1. "Cyber-Terrorism: The Shape of Future Conflict?" RUSI Journal, Oct. 1997, 40-45.
2. "Information Operations -- Coming of Age?" Jane's Intelligence Review, May 2000, 52-55.
Rattray, Gregory J. [LTCOL/USAF] Strategic Warfare in Cyberspace. Cambridge, MA: MIT Press, 2001.
Cronin, The Information Society 19.4 (2003), calls this a "compendious and remarkably level-headed" book. It "is a most welcome antidote to the hyperbole and simplifications to be found in much of what is written on the subject of information warfare and the Revolution in Military Affairs (RMA)."
Richardson, Doug. "Information Warfare -- New Threats and New Opportunities." Asian Defence Journal, Apr. 1997, 50-55.
Robins, Bill. "Implications of Information Age Operations." RUSI Journal, Oct. 1997, 32-39.
Rodgers, James L. "Information Warfare: Nothing New under the Sun." Marine Corps Gazette, Apr. 1997, 23-29.
Rohde, William E. [CDR/USN] "What Is Info Warfare?" U.S. Naval Institute Proceedings 122, no. 2 (Feb. 1996): 34-38.
This explanation of information warfare is built around the current Joint Staff definition. The author works through six categories: collection, processing, communications, offensive information warfare, protection, and issues and impact.
Rona, Thomas P. "Information Warfare: An Age-Old Concept with New Insights." Defense Intelligence Journal 5, no. 1 (Spring 1996): 53-67.
Ryan, Julie, John Woloschek, and Barry Leven. "Complexities in Conducting Information Warfare." Defense Intelligence Journal 5, no. 1 (Spring 1996): 69-82.
Sakkas, Peter E. "Espionage and Sabotage in the Computer World." International Journal of Intelligence and Counterintelligence 5, no. 2 (Summer 1991): 155-202.
The focus here is on the vulnerability of computers to various kinds of attack.
Schanzer, Steven T. "INTELINK: An Information Strategy." American Intelligence Journal 15, no. 2 (Autumn/Winter 1994): 37-41.
The effort to develop an information strategy began with the creation of the Intelligence Systems Board (ISB), which spanned both DoD and non-DoD organizations and was responsible for resolving interoperability issues within the intelligence community. The Board is supported by a "full-time action arm": the Intelligence Systems Secretariat (ISS). The ISS has established an Information Management Policy Working Group (IMPWG) comprised of senior technical representatives from intelligence organizations. The testbed architectural framework developed was INTELINK, designed to be "a worldwide intelligence information service." Early tests were successful, and follow-on issues are being addressed.
Schneider, James J. "Black Lights: Chaos, Complexity, and the Promise of Information Warfare." Joint Force Quarterly, Spring 1997, 21-28.
Schwartau, Winn. Information Warfare: Chaos on the Electronic Highway. New York: Thunder's Mouth Press, 1994. Information Warfare; Cyberterrorism: Protecting Your Personal Security in the Electronic Age. 2d ed. 1996. [pb]
Steele, Periscope 19.5, calls Information Warfare the "best available professional reading on the subject of C4I warfare." It "concludes with ... an outline for a recommended national C4I security strategy." This view is concurred in by Miller, IJI&C 11.2, who calls Schwartau's book "a valuable resource in the effort to combat those who seek to penetrate government, corporate, and personal security." For Kruh, Cryptologia 19.2, the author outlines "almost every kind of informational disaster imaginable."
Schwartzstein, Stuart J. D., ed. The Information Revolution and National Security. Washington, DC: The Center for Strategic and International Studies, 1996.
Seamon, Proceedings 125.1 (Jan. 1998), notes that both the doomsayers and the less-frenzied have their say in this edited volume.
[Serabian, John.] "Text: CIA Official Assesses Information Warfare Threat." 7 Dec. 1998. https://www.cia.gov.
Serabian is chief of the CIA's Critical Technologies Group. This item is text of a speech he gave on 7 December 1998 at a "Defense Week" conference. In the speech, he argues that "information warfare has the potential to deal a crippling blow to our national security if we do not take strong measures to counter it."
Singer, Abe, and Scott Rowell. "Information Warfare: An Old Operational Concept with New Implications." Institute for National Strategic Studies Strategic Forum 99 (Dec. 1996): 1-4 (entire issue).
The authors argue that the energy-information equation in warfare is changing rapidly, and suggest that the conduct of warfare will have to change to keep pace.
Sparrow, Malcolm K. "Network Vulnerabilities and Strategic Intelligence in Law Enforcement." International Journal of Intelligence and Counterintelligence 5, no. 3 (Fall 1991): 255-274.
Stein, George J. "Information Warfare." Airpower Journal 9 (Spring 1995): 30-39.
Stein, George J., and Richard Szafranski. U.S. Information Warfare. Alexandria, VA: Jane's Information Group, 1996.
Taylor, Philip M. "Propaganda and the Web War" The World Today 55, no. 6 (30 Jun. 1999): 10-12.
Thomas, Timothy L. "Deterring Information Warfare: A New Strategic Challenge." Parameters: U.S. Army War College Quarterly 26, no. 4 (Winter 1996-1997): 81-91.
Tirpak, John A. "New World of Information Warfare." Air Force Magazine, Jun. 1996, 30-35.
Tomes, Robert R. "Boon or Threat? The Information Revolution and U.S. National Security." Naval War College Review 53 (Summer 2000): 39-59.
Vego, Milan N. "Operational Deception in the Information Age." Joint Force Quarterly 30 (Spring 2002): 60-66.
"New information technologies and techniques increase rather than reduce opportunities for deception, allowing both attackers and defenders greater choice of methods."
Wettering, Frederick L. "The Internet and the Spy Business." International Journal of Intelligence and Counterintelligence 14, no. 3 (Fall 2001): 342-365.
"In addition to the theft of personal [and business] secrets, the Internet has made it much easier to target and recruit potential spies and securely communicate with them. The Internet has become a real boon to the spying profession."
Wheatley, Gary F., and Richard E. Hayes. Information Warfare and Deterrence. Washington, DC: National Defense University Press, 1996.
Whitehead, Yulin. "Information as a Weapon: Reality Versus Promises." Airpower Journal 11 (Fall 1997): 40-54.
Williams, Robert H. "Intelligence Community Girds for Cyberwar; Major Snafus Possible with Low Tech Effort." National Defense, Oct. 1998, 4.
Quotes remarks by Deputy Defense Secretary John J. Hamre, "at a NATO meeting in Vienna," and by DIRNSA Lt. Gen. Kenneth A. Minihan, "in an appearance before the Governmental Affairs Committee," to the effect that threats to the U.S. digital information infrastructure should be taken seriously.
Wright, Richard H. "Information Operations: Doctrine, Tactics, Techniques, and Procedures." Military Review 81 (Mar.-Apr. 2001): 30-32.
Return to InfoWar Table of Contents
Return to Post-WWII Issues Table of Contents
Return to Military Intelligence Table of Contents