TECHNOLOGIES AND WEAPONS OF INFORMATION WARFARE
2
Author(s):
BRIG PS PANESAR , MAJ GEN (DR) GS LAMBA (RETD)
Vol - 6, Issue- 2 ,
Page(s) : 7 - 18
(2015 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Abstract
The canvas of Information Warfare encompasses vast domains. The scientific community has been developing many weapons to support IW. This paper explores the technologies underlying these weapons - a few produce usable weapons, while many others remain in the realm of theory only. The weapons by themselves are non-lethal; however the results they could achieve could be highly disastrous.
- Mohinder Singh, Electronic Warfare, Institute of Armament Technology, Pune, India, June 1988, pdf document accessed on Internet at http://www.drdo.gov.in/drdo/data/Electronic%20Warfare.pdf on 03 Feb 2015.
- JPR Browne and Michael T Thurbon, Electronic Warfare, Brasseys Air Power, March 2005.
- Lessons of the Falklands War, Summary Report, February 1983, Department of Navy, Washington DC accesses on the Internet on 03 Feb 2015.
- William Graham, Electromagnetic Pulse Threats to U.S. Military and Civilian Infrastructure, hearing before the Military Research and Development Subcommittee, House Armed Services Committee, Oct. 7, 1999.
- David A Falgum, EMP Weapons Lead Race for non-lethal Technology, 24 May 1993, pp-61.
- Lowell Wood, statement before the House Research and Development Subcommittee,
- hearing on EMP Threats to the U.S. Military and Civilian Infrastructure, Oct. 7, 1999.
- CRS Report for Congress High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices:
- Threat Assessments August 20, 2004 accessed on the Internet at http://www.fas.org/man/crs/RL32544.pdf accessed on 05 Feb 2015.
- Amitav Mallik, HPL- DEW, Impact on Defence and Security, DRDO Publication DESIDOC, 2012 accessed on the Internet on 10 Feb 2015.
- Monika Chansoria, Directed Energy Weapons: India’s Strategic Game Changer, Article in Foreign Policy, August 2015, accessed on the Internet at http://foreignpolicy.com/2014/08/15/directed-energy-weapons-indias-strategic-game-changer/ on 09 Feb 2015.
- Schwartau, Winn, Class-II Information Warfare: Corporate Espionage and Sabotage, Presentation at the Second International Conference on Information Warfare, Montreal PQ, 18 Jan 1995.
- Schriner, D, The Design and Fabrication of a Damage Inflicting RF Weapon by 'Back Yard' Methods. Feb 2006, retrieved from Joint Economic Committee Web site: http://www.house.gov/jec/hearings/radio/schriner.htm on 09 Feb 2015.
- Sarah Simpson, Cryptography Defined, 1997, accessed on the Internet at http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/SSim/history.html
- Bruce Schneier, Applied Cryptography, Protocols, Algorithms, and Source Code in C, Second edition, John Wiley and Sons, New York (1996) p. 267.
- Westlund, Harold B, “NIST reports measurable success of Advanced Encryption Standard", Journal of Research of the National Institute of Standards and Technology 2002.
- Endre Bangerter, David Gullasch and Stephan Krenn, "Cache Games – Bringing Access-Based Cache Attacks on AES to Practice", 2010 accessed on the Internet on 10 Feb 2015.
- Joey Cheng, Tiny Robots Could Conduct Surveillance, search houses for soldiers, Defence Systems, May 2014, accessed on the internet at http://defensesystems.com/articles/2014/05/19/mast-tiny-robots-isr.aspx accessed on 04 Feb 2015.
- Mohinder Singh, op cit.
- William Silevan, Springtime for Twitter, Is the Internet driving the revolution of the Arab Spring?, Future Tense, accessed on the Internet at http://www.slate.com/articles/technology/future_tense/2011/07/springtime_for_twitter.html on 10 Feb 2015.
- Journalist’s Resource, Carnegie Foundation, Sep 25, 2013 accessed on the Internet at http://journalistsresource.org/studies/international/global-tech/research-arab-spring-internet-key-studies# on 10 Feb 2015.
- Ramesh Srinivasan, Taking Power through technology in the Arab Spring, Al Jazeera, 26 Oct 2012 accessed on the Internet at http://www.aljazeera.com/indepth/opinion/2012/09/2012919115344299848.html on 10 Feb 2015.
- Gabriel Weimann, How modern terrorists use the Internet, United States Institute of Peace, Special Report, March 2004, accessed on the internet at http://www.usip.org/sites/default/files/sr116.pdf on 10 Feb 2014.
- James Sanders, ‘Corporate espionage or fearmongering? The facts about hardware-level backdoors’,
- IT Security, August 7, 2013 accessed on the Internet at http://www.techrepublic.com/blog/it-security/corporate-espionage-or-fearmongering-the-facts-about-hardware-level-backdoors/ on 04 Feb 2015.
- Libicki, Martin. “What is Information Warfare?”, article for the Institute for National Strategic Studies.
- John Arquilla and David Ronfeldt, “Cyberwar is coming!” Comparative Strategy, Vol12, No. 2, Spring 1993 accessed on the Internet on 10 Feb 2015.
- Yael Shahar, “Information Warfare: The Perfect Terrorist Weapon?” Accessed on the Internet at http://all.net/books/iw/iwarstuff/www.ict.org.il/articles/infowar.htm on 10 Feb 2015.
|