INSTITUTE FOR THE ADVANCED STUDY OF INFORMATION WARFARE

(IASIW)

[Institute for 
the Advanced Study of Information Warfare]

Information warfare, also known as I-War, IW, C4I, or Cyberwar, has recently become of increasing importance to the military, the intelligence community, and the business world. The purpose of the IASIW is to facilitate an understanding of information warfare with reference to both military and civilian life.

BAR

"Communications without intelligence is noise; intelligence
without communications is irrelevant."

Gen. Alfred. M. Gray, USMC

". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence.
Subjugating the enemy's army without fighting is the true pinnacle of excellence."

Sun Tzu, The Art of War

This page will help you increase your understanding of information warfare. For those unfamiliar with the term, "Information Warfare" the following definition may be helpful:

Information warfare is the offensive and defensive use of information
and information systems to deny, exploit, corrupt, or destroy, an
adversary's information, information-based processes, information
systems, and computer-based networks while protecting one's own.
Such actions are designed to achieve advantages over military or
business adversaries.

Dr. Ivan Goldberg


Glossary of information warfare terms.
2600:The Hacker Quarterly

Abstracts of articles on protecting computer networks.

ACLU to spy on Echelon (Oakes).

Advanced Technology Demonstration Network (ADTnet)

Air Force Computer Emergency Response Team (AFCERT).

Air Force Information Warfare Center

Alerts from the NIPC.

Anonymous communication on the Internet.

Army Counterintelligence Online.

Army dumps Microsoft, adopts Apple to avoid hackers. (Glave).

Australian Computer Emergency Response Team (AUSCERT).

Back Orifice: A security alert advisory.

Banks appease online terrorists. (Shelton)

The battlefield of the future: 21st century warfare issues.

Bibliography of readings on IW. (Shope)

Another bibliography on IW. (Sanz)

Still another useful bibliography.

Big brother covets the Internet. (Brandt)

Big brother in cyberspace.

Books on Computer Crime.

Books on Computer Security.

Books on Computer Viruses.

Books on hacking.

Books on Information Warfare.

Books on Internet Security.

Books on TCP/IP.

Books on Telecommunication Networks.

British government site devoted to communications-electronics security.

Buffer overflow attacks. (Rothke)

Bugging: Types of technical surveillance devices.

Bulgaria and computer viruses. (Bennahum)

Business and IW.

C2 Bibliography.

How Carnivore works.

Carnivore and your privacy.

Carnivore and the 4th Amendment.

Carnivore FAQ. (Graham)

Carnivore as seen by the FBI.

Carnivore and the A.C.L.U.

About Carnivore.

Still more on Carnivore.

Carvinore can read everything.

Carnivore reviewed by the Justice Department.(McGuire)

CALEA: Communications Assistance for Law Enforcement Act.

CALEA: Communications Assistance for Law Enforcement Act---Text of the act.

Canadian government report on Information Operations.

Canadian government site devoted to information technology security.

Canadian information operations. (Bourque)

Center for Secure Information Systems (CSIS).

China strengthens laws on cybercrime.

A Chinese view of information warfare. (Mengxiong)

Other Chinese views of IW.

CIAC Bulletins.

CIPHER: Electronic newsletter of the technical committee on privacy and security of the IEEE.

Class III information warfare: has it begun? (Schwartau)

Common criteria for information technology security.

Computer attacks utilizing large data packets. (Hannaford)

Computer crime bibliography. (Anderson)

Computer crime categories. (Carter)

Computer crime: The Department of Justice perspective.

Computer crime: An historical survey. (Overill)

Computer crime: An introduction. (Fraser)

Computer crime laws by state.

Computer crime prevention.

Computer crime: How to invstigate. (Wright)

Computer crime and security survey.

Computer crime sentencing guidelines. (King)

Computer crime statistics. (Kabay)

Computer crime: What it costs.

Computer Emergency Response Team (CERT)

Computer espionage. (Defense Investigate Service)

Computer fraud and abuse act (USA).

Computer fraud: The risk to business.

Computer security F.A.Q.s.

Computer security information.

Computer security, law, and privacy.

Computer virus library

Computer virus myths. (Rosenberger)

Computer virus warnings; How to tell the real from the hoaxes. (Ford)

Computer viruses in information warfare. (Cramer & Pratt)

Confidentiality of health-related information.

Considering the Net as an intelligence tool. (Wilson)

Cornerstones of information warfare. (Fogleman & Widnall)

Corporations and cyber-terrorism.

