INFORMATIONS KRIGET
Information Warfare is defined by:
Actions taken to achieve information superiority by affecting adversary information, information based processes,
and information systems, while defending ones own information, information based processes and information
systems.

GLOSSARY

An introduction toInformation Warfare
Information Warfare(Linköping University)
INSTITUTE FOR THE ADVANCED STUDY OF INFORMATION WARFARE (IASIW)
A Theory of Information Warfare: Preparing For 2020 (Colonel Richard Szafranski, USAF)
What is Information Warfare?
Information Warfare ". . . the struggle for power changes when knowledge about knowledge becomes the prime source of power." -- Alvin Toffler
Air Intelligence Agency - facing the challenges of Information Warfare
Cybercrime, Infowar, and Infosecurity
A Guide to Information Warfare
Information War and Cyberspace Security
REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON INFORMATION WARFARE - DEFENSE (IW-D)
Information Warfare Documents
INFORMATION WARFARE (Prof George J. Stein, AWC)
The Information Warfare Researsch Center
Information Warfare-Protect Systems Engineering Division (Code 72)
Infowar.com
Infowar Slides
MS. GUIDANCE : CYBERWAR
Information Warfare (RST)
School of Information Warfare and Strategy
Information Warfare: Information Warfare and its Importanc
TECHNOLOGY FOR 21ST CENTURY WARFAR
Computer Virus Information
F-Secure Cryptography Products
The Information Warfare Division,som finns vid Naval Air Warfare Center Weapons Division in Point Mugu, CA.
IASIW, INSTITUTE FOR THE ADVANCED STUDY OF INFORMATION WARFARE
Journal of Electronic Defense
Intelligence and CounterIntelligence
Who's Watching Who & Who's Watching YOU pager
Class III Information Warfare: Has It Begun?
Phrack Magazine Web Page
Computer Security Institute
Propaganda
Dr Solomon’s Virussida
What is Information Warfare?

 


GLOSSARY OF INFORMATION WARFARE TERMS

 
AIA
Air Intelligence Agency at Kelly Air Force Base.
 
AFIWC
Air Force Information Warfare Center
 
C2W
Command-and-control warfare. Command systems, rather than commanders, are the chief target, as in Persian Gulf War.
 
C4I
Command, Control, Communications, Computers, and Intelligence
 
Copernicus
The code-name under which the Navy plans to reformulate its command and control structures in response to the realization that information is a weapon. Through Copernicus warfighters will get the information that they need to make tactical decisions. The architecture of Copernicus was designed by Vice Admiral Jerry O. Tuttle.
 
DES
Data Encryption Standard
 
DISA
Defense Information Security Administration. Military organization charged with resposibility to provide information systems support to fighting units.
 
DoD
Department of Defense.
 
van Eck monitoring
Monitoring the activity of a computer or other electronic equipment by detecting low levels of electromagnetic emissions from the device. Named after Dr. Wim van Eck who published on the topic in 1985.
 
EMP/T Bomb
A device similar to a HERF Gun but many times more powerful.
 
EW
Electronic warfare.
 
GCCS
Global Command and Control System.
 
HERF
High Energy Radio Frequency. As in HERF gun: a device that can disrupt the normal operation of digital equipment such as computers and navigational equipment by directing HERF emissions at them.
 
IBW
Intelligence-based warfare
 
NAIC
National Air Intelligence Center at Wright Patterson Air Force Base.
 
INFOSEC
Protection of classified information that is stored on computers or transmitted by radio, telephone teletype, or any other means.
 
IW/C2W
Information warfare/command and control warfare
 
JC2WC
The Joint Command and Control Warfare Center.
NSA
National Security Agency. This agency is charged with the tasks of exploiting foreign electromagnetic signals and protecting the electronic information critical to U. S. national security.
 
RMA
Revolution in Military Affairs. The realization by the military that information, and information technologies must be considered as a weapon in achieving national objectives via military activity.
 
SIGINT
The interception and analysis of electromagnetic signals
 
TEMPEST
Military code-name for activities related to van Eck monitoring, and technology to defend against such monitoring.