FAS Homepage | Intelligence |||| Links | Index | Search | Join FAS

FAS Intelligence Resource Program "The world isnít run by weapons anymore, or energy, or money. Itís run by little ones and zeros, little bits of data. Itís all just electrons.... Thereís a war out there ... and itís not about whoís got the most bullets. Itís about who controls the information. What we see and hear, how we work, what we think, itís all about information."

Information Warfare and
Information Security on the Web

This metapage is a comprehensive guide to information warfare resources on the Web, as well as a directory of points of entry to related resources. If you know of any resources that are not listed here, please let us know about them.

Other Resource Directories at this Site

Information Warfare

Electronic Pearl Harbor -- Not Likely George Smith [CRYPT] Issues in Science & Technology
Information warfare: The term conjures up a vision of unseen enemies, armed only with laptop personal computers connected to the global computer network, launching untraceable electronic attacks against the United States. But is such an electronic Pearl Harbor possible? The menacing scenarios have remained just that-only scenarios. Information warfare may be, for many, the hip topic of the moment, but a factually solid knowledge of it remains elusive. The government's evidence about US vulnerability to cyber attack is shaky at best.
Information Warfare, I-War, IW, C4I, Cyberwar
Information warfare, also known as I-War, IW, C4I, or Cyberwar, has recently become of increasing importance to the military, the intelligence community, and the business world. The purpose of the IASIW ( a virtual nongovernmental organization) is to facilitate an understanding of information warfare with reference to both military and civilian life. An EXTREMELY good place to get started on this complex topic.

MARTIN LIBICKI, NATIONAL DEFENSE UNIVERSITY, ACIS Paper 3, August 1995 "Information warfare, as a separate technique of waging war, does not exist. There are, instead, several distinct forms of information warfare, each laying claim to the larger concept" This is the MUST READ primer for this topic!! And once you have digested this, then check out all the other infowar stuff from NDU, where those wild and crazy guys at the School of Information Warfare and Strategy have gone pretty much berzerk on this topic, viz:

Information Warfare and InfoSecurity
Winn Schwartau's more or less definitive web site for Information Warfare and Information Security.

The Journal of IWAR Intelligence Acquisition
The Journal of IWAR Intelligence Acquisition is available for registration. You will receive confirmation within 24 hours after registration. The first issue, available on 15 Jan 1997, has the following articles:
  • A report on the Infrastructure Protection Task Force by Richard Forno from the U.S. House of Representatives;
  • An article by Robert Steele on Open Source Intelligence for IWAR;
  • Michael Wilson's Infrastructural WarfareThreat Model;
  • From the United Kingdom, Philip Davies offers recommendations for developing a balance between HUMINT and TECHINT for IWAR Intelligence;
  • An interview with Winn Schwartau about the status of IWAR Intelligence in Europe;
  • An editorial with solid recommendations for the Infrastructure Protection Task Force;
  • The Overheard on the Net Column: Security Managers give reasons why they sell their company's secrets.

RAND Strategic Information Warfare: A New Face of War
Summarizes research performed by RAND for the Office of the Assistant Secretary of Defense (Command, Control, Communications and Intelligence) with a particular emphasis on the defensive aspects of what is characterized in the report as "strategic information warfare." The online summary is interesting, but you need to get the complete hardcopy to get the full flavor of this report, which currently represents the [unclassified] state of the art.

RAND Research Review
Special issue on IW and cyberspace security

Institute for the Advanced Study of Information Warfare, a virtual organization that facilitates an understanding of information warfare in both military and civilian life

CSI Special Report on Information Warfare
By Richard Power. Excerpted from the Computer Security Journal, Vol. 11, no. 2, available from Computer Security Institute, San Francisco, CA, 415-905-2626. The printed version contains graphs and diagrams not included here. An "Information Warfare Year in Review" timeline of relevant news stories follows the paper.] A brief commentary on this study is also available.

lotsa links

The I-Bomb
A 1995 BBC Horizon documentary examining aspects of the Gulf War's 'digital battlefield' and how information technologies are changing the nature of warfare.

BY DOUGLAS WALLER WASHINGTON TIME Magazine August 21, 1995 "The U.S. may soon wage war by mouse, keyboard and computer virus. But it is vulnerable to the same attacks.... "information warfare"--now the hottest concept in the halls of the Pentagon. Info warriors hope to transform the way soldiers fight. Their goal: to exploit the technological wonders of the late 20th century to launch rapid, stealthy, widespread and devastating attacks on the military and civilian infrastructure of an enemy..."

