Bibliography

 

Primary Sources

Aldrich, Richard W. "The International Legal Implications of Information Warfare." U.S. Air Force Academy: Institute for National Security Studies -- Occasional Paper 9, I War Series: April 1996.

 

Arquilla, John & Ronfeldt, David. "Cyberwar is coming!" Journal of Comparative Strategy, V.12, No. 2: RAND Corporation, International Policy Department, 1993. On-line source.

 

Bolz, Frank Jr. et al, eds. The Counter-Terrorism Handbook: Tactics, Procedures, and Techniques. New York: Elsevier Publishing Co., 1990.

 

Bowman, Stephen. When the Eagle Screams: America's Vulnerability to Terrorism. New York: Birch Lane Press, 1994.

 

Browning, Graeme. "Counting Down." National Journal, 19 April 1997, 746-749.

 

Black, Peter. "Soft Kill: Fighting Infrastructure Wars in the 21st Century." Wired, July-August 1993.

 

Buyer, Bond, ed. "Cyber Terrorism." American Banker, 1997.

 

Campen, Al (Ret. USAF Col.). The First Information War: the Story of Communications, Computers and Intelligence Systems in the Persian Gulf War. Fairfax: AFCEA Int'l Press, 1992.

 

Cane, Alan. "Millennium Bomb Ticks Away." Financial Times of London. 2 June 1997, cited by Sen. Moynihan in the Congressional Record, 3 June 1997, S5268.

 

Carlin, John. "A Farewell to Arms." Wired, May 1997.

 

Cate, Fred H. Privacy in the Information Age. Washington: Brookings Institute Press, 1997.

 

Chailand, Gerard. Terrorism: From Popular Struggle to Media Spectacle. London: Saqi Books, 1987.

 

Cline, Ray S. and Yonah Alexander. Terrorism as State-Sponsored Covert Warfare. Fairfax: HERO Books, 1986.

 

Clutterbuck, Richard. Terrorism in an Unstable World. New York: Routledge, 1994.

 

CNN Today. "Air Force One Lost." 11 March 1998.

 

CNN Today. "Hacker Attacks Pentagon." 19 March 1998.

 

Craddock, Ashley. "Netwar and Peace in the Global Village." Wired, May 1997.

 

Crenshaw, Martha. Terrorism and International Cooperation. Occasional Paper Series 11. New York: Institute for East-West Security Studies, 1989.

 

David, Marcella. Supplement to Introduction to Public International Law. University of Iowa, College of Law: Fall 1997.

 

DeCew, Judith Wagner. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca: Cornell University Press, 1997.

 

Derrer, Douglas S. We Are All The Target. Annapolis: Naval Institute Press, 1992.

 

Devost, Matthew G. "National Security in the Information Age." Master's thesis, University of Vermont, 1995.

 

Devost, Matthew G., Neal Pollard and Brian Houghton. "Information Terrorism: Can You Trust Your Toaster?" Terrorism Research Center: National Defense University, 1997.

 

Discovery Channel, Discovery Magazine: Future War. 18 January 1998

 

Discovery Channel, Discovery Magazine: How to Track a Hacker. 18 August 1997

 

Dobson, Christopher and Ronald Payne. The Terrorists: Their Weapons, Leaders and Tactics. Rev. Ed. New York: Facts on File Inc., 1982.

 

Douglas, J.D and N.C. Livingston. America the Vulnerable. New York: Lexington Books, 1987.

 

Editors. "Encryption: 56-bit DES Cracked by Internet Users." Secure Computing. August 1997.

 

Freedman, David H. and Charles C. Mann. "Cracker." U.S. News & World Report, 2 June 1997, 56-65.

 

Freedman, Lawrence and Yonah Alexander, editors. Perspectives on Terrorism. Wilmington: Scholarly Resources, Inc., 1983.

 

Gill, Bates and Lonnie Henley. "China and the Revolution in Military Affairs." U.S. War College, Strategic Studies Institute: Seventh Annual Conference on Strategy, 20 May 1996.

 

Gingrich, Newt. To Renew America. New York: Harper Collins Publishers, 1995.

 

Haines, Ted (Director). Discovery Channel, Discovery Magazine: The Doomsday Plan. 22 March 1998.

 

Hanle, Donald J. Terrorism - the Newest Face of Warfare. Washington: Pergamon-Brasseys, 1989.

