WILLIAM COOPER ARCHIVED


INFO WAR LINKS

2600:The Hacker Quarterly
Abstracts of articles on protecting computer networks
Advanced Technology Demonstration Network (ADTnet)
Air Force Computer Emergency Response Team (AFCERT)
Air Force Information Warfare Center
Alerts from the NIPC.
Anonymous communication on the Internet
Army Counterintelligence Online
Army dumps Microsoft, adopts Apple to avoid hackers. (Glave)
Back Orifice: A security alert advisory
Banks appease online terrorists. (Shelton)
The battlefield of the future: 21st century warfare issues
Bibliography of readings on IW. (Shope)
Another bibliography on IW. (Sanz)
Still another useful bibliography
Big brother covets the Internet. (Brandt)
Big brother in cyberspace
Books on Computer Crime
Books on Computer Security
Books on Computer Viruses
Books on hacking
Books on Information Warfare
Books on Internet Security
Books on TCP/IP
Books on Telecommunication Networks
British government site devoted to communications-electronics security
Buffer overflow attacks. (Rothke)
Bugging: Types of technical surveillance devices
Bulgaria and computer viruses. (Bennahum)
Business and IW. (Alvarez)
C2 Bibliography
How Carnivore works
Carnivore and your privacy
Carnivore and the A.C.L.U
About Carnivore
Still more on Carnivore
Carvinore can read everything
CALEA: Communications Assistance for Law Enforcement Act
CALEA: Communications Assistance for Law Enforcement Act---Text of the act
Canadian government report on Information Operations
Canadian government site devoted to information technology security
Canadian information operations. (Bourque)
Center for Secure Information Systems (CSIS)
A Chinese view of information warfare. (Mengxiong)
Another Chinese view of IW
The CIA and information warfare. (Elliston)
CIAC Bulletins
CIPHER: Electronic newsletter of the technical committee on privacy and security of the IEEE
Class III information warfare: has it begun? (Schwartau)
Common criteria for information technology security
Computer attacks utilizing large data packets. (Hannaford)
Computer crime bibliography. (Anderson)
Computer crime categories. (Carter)
Computer crime: The Department of Justice perspective
Computer crime: An historical survey. (Overill)
Computer crime: An introduction. (Fraser)
Computer crime laws by state
Computer crime prevention
Computer crime sentencing guidelines. (King)
Computer crime statistics. (Kabay)
Computer crime: What it costs
Computer Emergency Response Team (CERT)
Computer espionage. (Defense Investigate Service)
Computer fraud
Computer Security Day
Computer security F.A.Q.s
Computer security information
Computer security, law, and privacy
Computer virus library
Computer virus myths. (Rosenberger)
Computer virus warnings; How to tell the real from the hoaxes. (Ford)
Computer viruses in information warfare. (Cramer & Pratt)
Confidentiality of health-related information
Congressional testimony by the CIA on information warfare
Considering the Net as an intelligence tool. (Wilson)
Cornerstones of information warfare. (Fogleman & Widnall)
Corporations and cyber-terrorism
Countering non-lethal information warfare. (Kluepfel)
Countering threats to information technology assets. (Lingerfelt)
Covert Action Quarterly
Criminal threats to business on the Internet. (Anderson)
Critical infrastructure protection. (Presidential Decision Directive)
Cryptographic terms: A glossary
Cryptography and free speech. (Rosenoer)
Cuba's approach to information management. (Symmes)
Curent computer security concerns
Cyber-attacks against NATO traced to China. (Brewin)
Cyber-attacks aimed at the USA
Cyber crime: An example
Cybercrime seminar. (Brenner)
Cybercrime, transnational crime, and intellectual property theft. (Saxton et al)
Cybernation: The American infrastructure in the information age
The cyber-posture of the national information infrastructure. (Ware)
Cyber responsibilities. (Donahue)
Cyber scare: Overstated computer threats. (Schmidt)
Cyberspace Electronic Security Act (CESA)
More about CESA
Cyberterrorism: Case studies
Cyberterrorism --- Fact or fancy? (Politt)
Cyberterrorism in the future. (Collin)
Cyberterrorism: Is it a real threat?
Cyberterrorism: RAND Corporation report
Cyber-terrorism: The shape of future conflict?