Countering non-lethal information warfare. (Kluepfel)

Countering threats to information technology assets. (Lingerfelt)

Counterintelligence news digest.

Covert Action Quarterly

Criminal threats to business on the Internet. (Anderson)

Critical infrastructure protection. (Presidential Decision Directive)

Cryptographic terms: A glossary.

Cryptography and free speech. (Rosenoer)

Cuba's approach to information management. (Symmes)

Curent computer security concerns.

Cyber-attacks against NATO traced to China. (Brewin)

Cyber-attacks aimed at the USA.

Cybercrime: An example.

Hiding cybercrimes. (Denning & Baugh)

Cybercrime: State and local resources needed to fight it.

Cybercrime seminar. (Brenner)

Cybercrime: Civil libertarian problem with the solutions. (McCullagh)

Cybercrime, transnational crime, and intellectual property theft. (Saxton et al)

Cybercrime: New European commission.

Cyberlaw: Legal issues regarding information warfare.

Cybernation: The American infrastructure in the information age.

The cyber-posture of the national information infrastructure. (Ware)

Cyber responsibilities. (Donahue)

Cyber scare: Overstated computer threats. (Schmidt)

Cyberspace Electronic Security Act (CESA).

Cyberstalking.

Combating Cyber Threats in the New Millennium.

More about CESA.

Cyberterrorism. (Denning)

Cyberterrorism: Case studies.

Cyberterrorism --- Fact or fancy? (Pollitt)

Cyberterrorism in the future. (Collin)

Cyberterrorism: Is it a real threat?

Cyberterrorism: RAND Corporation report.

Cyber-terrorism: The shape of future conflict? (Rathmeil)

Cyber-terrorism: Various aspects. (Wade)

Cyberwar in Asia? (McGuire & Williams)

Cyberwar: How the USA may lose. (Dunlap)

More on Cyberwar: How the USA may lose. (Dunlap)

Cyberwar: US Army prepares offensive techniques. (Messmer)

Cyberwar in the Midle East.

Cyberwar in Serbia. (Brewin)

Cyberwar and netwar: New modes, old concepts, of conflict. (Arquilla & Ronfeldt)

The dangers of concentrating on IW. (DiNardo & Hughes)

Defending against computer attacks. (Libicki)

Defending against cyberterrorism. (Lesser)

Defending against cyberterrorism: A Japanese view. (Miyawaki)

Defending cyberspace and other metaphors. (Libicki)

Defending information networks from attack. (Leopold)

Defending against IW attack. (Kopp)

Defending the USA from cyber attack. (Minihan )

Defense Advanced Research Projects Agency (DARPA) views the future. (Fernandez)

Defense Intelligence Agency (DIA): A brief history.

Defensive information warfare. (Alberts)

More on defensive information warfare. (Kaomea et al.)

Defining civil defense in the information age. (Round & Rudolph)

Denial of service attacks.

Digital search and seizure. (Center for Democracy and Technology)

Denial of service attacks and the UDP port.

Denial of service attacks and IRC.

The digital threat: United States national security and computers. (Devost)

DISA INFOSEC

DoD's automated intrusion detection system. (Frank)

The DoD's reaction to hacking. (Cummings)

DoD's vulnerability to information warfare. (Levin)

Dominant battlespace knowledge. (Johnson & Libicki)

ECHELON and other interception capabilities. (Campbell)

Inside ECHELON.

ECHELON: A global surveillance network. (Verton)

ECHELON: Lots of up-to-date information.

ECHELON: New Zealand's involvement. (Hager)

Economic/industrial espionage. (Venzke)

Economic Espionage Act of 1996.

Economic espionage: An information warfare perspective. (Cramer)

Economic espionage, technology transfers and national security. (Saxton et al.)

The economic impact of IW. (Saarelainen)

Electromagnetic and electronic systems: U.S./ Navy site.

Electromagnetic evesdropping.

Electromagnetic hazards. ()

Electromagnetic radiation and the brain: A bibliography. (Beck & Byrd)

Electromagnetic environmental effects. >BR>

Electromagnetic weapons of mass destruction. (Kopp)

Electronic civil disobedience. (Wray)

An electronic Pearl Harbor? Not likely. (Smith)

More on electronic Pearl Harbor.

Eligible receiver. (Gertz)

More about Eligible receiver.

Email and espionage.

Email security problem

Email: Which free services are secure?

Emission security assessments.

Emission security countermeasures.

EMP/T bombs.

EMP and TEMPEST hardening: U.S. Army document.

