
|
 |
|
Information Warfare Resources

ARCHIVES:
ARTICLES, RESEARCH, WHITE PAPERS
7
Pillars Partners devoted
to 'infrastructural warfare' primarily
and connection to information warfare.
CERT'S
Report for Cyber
Crime and Terrorism
in the 21 st
Century
- A white paper
on the need
for coordinated
technical response
toward information
crime and terrorism.
.pdf file from
CERT.
Computer
Crime Research
Resources,
Bruce T. Fraser,
J.D. This compilation
of information
presents research
resources for
those interested
in the topic
of computer
crime. The explosion
of new and pertinent
statutory law
over the past
two decades
reflects society's
attempts to
wrestle with
an ancient phenomenon
in a modern
context.
Conflict
and
the
Computer:
-
Information
Warfare
and
Related
Ethical
Issues
.
"ABSTRACT:
Information
warfare,
the
engaging
of
computers
in
conflict,
provides
new
avenues
for
investigation
regarding
their
use
in
industrial
espionage,
accomplishing
political
ends,
and
warfare.
"
by
Sam
Nitzberg.
Countering
Cyber-Terrorism:
workshop
at
USC:
Position
Papers
on
Countering
Cyber-Terrorism
presented
at
USC
Information
Sciences
Institute
in
June
1999
Subcommittee
on Terrorism and Technology: Senate Subcommittee
Jurisdiction: (1) Laws related to government
information policy, electronic privacy and security
of computer information, Freedom of Information
Act; (2) Oversight of technology, trade and
licensing; (3) Oversight of anti-terrorism enforcement,
and policy.
Terrorism
Research Center: "The Terrorism Research
Center is dedicated to informing the public
of the phenomena of terrorism and information
warfare. This site features essays and thought
pieces on current issues, as well as links to
other terrorism documents, research and resources."

Critical
Infrastructure Assurance Office
(CIAO) U.S. Department of
Commerce. Links to incident reporting
and alerts, as well as congressional
testimony on the subject.
62/63
Resource Kit Numerous articles,
speeches and fact sheets from
the White House regarding terrorist
threats of the 21st Century. DD
63 - Critical Infrastructure
Protect Presidential Decision
Directive 63 on Critical Infrastructure
Protection. PDD63
White Paper on infrastructure
protection.
Computer
Security Resource Clearinghouse From
the U.S. National Institute for Standards and
Technology (NIST), provides a wide selection
of documentation and pointers on subjects relating
to computer security, encryption, and related
issues.
The
Defense Advanced Research Projects Agency
(DARPA) is the central research and development
organization for the Department of Defense
(DOD). It manages and directs selected
basic and applied research and development
projects for DOD.
EmergencyNet
Emergency Response and Research Institute
Dedicated to emergency response operations
and issues relevant to them. Some of the
materials to be found here are specific
to the communications / informational
activities supporting emergency response.
National
Infrastructure Protection Center of the
U.S. Department of Justice (NIPC)
is associated with the U.S. Federal Bureau
of Investigation, and investigates cyber
terrorism and crime.
National
Security Agency: The National Security
Agency/Central Security Service is responsible
for the centralized coordination, direction,
and performance of highly specialized
technical functions in support of U.S.
Government activities to protect U.S.
communications and produce foreign intelligence
information. Visit the National Cryptologic
Museum Online!
National
Security Agency Handbook: Confidential
Security Guidelines This handbook
is designed to introduce you to
some of the basic security principles
and procedures with which all NSA
employees must comply.

