Services Winn Schwartau InfosecGate Home Site Map Contact
Interpact Security Awareness For Today's Business
Corporate Overview
Interpact's Services and Solutions
Security Awareness Training
Security Awareness Artwork
Interpact's Associates
Press Room
Contact Us
Winn Schwartau
Winn Schwartau: Speaker and Writer
Schwartau's Publications
Schwartau's  Schedule
Infosec Gateway


Security Awareness Promotional Art



Information Warfare Resources



7 Pillars Partners  devoted to 'infrastructural warfare' primarily and connection to information warfare.

Archive of Information Security Global Technology Research, Inc. Archive of online information security documents developed to assist professionals in researching a wide range of topics. L large compilation of documentation on IW and related issues

Battlefield of the Future: 21st Century Warfare Issues   Outlines major issues facing the military of the future

CERT'S Report for Cyber Crime and Terrorism in the 21 st Century - A white paper on the need for coordinated technical response toward information crime and terrorism. .pdf file from CERT.

Computer Crime Research Resources, Bruce T. Fraser, J.D. This compilation of information presents research resources for those interested in the topic of computer crime. The explosion of new and pertinent statutory law over the past two decades reflects society's attempts to wrestle with an ancient phenomenon in a modern context.

Conflict and the Computer: - Information Warfare and Related Ethical Issues . "ABSTRACT: Information warfare, the engaging of computers in conflict, provides new avenues for investigation regarding their use in industrial espionage, accomplishing political ends, and warfare. " by Sam Nitzberg.

Countering Cyber-Terrorism: workshop at USC: Position Papers on Countering Cyber-Terrorism presented at USC Information Sciences Institute in June 1999

Defending The Nation Against Cyber Attack: November 1998 --by By Lieutenant General Kenneth A. Minihan Director, National Security Agency.

Federation of American Scientists (FAS) Strategic Assessment: The Internet, by Charles Swett. "The following paper reviews the actual and potential impact of the Internet on domestic and foreign politics and international conflict, from the point of view of a U.S. Department of Defense analyst. It is presented here by the Project on Government Secrecy of the Federation of American Scientists".

The Future of CyberTerrorism: Where the Physical and Virtual Worlds Converge - From the Institute for Security and Intelligence.

Information Terrorism: Can You Trust Your Toaster? A portion of the paper that was a winner of the 1996 National Defense University Sun Tzu Art of War Research Award in Information Warfare. see also Can You Trust Your Bathtub? Brief essay on the fundamental nature of terrorism.

Rand Research Review   Information War and Cyberspace Security, Fall 1995:

Strategic Information Warfare: A New Face of War: Roger C. Molander, Andrew S. Riddile, Peter A. Wilson. "Identifies international security issues likely to affect the US, its friends, and potential adversaries

Subcommittee on Terrorism and Technology: Senate Subcommittee Jurisdiction: (1) Laws related to government information policy, electronic privacy and security of computer information, Freedom of Information Act; (2) Oversight of technology, trade and licensing; (3) Oversight of anti-terrorism enforcement, and policy.

Terrorism Research Center: "The Terrorism Research Center is dedicated to informing the public of the phenomena of terrorism and information warfare. This site features essays and thought pieces on current issues, as well as links to other terrorism documents, research and resources."

Critical Infrastructure Assurance Office (CIAO) U.S. Department of Commerce. Links to incident reporting and alerts, as well as congressional testimony on the subject.

62/63 Resource Kit Numerous articles, speeches and fact sheets from the White House regarding terrorist threats of the 21st Century. DD 63 - Critical Infrastructure Protect Presidential Decision Directive 63 on Critical Infrastructure Protection. PDD63 White Paper on infrastructure protection.

Computer Security Resource Clearinghouse   From the U.S. National Institute for Standards and Technology (NIST), provides a wide selection of documentation and pointers on subjects relating to computer security, encryption, and related issues.

The Defense Advanced Research Projects Agency (DARPA) is the central research and development organization for the Department of Defense (DOD). It manages and directs selected basic and applied research and development projects for DOD.

