Information Warfare

2600:The Hacker Quarterly

Abstracts of articles on protecting computer networks.

ACLU to spy on Echelon (Oakes).

Advanced Technology Demonstration Network (ADTnet)

Air Force Computer Emergency Response Team (AFCERT).

Air Force Information Warfare Center

Alerts from the NIPC.

Anonymous communication on the Internet.

Army Counterintelligence Online.

Army dumps Microsoft, adopts Apple to avoid hackers. (Glave).

Back Orifice: A security alert advisory.

Banks appease online terrorists. (Shelton)

The battlefield of the future: 21st century warfare issues.

Bibliography of readings on IW. (Shope)

Another bibliography on IW. (Sanz)

Still another useful bibliography.

Big brother covets the Internet. (Brandt)

Big brother in cyberspace.

Books on Computer Crime.

Books on Computer Security.

Books on Computer Viruses.

Books on hacking.

Books on Information Warfare.

Books on Internet Security.

Books on TCP/IP.

Books on Telecommunication Networks.

British government site devoted to communications-electronics security.

Buffer overflow attacks. (Rothke)

Bugging: Types of technical surveillance devices.

Bulgaria and computer viruses. (Bennahum)

Business and IW. (Alvarez)

C2 Bibliography.

How Carnivore works.

Carnivore and your privacy.

Carnivore and the A.C.L.U.

About Carnivore.

Still more on Carnivore.

Carvinore can read everything.

CALEA: Communications Assistance for Law Enforcement Act.

CALEA: Communications Assistance for Law Enforcement Act---Text of the act.

Canadian government report on Information Operations.

Canadian government site devoted to information technology security.

Canadian information operations. (Bourque)

Center for Secure Information Systems (CSIS).

A Chinese view of information warfare. (Mengxiong)

Another Chinese view of IW.

The CIA and information warfare. (Elliston)

CIAC Bulletins.

CIPHER: Electronic newsletter of the technical committee on privacy and security of the IEEE.

Class III information warfare: has it begun? (Schwartau)

Common criteria for information technology security.

Computer attacks utilizing large data packets. (Hannaford)

Computer crime bibliography. (Anderson)

Computer crime categories. (Carter)

Computer crime: The Department of Justice perspective.

Computer crime: An historical survey. (Overill)

Computer crime: An introduction. (Fraser)

Computer crime laws by state.

Computer crime prevention.

Computer crime sentencing guidelines. (King)

Computer crime statistics. (Kabay)

Computer crime: What it costs.

Computer Emergency Response Team (CERT)

Computer espionage. (Defense Investigate Service)

Computer fraud.

Computer Security Day.

Computer security F.A.Q.s.

Computer security information.

Computer security, law, and privacy.

Computer virus library

Computer virus myths. (Rosenberger)

Computer virus warnings; How to tell the real from the hoaxes. (Ford)

Computer viruses in information warfare. (Cramer & Pratt)

Confidentiality of health-related information.

Congressional testimony by the CIA on information warfare.

Considering the Net as an intelligence tool. (Wilson)

Cornerstones of information warfare. (Fogleman & Widnall)

Corporations and cyber-terrorism.

Countering non-lethal information warfare. (Kluepfel)

Countering threats to information technology assets. (Lingerfelt)

Covert Action Quarterly

Criminal threats to business on the Internet. (Anderson)

Critical infrastructure protection. (Presidential Decision Directive)

Cryptographic terms: A glossary.

Cryptography and free speech. (Rosenoer)

Cuba's approach to information management. (Symmes)

Curent computer security concerns.

Cyber-attacks against NATO traced to China. (Brewin)

Cyber-attacks aimed at the USA.

Cyber crime: An example.

Cybercrime seminar. (Brenner)

Cybercrime, transnational crime, and intellectual property theft. (Saxton et al)

Cybernation: The American infrastructure in the information age.

The cyber-posture of the national information infrastructure. (Ware)

Cyber responsibilities. (Donahue)

Cyber scare: Overstated computer threats. (Schmidt)

Cyberspace Electronic Security Act (CESA).

More about CESA.

Cyberterrorism: Case studies.

Cyberterrorism --- Fact or fancy? (Politt)

Cyberterrorism in the future. (Collin)

Cyberterrorism: Is it a real threat?

Cyberterrorism: RAND Corporation report.

Cyber-terrorism: The shape of future conflict?

Cyber-terrorism: Technology report. (Wade)

Cyberwar in Asia? (McGuire & Williams)

Cyberwar: How the USA may lose. (Dunlap)

Cyberwar in the Midle East.