Encryption in crime and terrorism. (Denning & Baugh)

Encryption papers available online.

Errors that lead to computer security vulnerabilities.

E-strikes and cyber-sabotage: Civilian hackers go online to fight.

Ethics, law and computer security.

The ethics of information warfare. (Kuehl)

European Union directive on data protection.

The FBI and cycbercrime.

The FBI's domestic counterterrorism program.

The FBI and electronic surveillance.

The FBI and email.

FBI's Congressional testimony on cybercrime.

The FBI's infrastructure protection and computer intrusion squad.

Federal Communications Law Journal.

Federal computer surveillance..

Federal guidelines for searching and seizing computers. (Robbins)

Federal Intrusion Detection Network (FIDNET). (Frank)

FIDNET: Civil liberties concerns.

Fighting computer viruses. (Kephart et al.)

Fighting Internet crime. (Lash)

Financial information networks: Protecting them from intrusion. (Stolfo)

Financial information networks: Vulnerability to hackers. (Winkler)

Firewalls. (Robinson)

Firewalls---For PCs and networks.

Fleeet information warfare center.

Foes with grudge sludge Drudge. (Glave)

Forecasting model for Internet security attacks. (Korzyk & VanDyke)

Forum of Incident Response and Security Teams.

France changes policy regarding cryptography. (Oram)

A French IW site.

A function model of information warfare. (Johnson)

Fundamentals of information warfare---An airman's view. (Foglerman)

The future of information security. (Libicki)

GAO on DoD INFOSEC.

Generally-Accepted System Security Principles. (GASSP)

German government site devoted to information technology security [in Genman].

Global information security. (Libicki)

Governmental (USA) electronic surveillance activity.

The great cyberwar of 2002. (Arquilla)

Guerrilla warfare in cyberspace.

HAARP: Highfrequency Active Auroral Research Project.

Hacked Web pages: An archive.

Hacked Web pages: Another archive.

Hacker's ethics.

Articles on hacking. (Martin)

Hacker News Network.

Hacker sentenced to prison: Press release of the Department of Justice.

Hacker wargames.

Hacker's view of hacking.

Hackers hired as cybercops.

Hackers: How should we respond? (Ludlow)

Hackers penetrate DoD computer systems.

The hacker's mind set. (Rist)

Hackers who break into computer systems (Denning).

Hacking in 2000: Work for DoD.

Hacking as civil disobedience.

Hacking Nasdaq. (Oakes & Kahney).

Hacking: The digital underground.

Hacking the power grid. (Koprowski)

Hacking TCP/IP. (Shimomura)

Hacking U.S. Government Web sites. (Mueller)

Hacking the Web. (McNamara)

Hardwar, softwar wetwar operational objectives of information warfare. (Wilson)

The heads and tails of information. (Baklarz)

Hearing on current and projected national security threats. (Tenet)

HERF (High Energy Radio Frequency) weapons.

HERF: An FAA course.

HERF gun proliferation.

HERF and the Panama Canal.

Higher education and information security. (Reynolds)

Hotmail security problems.

Human intelligence and covert action.

Identity theft. (Hayes)

IE 5 security bug. (Louderback)

Improving the security of your site by breaking into it. (Farmer)

Induced fragility in information age warfare. (Fowler & Peterson)

Industrial espionage: Who's stealing your information. (Denning)

The uses of information. (Rendon)

The information age: Its impact and consequences. (Alberts & Papp)

Information assurance and the information society. (Luiijf)

Information insecurity. (Peters)

Information operations.

Information operations: Applying the principles of war. (Nelson)

Information operations, deterrence, and the use of force. (Barnett)

Information operations in Bosnia: A preliminary assessment. (Allard)

Information operations and information systems. (Tulak & Hutton)

Information peacekeeping. (Steele)

Information risk management.

Information security: Implementing policy. (Wood)

Information Technology Laboratory. (NIST)

Information, technology, and the center of gravity. (Harley)

Information terrorism. (Devost, Houghton and Pollard)

Information war and the Air Force: Wave of the future or current fad? (Buchan)

Information Warfare Battlelab (US Air Force)

Information warfare in 2025. (Stein)

Information warfare: The possibility of disaster. (Carver)

Information warfare and the U.S. Marine Corps. (Yeary)

Information warfare defense. (Defense Science Board)

Information security: Computer attacks on Department of Defense pose increasing risks.

Information systems at the dawn of a new crentury. (Forno)

Information technology and warfare. (Libicki)

Infowar. (Browning)

Information warfare. (Lewis)

Information warfare database.

