[Institute for 
the Advanced Study of Information Warfare]

Information warfare, also known as I-War, IW, C4I, or Cyberwar, has recently become of increasing importance to the military, the intelligence community, and the business world. The purpose of the IASIW is to facilitate an understanding of information warfare with reference to both military and civilian life.


"Communications without intelligence is noise; intelligence
without communications is irrelevant."

Gen. Alfred. M. Gray, USMC

". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence.
Subjugating the enemy's army without fighting is the true pinnacle of excellence."

Sun Tzu, The Art of War

"There are but two powers in the world, the sword and the mind.
In the long run the sword is always beaten by the mind."
Napoleon Bonaparte

This page will help you increase your understanding of information warfare. For those unfamiliar with the term, "Information Warfare" the following definition may be helpful:

Information warfare is the offensive and defensive use of information
and information systems to deny, exploit, corrupt, or destroy, an
adversary's information, information-based processes, information
systems, and computer-based networks while protecting one's own by
predicting, mitigating, countering, and defeating threats..
Such actions are designed to achieve advantages over military,
political or business adversaries.

-- Dr. Ivan Goldberg

Glossary of information warfare terms.

2600:The Hacker Quarterly

ACLU to spy on Echelon (Oakes).

Advanced Technology Demonstration Network (ADTnet)

Al Quaeda and Information Warfare

Air War College: Cyberspace and Information Operations Study Center.

Anonymous communication on the Internet.

The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy [An important book]

Australian Computer Emergency Response Team (AUSCERT).

An Australian infowar site

Banks appease online terrorists. (Shelton)

Bibliography on IW.

Big brother in cyberspace.

Bin Laden and steganography. (McCullagh)

Bin Laden and telecommunications.

Buffer overflow attacks.

Bugging: Types of technical surveillance devices.

Building Internet Firewalls (2nd Edition) [An important book]

Bulgaria and computer viruses. (Bennahum)

Business and IW.

C2 Bibliography.

CALEA: Communications Assistance for Law Enforcement Act---Text of the act.

Canadian information operations.

Carnivore: Abandoned by the FBI?

Carnivore and your privacy.

Carnivore and congress.

Still more on Carnivore.

Carvinore can read everything.


Carnivore: How it worked.

Center for Secure Information Systems (CSIS).


The CERT Guide to System and Network Security Practices [An important book]

Redefining the role of information warfare in Chinese strategy.

China's restrictions on internet use.

China's online army.

A Chinese view of IW (Pufeng)

China and cybeterrorism.

CIAC Bulletins.

The CIA, science and technology

CIPHER: Electronic newsletter of the technical committee on privacy and security of the IEEE.

Code Red FAQ.

Code Red worm: CERT advisory

Computer crime bibliography. (Anderson)

Computer crime: The Department of Justice perspective.

Computer crime: The costs.

Computer crime: An introduction.

Computer crime laws by state.

Computer crime prevention (Interpol).

Computer Crime Researech Center

Computer crime: How the FBI invstigates.

Computer crime and security survey.

Another computer crime and security survey.

Computer crime statistics. (Thibodeau)

Computer Emergency Response Team (CERT).

Computer espionage devices.

Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. [An important book.]

Computer fraud and abuse act (USA).

Computer Fraud: Financial and Ethical implications.

Computer security bulletins.

Computer security information.

Computer security, law, and privacy a listserv.

Computer virus library

Computer virus myths and hoaxes.

Computer virus tutorial.

Computer virus warnings; How to tell the real from the hoaxes.

Confidentiality and health-related information.

More on the confidentiality of health-related information: HIPAA.

Cornerstones of information warfare. (Fogleman & Widnall)

Cyberterrorism: A case study..

Countering non-lethal information warfare. (Kluepfel)

Countering threats to information technology assets. (Lingerfelt)

Counterintelligence for the 21st century.

Covert Action Quarterly

Criminal threats to business on the Internet. (Anderson)

Critical infrastructure protection. (Presidential Decision Directive)

Critical infrastructure protection: Executive order of 16 October 2001.

Cryptographic terms: A glossary.

Cryptography and free speech. (Reimman)

Cryptography & Network Security: Principles & Practice [An important book]

Cryptography and privacy.

Cuba's approach to information management. (Symmes)

Cyber situation awareness.

Cyberattacks during the war on terrorism.

Cyber Attack: The National Protection Plan and its Privacy Implications.

Cybercrime: An example.

