A gateway to full-text online resources about the Revolution in Military Affairs, information war, and asymmetrical warfare. |
sponsored by Project on Defense Alternatives | |
E-mail This Page
| Tag This Page (del.icio.us) Strategic Information Warfare and Defense |
||
Terrorism and Counter-terrorism Homeland Security RMA Overview History and Context Information Warfare Strategic Information Warfare and Defense Asymmetric Warfare Future Warfare Network Centric Warfare U.S. Transformation Joint & Defense Wide Service Visions Air Power Space Power Army Transformation Sea Power Nuclear Issues Intelligence Issues New Technology Urban Warfare, Counter-Insurgency, & Operations Other Than War RMA & US Defense Strategy Second Thoughts on the RMA Allied Perspectives RMA Outside the West Arms Control, Ethics, and International Law PDA Sponsored Sites |
Cyberwar, Anyone? Air Force and the Cyberspace Mission Defending the Air Force's Computer Network in the Future Analysis: A New USAF Cyber-War Doctrine Hackers Take Down the Most Wired Country in Europe Cyber Attacks Explained Cyber Mobilization: The Neglected Aspect of Information Operations and Counterinsurgency Doctrine The Pentagon's Brand New Plan for Winning the Battle of Ideas Against Terrorists High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments America's War on the Web Cyberstrategy 2.0 Clausewitz's Theory of War and Information Operations The New Reality of International Telecommunications Strategy The New Reality of International Telecommunications Strategy Information Battleground Who Will Control the Internet Seminar Report: Asymmetric Information War at CNA Report of the Commission to Asses the Threat to the United States From Electromagnetic Pulse (EMP) Attack Use and Abuse of Media in Vulnerable Societies Creating a Common Communications Culture The Al-Jazeera News Network: Opportunity or Challenge for US Foreign Policy in the Middle East? Telewar: Lessons of News Management in the Gulf Wars The Dangers of Warfare in a Media Age Planning for the Next Cyberwar Cyberwar Solution Terrorists on the Net? Who Cares? Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats No Orwellian Scheme Behind DARPA's Total Information Awareness System Reality Bytes: Cyberterrorism and the Terrorist 'Use' of the Internet Wired Warfare: Computer Network Attack and Jus In Bello The Rise and Fall of the Office of Strategic Influence Designing Information Resources for Transboundary Conflict Early Warning Networks (Executable file produces PDF) Is Cyber Terror Next? Countering cyber war Information Power: International Affairs in the Cyber Age Cyber Protests: The Threat to the U.S. Information Infrastructure Cyber Attacks During the War on Terrorism: A Predictive Analysis Cyberwarriors: Activists and Terrorists Turn to Cyberspace Hacker Warriors: Rebels, Freedom Fighters, and Terrorists Turn to Cyberspace War.com: The internet and Psychological Operations The Ethics of Computer Network Attack Defensive Information Operations: 2000 Summer Study Volume II President's Commission on Critical Infrastructure Protection: Documents Cyber Threats: Developing a National
Strategy for Defending Our Cyberspace Preparing the U.S. Army for Homeland
Security: Concepts, Issues, and Options Information Warfare and the New Challenges to Waging Just War The Internet and the Changing Face of International Relations and Security Papers from the Conference on Homeland Protection (pdf download) Weapons of Mass Destruction Soldiers, Constables, Bankers, and Merchants: Managing National
Security Risks in the Cyber Era (pdf download) Whom the Gods Would Destroy: An Information Warfare Alternative for Deterrence and Compellence
Cyberterrorism Resolving the Legal Issues Concerning Information Warfare and International Law: The Reach of the Existing Framework, and the Creation of a New Paradigm Electronic
Pearl Harbor: A slogan for U.S. Info-warriors Infowar of Words Information Warfare: Time to Prepare Defending America's Cyberspace. National Plan for Information Systems Protection Version 1.0 The
Defense of the Infrastructure Information Operations Violates Protocol I The Emergence of Noopolitik: Towards An American Information Strategy Securing the U.S. Defense Information Infrastructure: A Proposed Approach Cyberthreat: Protecting U.S. Information Networks The Revolution in Military Affairs-Special Report Asymmetric Warfare and the Threat to the American Homeland Truth is the first casualty of cyberwar. An Electronic Pearl Harbor? Not Likely
Takedown: The Asymmetric Threat to the Nation Information Warfare and Nuclear Preemption Conflict and the Computer: Information Warfare and Related Ethical Issues What is Strategic Information Warfare?
Strategic Information Warfare Rising
The Cyber-Posture of the National Information Infrastructure Information Warfare and Deterrence
Defense Science Board Task Force on Info-War
Defensive Information Warfare
Information Warfare Database
Home | Online Books | Specialists | Research Sites | Bibliography PDA Publications: War Report | RMA Debate Page The Project on Defense Alternatives, The Commonwealth Institute | |