This paper by the Assistant for Strategic Assessment Office of the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict (Policy Planning) reviews the actual and potential impact of the Internet on domestic and foreign politics and international conflict, from the point of view of a U.S. Department of Defense analyst. It is presented here by the Federation of American Scientists.

Information Security in a Third Wave Society.
Prepared remarks by William P. Crowell deputy director, National Security Agency, at the National Information Systems Security Conference, Baltimore, Oct. 25, 1996. Information security can determine whether the United States simply rides the third societal wave passively or maximizes opportunities the information age offers. The results might be very different.

Electromagnetic Spectrum: Key to Success in Future Conflicts. Prepared remarks by Emmett Paige Jr.
assistant secretary of defense for command, control, communications and intelligence, to the AFCEA Spectrum Management Symposium, Washington, July 10, 1996. The United States must control the spectrum "in the next conflict."

Ensuring Joint Force Superiority in the Information Age. Prepared remarks by Emmett Paige Jr.
assistant secretary of defense for command, control, communications and intelligence, at the Armed Forces Staff College, Norfolk, Va., July 30, 1996. DoD must prepare tomorrow's warfighter with the requisite tools to do the job. Therefore, DoD must do everything possible to increase the knowledge, training and capability of the military work force.

Striving for Information Superiority
prepared remarks of Emmett Paige Jr., assistant secretary of defense, command, control, communications and intelligence, to the 311th Theater Signal Command Celebratory Activation Dinner, Fort George Meade, Md., June 22, 1996. Warfighters must be able to gather intelligence, know the capabilities of U.S. forces at any moment and model combat scenarios electronically -- quickly.

The Future of Information Security. Prepared remarks by Emmett Paige Jr.
assistant secretary of defense for command, control, communications and intelligence, to the Personnel Security Research Center Security Conference, McLean, Va., June 25, 1996. In the age of information, DoD can't afford to focus only on finding ways and means of improving policies and practices that might have been appropriate for the last generation.

Realizing the Potential of Intelink. Prepared remarks by Emmett Paige Jr.
assistant secretary of defense for command, control, communications and intelligence, to the Intelink Mission Support Conference, San Diego, Calif., June 11, 1996. Maintaining DoD's rapid progress of INTELINK and providing more intelligence products for warfighters is one of DoD's top priorities.

Achieving the Integrated Systems Concept
Keynote address by Emmett Paige Jr., ASD(C3I), to the Armed Forces Communications-Electronics Association, Washington, June 4, 1996. What's needed for a truly joint communications system that supports warfighters.

Raising Awareness of the Year 2000 Computer Problem
prepared statement by Emmett Paige Jr., ASD(C3I), to the Government Management, Information and Technology Subcommittee, House Government Reform and Oversight Committee, April 16, 1996. Most government computers -- DoD's included -- won't be able to tell time after Dec. 31, 1999.

The Global Command and Control System Home Page
The Global Command and Control System (GCCS) is an automated information system designed to support deliberate and crisis planning with the use of an integrated set of analytic tools and the flexible data transfer capabilities. GCCS will become the single C4I system to support the warfighter from foxhole to command post.

JMCIS On-Line Library Home Page
GCCS will become the single C4I system to support the joint warfighter, as envisioned under the C4I for the Warrior concept. Joint Maritime Command Information System (JMCIS) is the Navy component of GCCS.

HORIZON - A Jointly Focused Vision Charting the Course for the 21st Century Air Force
"C4I for the Warrior" was a landmark achievement in raising the critical importance of joint, integrated command, control, communications, computer and intelligence networks and systems to the execution and success of U.S. military operations.

Remarks [on Information Warfare]
Presented by General Henry Viccellio, Jr., commander of AFMC, to the National Air Intelligence Center, 22 September 1995 "This is the new order of war... and a key element of it is Information.... The capability we are developing for this new element of warfare provides us both lethal and non-lethal options to achieve a new, emerging and as yet not totally defined objective---information dominance ... consider this.... a 1995 Cadillac now has more computing power under its hood than the original guidance system that landed the Apollo space capsule on the moon."

Fundamentals of IW--An Airman's View
Speech by General Fogleman, AF Chief of Staff

Global awareness means that the Air Force can use affordable means to derive appropriate information about one or more places of interest after a delay which is short enough to satisfy operational needs.