Hiding cybercrimes. (Denning & Baugh)

Cybercrime: State and local resources needed to fight it.

Cybercrime prevention.

Cybercrime in the banking Industry.

Cybercrime: Civil libertarian problem with the solutions. (McCullagh)

Cybercrime, transnational crime, and intellectual property theft. (Saxton et al)

Cybercrime: European commission.

Cyberlaw encyclopedia.

Cyberlaw regarding hacking/cracking, viruses, and security

Cyberliberties as seen by the ACLU.

Cybernation: The American infrastructure in the information age.

Cyberspace Electronic Security Act(CESA)

Cyberspace & the Use of Force [An important book]

Cyberspace and Information Operations Study Center. (Air War College)


More on Cyberstalking.


Cybersurveillance and civil liberties.

Combating Cyber Threats.

Cyberterrorism. (Gordon)

Cyberterrorism: Putting it into context. (Kerr)

Cyber Terrorism and Information Warfare: Threats and Responses [An important book]

Cyberterrorism and the FBI.

Cyberterrorism: Analyzing the threat. (Rattray)

Cyberterrorism: Case study.

Cyberterrorism and Congress.

Cyberterrorism --- Fact or fancy? (Pollitt)

Cyberterrorism in the future. (Collin)

Cyberterrorism: Internet vulnerabilities

Cyberterrorism: An introduction

Cyberterrorism: Protecting commercial computers.

Cyberterrorism: Analyzing the threat. (Borland)

Cyberterrorism Hype v. Fact. (Knake)

Cyberterrorism: NATO resources.

The myth of cyberterrorism. (Green)

Cyberwarfare. (Schwartz)

Cyberwar 2.0 : Myths, Mysteries & Reality [An important book]

Cyberwar 3.0 : Human Factors in Information Operations and Future Conflict [An important book]

Cyberwar against Bin Laden.

Cyberwar and Israel.

Cyberwar : Security, Strategy, and Conflict in the Information Age [An important book]

Cyberwar: US Army prepares offensive techniques. (Messmer)

More on offensive cyberwar. (Graham)

Cyberwar in the Middle East.

More on cyberwar in the Middle East

Cyber-warfare: Principles. (Parks & Duggan)

The latest on cyberwar in the Middle East

Cyberwar and netwar: New modes, old concepts, of conflict. (Arquilla & Ronfeldt)

Cyber Warfare: An analysis of the means and motivations of selected nation states.

Deconstructing information warfare.

Defending against computer attacks. (Libicki)

Defending against cyberterrorism: A Japanese view. (Miyawaki)

Defending information networks from attack. (Leopold)

Defending the USA from cyber attack. (Minihan )

Defense Advanced Research Projects Agency (DARPA) views the future. (Fernandez)

Defecse Intelligence Agency (DIA).

Defensive information warfare. (Alberts)

Defensive information warfare: Strategy and tools. (Duggan & Hutchinson)

More on defensive information warfare. (Kaomea et al.)

Defining civil defense in the information age. (Round & Rudolph)

Denial of service attacks.

Denial of service attacks and the federal response.

Denial of service attacks and IRC.

Denial of service attacks: Minimizing the effects. (Huegen)

Denial of service attacks: Smurfing.

Denial of service attacks and terrorism.

Denial of service attacks and the UDP port.

Detecting computer intrusions.

Digital Evidence and Computer Crime [An important book

Digital search and seizure. (Center for Democracy and Technology)

The digital threat: United States national security and computers. (Devost)



Distributed denial of service tools.

Protecting Against Distributed Denial of Service (DDoS) Attacks.

DoD's automated intrusion detection system. (Frank)

The DoD's reaction to hacking. (Cummings)

DoD's vulnerability to information warfare. (Levin)

Dominant battlespace knowledge. (Johnson & Libicki)

EASEL survivability simulation


ECHELON: An introduction.

Inside ECHELON. (Campbell)

ECHELON: A European report.

ECHELON: A global surveillance network. (Verton)

ECHELON: Lots of up-to-date information.

ECHELON: New Zealand's involvement. (Hager)

An ECHELON failure: The World Trade Center terrorism.

ECHELON: The Danger of Communication in the 21ST Century. (Yancey)


ECHELON use by USA investigated by the United Nations.

Economic and industrial espionage.

Economic Espionage Act of 1996.

Economic espionage and cybercrime.

Economic espionage, technology transfers and national security. (Schweitzer et al.)

The economic impact of IW.

