MS. GUIDANCE :
Institute for National Strategic Studies
NATIONAL DEFENSE UNIVERSITY
Windows into Information Warfare
DARPA: Advanced Displays
In order to fight and win on the battlefield of the future, U.S. forces must first win the information war. (Defense Advance Research Project Agency)
A Theory of Information Warfare
Preparing For 2020 by Colonel Richard Szafranski, USAF
Information Warfare - Developing a Conceptual Framework
LT (N) R Garigue
Strategic Information Technology Specialist
Office of the Assistant Deputy Minister (Defense Information
Services)
2.1. THE EVOLUTION OF COMPUTER CONTROL
2.2. THE MOVE FROM CONTROL TO COORDINATION
2.3. VIRTUAL INFORMATION ENVIRONMENTS
2.4. KNOWLEDGE BASED WORK
2.4.1. FROM INFORMATION MANAGEMENT TO KNOWLEDGE MANAGEMENT
2.4.2. KNOWLEDGE ENABLED ORGANIZATIONS
2.5. THE IT INFRASTRUCTURE - GLOBAL NETWORKS
2.5.1. THE ORIGIN OF THE NETWORK
2.5.2. GROWTH OF THE INTERNET
2.5.3. INTEREST GROUPS AND VIRTUAL COMMUNITIES
2.5.4. VALUE SYSTEMS AND POLITICAL ACTION
2.6. THE ECONOMICS OF COORDINATION AND COOPERATION
2.6.1. THE CREATION OF WEALTH: KNOWLEDGE VERSUS CAPITAL
2.6.2. THE NETWORK AS BROADCASTER AND AMPLIFIER
2.7. TAXONOMY AND NATURAL MUTATION OF INFORMATION SYSTEMS
2.7.1. CONVERGENCE OF MILITARY AND CIVILIAN SYSTEMS
2.7.2. CONVERGENCE OF LOCAL AND GLOBAL SCOPE.
2.7.3. CONVERGENCE OF FUNCTIONALITY.
2.7.4. CONVERGENCE OF REPRESENTATIONS.
2.8. TACTICAL AND STRATEGIC INFORMATION SYSTEMS
3. INFORMATION WARFARE
3.1. INFORMATION SUPERIORITY
3.2. DEFINITION OF INFORMATION WARFARE
3.3. ADVANTAGES OF INFORMATION WARFARE
3.4. COMMAND AND CONTROL WARFARE
3.5. NEW MILITARY INFORMATION SYSTEM VULNERABILITIES
3.6. DISPLACEMENT OF WARFIGHTING ACTIVITIES
3.7. INFORMATION WARFARE CONCEPTUAL FRAMEWORK
3.7.1. INFORMATION WARFARE TARGET ANALYSIS
3.7.2. TYPES OF TARGET
3.7.3. TYPES OF WEAPONS
3.8. ANALYSIS OF THE INFORMATION WARFARE STRATEGIC MATRIX
3.8.1. PREDICTABLE OUTCOMES
3.8.2. UNPREDICTABLE OUTCOMES
3.9. IW CONTROL MODELS AND DECISION SYSTEMS
3.9.1. SENSORS/WEAPONS AND PLATFORMS
3.9.2. FROM SIMPLE CYBERNETICS TO MULTI-AGENT CONTROL
3.10. VISUALIZATION AND SEMIOTICS
3.11. OFFICER TRAINING AND EDUCATION
4. CONCLUSION
5. BIBLIOGRAPHY
Information Warfare In the Information Age
Daniel E. Magsig
Information warfare will dominate 21st century conflict. Although information warfare is not unique to the Information Age, the exponential growth in
information technologies during the past few decades has engendered heretofore unheard of opportunities for information exploitation. Properly conceived
information warfare operations can be inexpensive, highly effective, and executed by almost anyone anywhere. Achieving information dominance over an
adversary will decide conflicts long before resort to more violent forms of warfare is necessary.
Nonlethality, Information Warfare and Airpower in the Age of Chaos
Weapons of Massprotection: by Chris Morris, Janet Morris, Thomas Baines
Information Warfare USAF Fact Sheet 95-20
Information Warfare and its Importance. Information warfare is not new, but the rapid technological advances in information systems has vastly increased the value of information in warfare, thereby intensifying Air Force interest in it. Senior Air Force leadership has focused significant intellectual resources on this topic.