EmergencyNet Emergency Response and Research Institute Dedicated to emergency response operations and issues relevant to them. Some of the materials to be found here are specific to the communications / informational activities supporting emergency response.

National Infrastructure Protection Center of the U.S. Department of Justice (NIPC) is associated with the U.S. Federal Bureau of Investigation, and investigates cyber terrorism and crime.

National Security Agency: The National Security Agency/Central Security Service is responsible for the centralized coordination, direction, and performance of highly specialized technical functions in support of U.S. Government activities to protect U.S. communications and produce foreign intelligence information. Visit the National Cryptologic Museum Online!

National Security Agency Handbook: Confidential Security Guidelines This handbook is designed to introduce you to some of the basic security principles and procedures with which all NSA employees must comply.


Computer Crime & Information Warfare Timeline Open Computing. This is a summary timeline of significant IW / computer security events from 1970 to 1995.


The Center for Democracy and Technology's Counter Terrorism page contains information and analysis relating to counterterrorism legislation.

Center for Strategic and International Studies (CSIS) Global Organized Crime Project has compiled news articles, speeches, congressional testimony, and other resources that are related to transnational threats.

Electronic Frontier Foundation's "Censorship & Privacy - Terrorism Hysteria & Militia Fingerpointing" Archives. Information regarding legislative counterterrorism efforts that use "'terrorism' and 'militias' as excuses" for censorship.

EPIC: Electronic Privacy Information Center's Counter-Terrorism Proposals The Electronic Privacy Information Center is a resource for information on counterterrorism proposals and the restriction of free speech.

International Association of Counterterrorism and Security Professionals (IACSP) feature's from their magazine, Counterterrorism & Security.

Anti-Defamation League. organization against anti-Semitism and its site has information on terrorism, hate crimes, skinheads, militias, and extremists.

Strategic Studies Institute: United States Army War College. "Identifies international security issues likely to affect the US, its friends, and potential adversaries; Analyzes national security issues and...informs the U.S. Army as well as national leadership of policy options; Provides the U.S. Army with a source of ideas, criticism, innovative approaches, and independent analyses; Exposes external audiences to the U.S. Army's contributions to the nation. Provides studies and analyses to support and supplement the U.S. Army War College curriculum."

Transnational Threats Resource Center: The Center for Strategic and International Studies (CSIS) is a public policy research institution dedicated to analysis and policy impact. CSIS is the only institution of its kind that maintains resident experts on all the world's major geographical regions.


Harassment Through Psychological Warfare from Media Filter.Org's War at Home archives. While boring from within, the FBI and police also attack dissident movements from the outside. They openly mount propaganda campaigns through public addresses, news releases, books, pamphlets, magazine articles, radio, and television. They also use covert deception and manipulation.    A network of volunteers working to uncover and illuminate the surreptitious tactical ends to which media are employed. The tactic of media is invisible. Invisible in plain sight... The tactic of media is to make the invisible visible.."

Microwave Harassment and Mind-Control Experimentation by, Julianne McKinney Director, Electronic Surveillance Project Association of National Security Alumni

Ms. Guidance Cyberwar, Information Warfare and Psychological Operations

Politprop Minneapolis College of Art and Design (MCAD) "POLITPROP examines the art of propaganda as a potent force in forming social consciousness and recognizes propaganda as a powerful, valid means of artistic expression designed to broadly communicate messages of public importance. POLITPROP provides vital information for the research, detection and development of propaganda."

Propaganda Analysis Home Page As generally understood, propaganda is opinion expressed for the purpose of influencing actions of individuals or groups... Propaganda thus differs fundamentally from scientific analysis. The propagandist tries to "put something across," good or bad. The scientist does not try to put anything across; he devotes his life to the discovery of new facts and principles. The propagandist seldom wants careful scrutiny and criticism; his object is to bring about a specific action. The scientist, on the other hand, is always prepared for and wants the most careful scrutiny and criticism of his facts and ideas. Science flourishes on criticism. Dangerous propaganda crumbles before it. Alfred McClung Lee & Elizabeth Briant Lee, The Fine Art of Propaganda, 1939.

