)
Information operations, deterrence, and the use of force. (Barnett)
Information operations in Bosnia: A preliminary assessment. (Allard)
Information operations and information systems. (Tulak & Hutton)
Information peacekeeping. (Steele)
Information security: Implementing policy. (Wood)
Information Technology Laboratory. (NIST)
Information, technology, and the center of gravity. (Harley)
Information terrorism. (Devost, Houghton and Pollard)
Information war and the Air Force: Wave of the future or current fad? (Buchan)
Information Warfare Battlelab (US Air Force)
Information warfare in 2025. (Stein)
Information warfare: The possibility of disaster. (Carver)
Information warfare and the U.S. Marine Corps. (Yeary)
Information warfare defense. (Defense Science Board)
Information security: Computer attacks on Department of Defense pose increasing risks.
Information systems at the dawn of a new crentury. (Forno)
Information technology and warfare. (Libicki)
Information warfare: Defeating the enemy before battle. (Ivefors)
Information warfare and deterrence. (Wheatley & Hayes)
Information Warfare and Defense Preparedness. (Lipicki)
Information warfare: Developing a conceptual framework. (Garigue)
Information warfare with electromagnetic attack.
Information warfare and information security on the Web.
Information warfare is not InfoSec repackaged. (Schwartau)
Information warfare in international law. (Greenberg et al.)
Information warfare: Issues and perspectives. (Miller)
The information warfare mania. (Whitaker)
Information warfare: The perfect terrorist weapon. (Shahar)
Information warfare: Planning the campaign. (Okello et al.)
Information warfare: A philosophical and sociological perspective. (Bey)
Inforsec: How secure is your network?
From InfoWar to knowledge warfare. (Baumard)
Infrastructure protection. (Schwartau)
Infrastructure protection and threats to civil liberties. (O'Neil & Dempsey)
Infrastructural warfare slides. (Wilson)
The uses and misuses of intelligence. (Kober)
Intelligence agencies of the world - - - listed by country.
Intelligence-based threat assessments for information networks and infrastructures. (Anderson)
Intelligence challenges through 2015. (Gannon)
International computer intrusions. (Anderson)
International electronic surveillance by the USA: Civil liberties aspects. (ACLU et al.)
International legal implications of information warfare. (Aldrich)
Internet and cyber-terrorism. (Whine)
Internet firewalls: An FAQ. (Ranum et al.)
Internet security information sources. (U.S. Navy)
Internet as a tool for influencing foreign policy. (Denning)
Internet as an intelligence tool. (Wilson)
An introduction to information warfare. (Haeni)
Intrusion detection: New methods. (Cramer et al.)
The IW threat from sub-state groups: An interdisciplinary approach. (Rathmell et al.)
Joint force superiority in the information age. (Paige)
Joint Military Intelligence College. (JMIC)
Journal of Electronic Defense.
Journal of Intrastructural warfare.
Keeping information warfare in perspective. Gompert)
Knowledge strategies: Balancing ends, ways, and means in the information age. (Fast)
KUBARK: How the CIA obtains information.
Legal and practical constraints in IW, (Kuschner)
The mesh and the net: Speculations on armed conflict in an era of free silicone. (Libicki)
Microsoft vs. hackers. (Shankland)
Microsoft a threat to National security?(Forno)
Microsoft Office leaks sensitive data. (Oakes)
Microsoft Word documents that "phone home." (Smith)
Military information operations in a conventional warfare environment.
MKULTRA: Another type of information warfare. (Elliston)
Mobilization for a new era. (Wik)
National Counterintelligence Center.
National cryptologic strategy for the 21st century. (NSA)
National Infrastructure Protection Center (NIPC)
Federal photoidentity database. (McCullah)
On the National Reconnaissance Office (NRO).
The National Security Agency (NSA).
The NSA's role in defending the USA from cyber attack. (Minihan )
More information about the NSA.
NSA: Has it gotten too large and powerful?
National security in the information age. (Devost)
NSA and Fourth Amendment Rights.
NSA---Fifteen unclassified documents.