Cyber-terrorism: Technology report. (Wade)
Cyberwar in Asia? (McGuire & Williams)
Cyberwar: How the USA may lose. (Dunlap)
Cyberwar in the Midle East
Cyberwar in Serbia. (Brewin)
Cyberwar and netwar: New modes, old concepts, of conflict. (Arquilla & Ronfeldt)
The dangers of concentrating on IW. (DiNardo & Hughes)
Defending against computer attacks. (Libicki)
Defending against cyberterrorism. (Lesser)
Defending against cyberterrorism: A Japanese view. (Miyawaki)
Defending cyberspace and other metaphors. (Libicki)
Defending information networks from attack. (Leopold)
Defending against IW attack. (Kopp)
Defending the USA from cyber attack. (Minihan )
Defense Advanced Research Projects Agency (DARPA) views the future. (Fernandez)
Defense Intelligence Agency (DIA): A brief history
Defensive information warfare. (Alberts)
Defining civil defense in the information age. (Round & Rudolph)
Denial of service attacks
Dictonary of computer system vulnerabilities and exposures
Digital search and seizure. (Center for Democracy and Technology)
Denial of service attacks and the UDP port
Denial of service attacks and IRC
The digital threat: United States national security and computers. (Devost)
DISA INFOSEC
DoD's automated intrusion detection system. (Frank)
The DoD's evaluation of cyberwar. (Elliston)
DoD's offensive IW assets. (Brewin & Harreld)
The DoD's reaction to hacking. (Cummings)
DoD's vulnerability to information warfare. (Levin)
Dominant battlespace knowledge. (Johnson & Libicki)
ECHELON and other interception capabilities. (Campbell)
ECHELON: A global surveillance network. (Verton)
ECHELON: Lots of up-to-date information
ECHELON: New Zealand's involvement. (Hager)
Economic/industrial espionage. (Venzke)
Economic espionage: An information warfare perspective. (Cramer)
Economic espionage, technology transfers and national security. (Saxton et al.)
The economic impact of IW. (Saarelainen)
Electromagnetic and electronic systems: U.S./ Navy site
Electromagnetic evesdropping
Electromagnetic hazards
Electromagnetic radiation and the brain: A bibliography. (Beck & Byrd)
Electromagnetic environmental effects
Electromagnetic weapons of mass destruction. (Kopp)
Electronic civil disobedience. (Wray)
An electronic Pearl Harbor? Not likely. (Smith)
More on electronic Pearl Harbor
Eligible receiver. (Gertz)
More about Eligible receiver
Email and espionage
Email security problem
Emission security assessments
Emission security countermeasures
EMP/T bombs
EMP and TEMPEST hardening: U.S. Army document
Encryption in crime and terrorism. (Denning & Baugh)
Encryption: Why the government cannot control civilian use. (Forno)
Errors that lead to computer security vulnerabilities
E-strikes and cyber-sabotage: Civilian hackers go online to fight. (Riley)
The ethics of civil defense and information warfare. (Schwartau)
The ethics of information warfare. (Kuehl)
European Union directive on data protection
The FBI's domestic counterterrorism program
The FBI and electronic surveillance
The FBI and email
The FBI's infrastructure protection and computer intrusion squad
Federal Communications Law Journal
Federal computer surveillance
Federal Intrusion Detection Network (FIDNET). (Frank)
FIDNET: Civil liberties concerns
Fighting computer viruses. (Kephart et al.)
Fighting Internet crime. (Lash)
Financial information networks: Protecting them from intrusion. (Stolfo)
Financial information networks: Vulnerability to hackers. (Winkler)
Firewalls. (Robinson)
Firewalls---How to select one
Foes with grudge sludge Drudge. (Glave)
Forecasting model for Internet security attacks. (Korzyk & VanDyke)
France changes policy regarding cryptography. (Oram)
A French IW site.
A function model of information warfare. (Johnson)
Fundamentals of information warfare---An airman's view. (Foglerman)
The future of information security. (Libicki)
GAO on DoD INFOSEC.
Generally-Accepted System Security Principles. (GASSP)
German government site devoted to information technology security [in Genman].
Global information security. (Libicki)
Governmental (USA) electronic surveillance activity.
The great cyberwar of 2002. (Arquilla)
Guerrilla warfare in cyberspace.
HAARP: Highfrequency Active Auroral Research Project.
Hacked Web pages: An archive.
Hacked Web pages: Another archive.
Hacker's ethics.
Hacker sentenced to prison: Press release of the Department of Justice.
Hacker wargames.
Hacker's view of hacking.
Hackers: How should we respond? (Ludlow)
Hackers penetrate DoD computer systems.
The hacker's mind set. (Rist)
Hackers who break into computer systems (Denning).
Hacking in 1999.
Hacking Nasdaq. (Oakes & Kahney).
Hacking the power grid. (Koprowski)
Hacking TCP/IP. (Shimomura)
Hacking U.S. Government Web sites. (Mueller)
Hacking the Web. (McNamara)
Hardwar, softwar wetwar operational objectives of information warfare. (Wilson)
The heads and tails of information. (Baklarz)
Hearing on current and projected national security threats. (Tenet)
HERF (High Energy Radio Frequency) weapons.