Cyberwar in Serbia. (Brewin)

Cyberwar and netwar: New modes, old concepts, of conflict. (Arquilla & Ronfeldt)

The dangers of concentrating on IW. (DiNardo & Hughes)

Defending against computer attacks. (Libicki)

Defending against cyberterrorism. (Lesser)

Defending against cyberterrorism: A Japanese view. (Miyawaki)

Defending cyberspace and other metaphors. (Libicki)

Defending information networks from attack. (Leopold)

Defending against IW attack. (Kopp)

Defending the USA from cyber attack. (Minihan )

Defense Advanced Research Projects Agency (DARPA) views the future. (Fernandez)

Defense Intelligence Agency (DIA): A brief history.

Defensive information warfare. (Alberts)

Defining civil defense in the information age. (Round & Rudolph)

Denial of service attacks.

Dictonary of computer system vulnerabilities and exposures.

Digital search and seizure. (Center for Democracy and Technology)

Denial of service attacks and the UDP port.

Denial of service attacks and IRC.


The digital threat: United States national security and computers. (Devost)

DISA INFOSEC

DoD's automated intrusion detection system. (Frank)

The DoD's evaluation of cyberwar. (Elliston)

DoD's offensive IW assets. (Brewin & Harreld)

The DoD's reaction to hacking. (Cummings)

DoD's vulnerability to information warfare. (Levin)

Dominant battlespace knowledge. (Johnson & Libicki)

ECHELON and other interception capabilities. (Campbell)

ECHELON: A global surveillance network. (Verton)

ECHELON: Lots of up-to-date information.

ECHELON: New Zealand's involvement. (Hager)

Economic/industrial espionage. (Venzke)

Economic espionage: An information warfare perspective. (Cramer)

Economic espionage, technology transfers and national security. (Saxton et al.)

The economic impact of IW. (Saarelainen)

Electromagnetic and electronic systems: U.S./ Navy site.

Electromagnetic evesdropping.

Electromagnetic hazards. ()

Electromagnetic radiation and the brain: A bibliography. (Beck & Byrd)

Electromagnetic environmental effects. Electromagnetic weapons of mass destruction. (Kopp)


Electronic civil disobedience. (Wray)

An electronic Pearl Harbor? Not likely. (Smith)

More on electronic Pearl Harbor.

Eligible receiver. (Gertz)

More about Eligible receiver.

Email and espionage.

Email security problem

Emission security assessments.

Emission security countermeasures.

EMP/T bombs.

EMP and TEMPEST hardening: U.S. Army document.

Encryption in crime and terrorism. (Denning & Baugh)

Encryption: Why the government cannot control civilian use. (Forno)

Errors that lead to computer security vulnerabilities.

E-strikes and cyber-sabotage: Civilian hackers go online to fight. (Riley)

The ethics of civil defense and information warfare. (Schwartau)

The ethics of information warfare. (Kuehl)

European Union directive on data protection.

The FBI's domestic counterterrorism program.

The FBI and electronic surveillance.

The FBI and email.

The FBI's infrastructure protection and computer intrusion squad.

Federal Communications Law Journal.

Federal computer surveillance..

Federal Intrusion Detection Network (FIDNET). (Frank)

FIDNET: Civil liberties concerns.

Fighting computer viruses. (Kephart et al.)

Fighting Internet crime. (Lash)

Financial information networks: Protecting them from intrusion. (Stolfo)

Financial information networks: Vulnerability to hackers. (Winkler)

Firewalls. (Robinson)

Firewalls---How to select one.

Foes with grudge sludge Drudge. (Glave)

Forecasting model for Internet security attacks. (Korzyk & VanDyke)

France changes policy regarding cryptography. (Oram)

A French IW site.

A function model of information warfare. (Johnson)

Fundamentals of information warfare---An airman's view. (Foglerman)

The future of information security. (Libicki)

GAO on DoD INFOSEC.

Generally-Accepted System Security Principles. (GASSP)

German government site devoted to information technology security [in Genman].

Global information security. (Libicki)

Governmental (USA) electronic surveillance activity.

The great cyberwar of 2002. (Arquilla)

Guerrilla warfare in cyberspace.

HAARP: Highfrequency Active Auroral Research Project.

Hacked Web pages: An archive.

Hacked Web pages: Another archive.

Hacker's ethics.

Hacker sentenced to prison: Press release of the Department of Justice.

Hacker wargames.

Hacker's view of hacking.

Hackers: How should we respond? (Ludlow)

Hackers penetrate DoD computer systems.

The hacker's mind set. (Rist)

Hackers who break into computer systems (Denning).

Hacking in 1999.

Hacking Nasdaq. (Oakes & Kahney).