 

Hedrick, Daniel R. The Invisible Weapon: Telecommunication and International Politics 1851- 1945. New York: Oxford University Press, 1991.

 

I-War Research Group. www.i-war.com:80. 12 March 1998.

 

Institute for the Advanced Study of Information Warfare (IASIW). www.psycom.net/iwar.1.html: March 1996/January 1997/January 1998.

 

Inter-Pact and Winn Schwartau. www.info.sec.com. 12 March 1998.

 

Jasik, John. Interview with Author. United States Information Agency, Department of Democratization and Human Rights: June 1996.

 

Journal of Electronic Defense. www.jedefense.com. 12 March 1998.

 

Kirsner, Scott. "Hack the Magic." Wired, March 1998.

 

Kornblum, Janet. "Federal Unit to Fight Hacking." The Net, 28 February 1998.

 

Laquer, Walter. "Reflections on Terrorism." Foreign Affairs, Fall 1986, 88.

 

Lewis, B. The Assassins: a Radical Sect in Islam. London: Al Saqi, 1985.

 

Levy, Steven and Katie Hafner. "The Day the World Shuts Down." Newsweek, 2 June 1997, 53-59.

 

Libicki, Martin C. "What is Information Warfare?" National Defense University: Institute for National Strategic Studies, Paper 3, No. 28 (May 1995). Available On-Line.

 

Long, David E. The Anatomy of Terrorism. New York: Free Press, 1990.

 

Madsen, Douglas. "The Everyday Politics of 'Us' Against 'Them.'" (A Working Paper.) Iowa City: University of Iowa, 1991.

 

Magsig, Daniel E. "Information Warfare in the Information Age." 7 December 1995. On-line source: World Wide Web. March 1996.

 

McLoughlin, Glenn J. The Clipper Chip: a Fact Sheet Update. The Library of Congress: Congressional Research Service Report, 95-955 SPR. 8 September 1995.1

 

McLoughlin, Glenn J. The National Information Infrastructure: the Federal Role. The Library of Congress: Congressional Research Service Issue Brief, IB 95051. 6 June 1997 and update 16 January 1998.

 

Metz, Steven and James Kievit. "Strategy and the Revolution in Military Affairs: from Theory to Policy." U.S. Army War College: Strategic Studies Institute, 27 June 1995.

 

Molander, Roger C., Andrew S. Riddile, and Peter A. Wilson. "(Summary) Strategic Information Warfare: a New Face of War." Parameters, Autumn 1996, 81-92. (Full Report -- Santa Monica: RAND, 1996.)

 

Mungo, Paul and Bryan Clough. Approaching Zero: The Extra-Ordinary Underworld of Hackers, Phreakers, Virus Writers and Keyboard Criminals. New York: Random House Press, 1992.

 

Munro, Neil. "The Pentagon's New Nightmare: An Electronic Pearl Harbor." The Washington Post, Sunday, 16 July 1995. On-line source.

 

NBC (Movie). Blackout Effect: 3 January 1998.

 

Neill, S.D. Clarifying McLuhan: an Assessment of Process and Product. Westport: Greenwood Press, 1993.

 

Norton, Augustus R. and Martin H. Greenberg, eds. Studies in Nuclear Terrorism. Boston: G.K. Hall and Co., 1979.

 

Nye, Joseph S., Jr. and William A. Owens. "America's Information Edge." Foreign Policy (March/April 1996): 20-36.

 

Oliver, Covey, et al, eds. International Legal System: Cases and Materials. 4th Ed. Westbury: Foundation Press, Inc., 1995.

 

---------------------. International Legal System: Cases and Materials Document Supplement. 4th Ed. Westbury: Foundation Press, Inc., 1995.

 

Olson, Mancur, Jr. The Logic of Collective Action: Public Goods and the Theory of Groups. Cambridge: Harvard University Press, 1965.

 

O'Neil, Bard E. Insurgency and Terrorism: Inside Modern Revolutionary Warfare. Washington: Maxwell Macmillan Inc., 1990.

 

Papapathy, Rao A. Distributive Justice: a Third World Response to Rawls and Nozick. San Francisco: International Scholars Publications, 1998.

 

Pasternak, Douglas. "Wonder Weapons." U.S. News & World Report, 7 July 1997, 38-46.

 

Pinegar, Daniel G. "New Technology: New Security and New Threats" in The New World Order edited by G.R. Boynton, University of Iowa: 1996, 97-103.