HERF: An FAA course.
HERF gun proliferation.
HERF and the Panama Canal.
Higher education and information security. (Reynolds)
Hotmail security problems.
Human intelligence and covert action.
Identity theft. (Hayes)
IE 5 security bug. (Louderback)
Improving the security of your site by breaking into it. (Farmer)
Induced fragility in information age warfare. (Fowler & Peterson)
Industrial espionage: Who's stealing your information. (Denning)
The information age: Its impact and consequences. (Alberts & Papp)
Information assurance and the information society. (Luiijf)
Information insecurity. (Peters)
Information operations.
Information operations: Applying the principles of war. (Nelson)
Information operations, deterrence, and the use of force. (Barnett)
Information operations in Bosnia: A preliminary assessment. (Allard)
Information operations and information systems. (Tulak & Hutton)
Information peacekeeping. (Steele)
Information risk management. (Byrnes)
Information security: Implementing policy. (Wood)
Information, technology, and the center of gravity. (Harley)
Information war and the Air Force: Wave of the future or current fad? (Buchan)
Information warfare in 2025. (Stein)
Information warfare: The possibility of disaster. (Carver)
Information warfare and the U.S. Marine Corps. (Yeary)
Information warfare defense. (Defense Science Board)
Information security: Computer attacks on Department of Defense pose increasing risks.
Infowar. (Browning)
Information warfare. (Lewis)
Information warfare in the business world. (Winkler)
Information warfare: Defeating the enemy before battle. (Ivefors)
Information warfare and deterrence. (Wheatley & Hayes)
Information Warfare and Defense Preparedness. (Lipicki)
Information warfare: Developing a conceptual framework. (Garigue)
Information warfare with electromagnetic attack.
Information warfare and information security on the Web.
Information warfare is not InfoSec repackaged. (Schwartau)
Information warfare in international law. (Greenberg et al.)
Information warfare: Issues and perspectives. (Miller)
The information warfare mania. (Whitaker)
Information warfare: The perfect terrorist weapon. (Shahar)
Information warfare: A philosophical and sociological perspective. (Bey)
Information Warfare: Planning the Campaign. (Ayers, et al)
Information warfare and security: A slide show. (Denning)
Information warfare weapons.
Inforsec: What is really important. (Forno)
From InfoWar to knowledge warfare. (Baumard)
Infrastructure protection. (Schwartau)
Infrastructure protection and threats to civil liberties. (O'Neil & Dempsey)
Infrastructural warfare: An introduction.
Infrastructural warfare slides. (Wilson)
Intelligence agencies of the world - - - listed by country.
Intelligence-based threat assessments for information networks and infrastructures. (Anderson)
Internet and cyber-terrorism. (Whine)
Internet firewalls: An FAQ. (Ranum et al.)
Internet security.
Internet Security Handbook. (U.S. Navy)
International controls over information warfare. (Verton)
International computer intrusions. (Anderson)
International electronic surveillance by the USA: Civil liberties aspects. (ACLU et al.)
International legal implications of information warfare. (Aldrich)
Internet as an intelligence tool. (Wilson)
INTERNIC security hole.
An introduction to information warfare. (Haeni)
Intrusion detection: An FAQ.
Intrusion detection.
Intrusion detection: New methods. (Cramer et al.)
The IW threat from sub-state groups: An interdisciplinary approach. (Rathmell et al.)
IP spoofing demystified.
More about IP-spoofing.
Joint force superiority in the information age. (Paige)
Joint Military Intelligence College. (JMIC)
Journal of Electronic Defense.
Journal of Intrastructural warfare.
Journal of Internet Security.
Keeping information warfare in perspective. Gompert)
Knowledge strategies: Balancing ends, ways, and means in the information age. (Fast)
The Maginot line of information systems security. (Forno)
The mesh and the net: Speculations on armed conflict in an era of free silicone. (Libicki)
Microsoft vs. hackers. (Shankland)
Microsoft and security: Mutually exclusive terms. (Forno)
Military information operations in a conventional warfare environment.
MKULTRA: Another type of information warfare. (Elliston)
MKULTRA: Senate report
Mobilization for a new era. (Wik)
MS Office leaks sensitive data. (Oakes)
National Cryptologic Museum.
National cryptologic strategy for the 21st century. (NSA)
National Infrastructure Protection Center (NIPC)
Federal photoidentity database. (McCullah)
On the National Reconnaissance Office (NRO).
The NRO declassified.
The National Security Agency (NSA).
More information about the NSA.