Propaganda & Psychological Warfare Resource Page Propaganda in Theory and PracticeHow Does It Work?

Propaganda and Psychological Warfare Studies: Glossary: Department of Defense Military and Associated Terms

Propaganda in Theory and Practice: What Makes It Work? This report provides a basic description of contemporary propaganda and psy-war activities, with an explanation of how people can be "scientifically" deceived.

Psychological Operations/Warfare

The Psywar Society Home Page This site serves " international association of collectors of aerial propaganda leaflets and psychological warfare historians." Even though much of the material is focused on aerial leaflets, there are materials (and pointers to materials) on other / broader aspects of psychological operations / warfare as well.

The Reporters Collective (Media.Org) "an informal alliance of journalists and scholars from both north and south keeping a watchful eye on the international financial, military, and political institutions of the world and the often-hidden influence they wield on the emerging nations of the southern hemisphere. We specialize in research on the use of multilateral institutions as agents of United States foreign policy. Our aim is to investigate and to publicize the tactics, objectives, and plans of these agencies by sharing our knowledge with journalists, editors, publishers, and academics the world over. Information, in this context, becomes a form of self-defense, as the continued domination of the "old powers" becomes more and more dependent upon misinformation and propaganda."

Social Influence: Propaganda and Persuasion -- Some useful background information.

Sun Tzu The Art of War , compiled well over two thousand years ago by a mysterious Chinese warrior-philospher, is still perhaps the most prestigious and influential book of strategy in the world today, as eagerly studied in Asia by modern politicians and executives as it has been by military leaders and strategists for the last two millennia and more.


CIAC (US Dept of Energy's Computer Incident Advisory Capability) Hoax Pages: CIAC does not have the resources to investigate and/or confirm every hoax currently circulating the Internet. You can help eliminate "junk mail" by educating the public on how to identify a new hoax warning, how to identify a valid warning and what to do if you think a message is a hoax.

CIAC Chain Letter Page

Dr Solomon's Anti-Virus toolkit - Anti-Virus toolkit

F-Secure Computer Virus Info Center This service is provided by the F-Secure Anti-Virus Support Team. The database is updated several times a week. The virus description service was started on the 13th of June, 1994. Now in its sixth year, this site was the first anti-virus web site ever - and is considered the industry standard source for up-to-date information on new viruses and hoax alerts.

Fix-It Utilities Software - Fix-It Utilities 99 is a revolutionary, integrated suite of utilities that diagnose, fix and optimize Windows.

McAfee Associates Virus Hoax List

Network Associates - Anti-Virus Tools

Obtaining F-PROT - How to obtain F-PROT antivirus software The San Fernando Valley Folklore Society's Urban Legends Reference Pages

Stiller Research's Hoax Page wins acclaim as an internet "Key Resource"! Links2Go samples millions of web pages to determine which pages are most heavily cited by other web page authors. The best are selected as "Key Resources" Our hoax page has been designated a "Key Resource" in the "Urban Legends" category.

Symantec Anti Virus Research Center

Trend Micro, Incorporated: HouseCal/Free Tools/Scan for viruses

Urban Legends (Alt.folklore.urbanlegends) formerly the Computer Virus Myths home page Learn about computer virus myths, hoaxes, urban legends, and the implications if you believe in them. You can also search a list of computer virus hoaxes from A to Z.

Contact Interpact How to Contact Interpact, Inc.

Winn Schwartau, President and CEO
Kelley Walker, Development 727.796.8484 727.393.6361
Betty G. O'Hearn, Marketing


Copyright © 2000-2001 Interpact, Inc. All Rights Reserved
For comments about this page, contact: Kelley Walker, Interpact, Inc.
Copyright PolicyPrivacy Policy

Interpact Inc Security Awareness

Check out our FREE security awareness promotional art.  Download your copies today!