MS. GUIDANCE :

    CYBERWAR

    INFORMATION WARFARE and PSYCHOLOGICAL OPERATIONS
    ARTICLES and DOCUMENTS




    PART I
    PROPAGANDA ANALYSIS
    ONLINE JOURNALS
    INTELLIGENCE AGENCIES
    INDEX AND METAPAGES
    GENERAL RESOURCES


    ARTICLES and DOCUMENTS

    INFORMATION WARFARE


    What is Information Warfare ?

    Institute for National Strategic Studies
    NATIONAL DEFENSE UNIVERSITY

    Windows into Information Warfare

    DARPA: Advanced Displays
    In order to fight and win on the battlefield of the future, U.S. forces must first win the information war. (Defense Advance Research Project Agency)

    A Theory of Information Warfare

    Preparing For 2020 by Colonel Richard Szafranski, USAF

    Information Warfare - Developing a Conceptual Framework

    LT (N) R Garigue Strategic Information Technology Specialist Office of the Assistant Deputy Minister (Defense Information Services)
    2.1. THE EVOLUTION OF COMPUTER CONTROL 2.2. THE MOVE FROM CONTROL TO COORDINATION 2.3. VIRTUAL INFORMATION ENVIRONMENTS 2.4. KNOWLEDGE BASED WORK 2.4.1. FROM INFORMATION MANAGEMENT TO KNOWLEDGE MANAGEMENT 2.4.2. KNOWLEDGE ENABLED ORGANIZATIONS 2.5. THE IT INFRASTRUCTURE - GLOBAL NETWORKS 2.5.1. THE ORIGIN OF THE NETWORK 2.5.2. GROWTH OF THE INTERNET 2.5.3. INTEREST GROUPS AND VIRTUAL COMMUNITIES 2.5.4. VALUE SYSTEMS AND POLITICAL ACTION 2.6. THE ECONOMICS OF COORDINATION AND COOPERATION 2.6.1. THE CREATION OF WEALTH: KNOWLEDGE VERSUS CAPITAL 2.6.2. THE NETWORK AS BROADCASTER AND AMPLIFIER 2.7. TAXONOMY AND NATURAL MUTATION OF INFORMATION SYSTEMS 2.7.1. CONVERGENCE OF MILITARY AND CIVILIAN SYSTEMS 2.7.2. CONVERGENCE OF LOCAL AND GLOBAL SCOPE. 2.7.3. CONVERGENCE OF FUNCTIONALITY. 2.7.4. CONVERGENCE OF REPRESENTATIONS. 2.8. TACTICAL AND STRATEGIC INFORMATION SYSTEMS 3. INFORMATION WARFARE 3.1. INFORMATION SUPERIORITY 3.2. DEFINITION OF INFORMATION WARFARE 3.3. ADVANTAGES OF INFORMATION WARFARE 3.4. COMMAND AND CONTROL WARFARE 3.5. NEW MILITARY INFORMATION SYSTEM VULNERABILITIES 3.6. DISPLACEMENT OF WARFIGHTING ACTIVITIES 3.7. INFORMATION WARFARE CONCEPTUAL FRAMEWORK 3.7.1. INFORMATION WARFARE TARGET ANALYSIS 3.7.2. TYPES OF TARGET 3.7.3. TYPES OF WEAPONS 3.8. ANALYSIS OF THE INFORMATION WARFARE STRATEGIC MATRIX 3.8.1. PREDICTABLE OUTCOMES 3.8.2. UNPREDICTABLE OUTCOMES 3.9. IW CONTROL MODELS AND DECISION SYSTEMS 3.9.1. SENSORS/WEAPONS AND PLATFORMS 3.9.2. FROM SIMPLE CYBERNETICS TO MULTI-AGENT CONTROL 3.10. VISUALIZATION AND SEMIOTICS 3.11. OFFICER TRAINING AND EDUCATION 4. CONCLUSION 5. BIBLIOGRAPHY

    Information Warfare In the Information Age

    Daniel E. Magsig
    Information warfare will dominate 21st century conflict. Although information warfare is not unique to the Information Age, the exponential growth in information technologies during the past few decades has engendered heretofore unheard of opportunities for information exploitation. Properly conceived information warfare operations can be inexpensive, highly effective, and executed by almost anyone anywhere. Achieving information dominance over an adversary will decide conflicts long before resort to more violent forms of warfare is necessary.

    Nonlethality, Information Warfare and Airpower in the Age of Chaos

    Weapons of Massprotection: by Chris Morris, Janet Morris, Thomas Baines

    Information Warfare USAF Fact Sheet 95-20

    Information Warfare and its Importance. Information warfare is not new, but the rapid technological advances in information systems has vastly increased the value of information in warfare, thereby intensifying Air Force interest in it. Senior Air Force leadership has focused significant intellectual resources on this topic.