 

Pfeffer, Jeffry. New Directions for Organizational Theory. New York: Oxford University Press, 1997.

 

Power, Kevin. "Iowa will be the NII Test Bed." Government Computer News, March 1995, 1.

 

President's Commission for Critical Infrastructure Protection. Critical Foundations: Protecting America's Infrastructures. (Final Report) Washington: PCCIP, October 1997.

 

President's Commission on Critical Infrastructure Protection Home Page. www.pccip.gov Including: Executive Order 13010; Remarks by Chairman; Final Report, October 1997.

 

Reynolds, Gary K. The Ground Wave Emergency Network (GWEN). The Library of Congress: Congressional Research Service Report, 89-206 F. 27 March 1989.

 

Reto, Hanei. "An Introduction to Information Warfare." Master's thesis, George Washington University: 1996. On-line resource.

 

Robins, Phil Alden (Director). Sneakers. MCA Universal City Studios, Inc. 1992.

 

Round, W. Oscar and Earle L. Randolph, Jr. "Civil Defense in the Information Age." Institute for National Strategic Studies. No. 46; National Defense University: September, 1995.

 

Sawyer, Ralph D. (Translator) The Seven Military Classics of Ancient China . Oxford: Westview Press, 1993.

 

Schwartau, Winn. Information Warfare: Cyberterrorism: Protecting your Personal Security in the Electronic Age. 2nd Ed. New York: Thunder's Mouth Press, 1996.

 

--------------------. "The Ethics of Civil Defense and Information Warfare." www.ncsa.com/library/j.html. 12 March 1998.

 

--------------------. "Information Warfare is not InfoSec Repackaged." www.ncsa.com/library/f.html. 12 March 1998.

 

---------------------. Terminal compromise: Computer Terrorism - When Privacy and Freedom are the Victims. U.S.: Interpact Press, 1991.

 

Schwartzstein, Stuart J.D. The Information Revolution and National Security. Washington: Center for Strategic and International Studies, 1996.

 

Seger, Karl A. The Antiterrorism Handbook. Novato: Presido Press, 1990.

 

Sellers, Peter and George C. Scott (Directors). Wargames. 1983.

 

Slatalla, Michelle and Joshua Quittner. Masters of Deception: the Gang that Ruled Cyberspace. New York: Harper Perennial, 1996.

 

Smith, Marcia S. Encryption Technology: Congressional Issues. The Library of Congress: Congressional Research Service Issue Brief, IB 96039. 14 May 1997.

 

Spectre Press Catalog. www.spectre-press.com. 12 March 1998.

 

Stein, George J. (Professor, AWC). "Information Warfare." Air Power Journal, V. 9, No. 1, (Spring 1995).

 

Stoll, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Pocket Books, 1990.

 

Strategic Assessment Center. www.sac.saic.com. 12 March 1998.

 

Tehan, Rita. Welcome to Cyberia: an Internet Overview. The Library of Congress: Congressional Research Service Report, 97-544 C. May 12, 1997.

 

Toffler, Alvin & Heidi. War and Anti-War: Survival at the Dawn of the 21st Century. New York: Little, Brown and Company, 1993.

 

U.S. Air Force. Cornerstones of Information Warfare. Washington: United States Air Force, 1995.

 

U.S. Air Force. Information Warfare. Air Force Doctrine Division: Pentagon, 1996.

 

U.S. Congress. House. Subcommittee on Technology -- Committee on Science. Computer Security Enhancement Act of 1997. Thursday, 19 June 1997. (On H.R. 1903). Statements: Bachula, Diffie, Walker, Bidzoz, Rotenberg.

 

U.S. Congress. Public Law 100-235 [HR 145]: "Computer Security Act of 1987." 8 January 1988.

 

U.S. Congress. MILSTAR Satellite System FY 98 Report.

 

U.S. Congress. House. H.R. 1903 Computer Security Enhancement Act of 1997. 105th Congress.

 

U.S. Congress. Senate. Senate Record Vote Analysis: "Defense Authorization/Ground Wave Emergency Network." 10 September 1993, Vote 255. 103rd Congress. On-Line: www.senate.gov.

 

U.S. Congress. Senate. S. 1587 Encrypted Communications Privacy Act of 1996. 104th Congress.

 

U.S. Congress. Senate. S. 376 Encrypted Communications Privacy Act of 1997. 105th Congress.