William T. Johnsen
Douglas V. Johnson II
James O. Kievit
Douglas C. Lovelace, Jr.
and
Steven Metz
PART X: THE PRINCIPLE OF WAR "SURPRISE"
Theory of Postmodern Warfare (MediaFilter)
Genocide Psychological War Trickle Down Militarism Abandonment
Harassment Through Psychological Warfare
While boring from within, the FBI and police also attack dissident movements from the outside. They openly mount propaganda campaigns through public addresses, news releases, books, pamphlets, magazine articles, radio, and television. They also use covert deception and manipulation.
Eavesdropping On the Electromagnetic Emanations of Digital Equipment:
The Laws of Canada, England and the United States TEMPEST is an acronym for Transient Electromagnetic Pulse Emanation Standard. In the United States it is illegal for an individual to take effective counter-measures against TEMPEST surveillance!!
Summary of Agency Records Retrieval
CENTRAL INTELLIGENCE AGENCY/ MKULTRA, BLUEBIRD and ARTICHOKE DEPARTMENT OF DEFENSE DEPARTMENT OF ENERGY DEPARTMENT OF HEALTH AND HUMAN SERVICES DEPARTMENT OF VETERAN AFFAIRS NATIONAL AERONAUTICS AND SPACE ADMINISTRATION
Psychological Operations in Guerilla Warfare
Psychological Warfare Primer for Online Activists
" Since we are engaged in Revolutionary War in Cyberspace, it would behoove us who are actively participating to have a delineation of strategy, tactics, and operations of guerilla warfare eidetic to this medium. Our Guerilla Warfare Operating Area, (GWOA), is the internet, with its peculiar strategic advantages and vulnerabilities."
Microwave Harassment and Mind-Control Experimentation
by, Julianne McKinney
Director, Electronic Surveillance Project
Association of National Security Alumni
PART 1 - THE PROBLEM SURFACES
The Existing Directed-Energy Arsenal
BIOEFFECTS OF MICROWAVE RADIATION
CONGRESSIONAL OVERSIGHT
PRELIMINARY FINDINGS
PART II -- OVERT AND COVERT HARASSMENT
OVERT HARASSMENT
FAILURE OF "ESTABLISHMENT" SUPPORT SYSTEMS
RELATED COVERT METHODOLOGIES
HARASSMENT OBJECTIVES
THE "STALKER" PHENOMENON
John Arquilla and David Ronfeldt
International Policy Department
RAND
explaining cyberwar and information-related factors in military history.
"The information revolution and related organizational innovations are
altering the nature of conflict and the kinds of military structures,
doctrines, and strategies that will be needed. This study introduces
two concepts for thinking about these issues: "cyberwar" and
"netwar.""
David Ronfeldt, Beyond bureaucracy restructured perceptions of social space and time.
This text is excerpted from Langdon Winnder, "Mythinformation", (Ch.6), _The Whale and the Reactor: A Search for Limits in an Age of High Technology_, (Chicago: University of Chicago Press), 1986.
Chomsky on corporate propaganda
LETTER FROM NOAM CHOMSKY to Covert Action Quartely PEOPLE MAY BE CONFUSED ABOUT THE CAUSES OF THE GREAT INEQUALITY THEY SEE, BUT THEY UNDERSTAND THAT BUSINESS AND GOVERNMENT ARE NOT TO BE TRUSTED. NOW, MORE THAN EVER, CHOMSKY'S INSIGHT INTO THE MECHANICS AND ROLE OF PROPAGANDA IS CRUCIAL.
Peter Lamborn Wilson @ Public Netbase
Humanity has always invested heavily in any scheme that offers escape from the body. And why not? Material reality is such a mess. Some of the earliest "religious" artefacts, such as Neanderthal ochre burials, already suggest a belief in immortality. All modern (i.e. postpaleolithic) religions contain the "Gnostic trace" of distrust or even outright hostility to the body and the "created" world. Contemporary "primitive" tribes and even peasant-pagans have a concept of immortality and of going-outside-the-body (ec-stasy) without necessarily exhibiting any excessive body-hatred. The Gnostic Trace accumulates very gradually (like, mercury poisoning) till eventually it turns pathological. Gnostic dualism exemplifies the extreme position of this disgust by shifting all value from body to "spirit". This idea characterizes what we call civilization.
commentary on Derrick DeKerckhove's new book The Skin Of Culture. (The Anarchives)