Electromagnetic evesdropping. (van Eck)

Electromagnetic radiation and the brain: A bibliography. (Beck & Byrd)

Electromagnetic weapons of mass destruction. (Kopp)

Electronic civil disobedience. (Wray)

More on electronic civil disobedience.

Electronic Crime Scene Investigation (U.S. Dept. of Justice)

Electronic Frontier Foundation (EFF)

An electronic Pearl Harbor? Not likely. (Smith)

More on electronic Pearl Harbor.

Electronic Warfare for the Digitized Battlefield [An important book]

Eligible receiver. (Gertz)

More about Eligible receiver.

Email and espionage.

Email security.

Email wiretapping.

Emission security assessments.

Emission security countermeasures.

EMP and TEMPEST hardening: U.S. Army document.

Encryption in crime and terrorism. (Denning & Baugh)

Encryption policy: A Department of Justice FAQ.

Encryption papers available online.

Email security.

Errors that lead to computer security vulnerabilities.

E-strikes and cyber-sabotage: Civilian hackers go online to fight.

Ethics, law and computer security.

The ethics of information warfare. (Kuehl)

European Union directive on data protection.

Ew 101 : A First Course in Electronic Warfare [An important book]

The FBI and cybercrime.

The FBI and cybersecurity.

The FBI and electronic surveillance.

The FBI and email.

FBI's Congressional testimony on cybercrime.

Federal Communications Law Journal.

Federal Computer Incident Response Center(FedCIRC).

Federal computer surveillance..

Federal guidelines for searching and seizing computers. (Robbins)


Fighting computer viruses. (Kephart et al.)

Fighting Internet crime. (Lash)

Financial information networks: Fraud and intrussion detection.

Financial information networks: Vulnerability to hackers.

Firewalls FAQ

Firewalls: Are they enough? (Giannoulis)

Firewalls: How to deploy.

Firewalls---For PCs.

Firewalls and Internet Security [An important book]

Firewalls: NIST guidelines.

Fleet information warfare center.

Foes with grudge sludge Drudge. (Glave)

Forecasting model for Internet security attacks. (Korzyk & VanDyke)

Forum of Incident Response and Security Teams.

France changes policy regarding cryptography. (Oram)

A French IW site. [In French]

Fundamentals of information warfare---An airman's view. (Fogleman)

The future of information security. (Libicki)


Generally-Accepted System Security Principles. (GASSP)

German government site devoted to information technology security [In Genman].

Gilmore report of 31 October 2001.

Global Early Warning Information System (GEWIS)

More on Global Early Warning Information System (GEWIS)

Global information security. (Libicki)

Google as apyware.

Governmental (USA) electronic surveillance activity.

GOVNET: A new federal telecommunications network

The great cyberwar of 2002. (Arquilla)

Guerrilla warfare in cyberspace.

Kevin Metnick's new book on hacking. [An important book]

Hacked Web pages: An archive.

Hacked Web pages: Another archive.

Articles on hacking. (Martin)

Hacker sentenced to prison: Press release of the Department of Justice.

Hacker wargames.

Hacker's view of hacking.

Hackers: Can they considered constructive. (Hannemyr)

Hackers penetrate DoD computer systems.

Hackers Beware: The Ultimate Guide to Network Security [An important book]

Hackers could face terrorism charges.

Hackers who break into computer systems (Denning).

Hacking: How its done.

Hacking: How should we respond?

Hacking in 2000: Work for DoD.

Hacking as civil disobedience.

Hacking Nasdaq. (Oakes & Kahney).

Hacking: The digital underground.

Hacking the power grid. (Koprowski)

Hacking TCP/IP. (Shimomura)

Hacking U.S. Government Web sites.

Hacking with a conscience.

Hacking via web browsers.

Hacks: The best.

Hardwar, softwar wetwar operational objectives of information warfare. (Wilson)

Hearing on current and projected national security threats. (Tenet)

HERF and other radio frwquency weapons. (Sheymov)

HERF and the FAA.


Higher education and information security. (Reynolds)

Hotmail security problems. (Wilcox)

Human intelligence and covert action.

Identity theft. (Hayes)

Identity theft: Reducing the risk.

Identity Theft: Assessing the Problem and Efforts to Combat It.

Identity Theft: A Canadian perspective.

Identity Theft Resource Center.

Identity theft: What to do if it happens to you.

Improving the security of your site by breaking into it. (Farmer)

Incident Response: Investigating Computer Crime [An important book]

India and cyber-terrorism.

