Information Warfare

C - F

Campen, Alan D.

1.  "Information Operations Seeks Blend of Missives and Missiles."  Signal, Jun. 2002, 33-35.

2. ed. The First Information War. Fairfax, VA: AFCEA International Press, 1992.

Castagna, Michael J. "Virtual Intelligence: Reengineering Doctrine for the Information Age." International Journal of Intelligence and Counterintelligence 10, no. 2 (Summer 1997): 180-195.

Thematically, this article proceeds along the following line: "The information revolution has created an information-rich environment that is the essential enabler of the transparent battlefield.... As a result, the information revolution will allow timely and accurate intelligence to become a substitute for a large standing military force."

Cebrowski, Arthur K. [VADM/USN], and John J. Garstka. "Network-Centric Warfare: Its Origin and Future." U.S. Naval Institute Proceedings 124.1 (Jan. 1998): 28-35.

"Arising from fundamental changes in American society and business, military operations increasingly will capitalize on the advances and advantages of information technology."

Centner, Christopher M.  "Precision-Guided Propaganda: Exploiting the U.S. Information Advantage in Peacetime." Strategic Review 25 (Spring 1997): 35-41.

Clausing, Jeri. "Computer Intruders Apparently From Russia, Senate Panel Is Told." New York Times, 6 Oct. 1999. []

Michael Vatis, who heads the FBI's National Infrastructure Protection Center, told the Senate Judiciary Subcommittee on Technology and Terrorism on 6 October 1999 that "[i]ntruders who stole sensitive information on Defense Department weapons during a widespread series of attacks on government and private computer networks are apparently based in Russia."

Cline, Mary Ann. "The Growing Importance of the Intelligence Community in Information Warfare." Defense Intelligence Journal 5, no. 1 (Spring 1996): 83-86.

Copeland, Thomas E., ed. The Information Revolution and National Security. Carlisle, PA: Strategic Studies Institute, Army War College, 2000.

Proceedings from a conference co-sponsored by the Strategic Studies Institute and the University of Pittsburgh Matthew B. Ridgway Center for International Security.

Cox, Joseph L. [MAJ/USA] Information Operations in Operations Enduring Freedom and Iraqi Freedom -- What Went Wrong? Ft. Leavenworth, KS: U.S. Army School of Advanced Military Studies, May 2006. []

Aftergood, Secrecy News, 4 Aug. 2006, notes that information operations "can include military deception, psychological operations, operations security, and electronic warfare." This "monograph investigates the role of information operations in Iraq and presents recommendations for changes in doctrine, training, resources and intelligence support."

Critchlow, Robert D.  "Whom the Gods Would Destroy: An Information Warfare Alternative for Deterrence and Compellence."  Naval War College Review 53 (Summer 2000): 21-38.

Defense Intelligence Journal. "Information Warfare." 5, no. 1 (Spring 1996): Entire issue.

Click for Table of Contents.

Defense Intelligence Journal. "Knowledge Management." 9, no. 1 (Winter 2000): Entire issue.

Click for Table of Contents.

Denning, Dorothy E. Information Warfare and Security. New York: ACM Press, 1999.

Kruh, Cryptologia 23.3, calls Denning's work "a comprehensive overview of the wide range of activities that comprise information warfare." The book "provides the[] background needed to make informed judgements about potential threats or the defenses against them."

DiCenso, David J.  "IW Cyberlaw: The Legal Issues of Information Warfare."  Airpower Journal 13 (Summer 1999): 85-102.

DiCenso, David J. [MAJ/USAFR] "Information Operations: An Act of War." Chronicles Online Journal (31 Jul. 2000). [ -- not active 8/24/09]

DiNardo, R. L., and Daniel J. Hughes. "Some Cautionary Thoughts on Information Warfare." Airpower Journal 9 (Winter 1995): 69-79.

DuBois, Dennis N. "Intelligence Community Information Technology: Driving Architecture to Budget." Defense Intelligence Journal 9, no. 1 (Winter 2000): 57-66.

"If the Intelligence Community is to be a real 'community', greater commonality of IT architectures is required throughout."

Fenton, Ben. "Ex-KGB Major Leads US War against Hackers." Telegraph (London), 9 Jun. 1999. []

Victor Sheymov, a former KGB major who defected to the United States over 20 years ago, has founded a "cybersecurity" company and "is patenting a new device to thwart hackers."

Ferguson, Michael G. [CAPT/USMC] "The Internet: Our Enemy's Best Friend." Marine Corps Gazette (Jan. 1999), 48-50.

Expresses concern about the scope and nature of material available on the U.S. Marine Corps via the Internet, including extensive technical details accessible on the Marine Corps homepage ("Major advances in technology can be a dual-edged sword.").

Fogleman, Ronald R.  "Information Revolution: The Changing Nature of Warfare."  Aviation Week & Space Technology, 16 Apr. 1997, 31-32ff.

Forno, Richard F.

1. "Information Warfare: Fallacies in the Analysis of an Asymmetric Strategic Threat." NMIA Update, Feb. 1998, 11-17.

Current trends in U.S. information warfare focus "almost exclusively on developing enormously complex (electronic) architectures, and on conducting offensive attacks against others (many of whom do not have significant electronic infrastructures susceptible to electronic attack)."

2. and Ronald Baklarz. The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy. Washington, DC: CISSP, 1999.

The NMIA ZGram, 16 Feb. 1999, provides the following description of this work: "The Art of Information Warfare (TAOIW) is the first common-sense primer on the subject written for laymen, general readers, corporate executives, as well as IT professionals interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and technical perspectives."

Fredericks, Brian E.  "Information Warfare at the Crossroads."  Joint Force Quarterly (Summer 1997), 97-103.

Return to Post-WWII Issues Table of Contents

Return to Infowar Table of Contents