Hacking the power grid. (Koprowski)

Hacking TCP/IP. (Shimomura)

Hacking U.S. Government Web sites. (Mueller)

Hacking the Web. (McNamara)

Hardwar, softwar wetwar operational objectives of information warfare. (Wilson)

The heads and tails of information. (Baklarz)

Hearing on current and projected national security threats. (Tenet)

HERF (High Energy Radio Frequency) weapons.

HERF: An FAA course.

HERF gun proliferation.

HERF and the Panama Canal.

Higher education and information security. (Reynolds)

Hotmail security problems.

Human intelligence and covert action.

Identity theft. (Hayes)

IE 5 security bug. (Louderback)

Improving the security of your site by breaking into it. (Farmer)

Induced fragility in information age warfare. (Fowler & Peterson)

Industrial espionage: Who's stealing your information. (Denning)

The information age: Its impact and consequences. (Alberts & Papp)

Information assurance and the information society. (Luiijf)

Information insecurity. (Peters)

Information operations.

Information operations: Applying the principles of war. (Nelson)

Information operations, deterrence, and the use of force. (Barnett)

Information operations in Bosnia: A preliminary assessment. (Allard)

Information operations and information systems. (Tulak & Hutton)

Information peacekeeping. (Steele)

Information risk management. (Byrnes)

Information security: Implementing policy. (Wood)

Information, technology, and the center of gravity. (Harley)

Information war and the Air Force: Wave of the future or current fad? (Buchan)

Information warfare in 2025. (Stein)

Information warfare: The possibility of disaster. (Carver)

Information warfare and the U.S. Marine Corps. (Yeary)

Information warfare defense. (Defense Science Board)

Information security: Computer attacks on Department of Defense pose increasing risks.

Infowar. (Browning)

Information warfare. (Lewis)

Information warfare in the business world. (Winkler)

Information warfare: Defeating the enemy before battle. (Ivefors)

Information warfare and deterrence. (Wheatley & Hayes)

Information Warfare and Defense Preparedness. (Lipicki)

Information warfare: Developing a conceptual framework. (Garigue)

Information warfare with electromagnetic attack.

Information warfare and information security on the Web.

Information warfare is not InfoSec repackaged. (Schwartau)

Information warfare in international law. (Greenberg et al.)

Information warfare: Issues and perspectives. (Miller)

The information warfare mania. (Whitaker)

Information warfare: The perfect terrorist weapon. (Shahar)

Information warfare: A philosophical and sociological perspective. (Bey)

Information Warfare: Planning the Campaign. (Ayers, et al)

Information warfare and security: A slide show. (Denning)

Information warfare weapons.

Inforsec: What is really important. (Forno)

From InfoWar to knowledge warfare. (Baumard)

Infrastructure protection. (Schwartau)

Infrastructure protection and threats to civil liberties. (O'Neil & Dempsey)

Infrastructural warfare: An introduction.

Infrastructural warfare slides. (Wilson)

Intelligence agencies of the world - - - listed by country.

Intelligence-based threat assessments for information networks and infrastructures. (Anderson)

Internet and cyber-terrorism. (Whine)

Internet firewalls: An FAQ. (Ranum et al.)

Internet security.

Internet Security Handbook. (U.S. Navy)

International controls over information warfare. (Verton)

International computer intrusions. (Anderson)

International electronic surveillance by the USA: Civil liberties aspects. (ACLU et al.)

International legal implications of information warfare. (Aldrich)

Internet as an intelligence tool. (Wilson)

INTERNIC security hole.

An introduction to information warfare. (Haeni)

Intrusion detection: An FAQ.

Intrusion detection.

Intrusion detection: New methods. (Cramer et al.)

The IW threat from sub-state groups: An interdisciplinary approach. (Rathmell et al.)

IP spoofing demystified.

More about IP-spoofing.

Joint force superiority in the information age. (Paige)

Joint Military Intelligence College. (JMIC)

Journal of Electronic Defense.

Journal of Intrastructural warfare.

Journal of Internet Security.

Keeping information warfare in perspective. Gompert)

Knowledge strategies: Balancing ends, ways, and means in the information age. (Fast)

KUBARK: How the CIA obtains information.

Legal aspects of cyberspace.

Legal and practical constraints in IW, (Kuschner)

The Maginot line of information systems security. (Forno)

The mesh and the net: Speculations on armed conflict in an era of free silicone. (Libicki)

Microsoft vs. hackers. (Shankland)

Microsoft and security: Mutually exclusive terms. (Forno)

Military information operations in a conventional warfare environment.

MKULTRA: Another type of information warfare. (Elliston)

MKULTRA: Senate report

Mobilization for a new era. (Wik)

MS Office leaks sensitive data. (Oakes)

National Cryptologic Museum.

National cryptologic strategy for the 21st century. (NSA)

National Infrastructure Protection Center (NIPC)

Federal photoidentity database. (McCullah)

On the National Reconnaissance Office (NRO).

