1997 Information War & Cyberwar Reference List

While researching the history of cyberwar I found this list containing a lot of references about information war and cyberwar during the first high-tide of this topic during the 1990s. Feel free to use it. Thanks to whoever facilitated this list.

Pre-1997 Infowar Reference List

1. . “Air Force Web Site Shut Down As Hackers Gain Access, Change Files.” The Wall Street Journal, dec 31, 1996, p. 10.

2. “Black Boxes Rule… OK?” Jane’s Defence Systems Modernization 9, no. 2 (1996): 5.

3. “C4ISR in Concert.” Jane’s Defence Weekly 26, no. 10 (1996): 61.

4. Communications Law – Compilation of Selected Acts Within the Jurisdiction of the Committee on Commerce. Washington, DC: Government Printing Office, 1995.

5. “Dawn of Information Age Will Change Military More Than Cold War’s End.” Aerospace Daily 174 (1995): 325.

6. . “Defence in the 21st Century.” The Economist, 5 September 1992, pp. 3-22.

7. “Digitized Zypher Lifting Fog From No Man’s Land: Army Pushes Information Warfare Transition.” National Defense  80, no. 510 (1995): 32-33.

8. “EW Expands into Information Warfare.” Aviation Week and Space Technology 141 (1994): 47-48.

9. “For the First Time, Copernicus Architecture Addresses Information Warfare.” Aerospace Daily 174 (1995): 392.

10. “Going Beyond Real Time: the Next Step in Simulation.” Aviation Week and Space Technology 141 (1994): 71.

11. “Information Warriors Raze Enemy’s Vital Data Chains.” National Defense 79 (1995): 30-31.

12. “New US Naval System “Effective and Suitable”.” Jane’s Defence Weekly 26, no. 10 (1996): 69.

13. “Risk Management Provides Vital Information Security.” Signal 49 (1994): 25-28.

14. “Shipborne Systems Come Off-the-Shelf.” Jane’s Defence Weekly 25, no. 4 (1996): 30.

15. . “The Softwar Revolution.” The Economist, 10 June 1995, pp. 5-20.

16. “US Translator That Speaks the Language.”  Jane’s Defence Weekly 26, no. 2 (1996): 42.

17. “Virtual Reality Helps Build Frigate Bridge.” Jane’s Defence Weekly 25, no. 24 (1996): 45.

18. “Vision 2020.” Jane’s Defence Weekly 23, no. 23 (1995): 29-55.

19. Abel, Dawn. “Simulated War Games Evolve to Enable Combat Exercises.” Signal 44, no. 11 (1990): 45-47.

20. Ackerman, Robert K. “Advanced Information Systems Impel Operational Technologies: Research Agency Provides a Charge to New Electronics Systems Ranging From Thoughtful Sensors to Faithful Computer Simulations.” Signal 50 (1996): 41-43.

21. ———. “Businesses Face Threat of Information Warfare.” Signal 50 (1996): 45-46.

22. ———. “Military Planners Gird for Information Revolution: the Joint Staff Envisions a Future Where Implementing New Technologies Is an Essential Part of Force Definition.” Signal 49 (1995): 71-76.

23. ———. “Vital Intelligence Technologies Converge on Information Systems: Sharing Timely Data Across the Community Requires a Coherent Strategy for Implementing Edge Electronics.” Signal 50 (1996): 35-37.

24. Adam, John A., and Glen Zorpette. “Gulf Legacy.” IEEE Spectrum 28 (1991): entire issue.

25. Adams, David, and others. “The Public Switched Network: an Overview and Vulnerability Assessment.” Air Command and Staff College, 1995.

26. Adams, James. “The Role of the Media.” Ethnic Conflict and Regional Instability: Implications for US Policy and Army Roles and Missions. editors Robert L. Pfaltzgraff, and Richard H. Shultz, 161-69. Carlisle Barracks, PA: US Army War College, 1994.

27. Adcock, Ken, Marilyn M. Helms, and Kenny Jih Wen-Jang. “Information Technology: Can It Provide a Sustainable Competitive Advantage?” Information Strategy 9, no. 3 (1993): 10-15.

28. Aftergood, Steven. “The Soft-Kill Fallacy.” Bulletin of the Atomic Scientists 50 (1994): 40-45.

29. Albano do Amarante, Jose Carlos. “The Automated Battle: a Feasible Dream?” Military Review 74 (1994): 58-61.

30. Alberts, David S. Defensive Information Warfare. Washington, DC: National Defense University Press, 1996.

31. ———. Defensive Information Warfare. Washington, DC: National Defense University, 1996.

32. ———. The Unintended Consequences of Information Age Technologies. Washington, DC: National Defense University Press, 1996.

33. Aldrich, Richard W. The International Legal Implications of Information Warfare. Colorado Springs, CO: Institute for National Security Studies, 1996.

34. Alexander, David. “Information Warfare and the Digitized Battlefield.” Military Technology 19, no. 9 (1995): 57-59+.

35. Alexander, John B. “Antimaterial Technology.” Military Review 69 (1989): 29-41.

36. Alexander, John. B. “Non-Lethal Defense: a Comprehensive Defense Strategy Providing Commanders New Options.”SpaceCast 2020.

37. Alger, John I. “Declaring Information War: Early Training Crucial to Awareness.” International Defense Review 29, no. 7 (1996): 54.

38. ———. “Declaring Information Warfare.” Jane’s International Defence Review 29 (1996): 54-55.

39. Allard, C. Kenneth. Command, Control, and the Common Defense. New Haven: Yale University Press, 1990.

40. ———. “The Future of Command and Control: Toward a Paradigm of Information Warfare.” Turning Point: The Gulf War and U.S. Military Strategy. editors L. Benjamine Ederington, and Michael J. Mazarr, 161-92. Boulder, CO: Westview Press, 1995.

41. Allard, Kenneth. “Data Transforms Warfare: IW Poses New Challenges to Corporate Culture.” Defense News 9, no. 24 (3003).

42. Allison, Graham T. Essence of Decision. New Haven, CT: Harper Collins, 1971.

43. Arnett, Eric H. “Welcome to Hyperwar.” Bulletin of the Atomic Scientists 48, no. 7 (1992): 14-21.

44. Arnnett, Robert L., and Mary C. FitzGerald. “Restructuring the Armed Forces: the Current Soviet Debate.” Journal of Soviet Military Studies 3, no. 2 (1990): 193-220.

