• Information Intelligence v. Information Warfare

    Pages: 11

    An 11 page research paper that includes an introduction, a 2.5 page annotated bibliography, a 6 page critique of 2 articles on this topic plus references to further research that substantiates the conclusions of the authors, and a 1 page appendix that details the research process used in compiling this paper. Bibliography lists 5 sources.

    File: D0_khiiw.rtf

    Send Me This Paper »


    Sample Text:
    encompass everything from hacker intrusions into sensitive financial networks to attacks by cults using biological weapons. Lamberson (2000) defines information warfare as when enemies employ "information tools to target and  disrupt US operations or the information and networks that support crucial day-to-day workings of civilian and military systems" (Lamberson, 2000, p. 4). In the past, military operations have relied  heavily in intelligence gathering, that is, obtaining data on enemy activities and capabilities. While this traditional aspect of intelligence gathering is still important, intelligence now has to work cooperatively with  what is known as about information warfare in order to thwart this dire threat to US national security. A concentrated information warfare attack on the US could disrupt the health  of this country to a cataclysmic degree. To investigate this situation, the following is a critique of two articles pertaining to this subject, presented with additional research that all substantiates  the seriousness of this topic. Annotated Bibliography Flynt, Bill (1999) Threat convergence. Military Review 79(5), 2-11. An extensive article that goes  into detail on the threat to national security from information warfare, the author deals largely with the differences between the new concept of information warfare and the old paradigms left-over  from the Cold War. While some of the information in this article is outdated, i.e. the section pertaining to Y2K, the majority of Flynts remarks, particularly in regards to the  vulnerability of the financial sector, are still quite applicable to the topic of information warfare. Jones, Michael D. (2001) Information-age warfare. Military  Review 81 (2), 24-29. This is detailed article for use by military personnel. It is geared specifically towards helping commanders formulate "commanders critical information requirements" (CCIR). Jones stresses the 

    Back to Results