 

U.S. Congress. Senate. Congressional Record: Moynihan Statement. 3 June 1997, S5268.

 

U.S. Joint Chiefs of Staff. Information Warfare: a Strategy for Peace...the Decisive Edge in War. 1996-97.

 

Waller, Douglas. "Onward Cyber Soldiers." Time, Vol. 146, No. 8, (21 August 1995): 38-46.

 

Wiener, Leonard. "Turning to 2000." U.S. News & World Report, 12 May 1997, 78.

 

Wilkinson, Paul. Conflict Study 236: "Terrorist Targets and Tactics: New Risks to World Order." Washington: Research Institute for the Study of Conflict and Terrorism, 1990.

 

Zachery, Pascal. "The Godfather." Wired, November 1997, 152-160.

 

Secondary Sources

 

Alexander, Bevin. The Future of Warfare. New York: W.W. Norton & Company, 1995.

 

Alford, Jonathan, ed. The Impact of New Military Technology. New Jersey: Allanheld, Osmun and Co. Publishers Inc., 1981.

 

Batty, Michael and Bob Barr. "The Electronic Frontier." Futures, September 1994, 699-712.

 

Bowers, Jean M. Terrorism: selected references. The Library of Congress: Congressional Research Service Report, 96-838 L. 17 October 1996.

 

Buchan, Glenn. "Information War and the Air Force Wave of the Future? Current Fad?" Santa Monica: RAND Issue Paper, March 1996.

 

Cohen, Eliot A. "A Revolution in Warfare." Foreign Affairs, March/April 1996.

 

Congressional Research Service InfoPack. May 1997. IP 299T.

 

Congressional Research Service InfoPack. May 1997. IP 490I.

 

Daniker, Gustav. "The Guardian Soldier: On the Nature and Use of Future Armed Forces." New York: United Nations, 1995.

 

Dougherty, James E. & Robert L. Pfaltzgraff, Jr. Contending Theories of International Relations. 3rd Ed. New York: J.B. Lippincott Co., 1990.

 

Downes, Richard. National Defense University, Institute for National Strategic Studies: "New Security Relations in the Americas." No. 47, September 1995.

 

Dunnigan, James F. How to Make War. New York: Quill, 1983.

 

Editors. "Terrorism via the Computer." ABC Nightly News, 18 April 1996.

 

Elmer-Dewitt, Philip. "First Nation in Cyberspace." Time, 6 December 1993, 62-64.

 

Federal Information Processing Standards Publication 180. "Secure Hash Standard Algorithm." (Computer Security.) National Institute of Standards and Technology. 11 May 1993.

 

Federal Information Processing Standards Publication 185. "Escrowed Encryption Standard." (Telecommunications Security.) National Institute of Standards and Technology. 9 February 1994.

 

Federal Information Processing Standards Publication 186. "Digital Signature Standard." (Computer Security/Cryptography.) National Institute of Standards and Technology. 19 May 1994.

 

Feldman, Shai. Technology and Strategy: Future Trends, JCSS Conference Summary; Boulder: Westview Press, 1989.

 

Fogleman, General Ronald R. (Speech to Armed Forces Communications-Electronics Association). "Information Operations: the Fifth Dimension of Warfare." Defense Issues, V. 10, No. 47 (25 April 1995).

 

FM 34-36: Special Operations Forces Intelligence and Electronic Warfare Operations. 12 March 1998. www.fas.org:80/irp/doddir/army/fm34-36/toc.htm

 

Grczyn, Mary. "Information Warfare Strategy Targets Most Serious Threats." Defense Week, V. 16, 18 (December 1995): 9.

 

Hastedt, Glenn and Kay Knickrehm. Toward the Twenty-First Century: A Reader in World Politics. Englewood Cliffs: Prentice Hall, 1994.

 

Hove, Anders. "Media Challenges Foreign Policy Powers." The Tech, V.113, No. 55 (5 November 1993).

 

Horrock, Nicholas. "The New Terror Fear: Biological Weapons." U.S. News & World Report, 12 May 1997, 36.

 

Mabry, Edward A. and Richard E. Barnes. The Dynamics of Small Group Communication. Englewood Cliffs: Prentice-Hall, Inc., 1980.

 

Madsen, Douglas and Peter G. Snow. The Charismatic Bond. Cambridge: Harvard University Press, 1991.

 

May, Timothy. "Crypto-Anarchy and Virtual Communities." Conference at Monte Carlo, 1995. Internet materials: World Wide Web. March 1996.

