The hot topic. Protecting our country in ways we never thought necessary just a few years ago. Contribute to Electronic Civil Defense or join our discussion group from the Home Page.
- Microsoft, Citigroup Join New Cyber Defense Company iDEFENSE Answers President Clinton's Latest Call to Protect Critical Infrastructure
- On the Electronic Defense Theatre: According to Floodnet This is the tool recently used against the Pentagon.
- UK: SAFEGUARDS FOR INTRUSIVE SURVEILLANCE - DRAFT
- UK: CYBERCOPS SET TO SAVE SALFORD #20M
- Malaysia's High-Tech Plans Crumble
- FEMA DIRECTOR WITT AND WALL STREETíS FINANCIAL COMMUNITY ANNOUNCE PUBLIC/PRIVATE PARTNERSHIP TO CHANGE WAY BUSINESSES DEAL WITH NATURAL DISASTERS
- Subject: Re: EMI, Van Eck, etc.
- Do you ever lie awake at night worrying that extortionists might blast your LAN with electromagnetic HERF guns, that the military is spying on your network traffic or that hackers are in league with Saddam Hussein?
- CyberCrime interviews new anti-hacker agency chiefs Michael Vatis and Ken Geide who are two cops assigned to preserve and protect the nation's information infrastructure.
- PCCIP Report Could Have Been Done Quicker, Cheaper
- Ionosphere Research Lab Sparks Fears in Alaska
- CIWARS Intelligence Report - 1 February 1998
- NEW TECHNOLOGIES HAVE OPENED UP OPPORTUNITIES FOR CRIMINALS AND POLICE ALIKE, REPORTS JANET FIFE-YEOMANS.
- CYBER-TERROR IS REAL
- U.S. NATIONAL INFORMATION EMERGENCY DECLARED (Future View)
- Threats to U.S. National Security Statement for the record Louis J. Freeh, Director Federal Bureau of Investigation before the Senate Select Committee on Intelligence, Washington, D. C. January 28, 1998
- GLOBAL THREATS AND CHALLENGES: THE DECADES AHEAD by Lieutenant General Patrick M. Hughes, USA Director, Defense Intelligence Agency.
- The Administration and Congress have not taken Information Warfare (IW) seriously, But a wake-up call was sounded by the "Eligible Receiver" exercise. This is a posting from the Command-Control-Communications-Computers-Intelligence Surveillance Reconnaissance (C4ISR) [c4i-pro] forum.
- Australia: WWW Wired for WAR
- Australia's national security was at risk from attack via the Internet, with the net both a potential tool of war and a target, an air force expert on information warfare warned today.
- Information Systems Defence: Is Your Firewall Modern or Medieval? Read this editorial and find out.
- "It is Infrastructure Protection, Stupid; not Computer Security" A great editorial by William Church, Managing Director of The Centre for Infrastructural Warfare Studies.
- "Building a Defense, IWAR Bastion": An 82 K Zipped Power Point presentation also by William Church is available for downloading as well.
- CIWARS Intelligence Report - 4 January 1998
- CIWARS Assessment- Threat Shift Developing
- Internet Laws in the PRC - Read This!
- Information warfare and the real threat Government should use caution in responding to foreign info-threats
- The Futures Of American Business Four different scenarios of the world a decade from now provide insight into how companies can prepare for an uncertain future.
- Taiwan is developing advanced technologies for electronic warfare (EW) and meeting the challenge of information warfare (IW), according to retired Taiwanese navy captain Yin-Tung Chou.
- The U.S. commission on critical infrastructure drew strong criticism Wednesday for endorsing the Clinton administration's controversial policy requiring government access to all private computer data.
- PENTAGON WANTS NSA TO BUILD `THREAT' DATABASE.
