| |
| |
Contributors | |
| |
| |
Introduction to Information Warfare, 2nd Edition | |
| |
| |
Dedication and Acknowledgements | |
| |
| |
Prologue | |
| |
| |
Summary of Views on IW | |
| |
| |
| |
Model Disclaimer Between Former Adults | |
| |
| |
| |
An Introduction to Information Warfare | |
| |
| |
Electronic Civil Defense | |
| |
| |
| |
| |
The Econo-Politics of Information Warfare | |
| |
| |
| |
Computers Everywhere and the Global Network | |
| |
| |
Strategic Assessment: The Internet | |
| |
| |
| |
| |
Binary Schizophrenia | |
| |
| |
PsyOps | |
| |
| |
| |
An Information Warfare SIIOP | |
| |
| |
| |
Computer Decency Act | |
| |
| |
| |
| |
On the Nature of Insidious | |
| |
| |
Hiding in Plain View | |
| |
| |
| |
| |
Influenza, Malicious Software, and OOPS! | |
| |
| |
The Plausibility of UNIX Virus Attacks | |
| |
| |
| |
| |
Sniffers and the Switch | |
| |
| |
Puzzle Palace Conducting Internet Surveillance | |
| |
| |
| |
Future Problems With Firewalls | |
| |
| |
| |
Countering Nonlethal Information Warfare | |
| |
| |
| |
Telewar | |
| |
| |
| |
| |
The World of Mr. Van Eck | |
| |
| |
| |
Cryptography | |
| |
| |
The Three Little Pigs | |
| |
| |
| |
The Bio-Cyber Future | |
| |
| |
| |
The True Story of PGP | |
| |
| |
| |
| |
Chipping: Silicon-Based Malicious Software | |
| |
| |
Denial of Service | |
| |
| |
| |
| |
HERF Guns and EMP/T Bombs | |
| |
| |
More About HERF | |
| |
| |
| |
The E-Bomb | |
| |
| |
| |
| |
Hackers: The First Information Warriors in Cyberspace | |
| |
| |
Declaring War on France | |
| |
| |
| |
Social Engineering, Hackers of Planet Earth | |
| |
| |
Hackers as a National Resource | |
| |
| |
| |
| |
Who Are the Information Warriors? | |
| |
| |
Cyber-Civil Disobedience | |
| |
| |
| |
Should Spies Be Cops? | |
| |
| |
| |
Assassination Politics | |
| |
| |
| |
| |
The Military Perspective | |
| |
| |
Iraqi Virus Hoax Update | |
| |
| |
| |
Sometimes the Dragon Wins | |
| |
| |
| |
Worldwide Threat Assessment | |
| |
| |
| |
Nonlethal Weapons | |
| |
| |
| |
Ethical Conundra of Information Warfare | |
| |
| |
| |
The Fourth Force | |
| |
| |
| |
| |
Class 1: Personal Information Warfare | |
| |
| |
No Privacy | |
| |
| |
| |
Personal Information Warfare | |
| |
| |
| |
Information Warfare: The Personal Front | |
| |
| |
| |
How to Beat Goliath | |
| |
| |
| |
Church and Statutes | |
| |
| |
| |
Privacy in the Workplace | |
| |
| |
| |
| |
Class 2: Corporate Information Warfare | |
| |
| |
Corporate Civil Defense | |
| |
| |
| |
Diary of an Industrial Spy | |
| |
| |
| |
| |
Class 3: Global Information Warfare | |
| |
| |
Information Warfare | |
| |
| |
| |
Export Control | |
| |
| |
| |
Information Warfare Delphi | |
| |
| |
| |
| |
Defense Before Defeat | |
| |
| |
Deterring Information Attacks | |
| |
| |
| |
The Use of Cognitive Maps | |
| |
| |
| |
From InfoWar to Knowledge Warfare | |
| |
| |
| |
Protecting the NII | |
| |
| |
| |
America, The Last Empire | |
| |
| |
| |
| |
Outline of a National Information Policy: Defining America's Future | |
| |
| |
An Electronic Bill of Rights | |
| |
| |
| |
A Declaration of the Independence of Cyberspace | |
| |
| |
| |
| |
The Future of Information Warfare | |
| |
| |
Afterword: Practical Proactive Security and Privacy | |
| |
| |
Resources: Who Ya Gonna Call? | |
| |
| |
Who's Who in Information Warfare | |
| |
| |
Footnotes | |
| |
| |
Index | |