International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 456    Submit Your Rating     Cite This   Download        Certificate

TECHNOLOGIES AND WEAPONS OF INFORMATION WARFARE

    2 Author(s):  BRIG PS PANESAR , MAJ GEN (DR) GS LAMBA (RETD)

Vol -  6, Issue- 2 ,         Page(s) : 7 - 18  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Abstract The canvas of Information Warfare encompasses vast domains. The scientific community has been developing many weapons to support IW. This paper explores the technologies underlying these weapons - a few produce usable weapons, while many others remain in the realm of theory only. The weapons by themselves are non-lethal; however the results they could achieve could be highly disastrous.

  1.   Mohinder Singh, Electronic Warfare, Institute of Armament Technology, Pune, India, June 1988, pdf document accessed on Internet at http://www.drdo.gov.in/drdo/data/Electronic%20Warfare.pdf on 03 Feb 2015.
  2.   JPR Browne and Michael T Thurbon, Electronic Warfare, Brasseys Air Power, March 2005.
  3.   Lessons of the Falklands War, Summary Report, February 1983, Department of Navy, Washington DC accesses on the Internet on 03 Feb 2015.
  4.   William Graham, Electromagnetic Pulse Threats to U.S. Military and Civilian Infrastructure, hearing before the Military Research and Development Subcommittee, House Armed Services Committee, Oct. 7, 1999.
  5.   David A Falgum, EMP Weapons Lead Race for non-lethal Technology, 24 May 1993, pp-61.
  6.    Lowell Wood, statement before the House Research and Development Subcommittee,
  7. hearing on EMP Threats to the U.S. Military and Civilian Infrastructure, Oct. 7, 1999.
  8.   CRS Report for Congress High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices:
  9. Threat Assessments August 20, 2004 accessed on the Internet at http://www.fas.org/man/crs/RL32544.pdf accessed on 05 Feb 2015.
  10.   Amitav Mallik, HPL- DEW, Impact on Defence and Security, DRDO Publication DESIDOC, 2012 accessed on the Internet on 10 Feb 2015.
  11.   Monika Chansoria, Directed Energy Weapons: India’s Strategic Game Changer, Article in Foreign Policy, August 2015, accessed on the Internet at http://foreignpolicy.com/2014/08/15/directed-energy-weapons-indias-strategic-game-changer/ on 09 Feb 2015.
  12.   Schwartau, Winn, Class-II Information Warfare: Corporate Espionage and Sabotage, Presentation at the Second International Conference on Information Warfare, Montreal PQ, 18 Jan 1995.
  13.   Schriner, D, The Design and Fabrication of a Damage Inflicting RF Weapon by 'Back Yard' Methods. Feb 2006,  retrieved from Joint Economic Committee Web site: http://www.house.gov/jec/hearings/radio/schriner.htm on 09 Feb 2015.
  14.   Sarah Simpson, Cryptography Defined, 1997, accessed on the Internet at http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/SSim/history.html
  15.   Bruce Schneier, Applied Cryptography, Protocols, Algorithms, and Source Code in C, Second edition, John Wiley and Sons, New York (1996) p. 267. 
  16.   Westlund, Harold B, “NIST reports measurable success of Advanced Encryption Standard", Journal of Research of the National Institute of Standards and Technology 2002.
  17.   Endre Bangerter, David Gullasch and Stephan Krenn, "Cache Games – Bringing Access-Based Cache Attacks on AES to Practice", 2010 accessed on the Internet on 10 Feb 2015.
  18.   Joey Cheng, Tiny Robots Could Conduct Surveillance, search houses for soldiers, Defence Systems, May 2014, accessed on the internet at http://defensesystems.com/articles/2014/05/19/mast-tiny-robots-isr.aspx accessed on 04 Feb 2015.
  19.   Mohinder Singh, op cit.
  20.   William Silevan, Springtime for Twitter, Is the Internet driving the revolution of the Arab Spring?, Future Tense, accessed on the Internet at http://www.slate.com/articles/technology/future_tense/2011/07/springtime_for_twitter.html on 10 Feb 2015.
  21.  Journalist’s Resource, Carnegie Foundation, Sep 25, 2013 accessed on the Internet at  http://journalistsresource.org/studies/international/global-tech/research-arab-spring-internet-key-studies# on 10 Feb 2015.
  22.   Ramesh Srinivasan, Taking Power through technology in the Arab Spring, Al Jazeera, 26 Oct 2012 accessed on the Internet at http://www.aljazeera.com/indepth/opinion/2012/09/2012919115344299848.html on 10 Feb 2015.
  23.   Gabriel Weimann, How modern terrorists use the Internet, United States Institute of Peace, Special Report, March 2004, accessed on the internet at http://www.usip.org/sites/default/files/sr116.pdf on 10 Feb 2014.
  24.   James Sanders, ‘Corporate espionage or fearmongering? The facts about hardware-level backdoors’,
  25. IT Security, August 7, 2013 accessed on the Internet at http://www.techrepublic.com/blog/it-security/corporate-espionage-or-fearmongering-the-facts-about-hardware-level-backdoors/ on 04 Feb 2015.
  26.   Libicki, Martin.  “What is Information Warfare?”, article for the Institute for National Strategic Studies.
  27.   John Arquilla and David Ronfeldt, “Cyberwar is coming!” Comparative Strategy, Vol12, No. 2, Spring 1993 accessed on the Internet on 10 Feb 2015.
  28.   Yael Shahar, “Information Warfare: The Perfect Terrorist Weapon?” Accessed on the Internet at http://all.net/books/iw/iwarstuff/www.ict.org.il/articles/infowar.htm on 10 Feb 2015.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details