45. Arquilla, John. “The Strategic Implications of Information Dominance.” Strategic Review 22, no. 3 (1994): 24-30.

46. Arquilla, John, and David Ronfeldt. The Advent of Netwar. Santa Monica, CA: RAND, 1996.

47. ———. “Cyberwar Is Coming!” Comparative Strategy 12 (1993): 141-65.

48. Arrow, Kenneth J. “Classificatory Notes on the Production and Transmission of Technological Knowledge.” American Economic Review 59 (1969): 29-33.

49. ———. “Limited Knowledge and Economic Analysis.” American Economic Review 64 (1974): 1-10.

50. Ayers, Robert L. “DISA and Information Warfare.”InfoWar Con 1995, H3-H58.

51. Barker, Patrick K. Avoiding Technology-Induced Delusions of Grandeur: Preparing the Air Force for an Information Warfare Environment. Colorado Springs, CO: Institute for National Security Studies, 1996.

52. Barlow, John P. “A Taxonomy of Information.” Bulletin of the Atomic Scientists 20 (1994): 13-17.

53. ” Political Warfare and Psychological Operations: Rethinking the U.S. Approach, editors Frank R. Barnett, and Carnes Lord. Washington, DC: National Defense University Press, 1989.

54. Barnett, Jeffery R. Future War: an Assessment of Aerospace Campaigns in 2010. Maxwell AFB, AL: Air University Press, 1996.

55. Barnett, Jeffrey R. “The Revolution in Military Affairs.”SpaceCast 2020.

56. Barraclough, Geoffrey. “Eric Voegelin and the Theory of Imperialism.” The Philosophy of Order: Essays on History, Consciousness and Politics. editors Peter J. Opitz, and Gregor Sebba, 173-89. Stuttgart, GE: Klett-Cotta, 1981.

57. Bean, Mark H. “Fourth Generation Warfare?” Marine Corps Gazette 79, no. 3 (1995).

58. Beaumont, Roger A. The Nerves of War: Emerging Issues in and References to Command and Control. Washington, DC: AFCEA International Press, 1989.

59. Bell Communications Research. Generic Requirements for Data Communication Network Security. Bellcore, NJ: 1994.

60. ” Computers in Battle: Will They Work?, editors David Bellin, and Gary Chapman. Boston: Harcourt Brace Jovanovich, 1987.

61. Bender, Brian. “Navy Chief Commissions Fleet Information Warfare Center.” Defense Daily, 25 October 1995, pp. 108-9.

62. ———. “War on DoD’s Information Systems Continues to Escalate.” Defense Daily, 20 October 1995, pp. 89-90.

63. Benedikt, Michael. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991.

64. Beniger, James R. The Control Revolution: Technological and Economic Origins of the Information Society. Cambridge, MA: Harvard University Press, 1986.

65. Berenson, Paul J. “Knowledge Based Warfare.”Annual AFCEA Computing Conference.

66. Bergman, Kenneth R. “Space and the Revolution in Military Affairs.” Marine Corps Gazette 79, no. 5 (1995): 58-60.

67. Berkowitz, Bruce D. “Warfare in the Information Age.” Issues in Science and Technology  (1995): 59-66.

68. Betts, Richard. Surprise Attack. Washington, DC: The Brookings Institution, 1982.

69. Beyerchen, Alan. “Clausewitz, Nonlinearity, and the Unpredictability of War.” International Studies 17, no. 3 (1992-1993): 59-90.

70. ” Fuzzy Models for Pattern Recognition: Methods That Search for Structures in Data, editors James C. Bezdek, and K. Pal Sankar. New York: IEEE, 1992.

71. Bickers, Charles. “Fighting on the EW Front.” Jane’s Defence Weekly 23, no. 21 (1995): 31.

72. Bickers. Charles. “PJOCS Is Technology Base for UK’s Joint HQ.” Jane’s Defence Weekly 25, no. 24 (1996): 46.

73. Biddle, Tami Davis. “Handling the Soviet Threat: “Project Control” and the Debate on American Strategy in the Early Cold War Years.” Journal of Strategic Studies 12, no. 3 (1989): 273-302.

74. Bielski, Tanya. “Air Force Chief Embraces Information Warfare.” Defense Daily, 26 April 1995, pp. 125-26.

75. Billout, Guy. “Ask Me No Secrets, I’Ll Tell You No Lies.” Security Management 38 (1994): 24-25+.

76. ” Communication in the Age of Virtual Reality, editors Frank Biocca, and Mark R. Levy. Hillsdale, NJ: Erlbaum, 1995.

77. Bishop, Peter C. “Knowing the Future.”Workshop on Futures Intelligence Methodologies.

78. ———. “Long-Term Forecasting.”2025 Study.

79. Bitzinger, Richard, and Bates Gill. Gearing Up for High-Tech Warfare? Chinese and Taiwanese Defense Modernization and Implications for Military Confrontation Across the Taiwan Strait, 1995-2005. Washington, DC: Center for Strategic and Budgetary Assessments, 1996.

80. Bjorklund, Raymond C. The Dollars and Sense of Command and Control. Ft.McNair, DC: National Defense University Press, 1995.

81. Black, Peter. “Soft Kill: Fighting Infrastructure Wars in the 21st Century.” Wired 1, no. 3 (1993): 49-50.

82. ” A Sobering Look at the Contours of CyberspaceSteven K. Black. Ridgeway Viewpoints, 96-3. Pittsburg, PA: Ridgeway Center for International Studies, University of Pittsburg, 1996.

83. ” This Page Under Construction: Information Warfare in the Post-Cold War WorldSteven K. Black. Ridgeway Viewpoints, 96-1. Pittsburg, PA: Ridgeway Center for International Security Studies, University of Pittsburg, 1996.

84. Blair, David. “How to Defeat the United States: the Operational Military Effects of the Proliferation of Weapons of Precise Destruction.” Fighting Proliferation: New Concerns for the Nineties. editor Henry Sokolski, 75-94. Maxwell AFB, AL: Air University Press, 1996.

85. Blank, Stephen J. Reform and the Revolution in Russian Defense Economics. Carlisle Barracks, PA: U.S. Army War College, 1995.

86. Blazer, Ernest. “Information Is the Best Weapon.” Navy Times 43 (1994): 8.

87. Bleecker, Samuel E. “The Virtual Organization.” The Futurist 28 (1994): 9-12+.

88. Blokzeyl-Roth, Kathleen M. “Preparing the Battlefield – Volant Solo Shoots “Electron Bullets”.” Perspectives 8, no. 1 (1992): 1+.

