An 11 page research paper that includes an introduction, a 2.5 page annotated bibliography, a 6 page critique of 2 articles on this topic plus references to further research that substantiates the conclusions of the authors, and a 1 page appendix that details the research process used in compiling this paper. Bibliography lists 5 sources.
Name of Research Paper File: D0_khiiw.rtf
Unformatted Sample Text from the Research Paper:
encompass everything from hacker intrusions into sensitive financial networks to attacks by cults using biological weapons. Lamberson (2000) defines information warfare as when enemies employ "information tools to target and
disrupt US operations or the information and networks that support crucial day-to-day workings of civilian and military systems" (Lamberson, 2000, p. 4). In the past, military operations have relied
heavily in intelligence gathering, that is, obtaining data on enemy activities and capabilities. While this traditional aspect of intelligence gathering is still important, intelligence now has to work cooperatively with
what is known as about information warfare in order to thwart this dire threat to US national security. A concentrated information warfare attack on the US could disrupt the health
of this country to a cataclysmic degree. To investigate this situation, the following is a critique of two articles pertaining to this subject, presented with additional research that all substantiates
the seriousness of this topic. Annotated Bibliography Flynt, Bill (1999) Threat convergence. Military Review 79(5), 2-11. An extensive article that goes
into detail on the threat to national security from information warfare, the author deals largely with the differences between the new concept of information warfare and the old paradigms left-over
from the Cold War. While some of the information in this article is outdated, i.e. the section pertaining to Y2K, the majority of Flynts remarks, particularly in regards to the
vulnerability of the financial sector, are still quite applicable to the topic of information warfare. Jones, Michael D. (2001) Information-age warfare. Military
Review 81 (2), 24-29. This is detailed article for use by military personnel. It is geared specifically towards helping commanders formulate "commanders critical information requirements" (CCIR). Jones stresses the