CYBERCRIME,
ESPIONNAGE, TERRORISM
Strategic
Studies Institute:
United States Army
War College. "Identifies
international security
issues likely to affect
the US, its friends,
and potential adversaries;
Analyzes national
security issues and...informs
the U.S. Army as well
as national leadership
of policy options;
Provides the U.S.
Army with a source
of ideas, criticism,
innovative approaches,
and independent analyses;
Exposes external audiences
to the U.S. Army's
contributions to the
nation. Provides studies
and analyses to support
and supplement the
U.S. Army War College
curriculum."
Transnational
Threats Resource Center:
The Center for Strategic
and International
Studies (CSIS) is
a public policy research
institution dedicated
to analysis and policy
impact. CSIS is the
only institution of
its kind that maintains
resident experts on
all the world's major
geographical regions.
PROPAGANDA
AND PSYCHOLOGICAL WARFARE
Harassment
Through
Psychological
Warfare
from
Media
Filter.Org's
War
at
Home
archives.
While
boring
from
within,
the
FBI
and
police
also
attack
dissident
movements
from
the
outside.
They
openly
mount
propaganda
campaigns
through
public
addresses,
news
releases,
books,
pamphlets,
magazine
articles,
radio,
and
television.
They
also
use
covert
deception
and
manipulation.
Mediafilter.org A
network
of
volunteers
working
to
uncover
and
illuminate
the
surreptitious
tactical
ends
to
which
media
are
employed.
The
tactic
of
media
is
invisible.
Invisible
in
plain
sight...
The
tactic
of
media
is
to
make
the
invisible
visible.."
Politprop
Minneapolis College
of Art and Design
(MCAD) "POLITPROP examines
the art of propaganda
as a potent force in
forming social consciousness
and recognizes propaganda
as a powerful, valid
means of artistic expression
designed to broadly
communicate messages
of public importance.
POLITPROP provides vital
information for the
research, detection
and development of propaganda."
Propaganda
Analysis Home Page
As generally understood,
propaganda is opinion
expressed for the purpose
of influencing actions
of individuals or groups...
Propaganda thus differs
fundamentally from scientific
analysis. The propagandist
tries to "put something
across," good or bad.
The scientist does not
try to put anything
across; he devotes his
life to the discovery
of new facts and principles.
The propagandist seldom
wants careful scrutiny
and criticism; his object
is to bring about a
specific action. The
scientist, on the other
hand, is always prepared
for and wants the most
careful scrutiny and
criticism of his facts
and ideas. Science flourishes
on criticism. Dangerous
propaganda crumbles
before it. Alfred McClung
Lee & Elizabeth Briant
Lee, The Fine Art of
Propaganda, 1939.
The
Psywar Society Home
Page This site serves
"...an international
association of collectors
of aerial propaganda
leaflets and psychological
warfare historians."
Even though much of
the material is focused
on aerial leaflets,
there are materials
(and pointers to materials)
on other / broader aspects
of psychological operations
/ warfare as well.
The
Reporters Collective
(Media.Org) "an
informal alliance of
journalists and scholars
from both north and
south keeping a watchful
eye on the international
financial, military,
and political institutions
of the world and the
often-hidden influence
they wield on the emerging
nations of the southern
hemisphere. We specialize
in research on the use
of multilateral institutions
as agents of United
States foreign policy.
Our aim is to investigate
and to publicize the
tactics, objectives,
and plans of these agencies
by sharing our knowledge
with journalists, editors,
publishers, and academics
the world over. Information,
in this context, becomes
a form of self-defense,
as the continued domination
of the "old powers"
becomes more and more
dependent upon misinformation
and propaganda."
Social
Influence: Propaganda
and Persuasion -- Some
useful background information.
Sun
Tzu The Art of War
, compiled well over
two thousand years ago
by a mysterious Chinese
warrior-philospher,
is still perhaps the
most prestigious and
influential book of
strategy in the world
today, as eagerly studied
in Asia by modern politicians
and executives as it
has been by military
leaders and strategists
for the last two millennia
and more.
VIRII,
WORMS, TROJAN HORSES, HOAXES
Dr
Solomon's Anti-Virus
toolkit
- Anti-Virus
toolkit
F-Secure
Computer Virus
Info Center
This service
is provided
by the F-Secure
Anti-Virus Support
Team. The database
is updated several
times a week.
The virus description
service was
started on the
13th of June,
1994. Now in
its sixth year,
this site was
the first anti-virus
web site ever
- and is considered
the industry
standard source
for up-to-date
information
on new viruses
and hoax alerts.
Stiller
Research's Hoax Page
wins acclaim as an
internet "Key Resource"!
Links2Go samples millions
of web pages to determine
which pages are most
heavily cited by other
web page authors.
The best are selected
as "Key Resources"
Our hoax page has
been designated a
"Key Resource" in
the "Urban Legends"
category.
Symantec
Anti Virus Research
Center
Vmyths.com
formerly the Computer
Virus Myths home page
Learn about computer
virus myths, hoaxes,
urban legends, and
the implications if
you believe in them.
You can also search
a list of computer
virus hoaxes from
A to Z.
How to Contact Interpact, Inc.
E-mail
|
Phone
|
Fax
|
|
727.393.6600
|
727.393.6361
|
Kelley
Walker,
Development
|
727.796.8484 |
727.393.6361 |
|
727.360.4061
|
727.368.0051
|
CORPORATE
OVERVIEW SERVICES
& SOLUTIONS WINN
SCHWARTAU
INFOSEC GATEWAY CONTACT HOME
Copyright
© 2000-2001 Interpact, Inc. All Rights Reserved
For comments about this page, contact: Kelley
Walker, Interpact, Inc.
Copyright Policy Privacy
Policy

|
 |
|