    OPERATIONS



    The Principles of War in the 21st Century: STRATEGIC CONSIDERATIONS

    William T. Johnsen Douglas V. Johnson II James O. Kievit Douglas C. Lovelace, Jr. and Steven Metz
    PART X: THE PRINCIPLE OF WAR "SURPRISE"

    Theory of Postmodern Warfare (MediaFilter)

    Genocide Psychological War Trickle Down Militarism Abandonment

    Harassment Through Psychological Warfare

    While boring from within, the FBI and police also attack dissident movements from the outside. They openly mount propaganda campaigns through public addresses, news releases, books, pamphlets, magazine articles, radio, and television. They also use covert deception and manipulation.

    Eavesdropping On the Electromagnetic Emanations of Digital Equipment:

    The Laws of Canada, England and the United States TEMPEST is an acronym for Transient Electromagnetic Pulse Emanation Standard. In the United States it is illegal for an individual to take effective counter-measures against TEMPEST surveillance!!

    Summary of Agency Records Retrieval

    CENTRAL INTELLIGENCE AGENCY/ MKULTRA, BLUEBIRD and ARTICHOKE DEPARTMENT OF DEFENSE DEPARTMENT OF ENERGY DEPARTMENT OF HEALTH AND HUMAN SERVICES DEPARTMENT OF VETERAN AFFAIRS NATIONAL AERONAUTICS AND SPACE ADMINISTRATION

    Psychological Operations in Guerilla Warfare

    Psychological Warfare Primer for Online Activists

    " Since we are engaged in Revolutionary War in Cyberspace, it would behoove us who are actively participating to have a delineation of strategy, tactics, and operations of guerilla warfare eidetic to this medium. Our Guerilla Warfare Operating Area, (GWOA), is the internet, with its peculiar strategic advantages and vulnerabilities."

    Microwave Harassment and Mind-Control Experimentation

    by, Julianne McKinney Director, Electronic Surveillance Project Association of National Security Alumni
    PART 1 - THE PROBLEM SURFACES The Existing Directed-Energy Arsenal BIOEFFECTS OF MICROWAVE RADIATION CONGRESSIONAL OVERSIGHT PRELIMINARY FINDINGS PART II -- OVERT AND COVERT HARASSMENT OVERT HARASSMENT FAILURE OF "ESTABLISHMENT" SUPPORT SYSTEMS RELATED COVERT METHODOLOGIES HARASSMENT OBJECTIVES THE "STALKER" PHENOMENON

    CYBERWAR



    Cyberwar is coming!

    John Arquilla and David Ronfeldt International Policy Department RAND
    explaining cyberwar and information-related factors in military history. "The information revolution and related organizational innovations are altering the nature of conflict and the kinds of military structures, doctrines, and strategies that will be needed. This study introduces two concepts for thinking about these issues: "cyberwar" and "netwar.""

    Cyberocracy is coming

    David Ronfeldt, Beyond bureaucracy restructured perceptions of social space and time.

    Mythinformation

    This text is excerpted from Langdon Winnder, "Mythinformation", (Ch.6), _The Whale and the Reactor: A Search for Limits in an Age of High Technology_, (Chicago: University of Chicago Press), 1986.

    Chomsky on corporate propaganda

    LETTER FROM NOAM CHOMSKY to Covert Action Quartely PEOPLE MAY BE CONFUSED ABOUT THE CAUSES OF THE GREAT INEQUALITY THEY SEE, BUT THEY UNDERSTAND THAT BUSINESS AND GOVERNMENT ARE NOT TO BE TRUSTED. NOW, MORE THAN EVER, CHOMSKY'S INSIGHT INTO THE MECHANICS AND ROLE OF PROPAGANDA IS CRUCIAL.

    The Information War

    Peter Lamborn Wilson @ Public Netbase

    Humanity has always invested heavily in any scheme that offers escape from the body. And why not? Material reality is such a mess. Some of the earliest "religious" artefacts, such as Neanderthal ochre burials, already suggest a belief in immortality. All modern (i.e. postpaleolithic) religions contain the "Gnostic trace" of distrust or even outright hostility to the body and the "created" world. Contemporary "primitive" tribes and even peasant-pagans have a concept of immortality and of going-outside-the-body (ec-stasy) without necessarily exhibiting any excessive body-hatred. The Gnostic Trace accumulates very gradually (like, mercury poisoning) till eventually it turns pathological. Gnostic dualism exemplifies the extreme position of this disgust by shifting all value from body to "spirit". This idea characterizes what we call civilization.

    Information Leviathan

    commentary on Derrick DeKerckhove's new book The Skin Of Culture. (The Anarchives)