NSA: Has it gotten too large and powerful?
NSA offers INFOSEC courses.
National security in the information age. (Devost)
NSA and Fourth Amendment Rights.
NSA---Fifteen unclassified documents.
The NSA Handbook.
Navy INFOSEC website.
Network Centric Warfare. (Stein)
More on Network Centric Warfare. (Brewin)
Network Centric Warfare: Seven deadly sins. (Barnett)
NT Web technology vulnerabilities. (rain.forest.puppy)
OASD C3I
Online privacy: A guide. (Center for Democracy and Technology)
Pentagon's computers vulnerable to hired hackers. (Myers)
Pentagon cybertroops: The national security apparatus gears up for infowar. (Overbeck)
Pentagon vs. hackers. (Miklaszewski & Windrem)
Piercing firewalls.
Political aspects of class III information warfare: Global conflict and terrorism. (Devost)
The political demographics of cyberspace.
Precautionary disconnects form the Internet. (Rosenberger)
Privacy act of 1974 (As amended).
Psychotronic Weapons: Myth or Reality? (Pavlychev)
Psychological warfare documents.
Radio frequency weapons: Congressional testimony.
Radio frequency weapons. (Schweitzer)
More about radio frequency weapons. (Schweitzer)
Reducing cyber-threats. (Revah)
Reflections on the 1997 Commission on Critical Infrastructure Protection (PCCIP) Report. (Staten)
Remote viewing: The CIA's involvement with a weird version of IW. (Elliston)
Report a computer intrusion or computer crime to the FBI.
A revolution in military affairs (RMA). (Thomas)
More on RMA (Whitaker)
Risk assessment of the electric power industry. (NSTAC)
Risk management. (Meritt)
School for Information Warfare and Strategy (IWS).
Security analyzer: Download one to check the security of your system.
Security breaches: Examples from the media.
SIGINT and the Cuban missile crisis. (NSA)
The silicone spear: As assessment of information based warfare. (Everett et al.)
Simulating cyber attacks, defenses, and consequences.
SPAWAR: Space and Naval Warfare Systems Command.
Strategic information warfare. (Molander)
Strategic war . . . in cyberspace. (Molander et al.)
Searches and the Internet: A Canadian perspective. (Hourihan)
Surveillance technology and risk of abuse of economic information.
A Swedish perspective on IW.
TCP/IP security
TCP SYN Flooding and IP Spoofing Attacks
The technologies of political and economic control. (STOA)
Telecommunications Act of 1996.
Telecommunications Act of 1996: Impact on schools and libraries.
\ T/TCP vulnerabilities.
TEMPEST: Lots of unofficial information. (McNamara)
TEMPEST monitoring.
TEMPEST in the Navy.
TEMPEST: The physics on which it is based.
Terrorists and cyberspace. (Whine)
Terrorism by email.(Szucs)
KUBARK: How the CIA obtains information.
Legal aspects of cyberspace.
Legal and practical constraints in IW, (Kuschner)
Terrorism on the Net.
Terrorism and information warfare. (Wilson)
Terrorism at the touch of a keyboard. (Pasternak & Auster)
The third wave; What the Tofflers never told you. (Czerwinski)
Threat assessments for information networks. (Anderson)
Tools to increase computer security.
Trojan horse attempts to gather information on Web sites. (Dugan)
Trojans removal database.
Truth is the first casualty of cyberwar. (Smith)
Types of information warfare. (Libicki)
The unintended consequences of information age technologies. (Alberts)
United Nations manual on the prevention and control of computer-related crime.
U. S. Army Special Operations and PSYOPS.
U.S. cryptography policy.
U.S. foes targeting American computer networks. (Pietrucha)
The U.S. intelligence community.
U.S. sitting duck, DOD panel predicts. (Brewin & Harreld)
Uses and misuses of intelligence. (Kober)
USS Liberty.
The VENONA project.
Virus creation labs.
Vulnerabilities of the national information infrastructure. (Miller)
More on the vulnerability of the National information infrastructure. (Ware)
Still more on vulnerabilities. (Forno)
Waging IWar. (Wilson)
Wars of the near future. (Sundarji)
Weather site penetrated by hackers. (Boyle)
What hackers know about you.
What is information warfare? (Libicki)
Whitehouse report on online privacy and security. (Cohen, Reno, Lew Daley)
Windows NT Trojan horse. (Clark)
Windows security problem. (Wilcox)
WWW Security FAQ. (Stein)
Y2K hysteria: A dramatic example. (North)
Y2K technology problems. (Koskinen)
Y2K violence.
Y2K and the possibility of a cyber-attack.

USE YOUR BACK BUTTON TO RETURN