Battlefield of the Future 21st Century Warfare Issues
Air War College Studies in National Security September 1995

Other Air Force Publications
  • Information Warfare by Prof George J. Stein, AWC Airpower Journal (Spring 1995): Article discussing definitions, strategy, doctrine, and the danger of failing to develop information warfare
  • Russian Views on Information-Based Warfare by Timothy L. Thomas Special Edition 96 Airpower Journal The availability of pirated technology will allow Russia to quickly catch and perhaps surpass even our own technological competency in some areas. In the information age, there is little room for complacency.

  • USAFA INSS Occasional Paper #9 The International Legal Implications of Information Warfare. Richard W. Aldrich, April 1996
  • Occasional Paper #11 Melancholy Reunion: A Report from the Future on the Collapse of Civil-Military Relations in the United States. Charles J. Dunlap, Jr., October 1996

Marine Corps Tactical Systems Support Activity Camp Pendleton, CA.
The mission of MCTSSA is to provide software, firmware, and systems integration support for designated tactical data (computer-based) systems during their entire life-cycle: ensuring joint interoperability and sustaining combat readiness of these systems for the Fleet Marine Forces (FMFs); and to perform other support functions related to tactical data systems as directed. Projects include the Global Command and Control System [GCCS], Intelligence Analysis System [IAS], the AN/PSQ-9 Team Portable Communications Intelligence (COMINT) System (TPCS) and the Tactical Remote Sensor System (TRSS)

Army Digitization Master Plan (ADMP)
ARMY DIGITIZATION OFFICE (ADO) The Army Digitization Master Plan (ADMP) provides the roadmap and the direction necessary to bring the capabilities of information age technology to the future battlefield. The ADMP addresses strategies, responsibilities, requirements, acquisition, experimentation methodology, joint and combined interoperability, and the management process that will transform the Army into a 21st century force (Force XXI).

Force XXI Homepage
Force XXI is America's Army for the 21st Century. Force XXI is the reconceptualization and redesign of the force at all echelons, from the foxhole to the industrial base, to meet the needs of a volatile and ever changing world. It will be a force organized around information and information technologies. The central and essential feature of this Army will be its ability to exploit information. The plan to do this is the FORCE XXI Campaign Plan. And TRADOC PAMPHLET 525-5 FORCE XXI OPERATIONS is the Training and Doctrine Command's evolving vision of future joint military operations‚Force XXI Operations.

US ARMY COMMUNICATIONS-ELECTRONICS COMMAND The Fiscal Year 1995 edition of the C4IEW Project Book is available in two formats. One is for use by DOD components only (critical technologies) and is For Official Use Only (FOUO). This second version is available for use by DOD components, their contractors and the public. The information found within is current at the time of publication (February 1995) and is subject to change.

JWID-94 -- Recommendations for Applying JWID-94 Lessons Learned
The JWID-94 Lessons Learned have been published by DISA/JIEO JITC, and the Marine Corps as lead Service has formulated recommended courses of action to address them during JWID '95.

JWID '95 HomePage
The Marine Corps was designated by the Joint Staff to lead the 1995 Joint Warrior Interoperability Demonstration in September, hosted by the US Pacific Command. This the seventh in a series of annual Joint Staff sponsored information technology demonstrations intended to further the goals of the Joint Staff C4I for the Warrior initiative.

The Joint Warrior Interoperability Demonstration is a US joint forces exercise that takes place every year to test the interoperability between heterogenous and dissimilar services. JWID'96 is mainly for US Army, Navy, Marine and Air Forces, however allied nations have been invited to take part. The Navy JWID 96 Home Page also has some interesting material.

ATLANTIC RESOLVE 94 was an exercise model linking USAREUR exercises to developing situations, emerging international interests and the use of hypotheses to shape training events. Access to intelligence data through the use of ADP systems, such as the All Source Analysis System (ASAS), results in more timely and accurate intelligence support to the commander. Deployed analytic intelligence staffs can meet the intelligence needs of their respective commanders, providing reduction in intelligence staffing at deployed headquarters.

The Third Wave Revolution: Netwars and Activists Power on the Net
"In the past few years, the Pentagon and Military Industrial establishment have taken a keen interest in the new information technology and how it affects politics and warfare. They are a bit worried that things like the Internet will change the balance of power." An extremely comprehensive compendium of material nicely implemented by Jason Wehling at the Portland Anarchist Web [why do you think all your email addresses have that little circled A [ @ ] in them??].