- THE NEW MILLENNIUM GLOBAL INFORMATION INFRASTRUCTURE- THREATS AND POSSIBILITIES by Manuel W. Wik
733globd1.doc 58k Word File Format
- Information Warfare and Finance: A Strategic Target by Ed Browne
Financial Infowar.doc 168k Word File Format
Infowarcon-presentation.ppt 994k Power Point file
InfoWarCon-speech.doc 33k Word File Format
- Dept. of Defense and the Defense Information Systems Agency Join with private Infowar.Com to Promote Healthy Electronic Defense
- Reflections on the 1997 Commission on Critical Infrastructure Protection (PCCIP), by Clark Staten, Senior Analyst, Emergency Response and Research Institute.
- US Computer Security Called a Critical Mess by James Glave
- United States Government should be budgeting US$1 billion ($1.4 billion) a year to combating cyber terrorism by 2004, a US presidential commission has concluded.
- President's Commission on Critical Infrastructure Protection (PCCIP) Website
- Richard Forno speaks his mind. From what I can tell from the President's Commission on Critical Infrastructure Protection (PCCIP) research to date, their upcoming report should be anything but a surprise to the United States. I gather that after months (over a year) of interviews, travels, conferences, and public meetings, their final report will essentially be Nothing That We Haven't Heard Of Before.
- Commission calls for a defensive posture
- In the Summer of 2003, Iranís armed forces are closing in on Saudi Arabia in a bid to control Middle Eastern oil production. The U.S. gathers its allies and prepares to repel Iran, but finds itself virtually paralyzed as invisible and untraceable computer assailants shut down power grids, cause trains to collide, disrupt financial transactions and close down telephone systems. The Second Gulf War has become the First Cyberwar.
- U.S. plans protection against cyberterrorists; but President's Commission is behind schedule.
- The Pentagon and the rest of the national security establishment are inadequately prepared to respond to a military strike on the United States, the chairman of a nongovernment defense review panel said Thursday.
- More on the upcoming Marsh report.
- President's Commission on Critical Infrastructure Protection
- Cyber Warfare: PCCIP's Marsh says, "While a catastrophic cyber attack has not occurred, we have enough isolated incidents to know that the potential for disaster is real and the time to act is now." Right. Now, we have to ask, why did we need to wait 7 years to get action?
- The Direct Threat of Electronic High-Technology Weapons: by Dr. Nicholas Chantler. A look at DEW (Directed Energy Weapons); HERF (High Energy Radio Frequency); and the, EMP (Electro-Magnetic Pulse) Presented at InfowarCon 97.
dewfin.doc 46k Word Document Format
- Australia's Vulnerability to Information Attack: Towards a National Information Policy by Dr. Adam Cobb, Strategic and Defence Studies Centre, Australian National University (email@example.com)
- Dr. Cobb illustrates the fragile national infrastructure in Austrailia. He will be presenting in Canberra, Austrailia late October. Winn Schwartau will also be speaking via video conference. Check out this paper and then surf over to Dr.Cobb's site at: http://coombs.anu.edu.au/~acobb/
- Turkish Islamists win closure of hoax Web site
- Taiwan Fights Internet Crime
- Tiny Modems For High-Tech Florida Cops.
- Remarks Prepared for Delivery by Robert T. Marsh Chairman, President's Commission on Critical Infrastructure Protection.
- Excellent Press about the Manhatten Cyber Project on line!!!
- Halifax To Offer World's First Internet Policing Service.
- U.A.E. Faces Legal Issues in Cracking Down on Internet Hackers.
- European Question NSA's and FBI's wisdom of intentionally introducing security weaknesses into communications infrastructures. Read on...
- Prof. Teaches Cops How To Hack.
- Presented at InfoWarCon 97. "Measuring the Value of Information" by Dr. Myron Cramer. A very complex and confusing subject has been made interesting by Dr. Cramer. Dr. Cramer serves on the Management Team for the Manhatten Cyber Project and moves his place of employment to SAIC in the next few weeks.
infoval1.doc 79K Word Document Format
infoval.pdf 48K PDF Document Format.