89. Bloom, Richard W. “Propaganda and Active Measures.” Handbook of Military Psychology. editors Reuven Gal, and A. David Mangelsdorff, 693-709. Chichester, UK: John Wiley & Sons, 1991.

90. Blount, Kerry A. “Two-Part Component Strategy for Winning the Information War.” Army 45 (1995): 10-11.

91. ———. “Wrestling With Information Warfare’s Dark Side.” Army 46 (1996): 9-12+.

92. Boar, Bernard H. The Art of Strategic Planning for Information Technology. New York: John Wiley & Sons, 1993.

93. Boatman, John. “ARPA Sharpen Up for Information Warfare.” Jane’s Defence Weekly 24, no. 7 (1995): 5.

94. ———. “The Jane’s Interview: Larry Lynn (ARPA).” Jane’s Defence Weekly 24, no. 10 (1995): 64.

95. Bodnar, John W. “Military-Technical Revolution: From Hardware to Information.” Naval War College Review 46 (1993): 7-21.

96. Boorda, Jeremy M. “Leading the Revolution in C4I.” Joint Force Quarterly , no. 9 (1995): 14-17.

97. Bowdish, Randall G. “The Revolution in Military Affairs: the Sixth Generation.” Military Review 75, no. 6 (1995): 26-33.

98. Boyd, Morris J., and Michael Woodgerd. “Information Operations: Force XXI Operations.” Military Review 74 (1994): 16-28.

99. Brandt, Daniel. “Infowar and Disinformation: From the Pentagon to the Net.” NameBase Newsletter , no. 11 (1995).

100. Brewin, Bob, and Heather Harreld. “U.S. Sitting Duck, DOD Panel Predicts.” Federal Computer Week 10, no. 33 (1996): 1, 32.

101. Brodie, Bernard. Strategy in the Missile Age. Princeton, NJ: Princeton University Press, 1965.

102. Brodie, Ricchard. Virus of the Mind: the New Science of the Meme. Seattle, WA: Integral Press, 1996.

103. Brown, Anthony C. Bodyguard of Lies. New York: Harper Collins, 1975.

104. Brown, M. “Information Warfare.”Symposium Auswirkungen Neuer Waffentechnologien, 10-32Zentraler Forschungs-und Studienbereich: Amt für Studien und Übungen der Bundeswehr , 1996.

105. Buchan, Glenn. Information War and the Air Force: Wave of the Future? Current Fad?, RAND, 1996.

106. Builder, Carl H. The Icarus Syndrome: the Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force. New Brunswick, NJ: Transaction Publishers, 1994.

107. ———. Rethinking National Security and the Role of the Military. RAND Paper P-7943 ed. Santa Monica, CA: RAND, 1995.

108. Bunker, Robert J. “Advanced Battlespace and Cybermaneuver Concepts: Implications for Force XXI.” Parameters 26, no. 3 (1996): 108-20.

109. ———. “Transition to Fourth Epoch War.” Marine Corps Gazette 78 (1994): 20+.

110. Busey, James B. “Information Superiority Dashes Throny Power Projection Issues.” Signal 49 (1994): 13.

111. ———. “Information Warfare Calculus Mandates Protective Action.” Signal 49 (1994): 15.

112. ———. “Milstar Offers Tactical Information Dominance.” Signal 48 (1994): 11.

113. Campbell, William H. “NTC to Test Digitization.” Army 44 (1994): 34.

114. ” The First Information War, Contributing editor Alan D. Campen. Fairfax, VA: AFCEA International Press.

115. Campen, Alan D. “Information Warfare Is Rife With Promise, Peril.” Signal , no. 48 (1993): 19-20.

116. ———. “Rush to Information-Based Warfare Gambles With National Security.” Signal  (1995): 67-69.

117. ———. “Vulnerability of Info Systems Demands Immediate Action: Reliance by Military on Commercial Communications Infrastructure Poses Significant Peril to United States.” National Defense  (1995): 26-27.

118. ” Cyberwar: Security, Strategy and Conflict in the Information Age, contributing editors Alan D. Campen, Douglas H. Dearth, and R. Thomas Gooden. Fairfax, VA: AFCEA International Press, 1996.

119. ” Developing Battlefield Technologies in the 1990s, editor Edwin R. Carlisle. McNair Papers, 21. Washington, DC: National Defense University, 1993.

120. Carlisle, Edwin R., ed. “Developing Battlefield Technologies in the 1990s.”. McNair Paper, 21. Washington, DC: National Defense University Press, 1997.

121. Casagrande, E. E. Ric. Non-Lethal Weapons: Implications for the RAAF, RAAF, Air Power Studies Centre, 1995.

122. Cassidy, Michael S. “SIGINT: an Important Part of Air Force Intelligence.” American Intelligence Journal 15 (1994): 20.

123. ” Evolution of an Information Society, editor A. E. Cawkell. London: ASLIB, 1987.

124. Cebrowski, Arthur K., and Peter Pace. Information Warfare: a Strategy for Peace… the Decisive Edge in War. Washington, DC: The Joint Staff (J6K &J38), 1996.

125. Cetron, Marvin. An American Renaissance in the Year 2000. Bethesda, MD: World Future Society, 1994.

126. Chaisson, Kernan. “Navy Information Warfare Activity Formed.” World Aerospace & Defense Intelligence , no. 687 (1994): 11.

127. Chantler, Nicholas. “Computer Hackers Brilliance: Above and Beyond Ethics? – What Do We Know About Them?”InfoWar Con 96, 3-37.

128. Cherry, W. Peter, and Glenn Otin. Concept Paper: Information Campaigns. Ann Arbor MI: Vector Research, Inc, 1991.

129. Cheswick, William, and Steven Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Boston, MA: Addison-Wesley, 1994.

130. Chilcote, Richard A. Strategic Art: the New Disicipline for 21st Century Leaders. Carlisle Barracks, PA: U.S. Army War College, 1995.

131. Chisholm, Donald. Coordination Without Hierarchy: Informal Structures in Multiorganizational Systems. Berkeley, CA: University of California Press, 1989.

132. Chizum, David G. Soviet Radioelectronic Combat. Boulder, CO: Westview, 1985.

133. Chotikul, Diane. “The Soviet Theory of Reflexive Control in Historical and Psychocultural Perspective.” Naval Postgraduate School, 1986.

134. Clapes, Anthony L. Softwars: the Legal Battle for Control of the Global Software Industry. Westport, CT: Quorum Books, 1993.

