At a "town hall" meeting at Gartner's ITxpo this week, the research firm brought out a dozen of its top experts to discuss the impact of the ongoing war with Iraq on business and IT. Unfortunately, …
NIH monitoring Internet use
The National Institutes of Health has deployed software to track and manage Internet use for more than 41,000 employees. NIH, an agency in the Department of Health and Human Services, signed a …
The Clinton Administration’s Policy on Critical Infrastructure Protection: PDD 63
This White Paper explains key elements of the Clinton Administration's policy on critical infrastructure protection. It is intended for dissemination to all interested parties in both the private and …
Homeland Defense: Threats and Policies in Transition
In a May 1998 commencement address at the U.S. Naval Academy, President Clinton announced his approval of two important Presidential Decision Directives (PDDs). PDD-62 and PDD-63 address …
Continue Reading about Homeland Defense: Threats and Policies in Transition
Terrorist Intelligence Operations
A Renewed Challenge for the Security Educator Reprinted from the Interagency OPSEC Support Staff, Intelligence Threat Handbook, May 1996, Section 4. Introduction This article assesses the …
The Threat of Domestic Terrorism
by Lynn F. Fischer DoD Security Institute While the international terrorist threat to U.S. persons and property is the continuing concern of U.S. defense and law enforcement organizations, there …
Shunning the Frumious Bandersnatch: Current Literature on Information Warfare and Deterrence
by Geoffrey S. French1 Attempts to link information warfare and deterrence were inevitable. Emerging at the end of the Cold War, the concept of information warfare seemed to offer new relevancy …
Shunning the Frumious Bandersnatch: Current Literature on Information Warfare
Attempts to link information warfare and deterrence were inevitable. Emerging at the end of the Cold War, the concept of information warfare seemed to offer new relevancy for old doctrines, policies, …
Continue Reading about Shunning the Frumious Bandersnatch: Current Literature on Information Warfare
Shunning the Frumious Bandersnatch: Current Literature on Information Warfare and Deterence
Attempts to link information warfare and deterrence were inevitable. Emerging at the end of the Cold War, the concept of information warfare seemed to offer new relevancy for old doctrines, …
Restricting Information Warfare: Current Literature on Arms Control and Information Warfare
As the tools and techniques of information warfare continue to develop, policy will also progress to take the new capabilities and applications into account. Although the general subject of …