U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Information Warfare: How to Survive Cyber Attacks

NCJ Number
191434
Author(s)
Michael Erbschloe
Date Published
2001
Length
335 pages
Annotation
This book explores the impact of information warfare and the damage it can cause to governments, corporations, and commercial Web sites.
Abstract
A global communications infrastructure has now made it possible for a wider assortment of groups to wage information warfare. Information warfare is comprised of 10 different deliberate strategies to totally destroy or partially disable military capabilities, industrial information infrastructure, and information technology-based civilian and government economic activities. These strategies are offensive ruinous information warfare, offensive containment information warfare, sustained terrorist information warfare, random terrorist information warfare, defensive preventive information warfare, defensive ruinous information warfare, defensive responsive containment information warfare, sustained rogue information warfare, random rogue information warfare, and amateur rogue information warfare. Terrorists and rogue criminals are the information warfare threat of the future. A scenario, called PH2, is presented to illustrate how 10 people could cause severe economic damage. Both defensive and offensive information warfare capabilities are assessed. Information warfare strategies and tactics are examined from a military perspective. An overview of defensive strategies for private companies that may become the direct target of information warfare is provided through an examination of information warfare strategies and tactics from a corporate perspective. The emergence of the computer-literate terrorist and criminal is examined, as well as the reasons why terrorists and rogues have an advantage in information warfare. The impact that information warfare can have on the innocent bystanders on the information superhighway is described. An analysis delves into the minds and motivations of the new techno-terrorists and criminals by reviewing the crimes of the past and speculating on the crimes of the future. The process and challenges of recruiting and training information warriors are discussed. Countering information warfare attacks will require the coordinated response of legislative bodies, military organizations, and private industries. Glossary, index