135. Clapper, James R., and Eben H. Trevino. “Critical Security Dominates Information Warfare Moves.” Signal 49, no. 7 (1995): 71-72.

136. ” C3I: Issues of Command and Control, editor Thomas P. Coakley. Washington, DC: National Defense University Press, 1991.

137. Coakley, Thomas P. Command and Control for War and Peace. Washington, DC: National Defense University Press, 1992.

138. Codevilla, A. Informing Statecraft: Intelligence for the New Century. New York: Free Press, 1992.

139. Coe, Gary Q. “Modeling Processes Offer Command and Control Aids.” Signal 48 (1993): 67-69.

140. Cohen, Eliot A. “A Revolution in Warfare.” Foreign Affairs 75, no. 2 (1996): 37-54.

141. Cohen, Frederick B. Protection and Security on the Information Superhighway. New York: John Wiley & Sons, 1995.

142. Collins, John M. Military Roles and Missions: a Framework for Review. Washington, DC: Congressional Research Office, 1995.

143. Colucci, Frank. “Using Data As a Weapon.” Rotor & Wing 28 (1994): 23-27.

144. Constance, Paul. “From Bombs to Bytes: Era of on-Line Weaponry Is Here.” Government Computer News 14 (1995): 51.

145. Cook, Nick. “VR: Even Better Than the Real Thing.” Jane’s Defence Weekly 21 (1994): 24-25.

146. Cook, Wyatt C. “Information Warfare: a New Dimension in the Application of Air and Space Power.” Air War College, 1993.

147. Cooper, Jeffrey R. Another View of the Revolution in Military Affairs. Carlisle Barracks, PA: U.S. Army War College, 1994.

148. Cooper, Pat. “Computers May Guide U.S. War Plans.” Defense News 11, no. 9 (1996): 28-29.

149. ———. “DoD Directive Links Info War Intelligence, Operations.” Defense News 11, no. 41 (1996): 84.

150. ———. “In Cyberspace, US Confronts an Illusive Foe: Hackers Offer Nefarious Threats to Computer Networks.” Defense News 10 (1995): 1+.

151. ———. “Information Warfare Operations Require Intelligence Boost.” Defense News 11, no. 36 (1996): 16.

152. ———. “Information Whizzes to Advise DoD on Future War.” Defense News 11, no. 8 (1996): 14.

153. ———. “IW Study May Guide U.S. Policy.” Defense News 11, no. 12 (1996): 39.

154. ———. “New Center to Coordinate Future DoD Data Systems.” Defense News 11, no. 41 (1996): 74.

155. ———. “Newest Information Warfare Technology Could Backfire on the Battlefield.” Defense News 11, no. 18 (1996): 26.

156. ———. “Pentagon Debates Potential of Information War.” Defense News 11 (1996): 3+.

157. ———. “Pentagon Debates Potential of Information Warfare.” Defense News 11, no. 19 (1996): 3+.

158. ———. “Pentagon Eyes Ways to Counter Commercially Available Threats.” Defense News 11, no. 32 (1996): 18.

159. ———. “U.S. Army Seeks Computer Antivirus Plan.” Defense News 11, no. 34 (1996): 23.

160. ———. “U.S. Lawmakers Examine Vulnerability of Internet.” Defense News 11, no. 21 (1996): 3+.

161. ———. “U.S. Stealth Enhancements Are Key to “Air Occupation”.” Defense News 11, no. 37 (Sept 16-22): 1+.

162. ———. “War Game Reveals IW Vulnerabilities.” Defense News 11, no. 9 (1996): 33.

163. Cooper, Pat, and Robert Holzer. “America Lacks Reaction Plan for Info War.” Defense News 10 (1995): 3+.

164. Cooper, Pat, and Frank Oliveri. “Air Force Carves Operational Edge in Info Warfare.” Defense News 10 (1995): 1+.

165. Cordesman, Anthony H. Compensating for Smaller Forces: Adjusting Ways and Means Through Technology. Carlisle Barracks, PA: U.S. Army War College, 1992.

166. Cruce, Andrew C. “Simulation Technology Making Rapid Advances.” Defense Electronics 25 (1993): 48-51.

167. Curtis, Ian G. S. “Misinformed About Information Warfare? the Three-Wave Theory Is Under Fire.” Defense & Foreign Affairs Strategic Policy 24, no. 3 (1996): 4-5.

168. Czerwinski, Thomas J. “Command and Control at the Crossroads.” Parameters 26, no. 3 (1996): 121-32.

169. ———. “The Third Wave: What the Tofflers Never Told You.” Strategic Forum , no. 72 (1996): 1-4.

170. Davidow, William H., and Michael S. Malone. The Virtual Corporation. New York: Harper Collins, 1992.

171. de Caro, Chuck. “Softwar: Sats, Lies, and Video Rape.”InfoWar Con 96, Sect.A3, 3-14.

172. De Landa, Manuel. War in the Age of Intelligent Machines. New York: Zone, 1991.

173. Dean, David J. “Project Control: Creative Strategic Thinking at Air University.” Air University Review 35, no. 5 (1984): 22-31.

174. Debban, Alan W. “Disabling Systems: War-Fighting Option for the Future.” Airpower Journal 7, no. 1 (1993): 44-50.

175. Defense Information Systems Agency. Defense Information Infrastructure Master Plan – Version 2.0. Arlington, VA: Government Printing Office, 1995.

176. Defense Science Board. Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield. Washington, DC: Government Printing Office, 1994.

177. DeGroat, Arthur S. “Information and Combat Power on the Force XXI Battlefield.” Military Review 75 (1995): 56-62.

178. DeGroat Arthur S., and Michael J. Stagoski. “Mounted Battle Command in the Information Age.” Army 44 (1994): 10-14.

179. ” Computers Under Attack: Intruders, Worms and Viruses, editor Peter J. Denning. New York: ACM Press, 1990.

180. Department of Commerce. Global Information Infrastructure: Agenda for Cooperation. Washington, DC: Government Printing Office, 1995.

181. Department of the Navy . Copernicus…Forward C4I for the 21st Century. Washington, DC: Government Pronting Office, 1995.

182. Devereaux, Christopher. “Combat Leadership and the Media.” U.S. Naval Institute Proceedings 121, no. 7 (1995): 62-65.

183. Dick, Charles. “Russian Views on Future War – Part One.” Jane’s Intelligence Review 5 (1993): 390-392.

184. ———. “Russian Views on Future War – Part Three.” Jane’s Intelligence Review 5 (1993): 488-95.