ACT Books and Papers
Material from the Center for Advanced Concepts and Technology on the implications of information technology to national security, as well as related areas of command-and-control, and information warfare

Cornerstone s of Information Warfare
Air Force's foundation for organizing, training, equipping, and employing IW forces and capabilities

Cyberwar is Coming
RAND study on cyberwar and netwar

DARPA Research
Research papers from the Defense Advanced Research Projects Agency's Information Technology Office

IW: Considering the New Battlefield
Discussion paper on fighting in a logical, rather than a physical, battlefield

IW: Same wine, different bottle?
Article addressing whether or not we should establish a separate information "corps" and the claim that information age weapons only work against high-tech adversaries like ourselves

More IW documents
Compliments of Dan Eding

Infowar and Disinformation: From the Pentagon to the Net
By Daniel Brandt, from NameBase NewsLine, No. 11, October-December 1995

Other IW-related Sites
A short listing by Management Analytics -- has an appropriately broad definition of the problem, and one would hope that this currently limited resource would grow with time.

Information Security

Computer security/crime
A small metapage.

Welcome to All.Net
"Infosec Heaven" sponsored by Management Analytics has an extensive document collection

NASA Security
Office homepage.

Paul's Assorted Crypto Links
A nice jump-page.

Streaky's Side of Bacon
Mostly things on Information Security (InfoSec)

Air Force Computer Emergency Response Team, the single point of contact in the Air Force for reporting and handling computer security incidents and vulnerabilities

AF Info Protect
AFCA's Information Protection home page

U.S. Department of Energy's Computer Security Technology Center

CISS, the Defense Information Systems Agency's Center for Information Systems Security

Computer Security Institute
The oldest international membership organization offering training specifically targeted to information security professionals

Forum of Incident Response Teams, a coalition of government, commercial, and academic organizations established to exchange information and coordinate security-related response activities.

Framework and Open Reference Model for Information Security workspace, a logically structured virtual repository for information technology security related information

National Computer Security Association, providing information security-related training, testing, research, product certification, underground reconnaissance, help-desk and consulting services

The forum on risks to the public in computers and related systems. Its USENET equivalent is comp.risk

Computer Sciences Corporation Technical Papers
"The technical papers provided in this section are based on a review and analyses of the publicly available documents identified in the reference and the authors involvement in varioius groups and committees. The opinions and recommendations contained herein are solely those of the authors."

Inslaw's Rebuttal to the Bua Report
254k (!) from DeepTimes "This report is as important as it is large. Possibly the most important current issue concerning criminal activity in government." [ or possibly not, as the case may be...]

The Unified INFOSEC Glossary
Maintained by The Center for Decision Support at Idaho State University. A search will return the words that contain the search word you typed in. For example, a search on "infose" will recover the word INFOSEC and others.

Information Security Library
This Information Security Library is maintained by The Center for Decision Support at Idaho State University.

Text CompuSec Library
This text version provides a link to papers, articles and/or reports from a variety of sources on the following topics: DOS related security stuff, documents on encryption, documents on firewalls, documents on legal issues, macintosh, passwords, potpourri, , rainbow series, and unix from the Naval Research Laboratory Information Security Office

Netsurfer Focus
Special issue on computer and network security

Web Review
Special issue on NSA's Fortezza program

The electronic newsletter of IEEE's Technical Committee on Security and Privacy

CypherPunks and Friends

Providing the hacker community with information on operating systems, networking technologies, and telephony, as well as relaying other topics of interest to the international computer underground

The Cypherpunks Homepage
Lotsa crypto stuff...

The unofficial greater DC area Cypherpunks Page

The "Information Superhighway" and its Discontents
By Daniel Brandt from NameBase NewsLine, No. 7, October-December 1994

Index of Privacy Resources
From Wired magazine. "The national security state, with the backing of the Clinton-Gore administration, is attempting a stealth strike on our rights. If they succeed, we could shortly find ourselves under a government with the automated ability to log the time, origin, and recipient of every call and email message, to monitor our most private communications, to track our physical whereabouts continuously, and to keep better account of our financial transactions than we do - all without a warrant."

Big Brother is Watching YOU
"By Brad Cox in connection with the paradoxical goals of the Middle of Nowhere project." An extremely estensive and nicely done annotated guide to online resources on issues ranging from the FBI Wiretap (Digital Telephony) Bill and the Clipper Chip to the Communications Decency Act. This site, implemented by a professor at George Mason University, is definitely the place to start.

FAS Homepage | Intelligence |||| Links | Index | Search | Join FAS

Maintained by John Pike
Updated Saturday, November 07, 1998 10:18:09 AM