 

Midlarsky, Manus I., ed. Handbook of War Studies. Boston: Unwin Hyman Inc., 1989.

 

NCSA. "NCSA and AOL warn of Significant Prevalence of AOL Password Trojan." Press Release: 27 June 1997.

 

Newman, Richard J. "Getting Ready for the Wrong War?" U.S. News & World Report, 12 May 1997, 30-35.

 

NSDD 145. National Policy on Telecommunications and Automated Information Systems Security. September 17, 1984. Unclassified Partial Text.

 

Perl, Raphael F. Terrorism, the Future, and U.S. Foreign Policy. The Library of Congress: Congressional Research Service Issue Brief, IB 95112. 14 May 1997.

 

Perl, Raphael F. et al. Terrorism: Background and Issues for Congress. The Library of Congress: Congressional Research Service Issue Brief, IB 95086. 23 May 1997.

 

Reuters. "Pentagon, FBI Probe Latest Hacks." The Net, 25 February 1998.

 

Sandler, Todd. Collective Action: Theory and Applications. Ann Arbor: University of Michigan Press, 1992.

 

Snow, Donald M. National Security: Defense Policy for a New International Order. 3rd Ed. New York: St. Martin's Press, 1995.

 

Stanley Kubrick (Director). Dr. Strangelove or: How I Learned to Stop Worrying and Love the Bomb. Hawk Films Ltd., Columbia Pictures. 1963.

 

Star Trek: Deep Space 9. "Homefront" and "Paradise Lost." Pt. 1 & 2. Episode #483 & 484.

 

Star Trek: The Next Generation. "11001001." Episode #116: 2 Febraru 1988.

 

Thompson, Mark. "Wired for War." Time, 31 March 1997, 72-73.

 

Urban, Ellison C. "The Information Warrior." IEEE Spectrum. V. 32, (November 1995): 66-70

 

U.S. Congress. House. Committee on the Judiciary, Report: H.R. 3011 Security and Freedom through Encryption (Safe) Act. 104th Congress, 25 September 1996.

 

U.S. Congress. House. H.R. 695 Security and Freedom through Encryption (Safe) Act. 105th Congress.

 

U.S. Congress. Public Law 103-414 [H.R. 4922]: Communications Assistance in Law Enforcement Act." 25 October 1994.

 

U.S. Congress. Senate. Committee on Commerce, Science and Transportation. Encryption, Pro- CODE Act. 19 March 1997. (On S. 377). Statements: McCain, Leahy; (1) Freeh, Barksdale; (2) Reinsch, Aaron, Black, Kretz; (3) Berman, Walker.

 

U.S. Congress. Senate. Committee on the Judiciary. Encryption, Key Recovery, and Privacy Protection in the Information Age." Wednesday, 25 June 1997. Statements: Hatch, Freeh, Crowell, Dam, Mackay, Neumann, Ozzie.

 

U.S. Congress. Senate. McCain, John (Senator). Dear Colleague letter and paper. "Ready Tomorrow: Defending American Interests in the 21st Century." 19 March 1996

 

U.S. Congress. Senate. National Security Telecommunications Advisory Committee (NSTAC), Information Assurance Task Force: Executive Summary, "Risk Assessment of the Electric Power Industry." www.ncsa.com/news/elecpower.html

 

U.S. Congress. Senate. Permanent Subcommittee on Investigations -- Committee on Governmental Affairs. Security in Cyberspace. Tuesday, 16 July 1996. Statements: Nunn, Leahy, Kyle, Gorelick, White.

 

U.S. Congress. Senate. S. 377 Promotion of Commerce On-Line in the Digital Era (Pro-CODE) Act of 1997. 105th Congress.

 

Wallace, Stewart (Major General). Interview with Author. University of Iowa, Iowa City: February 1998.

 

Walsh, Maurice N., ed. War and the Human Race. London: Elsevier Publishing Co., 1971.

 

Zuckerman, Mortimer B. "Winning the Future's Wars." U.S. News & World Report, 12 May 1997, 83-84.


Copyright Dan Pinegar 1996, 1998, 2000, 2001. All Rights Reserved. Thesis available for academic, research or intelligence purposes only. Please notify author if citing within research document or for permission to republish substantive sections or chapters in whole or in part. Thank you.

CONCLUSION Return To Index ENDNOTES

Email: Xavieur@aol.com