185. ———. “Russian Views on Future War – Part Two.” Jane’s Intelligence Review 5 (1993): 451-53.

186. Dishong, Donald J. On Studying the Effect of Information Warfare on C2 Decision Making. Monterey, CA: Naval Postgraduate School, 1994.

187. ” The Military Landscape: Mathematical Models of Combat, editors John T. Dockery, and A. E. R. Woodcock. Cambridge, UK: Woodhead, 1993.

188. Donnelly, John. “Research Agency Gears Up for Information Warfare.” Defense Week 16 (1995): 5+.

189. Downs, Lawrence G. “Digital Data Warfare: Using Malicious Computer Code As a Weapon.” Air War College, 1995.

190. ” New Information Infrastructure: Strategies for U.S. Policy, editor William J. Drake. New York: Twentieth Century Fund Press, 1995.

191. Drucker, Peter. Post-Capitalist Society. New York: Harper Collins, 1993.

192. Dunlap, Charles J. “How We Lost the High-Tech War of 2007.” The Weekly Standard 1, no. 19 (1996): 22-28.

193. Echevarria, Antulio, and John M. Shaw. “The New Military Revolution: Post-Industrial Change.” Parameters 22 (1992-1993): 70-79.

194. Ederington, L. Benjamin, and Michael J. Mazaar. Turning Point: the Gulf War and U.S. Military Strategy. Boulder, CO: Westview Press, 1994.

195. Emmett, Peter C. “Information Mania: a New Manifestation of Gulf War Syndrome, Part One.” Air Clues 50, no. 6 (1996): 204-7.

196. ———. “Information Mania: a New Manifestation of Gulf War Syndrome, Part Two.” Air Clues 50, no. 7 (1966): 244-48.

197. ———. “Software Warfare: the Emerging Future.” RUSI Journal 137, no. 6 (1992): 56-60.

198. ———. “Software Warfare: the Militarization of Logic.” Joint Force Quarterly , no. 5 (1994): 84-90.

199. Engelbrecht, Joseph A. “War Termination: Why Does a State Decide to Stop Fighting?” Columbia University, 1992.

200. Evancoe, Paul. “Tomorrow’s Weapons of Choice.” Military Technology 18 (1994): 68-71.

201. Evancoe, Paul R., and Mark Bentley. “Computer Viruses Loom As Future Era Weapons.” National Defense 78 (1994): 19+.

202. ———. “CVW – Computer Virus As a Weapon.”  Military Technology 18 (1994): 38-40.

203. Evers, Stacey. “C4ISR Challenges the Cream of US Defence.” Jane’s Defence Weekly 26, no. 10 (1996): 61.

204. ———. “Data Fusion Gives F-22 Pilots the Big Picture.” Jane’s Defence Weekly 26, no. 2 (1996): 41.

205. ———. “Information Worth a Thousand Passes.” Jane’s Defence Weekly 25, no. 20 (1996): 32.

206. ———. “The Jane’s Interview: Barry Horton (ASDC3I).” Jane’s Defence Weekly 25, no. 15 (1996): 32.

207. ———. “Stopping the Hacking of Cyber Information.” Jane’s Defence Weekly 25 (1996): 22-25.

208. ———. “Stopping the Hacking of Cyber Information.” Jane’s Defence Weekly 25, no. 15 (1996): 22.

209. ———. “US Navy Commissions New Information Centre.” Jane’s Defence Weekly 25, no. 18 (1995): 11.

210. ———. “USAF Uses CUBE to Solve C2 Problems.” Jane’s Defence Weekly 25, no. 12 (1996): 19.

211. Eward, Ronald S. “The Vulnerabilities of a Global Electronic Economy.”Infowar Con 96, Sect. A2, 3-48.

212. ” Information Technology, editor Edward A. Feigenbaum. New World Vistas: Air and Space Power for the 21st Century, Gene H. McCall. Washington, DC: Scientific Advisory Board, 1995.

213. Feigenbaum, Edward A. “The Intelligent Use of Machine Intelligence.” CrossTalk  (1995): 10-13.

214. Felker, Ed. “Information Warfare: a View of the Future.” A Common Perspective 3, no. 2 (1995): 17-18.

215. Felker, Edward J. Oz Revisited: Russian Military Doctrinal Reform in the Light of Their Analysis of Desert Storm. Maxwell AFB, AL: School of Advanced Airpower Studies, 1995.

216. Ferster, Warren. “Israelis Pressure U.S. for Imagery Restriction.” Defense News 11, no. 24 (1996): 1+.

217. FitzGerald, Mary C. “Advanced Conventional Munitions and Moscow’s Defensive Force Posture.” Defense Analysis 6, no. 2 (1990): 167-91.

218. ———. The Impact of the Military-Technical Revolution on Russian Military Affairs, 2 Vols., MDA903-91-C-0190. Herman Kahn Center, Indianapolis, IN, 1993.

219. ———. The New Russian Revolution in Military Affairs. London, UK: Royal United Services Institute for Defence Studies, 1994.

220. ———. “Russia’s New Military Doctrine.” RUSI Journal 137 (1992): 40-48.

221. ———. “The Russian Image of Future War.” Comparative Strategy 13 (1994): 167-80.

222. ———. “The Russian Military’s Strategy for “Sixth Generation” Warfare.” Orbis 38, no. 3 (1994): 457-76.

223. ———. “Russian Views on Electronic Signals and Information Warfare.” American Intelligence Journal 15 (1994): 81-87.

224. ———. “Russian Views on Information Warfare.” Army 44 (1994): 57-58+.

225. ———. “The Soviet Image of Future War: “Through the Prism of the Persian Gulf”.” Comparative Strategy 10 (1991): 393-435.

226. Fitzsimonds, James R., and Jan M. VanTol. “Revolutions in Military Affairs.” Joint Force Quarterly , no. 4 (1994): 24-31.

227. Fogleman, Ronald R. “The Fifth Dimension of Warfare.”Armed Forces and Communications Association.

228. ———. “Fundamentals of Information Warfare: an Airman’s View.”NDU/NSIA Global Information Explosion Conference .

229. Fogleman, Ronald R., Chief of Staff, USAF, and Sheila E. Widnall, Secretary of the Air Force. Cornerstones of Information Warfare.1995.