Induced fragility in information age warfare. (Fowler & Peterson)

Inductrial espionage. (Denning et al)

Industrial espionage and hacking.

The information age: Its impact and consequences. (Alberts & Papp)

Information Assurance. (Hamill)

Information insecurity. (Peters)

Information Operations

Information operations and information warfare.

Information operations, deterrence, and the use of force. (Barnett)

Information operations in Bosnia: A preliminary assessment. (Allard)

Information operations: The fifth dimension of warfare (Fogleman).

Information peacekeeping. (Steele)

Information risk management.

Information Security Policies Made Easy Version 9. {An important book]

Information Security Risk Analysis. [An important book]

Information superiority: A DoD perspective.

Information systems: Insiders as a threat.

Information systems: More on insiders as a threat.

Information Technology Laboratory. (NIST)

Information, technology, and the center of gravity. (Harley)

Information terrorism. (Devost, Houghton and Pollard)

Information war and the Air Force: Wave of the future or current fad? (Buchan)

Cornerstones of information warfare. (Fogleman & Widnall)

Information Warfare Battlelab (US Air Force)

Information warfare in 2025. (Stein)

Information warfare and international law. (Greenberg et al.)

Information warfare: The possibility of disaster. (Carver)

Information warfare defense. (Defense Science Board)

Information security: Computer attacks on Department of Defense pose increasing risks.

Information systems at the dawn of a new crentury. (Forno)

Information technology: Federal dcouments.

Information technology vulnerabilities.

Infowar. (Browning)

Information warfare. (Lewis)

Information warfare bibliography.

Information warfare database.

Information warfare: Defeating the enemy before battle. (Ivefors)

Information warfare and deterrence. (Wheatley & Hayes)

Information Warfare and Defense Preparedness. (Lipicki)

Information warfare with electromagnetic attack.

Information Warfare : How Businesses, Governments, and Others Achieve Global Objectives and Atain Competitive Advantage [An important book]

Information Warfare: How to Survive Cyber Attacks [An important book]

Information warfare and information security on the Web.

Information Warfare, Infosec, and Dynamic Information Defense.

Information warfare and international law. (Greenberg et al.)

Information warfare: Issues and perspectives. (Miller)

The information warfare mania. (Whitaker)

Information warfare: National protection plan and its privacy implications. (Cilluffo)

Information warfare: The perfect terrorist weapon. (Shahar)

Information warfare: Planning the campaign. (Okello et al.)

Information Warfare Principles and Operations [An important book]

Information warfare: Protecting the USA from attack.

Information warfare: Recent news.

Information Warfare & Security [An important book]

Information warfare weapons.

Infosec: How secure is your network?

From InfoWar to knowledge warfare. (Baumard)

Infrastructure protection and threats to civil liberties. (O'Neil & Dempsey)

Infrastructural warfare.

Infrastructural warfare slides. (Wilson)

Intelligent agents for intrusion detection.

The uses and misuses of intelligence. (Kober)

Intelligence agencies of the world - - - listed by country.

Intelligence analysis variables: A taxonomy

Intelligence-based threat assessments for information networks and infrastructures. (Anderson)

Intelligence challenges through 2015. (Gannon)

Intelligence in the Internet era. (Clift)

International computer intrusions. (Anderson)

International electronic surveillance by the USA: Civil liberties aspects. (ACLU et al.)

International legal implications of information warfare. (Aldrich)

Internet and cyber-terrorism. (Whine)

Internet firewalls: An FAQ. (Ranum et al.)

Internet Fraud Complaint Center.

Internet security.

Internet as a tool for influencing foreign policy. (Denning)

Internet as an intelligence tool. (Wilson)

More on the Internet as an intelligence gathering tool

Internet monitoring by U.S. government.

Internet privacy law. (Walton)

Reporting internet-related crime.

INTERNIC security hole.

Interview with John Arquilla.

Introduction to Communication Electronic Warfare Systems [An important book]

An introduction to information warfare. (Haeni)

Intrusion detection: An FAQ.

Intrusion detection, another FAQ.

Intrusion detection: Resources.

Intrusion detection: New developments.

Intrusions: How to respond.

Israel's cyberway with Iran.

The IW threat from sub-state groups: An interdisciplinary approach. (Rathmell et al.) More about IP-spoofing.

Iraq and information warfare

Joint force superiority in the information age. (Paige)

Joint Military Intelligence College. (JMIC)

Journal of Electronic Defense.