Network Centric Warfare. (Stein)
More on Network Centric Warfare. (Brewin)
Network Centric Warfare: Seven deadly sins. (Barnett)
NT Web technology vulnerabilities.
Online privacy: A guide. (Center for Democracy and Technology)
Organizing for information warfare. (Devost)
Pentagon's computers vulnerable to hired hackers. (Myers)
Pentagon cybertroops: The national security apparatus gears up for infowar. (Overbeck)
Pentagon vs. hackers. (Miklaszewski & Windrem)
Technologies of political control.
Political aspects of class III information warfare: Global conflict and terrorism. (Devost)
The political demographics of cyberspace.
Precautionary disconnects form the Internet. (Rosenberger)
Privacy act of 1974 (As amended).
Protrecting America's infrastructure.(PCCIP)
Psychotronic Weapons: Myth or Reality? (Pavlychev)
Psychological warfare documents.
Radio frequency weapons: Congressional testimony.
Radio frequency weapons. (Schweitzer)
More about radio frequency weapons. (Schweitzer)
Reducing cyber-threats. (Revah)
Reflections on the 1997 Commission on Critical Infrastructure Protection (PCCIP) Report. (Staten)
Remote viewing: The CIA's involvement with a weird version of IW. (Elliston)
Report a computer intrusion or computer crime to the FBI.
A revolution in military affairs (RMA).
Risk assessment of the electric power industry.
School for Information Warfare and Strategy (IWS).
Security analyzer: Download one to check the security of your system.
Security breaches: Examples from the media.
SIGINT and the Cuban missile crisis. (NSA)
The silicone spear: As assessment of information based warfare. (Everett et al.)
Simulating cyber attacks, defenses, and consequences.
Social activism on the Internet. (Electrohippies)
SPAWAR: Space and Naval Warfare Systems Command.
Strategic information warfare. (Molander)
Strategic war . . . in cyberspace. (Molander et al.)
Search for IW and Computer books.
Searches and the Internet: A Canadian perspective. (Hourihan)
Securing US defense information infrastructure.
Surveillance technology and risk of abuse of economic information.
TCP SYN Flooding and IP Spoofing Attacks
The technologies of political and economic control. (STOA)
Telecommunications Act of 1996.
Telecommunications Act of 1996: Impact on schools and libraries.
TEMPEST: Lots of useful information about TEMPEST. (McNamara)
TEMPEST: The physics on which it is based.
Terrorists and cyberspace. (Whine)
Countering the new terrorism. (RAND)
Terrorism by email.(Szucs)
>BR>
Postmodern terrorism. (Laqueur)
Terrorism and information warfare. (Wilson)
Terrorism at the touch of a keyboard. (Pasternak & Auster)
The third wave; What the Tofflers never told you. (Czerwinski)
Threat assessments for information networks. (Anderson)
Tools to increase computer security.
Trojan horse attempts to gather information on Web sites. (Dugan)
Truth is the first casualty of cyberwar. (Smith)
Types of information warfare. (Libicki)
Understanding information power. (Gortler)
The unintended consequences of information age technologies. (Alberts)
U. S. Army Special Operations and PSYOPS.
The U.S. intelligence community.
U.S. sitting duck, DOD panel predicts. (Brewin & Harreld)
U.S. statutes regarding computer crime.
Uses and misuses of intelligence. (Kober)
Vulnerabilities of the national information infrastructure. (Miller)
More on the vulnerability of the National information infrastructure. (Ware)
Still more on vulnerabilities. (Forno)
Wars of the near future. (Sundarji)
Web sites related to terrorism.
What is information warfare? (Libicki)
Whitehouse report on online privacy and security. (Cohen, Reno, Lew Daley)
Windows NT Trojan horse. (Clark)
Windows security problem. (Wilcox)
Y2K hysteria: A dramatic example. (North)
Y2K and the possibility of a cyber-attack.
Sign
the Guestbook
View
the Guestbook
PLEASE
NOTE: this site is constantly being improved. If you can
suggest any Web sites
devoted to information warfare, please let us hear from you, so
we can add links to those sites.