230. Fox, Terrance M. “Closing the Media-Military Technology Gap.” Military Review 75, no. 6 (1995): 10-16.

231. Fracker, Martin L. “Cognitive Engineering for Information Dominance.”USAF 2025.

232. Franks, Frederick M. “Winning the Information War: Evolution and Revolution.” Vital Speeches 60 (1994): 453-58.

233. Frederick, Howard. “Computer Networks and the Emergence of Global Civil Society.” Global Networks: Computers and International Communications. editor Linda M. Harasim, 283-95. Cambridge, MA: MIT Press, 1993.

234. Fulghum, David A. “Secret Carbon-Fiber Warheads Blinded Iraqi Air Defenses.” Aviation Week & Space Technology  136, no. 17 (1992): 18-20.

235. Gambel, Daniel W. “MLS (Multi-Level Security): Data Security for the DOD and the Rest of Us.” Defense Electronics 27, no. 6 (1995): 10+.

236. ” To Inform or to Control? the New Communications Networks, editors Oswald H. Ganley, and Gladys D. Ganley. Norwood, NJ: Ablex Publishing Co, 1989.

237. Garceau, Linda, Elise Jancura, and John Kneiss. “Object-Oriented Analysis and Design: a New Approach to Systems Development.” Journal of Systems Management 16, no. 2 (1993): 25-32.

238. Garden, Timothy. The Technology Trap: Science and the Military. Washington, DC: Brassey’s Defence Publishers, 1989.

239. Garrity, Patrick J. Why the Gulf War Still Matters: Foreign Perspectives on the War and the Future of International Security. Los Alamos, NM: Center for National Security Studies, 1993.

240. Gehly, Darryl. “Controlling the Battlefield.” Journal of Electronic Defense 16, no. 6 (1993): 42-49.

241. General Accounting Office. Export Controls: Issues in Removing Militarily Sensitive Items From the Munitions List. Washington, DC: Government Printing Office, 1993.

242. Gibbs, W. Wayt. “Software’s Chronic Crisis.” Scientific American 271, no. 3 (1994): 86-95.

243. Giboney, Thomas B. “Commander’s Control From Information Chaos.” Military Review 71 (1991): 34-38.

244. Giessler, Fred. “Competing Cybernetic Systems: a Scientific Construct for Information War.”1994.

245. ———. “Cybernetics in Command and Control and Information War: Return to the Futuure of Systems Thinking.”1994.

246. Gill, Bates, and Lonnie Henley. China and the Revolution in Military Affairs. Carlisle Barracks, PA: U.S. Army War College, 1996.

247. Gill, Bates, and Kim Taeho. China’s Arms Acquisitions From Abroad: a Search for “Superb and Secret Weapons”. Oxford, UK: Oxford University Press, 1995.

248. Gingrich, Newt. “Information Warfare: Definition, Doctrine and Directions.”AFCEA Conference.

249. ———. “Ten Challenges From Now to 2010.”AFCEA Conference.

250. Gleick, James. Chaos: Making a New Science. New York: Penguin Books, 1987.

251. Glenn, Jerome Clayton. Future Mind: Artificial Intelligence. Washington, DC: Acropolis Books, 1989.

252. Goggans, Chris. “Hackers Aren’t the Real Enemy.” Computerworld 26 (1992): 37.

253. ” Tactics and Techniques for 21st Century Military Superiority, study directors Ted Gold, and Donald Latham. Washington, DC: Defense Science Board, 1996.

254. Goldman, Steven L., Roger N. Nagel, and Kenneth Preiss. Agile Competition and Virtual Organizations. New York: Van Nostrand Reinhold, 1995.

255. Goodman, Glenn W. “Power of Information: Air Force Clarifies Its Misunderstood Virtual Presence Concept.” Armed Forces Journal International 132, no. 12 (1995): 24.

256. Gormley, Dennis. “Make Information Dominance NATO’s Military Glue.” Defense News 11, no. 27 (1996): 21.

257. Gornicki, Wieslaw. “W Cieniu Bomb-L.” DZIS 11, no. 62 (1995): 48-60.

258. Gove, Ronald. “The Information Warfare Challenges of a Ntional Information Infrastructure.”InfoWar Con 1995, A3-A9.

259. Gray, Colin S. “The Changing Nature of Warfare?” The Officer: ROA National Security Report  (1995): 36-39.

260. Gray, Jim. “Turning Lessons Learned into Policy.” Journal of Electronic Defense 16 (1993): 87-92.

261. ” Desert Storm and the Mass Media, editors Bradley S. Greenberg, and Walter Gantz. Cresskill, NY: Hampton Books, 1993.

262. Grier, Peter. “The Data Weapon.” The Government Executive 24 (1992): 20-22+.

263. ———. “Information Warfare.” Air Force Magazine 78 (1995): 34-37.

264. Griffin, Gary B. “Future Foes, Future Fights.” Military Review 74 (1994): 56-60.

265. Griffith, Thomas E. Strategic Attack of National Electrical Systems. Maxwell AFB, AL: School of Advanced Airpower Studies, 1994.

266. Grin, John. Military-Technological Choices and Political Implications: Command and Control in Established NATO Posture and Non-Provocative Defence. New York: St. Martin’s Press, 1990.

267. ” Military Technological Innovation and Stability in a Changing World: Politically Assessing and Influencing Weapon Innovation and Military Research and Development, editors John Grin, Wim A. Smit, and Lev Voronkow. Amsterdam: VU Iniversity Press, 1992.

268. Guilbault, R. G. “Information Empowerment: the Key Force Multiplier.” Defense & Security Electronics 28, no. 1 (1996): 10+.

269. Hafner, Katie, and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster, 1991.

270. Hammes, Thomas X. “Evolution of War: the Fourth Generation.” Marine Corps Gazette 78 (1994): 35-38+.

271. Hamon, Dale R., and Walter G. Green. “Space and Power Projection.” Military Review 74 (1994): 61-67.

272. Hardy, Stephen M. “Accessing the Digital Battlefield.” Journal of Electronic Defense 17 (1994): 31-32+.

273. ———. “Should We Fear the Byte Bomb?” Journal of Electronic Defense 19, no. 1 (1996): 42+.

274. Harig, Paul T. “The Digital General: Reflections in Leadership in the Post-Information Age.” Parameters 26, no. 3 (1996): 133-40.

275. Harknett, Richard J. “Information Warfare and Deterrence.” Parameters 26, no. 3 (1996): 93-107.

276. Haynes, Colin. The Computer Virus Protection Handbook. San Francisco, CA: Sybex, 1990.

277. Haywood, James E. Improving the Management of an Air Campaign With Virtual Reality. Maxwell AFB. AL: Air University Press, 1996.