Information warfare: Defeating the enemy before battle. (Ivefors)

Information warfare and deterrence. (Wheatley & Hayes)

Information Warfare and Defense Preparedness. (Lipicki)

Information warfare: Developing a conceptual framework. (Garigue)

Information warfare with electromagnetic attack.

Information warfare and information security on the Web.

Information warfare is not InfoSec repackaged. (Schwartau)

Information warfare in international law. (Greenberg et al.)

Information warfare: Issues and perspectives. (Miller)

The information warfare mania. (Whitaker)

Information warfare: The perfect terrorist weapon. (Shahar)

Information warfare: Planning the campaign. (Okello et al.)

Information warfare: A philosophical and sociological perspective. (Bey)

Information warfare weapons.

Inforsec: How secure is your network?

From InfoWar to knowledge warfare. (Baumard)

Infrastructure protection. (Schwartau)

Infrastructure protection and threats to civil liberties. (O'Neil & Dempsey)

Infrastructural warfare.

Infrastructural warfare slides. (Wilson)

The uses and misuses of intelligence. (Kober)

Intelligence agencies of the world - - - listed by country.

Intelligence-based threat assessments for information networks and infrastructures. (Anderson)

Intelligence challenges through 2015. (Gannon)

International computer intrusions. (Anderson)

International electronic surveillance by the USA: Civil liberties aspects. (ACLU et al.)

International legal implications of information warfare. (Aldrich)

Internet and cyber-terrorism. (Whine)

Internet firewalls: An FAQ. (Ranum et al.)

Internet security.

Internet security information sources. (U.S. Navy)

Internet as a tool for influencing foreign policy. (Denning)

Internet as an intelligence tool. (Wilson)

INTERNIC security hole.

An introduction to information warfare. (Haeni)

Intrusion detection: An FAQ.

Intrusion detection.

Intrusion detection: New methods. (Cramer et al.)

The IW threat from sub-state groups: An interdisciplinary approach. (Rathmell et al.)

IP spoofing demystified.

More about IP-spoofing.

Joint force superiority in the information age. (Paige)

Joint Military Intelligence College. (JMIC)

Journal of Electronic Defense.

Journal of Intrastructural warfare.

Journal of Internet Security.

Keeping information warfare in perspective. Gompert)

Knowledge strategies: Balancing ends, ways, and means in the information age. (Fast)

KUBARK: How the CIA obtains information.

Legal aspects of cyberspace.

Legal and practical constraints in IW, (Kuschner)

The mesh and the net: Speculations on armed conflict in an era of free silicone. (Libicki)

Microsoft vs. hackers. (Shankland)

Microsoft a threat to National security?(Forno)

Microsoft Office leaks sensitive data. (Oakes)

Microsoft Word documents that "phone home." (Smith)

Military information operations in a conventional warfare environment.

MKULTRA: Another type of information warfare. (Elliston)

MKULTRA: Senate report

Mobilization for a new era. (Wik)

National Counterintelligence Center.

National Cryptologic Museum.

National cryptologic strategy for the 21st century. (NSA)

National Infrastructure Protection Center (NIPC)

Federal photoidentity database. (McCullah)

On the National Reconnaissance Office (NRO).

The NRO declassified.

The National Security Agency (NSA).

The NSA's role in defending the USA from cyber attack. (Minihan )

More information about the NSA.

NSA: Has it gotten too large and powerful?

NSA offers INFOSEC courses.

National security in the information age. (Devost)

NSA and Fourth Amendment Rights.

NSA---Fifteen unclassified documents.

The NSA Handbook.

Navy INFOSEC website.

Network Centric Warfare. (Stein)

More on Network Centric Warfare. (Brewin)

Network Centric Warfare: Seven deadly sins. (Barnett)

Network intrusion. (Shipley)

NT Web technology vulnerabilities.

OASD C3I.

Online privacy: A guide. (Center for Democracy and Technology)

Organizing for information warfare. (Devost)

Pentagon's computers vulnerable to hired hackers. (Myers)

Pentagon cybertroops: The national security apparatus gears up for infowar. (Overbeck)

Pentagon vs. hackers. (Miklaszewski & Windrem)

Piercing firewalls.

Technologies of political control.

Political aspects of class III information warfare: Global conflict and terrorism. (Devost)

The political demographics of cyberspace.

Precautionary disconnects form the Internet. (Rosenberger)

Privacy act of 1974 (As amended).

Protrecting America's infrastructure.(PCCIP)

Psychotronic Weapons: Myth or Reality? (Pavlychev)

Psychological warfare documents.

