U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Information Warfare and Security

NCJ Number
191433
Author(s)
Dorothy E. Denning
Date Published
1999
Length
539 pages
Annotation
This book is about information warfare, or operations that target or exploit information media in order to win some objective over an adversary.
Abstract
Chapter One begins with a brief account of information warfare incidents relating to the Persian Gulf War. It then summarizes a theory of information warfare and trends arising from new technologies. Chapter Two presents a theory of information warfare and the four main elements. Chapter Three summarizes activity in four domains: play, crime, individual rights, and national security. Chapter Four covers the acquisition of information from open sources, which are unclassified sources of information in the public domain or available from commercial services. Chapter Five concentrates on five areas of perception management: lies and distortions, denouncement, harassment, advertising, and censorship. Chapter Six covers information warfare operations by insiders who have access to the information resources they exploit and by outsiders who either exploit insiders or penetrate the physical premises. Chapter Seven covers the use of sensors to collect information from the physical environment, telecommunications systems, and computer networks. Chapter Eight gives a sampling of hacking tools and techniques. Additional methods are described in Chapters Nine and Ten, including masquerade and cyberplagues. The seven safeguards of information resources by hiding them from view are described in Chapter Eleven. Chapter Twelve describes methods of authentication in four basic categories. Chapter Thirteen focuses on three types of defensive operations: access controls, filtering, and intrusion and misuse detection. Chapter Fourteen describes ways of identifying and eliminating security weaknesses before an attack. Bibliography, endnotes