Journal of Internet Security.

Keeping information warfare in perspective. (Gompert)

Knowledge strategies: Balancing ends, ways, and means in the information age. (Fast)

Legal aspects of cyberspace.

Legal and practical constraints in IW, (Kuschner)

More on the legal aspects of IW. (DeCenso)

Linux and cybercrime.

Measuring the impact of information warfare.

Microsoft vs. hackers. (Shankland)

Microsoft a threat to National security?(Fontana)

Microsoft Office leaks sensitive data. (Oakes)

Military information operations in a conventional warfare environment.

Model state computer crimes code.

MKULTRA: Another type of information warfare. (Elliston)

MKULTRA: Senate report

Mobilization for a new era. (Wik)

National Counterintelligence Executive (NCIX) .

National Cryptologic Museum.

National cryptologic strategy for the 21st century. (NSA)

National Infrastructure Protection Center (NIPC)

More on the National Infrastructure Protection Center (NIPC)

National infrastructure protection: Legal aspects (Dick)

National photoidentity database. (McCullah)

National Plan to Secure Cyberspace.

On the National Reconnaissance Office (NRO).

The NRO declassified.

The National Security Agency (NSA).

More on the National Security Agency.

More information about the NSA.

NSA: Has it gotten too large and powerful?

NSA INFOSEC courses.

National security in the information age. (Devost)

NSA and Fourth Amendment Rights.

NSA and Fourth Amendment rights: Part 2.

NSA---Fifteen unclassified documents.

The NSA Handbook.

National Security Telecommunications and Information Systems Security Committee (NISTISSC) publications.

National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.

Navy IWAR website.

Navy intelligence, information warfare and information technology.

Networks and Netwars : The Future of Terror, Crime, and Militancy [An important book]

Network Centric Warfare. (Stein)

DoD on Network Centric Warfare.

More on Network Centric Warfare. (Brewin)

Network Centric Warfare: Seven deadly sins. (Barnett)

Network intrusion. (Shipley)

Network Intrusion Detection: An Analyst's Handbook [An important book]

Network Security: Private Communication in a Public World [An important book]

NT Web technology vulnerabilities.

The Nimda worm.

Nimda worm: CERT advisory



Online access and security.

Online battleground.

Online privacy: A guide. (Center for Democracy and Technology)

Organizing for information warfare. (Devost)

OSS: America's first intelligence agency. (CIA)

PC security vulnerabilities: CERT advisory

Pentagon's computers vulnerable to hired hackers?

Pentagon cybertroops: The national security apparatus gears up for infowar. (Weisman)

Pentagon vs. hackers. (Miklaszewski & Windrem)

The philosophy of war.

More on the philosophy of war.

Phishing (U.S. Dept. of Justice)

Phrishing for consumer crredit information.

Piercing firewalls.

Technologies of political control.

Political aspects of class III information warfare: Global conflict and terrorism. (Devost)

The political demographics of cyberspace (Bauwens).

Precautionary disconnects from the Internet. (Rosenberger)

Privacy act of 1974 (As amended).

Project P415.

Protrecting America's infrastructure.(PCCIP)

Protecting online privacy.

Psychotronic Weapons: Myth or Reality? (Pavlychev)

Psychological warfare bibliography.

Psychology of intelligence analysis. (CIA)

Quantum cryptography

Radio frequency weapons. (Schweitzer)

Radio frequency weapons: Congressional testimony.

More about radio frequency weapons. (Schweitzer)

Radio frequency weapons: The EMP gun.

Radio frequency weapons technology. (Cereijo)

Radio frequency weapons: An update.

Reducing cyber-threats. (Revah)

Reflections on the 1997 Commission on Critical Infrastructure Protection (PCCIP) Report. (Staten)

Remote viewing: The CIA's involvement with a weird version of IW. (Puthoff)

Report a computer intrusion or computer crime to the FBI.

A revolution in military affairs (RMA).

More on RMA.

Risk assessment of the electric power industry.

Risk management.

Russia calls Facebook “Information warfare weapon.”

Russian-Chechen Information Warfare 1994-2006

School for Information Warfare and Strategy (IWS): Tutorial.

Searching and seizing computers (US Dept. of Justice).

Securing desktop workstations.

Securing network servers.

Security analyzer: Download one to check the security of your system.

Security breaches: Examples from the media.

Security tools.

SIGINT and the Cuban missile crisis. (NSA)

The silicone spear: As assessment of information based warfare. (Everett et al.)