278. Hedberg, Bo, and Jonsson. “Designing Semi-Confusing Information Systems for Organizations in Changing Environments.” Accounting, Organizations and Society 3, no. 1 (1978): 47-64.

279. Herman, Paul F. “The Military-Technical Revolution.” Defense Analysis 10, no. 1 (1994): 91-95.

280. Hitchcock, Walter T. The Intelligence Revolution: a Historical Perspective. Washington, DC: USAF Academy, 1991.

281. Hoffman, Bruce. Responding to Terrorism Across the Technological Spectrum. Santa Monica, CA: RAND, 1994.

282. Holzer, Robert. “JCS for Strategy for Future Warfare.” Defense News 29, no. 4+ (1903).

283. ———. “Krulak (Commandant, USMC) Warns of Over-Reliance on Technology.” Defense News 11, no. 40 (1996): 4+.

284. ———. “Simulation Comes to Personal Computers.” Defense News 11, no. 40 (1996): 26+.

285. ———. “U.S. Navy Begins Information War Effort.” Defense News 9 (1994): 4.

286. Horner, Charles A. “Space Systems Pivotal to Modern Warfare.” Defense 94 4 (1994): 20-29.

287. Howland, D. The Cybernetic Modelling of Soviet Systems. Washington, DC: Defense Intelligence Agency, 1990.

288. Huber, Arthur F., and others. The Virtual Combat Air Staff: the Promise of Information Technologies. Santa Monica, CA: RAND, 1996.

289. ———. The Virtual Combat Air Staff: the Promise of Information Technologies. Santa Monica, CA: RAND, 1996.

290. ———. The Virtual Combat Air Staff: the Promise of Information Technologies. Santa Monica, CA: RAND, 1996.

291. Hundley, Richard O., and Robert H. Anderson. Security in Cyberspace: an Emerging Challenge for Society. Santa Monica, CA: RAND, 1994.

292. Hundley, Richard O., and Eugene C. Gritton. Future Technology Driven Revolutions in Military Affairs. Santa Monica, CA: RAND, 1994.

293. Hunter, Roger C. “Disabling Systems and the Air Force.” Airpower Journal 8, no. 3 (1994): 43-47.

294. Hurska, Jan. Computer Viruses and Anti-Virus Protection. New York: Ellis Horwood Publishers, 1990.

295. Hust, Gerald R. Taking Down Telecommunications. Maxwell AFB, AL: Air University Press, 1994.

296. Hutcherson, Norman B. Command and Control Warfare: Putting Another Tool in the War-Fighter’s Data Base. Maxwell AFB, AL: Air University Press, 1994.

297. Information Infrastructure Task Force. National Information Infrastructure Progress Report, September 1993-1994. Washington, DC: Department of Commerce, 1994.

298. Institute for Foreign Policy Analysis. War in the Information Age. Washington, DC: IFPA, 1996.

299. Institute for National Strategic Studies. Project 2015. FtMcNair, Washington, DC: National Defense University Press, 1995.

300. Ippolito, Dennis S. Federal Budget Policy and Defense Strategy. Carlisle Barracks, PA: U.S. Army War College, 1995.

301. ” Fundamentals of Tactical Command and Control: a Soviet ViewD. D. Ivanov, V. P. Savel’yev, and P. V. Shemanskiy, translator USAF. Soviet Military Thought, 18. Washington, DC: Goverment Printing Office, 1977.

302. ” The Owl of Minerva Flies at Twilight: Doctrinal Change and Continuity and the Revolution in Military AffairsDavid Jablonsky. Professional Readings in Military Strategy, Strategic Studies Institute, 10. Carlisle Barracks, PA: US Army War College.

303. Jain, P. C. “Architectural Trends in Military Satellite Communications Systems.” Proceedings of the IEEE 78, no. 7 (1990): 1177-89.

304. Jenish, D’Arcy. “A Terrorist Virus.” Maclean’s 105 (1992): 48+.

305. Jensen, Owen E. “Information Warfare: Principles of Third-Wave War.” Airpower Journal 8, no. 4 (1994): 35-43.

306. Jensik, Robert R. “The Evolution of Electronic Combat Doctrine.” Air War College, 1993.

307. Johnson, Craig L. “Information Warfare – Not a Paper War.” Journal of Electronic Defense 17 (1994): 55-56+.

308. Johnson, Dana J., Katherine Poehlmann, and Richard Buennecke. Space Roles, Missions, and Functions: the Challenge of Organizational Reform. Santa Monica, CA : RAND, 1995.

309. Johnson, Douglas V. The Impact of the Media on National Security Decision Making. Carlisle Barracks, PA: U.S. Army War College, 1994.

310. ” Dominant Battlespace Awareness, editors Stuart E. Johnson, and Martin C. Libicki. Ft.McNair, DC: National Defense University Press, 1966.

311. Joint Security Commission. Redefining Security: a Report to the Secretary of Defense and the Director of Central Intelligence. Washington, DC: Government Printing Office, 1994.

312. Jones, Jeffrey B. “Theater Information Strategies.” Military Review 74, no. 11 (1994): 48-50.

313. Jones, R. V. The Wizard War: British Scientific Intelligence 1939-1945. New York: Coward, McCann & Georghegan, 1978.

314. Kabay, Michael E. The NCSA Guide to Enterprise Security: Protecting Information Assets. McGraw-Hill, 1996.

315. Kahan, James P., Robert Worley, and Cathleen Stasz. Understanding Commander’s Information Needs. Santa Monica, CA: RAND, 1989.

316. Kahn, Herman. On Escalation. New York: Praeger, 1965.

317. Kelley, Jay. “Brilliant Warriors.” Joint Force Quarterly , no. 11 (1996): 104-10.

318. Kelly, Kevin. Out of Control: the Rise of Neo-Biological Civilization. New York: Addison-Wesley, 1994.

319. Kendall, Frank. “Exploiting the Military Technical Revolution: a Concept for Joint Warfare.” Strategic Review  24, no. 2 (1992): 23-30.

320. Kitfield, James. “Live by the Sword, Die by Software.” Government Executive 27 (1995): 72.

321. ———. “Trading Bullets for Bytes.” Government Executive 26 (1994): 18,19+.