The NRO declassified.

The National Security Agency (NSA).

More information about the NSA.

NSA: Has it gotten too large and powerful?

NSA offers INFOSEC courses.

National security in the information age. (Devost)

NSA and Fourth Amendment Rights.

NSA---Fifteen unclassified documents.

The NSA Handbook.

Navy INFOSEC website.

Network Centric Warfare. (Stein)

More on Network Centric Warfare. (Brewin)

Network Centric Warfare: Seven deadly sins. (Barnett)

NT Web technology vulnerabilities. (rain.forest.puppy)

OASD C3I

Online privacy: A guide. (Center for Democracy and Technology)

Pentagon's computers vulnerable to hired hackers. (Myers)

Pentagon cybertroops: The national security apparatus gears up for infowar. (Overbeck)

Pentagon vs. hackers. (Miklaszewski & Windrem)

Piercing firewalls.

Political aspects of class III information warfare: Global conflict and terrorism. (Devost)

The political demographics of cyberspace.

Precautionary disconnects form the Internet. (Rosenberger)

Privacy act of 1974 (As amended).

Psychotronic Weapons: Myth or Reality? (Pavlychev)

Psychological warfare documents.

Radio frequency weapons: Congressional testimony.

Radio frequency weapons. (Schweitzer)

More about radio frequency weapons. (Schweitzer)

Reducing cyber-threats. (Revah)

Reflections on the 1997 Commission on Critical Infrastructure Protection (PCCIP) Report. (Staten)

Remote viewing: The CIA's involvement with a weird version of IW. (Elliston)

Report a computer intrusion or computer crime to the FBI.

A revolution in military affairs (RMA). (Thomas)

More on RMA (Whitaker)

Risk assessment of the electric power industry. (NSTAC)

Risk management. (Meritt)

School for Information Warfare and Strategy (IWS).

Security analyzer: Download one to check the security of your system.

Security breaches: Examples from the media.

SIGINT and the Cuban missile crisis. (NSA)

The silicone spear: As assessment of information based warfare. (Everett et al.)

Simulating cyber attacks, defenses, and consequences.

SPAWAR: Space and Naval Warfare Systems Command.

Strategic information warfare. (Molander)

Strategic war . . . in cyberspace. (Molander et al.)

Searches and the Internet: A Canadian perspective. (Hourihan)

Surveillance technology and risk of abuse of economic information.

A Swedish perspective on IW.

TCP/IP security

TCP SYN Flooding and IP Spoofing Attacks

The technologies of political and economic control. (STOA)

Telecommunications Act of 1996.

Telecommunications Act of 1996: Impact on schools and libraries.

T/TCP vulnerabilities.

TEMPEST: Lots of unofficial information. (McNamara)

TEMPEST monitoring.

TEMPEST in the Navy.

TEMPEST: The physics on which it is based.

Terrorists and cyberspace. (Whine)

Terrorism by email.(Szucs)

Terrorism on the Net.

Terrorism and information warfare. (Wilson)

Terrorism at the touch of a keyboard. (Pasternak & Auster)

The third wave; What the Tofflers never told you. (Czerwinski)

Threat assessments for information networks. (Anderson)

Tools to increase computer security.

Trojan horse attempts to gather information on Web sites. (Dugan)

Trojans removal database.

Truth is the first casualty of cyberwar. (Smith)

Types of information warfare. (Libicki)

The unintended consequences of information age technologies. (Alberts)

United Nations manual on the prevention and control of computer-related crime.

U. S. Army Special Operations and PSYOPS.

U.S. cryptography policy.

U.S. foes targeting American computer networks. (Pietrucha)

The U.S. intelligence community.

U.S. sitting duck, DOD panel predicts. (Brewin & Harreld)

Uses and misuses of intelligence. (Kober)

USS Liberty.

The VENONA project.

Virus creation labs.

Vulnerabilities of the national information infrastructure. (Miller)

More on the vulnerability of the National information infrastructure. (Ware)

Still more on vulnerabilities. (Forno)

Waging IWar. (Wilson)

Wars of the near future. (Sundarji)

Weather site penetrated by hackers. (Boyle)

What hackers know about you.

What is information warfare? (Libicki)

Whitehouse report on online privacy and security. (Cohen, Reno, Lew Daley)

Windows NT Trojan horse. (Clark)

Windows security problem. (Wilcox)

WWW Security FAQ. (Stein)

Y2K hysteria: A dramatic example. (North)

Y2K technology problems. (Koskinen)

Y2K violence.

Y2K and the possibility of a cyber-attack.

 



[Blue Ribbon Campaign icon]


     
 
 
  Home |
   © 1999-2002, HOTT All rights reserved.