- "Critical Infrastructure Protection". This was presented as a keynote at InfoWarCon 97 by Ms. Sara Jayne League. This is a briefing of the work that is being done by the IPTF, Infrastructure Protection Task Force. Ms.League is the DISA representative to the IPTF. The goals, mission, status, and the Manhatten Cyber Project are illustrated.
infowar.ppt 166K Power Point Document Format.
- Warning Sounded on Digital Crime Threat.
- It Takes a Digital Detective to Track Down Today's Computerised Criminals.
- Fraudbusters Seek Fresh Angles as Cybercrime Grows.
- "Who's Listening" ..looking at the past to the present by Capt.Zap, ( Ian. A. Murphy) the first hacker convicted of a computer crime way back in 1983.
- Ontario Eyes ISP Responsibility For Net Content.
- Cyber Threats of Concern to Presidential Commission.
- Here is the News Release for The Manhattan Cyber Project stating that government is now on board. Keep current on this exciting project.
- Global Database Helps In Smuggling Fight
- Government Urged to Buckle up when Cruising the Information Highway
- Security Implications of High-Power Microwave Technology by Ed Pevler presented at the IEE International Symposium on Technology and Society 1997. This is an excellent paper you won't want to miss reading if you have the interest in EMP's.
- Yemen Cites ``Security'' for Mobile Phone Cut Off.
- Information Warfare (IW) used by Bosnian-Serb Police
- A Private Eye On Piracy
- Bug of Superintendent's Phone Feared
- Use of Porno On-Line Rising Sharply: Police.
- Robocop, Move Over... Next Generation Super Cops Just Might be Accountants.
- Police Get New Powers to Warn on Paedophiles.
- Crimebusting across the EU is set to become easier after the UK joins the Schengen Information System.
- EIC Group to Monitor Economic Crime Links.
- New Firm Targets Criminals Through Computer Clues.
- Cybercops Drive Crooks Crazy on Techno-Beat.
- Security Breached on British Tax System
- Companies Join Forces to Track Hackers
- Spy Agency Wants To Sell Advice
- U.S. Lacks Tools Vs. Computer Attack: It's what we been saying since 1991...now they take it seriously! Read on.
- Read about the Manhatten Cyber Project!!!
USA Today: http://www.usatoday.com/news/washdc/ncs3.htm
- Manhatten Cyber Project is announced Comments by Winn Schwartau.
- Defense Review Vows 'Robust Commitment' to Information Warfare
- Threats to computer systems likely will increase, official says.
- While we worry about overregulation of the Net by the government, we are not alone. Germany is going through similar pains.
- IRA bombs target civilian power infrastructure
- You won't want to miss reading "Financial Warfare: assessing threats to the U.S. Financial Infrastructure" by Thomas Manzi, Senior Intelligence Analyst with the U.S. Drug Enforcement Administration. This thesis is a real eye opener! (389K zip 1.8M Word Doc File)
- "Information Warfare and Finance: A Strategic Target." 165K Word Doc file. General Jim McCarthy introduced me to a bright young cadet at the US Air Force Academy, Cadet Ed Browne. He pinch-hit for us as a speaker at the I.B.I.S. conference in New York recently and his performance and content was superior. The Banking officials who heard him had nothing but accolades, and I strongly urge you to read this fascinating paper. Do let us know what you think.
- NCSA to Host Financial Information Security Quarterly Consortium
- Proposal for State Access to Company Computers
- Analyst finds U.S. Treasury, Military computers vulnerable to `Infowar'. By Reid Kanaley.
- Malaysia: Cyber laws passed to support High-Tech ...
- Lawmakers get education on Perils of Cyber Warfare
- Communications: Warfare in Cyberspace
- Some skepticism about the President's Commission on Critical Infrastructure.
- GAO Executive report - B-266140 Executive Summary: PURPOSE ~~Unknown and unauthorized individuals are increasingly attacking and gaining access to highly sensitive unclassified information on the Department of Defense's computer systems. Given the threats the attacks pose to military operations and national security, GAO was asked to report on the extent to which Defense systems are being attacked, the potential for further damage to information and systems, and the challenges Defense faces in securing sensitive information.