Radio frequency weapons: Congressional testimony.

Radio frequency weapons. (Schweitzer)

More about radio frequency weapons. (Schweitzer)

Reducing cyber-threats. (Revah)

Reflections on the 1997 Commission on Critical Infrastructure Protection (PCCIP) Report. (Staten)

Remote viewing: The CIA's involvement with a weird version of IW. (Elliston)

Report a computer intrusion or computer crime to the FBI.

A revolution in military affairs (RMA).

More on RMA.

Risk assessment of the electric power industry.

Risk management.

School for Information Warfare and Strategy (IWS).

Security analyzer: Download one to check the security of your system.

Security breaches: Examples from the media.

SIGINT and the Cuban missile crisis. (NSA)

The silicone spear: As assessment of information based warfare. (Everett et al.)

Simulating cyber attacks, defenses, and consequences.

Social activism on the Internet. (Electrohippies)

SPAWAR: Space and Naval Warfare Systems Command.

Strategic information warfare. (Molander)

Strategic war . . . in cyberspace. (Molander et al.)

Search for IW and Computer books.

Searches and the Internet: A Canadian perspective. (Hourihan)

Securing US defense information infrastructure.

Surveillance technology and risk of abuse of economic information.

A Swedish perspective on IW.

TCP/IP security

TCP SYN Flooding and IP Spoofing Attacks

The technologies of political and economic control. (STOA)

Telecommunications Act of 1996.

Telecommunications Act of 1996: Impact on schools and libraries.

TCP/IP vulnerabilities.

TEMPEST: Lots of useful information about TEMPEST. (McNamara)

TEMPEST countermeasures.

TEMPEST monitoring.

TEMPEST in the Navy.

TEMPEST: The physics on which it is based.

Terrorists and cyberspace. (Whine)

Countering the new terrorism. (RAND)

Terrorism by email.(Szucs) >BR>

Postmodern terrorism. (Laqueur)

Terrorism on the Net.

Terrorism and information warfare. (Wilson)

Terrorism at the touch of a keyboard. (Pasternak & Auster)

The third wave; What the Tofflers never told you. (Czerwinski)

Threat assessments for information networks. (Anderson)

Tools to increase computer security.

Trojan horse attempts to gather information on Web sites. (Dugan)

Trojans removal database.

Truth is the first casualty of cyberwar. (Smith)

Types of information warfare. (Libicki)

Understanding information power. (Gortler)

The unintended consequences of information age technologies. (Alberts)

U. S. Army Special Operations and PSYOPS.

U.S. cryptography policy.

The U.S. intelligence community.

U.S. sitting duck, DOD panel predicts. (Brewin & Harreld)

U.S. statutes regarding computer crime.

Uses and misuses of intelligence. (Kober)

USS Liberty.

The VENONA project.

Virus creation labs.

Vulnerabilities of the national information infrastructure. (Miller)

More on the vulnerability of the National information infrastructure. (Ware)

Still more on vulnerabilities. (Forno)

Waging IWar. (Wilson)

Wars of the near future. (Sundarji)

Web sites related to terrorism.

What hackers know about you.

What is information warfare? (Libicki)

Whitehouse report on online privacy and security. (Cohen, Reno, Lew Daley)

Windows NT Trojan horse. (Clark)

Windows security problem. (Wilcox)

Wiretapping in the USA.

WWW Security FAQ. (Stein)

Y2K hysteria: A dramatic example. (North)

Y2K violence.

Y2K and the possibility of a cyber-attack.

Receive email when this page changes

Powered by NetMind
 
Click Here


Sign the Guestbook
Guestbook by GuestWorld
View the Guestbook


PLEASE NOTE: this site is constantly being improved. If you can suggest any Web sites devoted to information warfare, please let us hear from you, so we can add links to those sites.

Please email us Please take a moment and email us your reactions to this site and any suggestions you may have as to how we can make it more useful to you.

Please visit us again soon!

Created by Dr. Ivan Goldberg Psydoc@PsyCom.Net

Last revised: 13 January 2001

There have been visitors to this page since 1 January 1996.

Disclaimer:

This web site is provided as a public service to increase public and professional access to timely, accurate and comprehensive information about information warfare and information security issues. Considerable effort has been taken to ensure the accuracy of the information contained in this site. However, no assurance is given that the information supplied is accurate or complete. Links are to external resources on the World Wide Web and herefore, there is no control of the content of such information and no legal responsibility or liability for any aspect of such information is accepted or implied.