Simulating cyber attacks, defenses, and consequences.

The Slammer worm.

Social activism on the Internet. (Electrohippies)

SPAWAR: Space and Naval Warfare Systems Command.

Strategic information warfare. (Molander)

Search for IW and Computer books.

Securing US defense information infrastructure.

Secrets and Lies : Digital Security in a Networked World [An important book]

Social organization of the computer underground. (Meyer)

Spam mitigation techniques.

Worm Targets SQL Vulnerability.

Strategic Information Warfare : A New Face of War [An important book]

Strategic Warfare in Cyberspace [An important book]

Surveillance: Use of biometrics (Woodward).

Surveillance: Arguments against the use of biometrics (Agre)

Surveillance legislation and threats to civil liberties.

Surveillance technology and risk of abuse of economic information.

A Swedish perspective on IW.

> Taxonomy of intelligence analysis variables

TCP/IP security.

TCP SYN Flooding and IP Spoofing Attacks

Technology Law Review.

The technologies of political and economic control. (STOA)

Telecommunications Act of 1996.

Telecommunications Act of 1996: Impact on schools and libraries.

TCP/IP vulnerabilities.


TEMPEST countermeasures.

TEMPEST: Lots of useful information about TEMPEST. (McNamara)

TEMPEST: Maintenance and disposition of equipment.

TEMPEST monitoring.

TEMPEST in the Navy.

TEMPEST: U.S. Army specifications.

TEMPEST: The physics on which it is based.

Terrorist networks and information warfare. (Taipale)

Terrorists and cyberspace. (Whine)

Terrorism and information security.

Countering the new terrorism. (RAND)

Terrorism by email.(Szucs)

Postmodern terrorism. (Laqueur)

Terrorism at the touch of a keyboard. (Pasternak & Auster)

The third wave; What the Tofflers never told you. (Czerwinski)

Threat assessments for information networks. (Anderson)

Tiger: A scanning program for UNIX.

Tools to increase computer security.

Trojan horse attempts to gather information on Web sites. (Dugan)

Trojans removal database.

Trusted Computing: National Science Foundation program.

Truth is the first casualty of cyberwar. (Smith)

Types of information warfare. (Libicki)

Understanding information power. (Gortler)

The unintended consequences of information age technologies. (Alberts)

U.S. Army Asymmetric Warfare Group

U/S. Army information operations.

U. S. Army PSYOPS.

US-CERT technical documents.

U.S. cryptography policy.

The U.S. intelligence community.

> U.S. Signal Intelligence Directive (USSID).

U.S. sitting duck, DOD panel predicts. (Brewin & Harreld)

U.S. statutes regarding computer crime.

Uses and misuses of intelligence. (Kober)

USS Liberty.

The VENONA project.

Virus creation labs.

Vulnerabilities of the information infrastructure. (Miller)

More on the vulnerability of the information infrastructure. (NIPC)

Still more on vulnerabilities. (Forno)

Waging Iwar. (Wilson)

Wars of the near future. (Sundarji)

Web sites related to terrorism and counterterrorism.

What hackers know about you.

What is information warfare? (Libicki)

Whitehouse report on online privacy and security. (Cohen, Reno, Lew, Daley)

Windows 2000 security guide from the NSA.

Windows NT Trojan horse. (Clark)

Windows security problem. (Wilcox)

Wiretapping in the USA.

Worm W32.Nimda.A@MM. (NIPC)

More on the W32.Nimna.a@MM worm.

WWW Security FAQ. (Stein & Stewart)

Receive email when this page changes

Powered by NetMind
Click Here

PLEASE NOTE: this site is constantly being improved. If you can suggest any Web sites devoted to information warfare, please let us hear from you, so we can add links to those sites.

Please email us Please take a moment and email us your reactions to this site and any suggestions you may have as to how we can make it more useful to you.

Please visit us again soon!

Created by Dr. Ivan Goldberg Psydoc@PsyCom.Net

Revised: 31 August 2011.

There have been visitors to this page since 13 November 1995.


This web site is provided as a public service to increase public and professional access to timely, accurate and comprehensive information about information warfare and information security issues. Considerable effort has been taken to ensure the accuracy of the information contained in this site. However, no assurance is given that the information supplied is accurate or complete. Links are to external resources on the World Wide Web and herefore, there is no control of the content of such information and no legal responsibility or liability for any aspect of such information is accepted or implied.