- Security of the Public Telecommunications Network NRIC Focus Group 1 Data Item
- Special report Of the Select Committee on Intelligence 132K html
- From ENN - NSA Director warns of Cyber threat ..
- Virtual Government: The Puzzle of Intergovernmental Networks.
- Foreword from the "TEST AND EVALUATION YEAR-2000 TEAM REPORT"
- New security threats rest in 'cyber terrorism'
- Cracking Passwords. ....an interesting post and great link.
- Read about this product, the EZ-Stealth-Mailer. Hmmmm... could be used as a infowar weapon. Thanks to Col. GI Wilson for the forward.
- The FEMA Emergency Operations Planning Guide. Available as a downloadable.pdf file that is 870K. Mr. Fred Fuller was kind enough to offer this review.
- Dubai police pursue bid to control internet.
- Exposing the Global Surveillance System. by Nicky Hager
- Washington goes on the defensive.
- Part II, the Appendices of the Information Warfare Defense Report issued by the Defense Science Board. This is a 426K ZIP file, which will explode to 5 files, about 8MB, of Word 6.0. Do let us know what you think, and what further information like this you would like us to publish. Thanks again to Sherra for all of her hard work!
- "Report of the Defense Science Board Task Force on Information Warfare - Defense (IW-D)". Download the single DSB_PT1.ZIP (543K) which when unzipped (Pkzip by Pkware, www.pkware.com) creates four separate Word 6.0 files including complete graphics (9.6M). Thanks to Sherra for a terrific job! This is the complete report except for the Appendices which will be published here on Wednesday, January 15.
Also see the DoD report on Information Warfare called Information Warfare Legal, Regulatory, Policy and Organizational Considerations for Assurance
- An interesting contribution ........" No matter what techniques and methods are chosen for the IW, it is important that these methods are integrated into the company's tactical and strategic communication processes to implement effectively the company's business strategies and tactics. Read Information Warfare and Its Impacts on Commercial Enterprises
- The solutions to the problem of protecting ourselves and our society from emerging WMD threats will be complex and demanding. Emerging Threat ... By Fred Fuller and Colonel G.I.Wilson, USMC
- Electromagnetic Spectrum: Key to Success in Future Conflicts by Emmett Paige Jr. Read why "to prevail in the next conflict, one must control the electromagnetic spectrum."
- Effects of the next cycle of solar interference. [David L. Oppenheimer]
- The Joint Chief's of Staff Report on Information Warfare Now Available. The Second Edition of "Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance" This invaluable report offers a well-balanced analysis of the DoD's concerns about information security and electronic national security. Thank you to Major Steven J. Spano, and the support from the Joint Chiefs of Staff, J6K, Information Warfare Division for making this possible. This report is downloadable, 3.12 Meg in Word format.
- Are We Living in a state of National Emergency? According to Executive Order #12923 we are. Surprised us big time!
- Defense Science Board Task Force on Information Warfare-Defense (IW-D), will be issuing a report in the next few days. Federal Computer Week has an interesting article stating that the report called the threat of an IW attack "significant," adding that the nation's "vulnerabilities are numerous, [and] the countermeasures are extremely limited...." You can read the article at http://www.fcw.com/pubs/fcw/1111/duck.htm. We will be publishing the report as it is made available to us.
- Clinton's Cyberwar Executive Order regarding the Establishment of President's Commission on Critical Infrastructure Protection.
- Countering Non-lethal Information Warfare Lessons learned on foiling the Information Superhighwayman of the North American public switched telephone network. By Hank Kluepfel CPP, Science Applications International Corporation.
- CIA Director John Deutch Testifies, June 25, 1996
A quick digested report.
- ITAR Law Suit
Professor sues because of restrictions on his course by Federal Government.
Infowar.Com, Ltd. firstname.lastname@example.org