Announcement

Collapse
No announcement yet.

A Glossary of Information Warfare Terms

Collapse
X
Collapse
  •  

  • A Glossary of Information Warfare Terms

    A Glossary of Information Warfare Terms

    NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

    GLOSSARY OF INFORMATION WARFARE TERMS

    AIA

    Air Intelligence Agency at Kelly Air Force Base.

    AFIWC

    Air Force Information Warfare Center

    C2W

    Command-and-control warfare. Command systems, rather than commanders, are the chief target, as in Persian Gulf War.

    C4I

    Command, Control, Communications, Computers, and Intelligence

    Copernicus

    The code-name under which the Navy plans to reformulate its command and control structures in response to the realization that information is a weapon. Through Copernicus warfighters will get the information that they need to make tactical decisions. The architecture of Copernicus was designed by Vice Admiral Jerry O. Tuttle.

    DES

    Data Encryption Standard

    DISA

    Defense Information Security Administration. Military organization charged with resposibility to provide information systems support to fighting units.

    DoD

    Department of Defense.

    van Eck monitoring

    Monitoring the activity of a computer or other electronic equipment by detecting low levels of electromagnetic emissions from the device. Named after Dr. Wim van Eck who published on the topic in 1985.

    EMP/T Bomb

    A device similar to a HERF Gun but many times more powerful.

    EW

    Electronic warfare.

    GCCS

    Global Command and Control System.

    HERF

    High Energy Radio Frequency. As in HERF gun: a device that can disrupt the normal operation of digital equipment such as computers and navigational equipment by directing HERF emissions at them.

    IBW

    Intelligence-based warfare

    NAIC

    National Air Intelligence Center at Wright Patterson Air Force Base.

    INFOSEC

    Protection of classified information that is stored on computers or transmitted by radio, telephone teletype, or any other means.

    IW/C2W

    Information warfare/command and control warfare

    JC2WC

    The Joint Command and Control Warfare Center.

    NSA

    National Security Agency. This agency is charged with the tasks of exploiting foreign electromagnetic signals and protecting the electronic information critical to U. S. national security.

    RMA

    Revolution in Military Affairs. The realization by the military that information, and information technologies must be considered as a weapon in achieving national objectives via military activity.

    SIGINT

    The interception and analysis of electromagnetic signals

    TEMPEST

    Military code-name for activities related to van Eck monitoring, and technology to defend against such monitoring.
      Posting comments is disabled.

    Hot Topics

    Collapse

    There are no results that meet this criteria.

    Latest Articles

    Collapse

    • What is Information Warfare?
      by Enigma
      What is Information Warfare?

      by Martin Libicki

      WHAT IS INFORMATION WARFARE?

      MARTIN LIBICKI

      Preface

      In recent years, a concept known as "information warfare" has become popular within certain circles of the U.S. defense establishment. The concept is rooted in the undisputable fact that information and information technologies are increasingly important to national security in general and to warfare specifically. According...
      12-14-2022, 05:48 PM
    • War in the Age of Invisible Machines
      by Enigma
      War in the Age of Invisible Machines

      by Thomas McCarthy

      Introduction

      The fate of the world is determined by our actions and decisions, and many of the most profound decisions and actions are made by the largest of actors: states. The range of possible behaviors for states is partly delineated by the relations among them, as each state must always act in a world of other states. Kingdoms, republics and empires have risen and fallen over the millennia, their...
      12-14-2022, 05:46 PM
    • War in the Age of Invisible Machines
      by Enigma
      War in the Age of Invisible Machines

      by Thomas McCarthy

      War in the Age of Invisible Machines

      by Thomas McCarthy

      Introduction

      The fate of the world is determined by our actions and decisions, and many of the most profound decisions and actions are made by the largest of actors: states. The range of possible behaviors for states is partly delineated by the relations among them, as each state must always act in a world of other states....
      12-14-2022, 05:45 PM
    • War Tactics
      by Enigma

      War Tactics

      War Tactics

      I don't know if these will be of any use to you, being the civilized, cult- ured human beings we are, but I've been known to use them.

      ***How to kill using bamboo rods**

      Well take a bamboo stick or better yet a knife and put any type of animal excrements (shit) on the knife or the sharpened bamboo rod... Plant the knife or rod in the ground firmly... When someone steps on it they most likely will die of blood loss...
      12-14-2022, 05:44 PM
    • VX BioToxin
      by Enigma

      VX BioToxin

      by Richard Finke

      XV Biotoxin

      This report is highly reliable as it is sourced from publicly available media and well-placed private individuals within sympathetic intelligence departments. It was verbally reported to me directly and previous experience has been acutely accurate.

      XV Biotoxin
      as recounted to Richard Finke

      Larry Harris, Registered Microbiologist, previously much maligned as 'Dr. Frankenstein,'...
      12-14-2022, 05:43 PM
    • Unconventional Warfare: Initiators (#2)
      by Enigma
      Unconventional Warfare: Initiators (#2)

      by Video Vindicator

      UNCONVENTIONAL WARFARE: Devices and Techniques

      FILE TWO: INITIATORS

      Written By Video Vindicator

      ------

      FUSE CORD:

      -Description

      (1) This item consists of a continuous train of explosive or fastburning material enclosed in a flexible waterproof cord or cable. It is used for setting off an explosive or combustible mixture of powders by...
      12-14-2022, 05:43 PM
    Working...
    X