322. Kleinrock, Leonard. “ISDN – the Path to Broadband Networks.” Proceedings of the IEEE 79, no. 2 (1991): 112-17.

323. Kobb, Bennett Z. “Telecommunications.” IEEE Spectrum 32, no. 1 (1995): 30-34.

324. Koch, James R. “Operation Fortitude: the Backbone of Deception.” Military Review 72 (1992): 66-77.

325. Kofman, Fred, and Peter M. Senge. “Communities of Commitment: the Heart of Learning Organizations.” Organizational Dynamics 22 (1993): 5-22.

326. ” A Doctrine for the Use of Electromagnetic Pulse WeaponsCarlo Kopp. Studies, 15. Air Power Studies Centre, Australia: Royal Australian Air Force, 1993.

327. Kopp, Carlo. “The E-Bomb: a Weapon of Electrical Mass Destruction.”InfoWar Con 96, Sect. C-2, 3-31.

328. Kraus, George F. “Information Warfare in 2015.” U.S. Naval Institute Proceedings 121, no. 8 (1995): 42-45.

329. Krepinevich, Andrew F. “Cavalry to Computer: the Pattern of Military Revolutions.” National Interest , no. 37 (1994).

330. ———. “Keeping Pace With the Military-Technological Revolution.” U.S. Naval Institute Proceedings 10 (1994): 23-29.

331. Krepinevich, Andrew K. “Keeping Pace With the Military Technical Revolution.” Issues in Science and Technology  (1994).

332. Kuehl, Dan. “Joint Information Warfare: an Information-Age Paradigm for Jointness.” Strategic Forum , no. 105 (1997): 1-4.

333. Kugler, Richard L. US Military Strategy and Force Posture for the 21st Century. Santa Monica, CA: RAND, 1994.

334. Kurzweil, Raymond. The Age of Intelligent Machines. Cambridge, MA: MIT Press, 1990.

335. ———. “May the Smartest Machine Win: Warfare in the 21st Century.” Library Journal 118 (1993): 70-72.

336. Leach, Raymond J. “”Information” Support to U.N. Forces.” Marine Corps Gazette 78 (1994): 49-50.

337. Lee, James G. Counterspace Operations for Information Dominance. Maxwell, AFB, AL: Air University Press, 1994.

338. Lefebvre, Vladimir A. Algebra of Conscience: a Comparative Analysis of Western and Soviet Ethical Systems. Dordrecht, NL: D. Reidel Publishing, 1982.

339. ” The Structure of Awareness: Toward a Symbolic Language of Human ReflexionVladimir A. Lefebvre, translator, with introduction Anatol Rapoport. Beverly Hills, CA: Sage, 1977.

340. Lefebvre, Vladimir A., and Victorina D. Lefebvre. Reflexive Control: the Soviet Concept of Influencing an Adversary’s Decision Making Process. Englewood, CO: SAIC, 1984.

341. Lefebvre, Vladimir A., and G. L. Smolyan. “Algebra Konflikta.” Algebra of Conflict, translator National Technical Information Service. Springfield, VA: U.S. Department of Commerce, 1971.

342. Lehner, Paul E. Artificial Intelligence and National Defense: Opportunity and Challenge. Blue Ridge Summit, PA: Tab Books, 1989.

343. Lesser, Roger. “So You Think Your Information Is Secure – Is It?” Defense Electronics 27, no. 5 (1995): 16-19.

344. ” Cyborg Worlds: the Military Information Society, editors Les Levidow, and Kevin Robins. London: Free Association, 1989.

345. Levite, Ariel. Intelligence and Strategic Surprise. New York: Columbia University Press, 1987.

346. Lewonowski, Mark C. “Information Warfare.” Essays on Strategy. 9 ed., editor Thomas C. Gill, 55-80. FtMcNair, DC: National Defense University Press, 1993.

347. Libicki, Martin C. Defending Cyberspace and Other Metaphors. Washington, DC: National Defense University Press, 1997.

348. ———. Defending Cyperspace and Other Metaphors. Washington, DC: National Defense University, 1997.

349. ———. “Information & Nuclear RMAs Compared.” Strategic Forum , no. 82 (1996): 1-4.

350. ———. The Mesh and the Net: Speculations on Armed Conflict in the Age of Free Silicon. Washington, DC: National Defense University Press, 1995.

351. ” What Is Information Warfare?Martin C. Libicki. Ft.McNair, DC: National Defense University Press, 1995.

352. Libicki, Martin C., and James A. Hazlett. “Do We Need an Information Coprs?” Joint Forces Quarterly , no. 1 (1993): 88-97.

353. Lind, William S., and others. “The Changing Face of War into the Fourth Generation.” Military Review 69, no. 10 (1989): 2-11.

354. Littleton, Matthew J. Information Age Terrorism: Toward Cyberwar. Monterey, CA: Naval Postgraduate School, 1995.

355. Lok, Jorin Janssen. “Australia Opens Up Its Data Channels.” Jane’s Defence Weekly 26, no. 6 (1996): 35.

356. Lok, Joris Janssen. “Drawing Together NATO’s Databases.” Jane’s Defence Weekly 25, no. 1 (1996): 23.

357. ———. “Frigate’s Fuzed Radar Foils ASM Threat.” Jane’s Defence Weekly 25, no. 16 (1996): 65.

358. ———. “Goggles Take Wearer to a Virtual World.” Jane’s Defence Weekly 25, no. 21 (1995): 53.

359. ———. “ISIS Offers Evilution in Data Integration.” Jane’s Defence Weekly 26, no. 6 (1996): 37.

360. ———. “Joint STARS and the Need for Speed.” Jane’s Defence Weekly 25, no. 4 (1996): 29.

361. ———. “Security in Numbers on the OSCE Network.” Jane’s Defence Weekly 25, no. 4 (1996): 27.

362. ———. “Texas Changes Tack With IT Acquisitions.” Jane’s Defence Weekly 26, no. 10 (1996): 69.

363. Lucky, Robert W. Silicon Dreams: Information, Man and Machine. NY: St. Martin’s Press, 1989.

364. Ludwig, Mark A. The Little Black Book of Computer Viruses. Tucson, AZ: American Eagle Publishing Co., 1991.

365. Lum, Zachary A. “Pump Up the Volume – Here Comes the Jam.” Journal of Electronic Defense 17 (1994): 34+.

366. ———. “We Want the Airwaves: Defense on the C2 Front.” Journal of Electronic Defense 19 (1996): 37-40.

367. Luzgan, Tamara. “Information Powershift: a Paradigm for Information-Based Warfare.”InfoWar Con 1995, D3-D14.

368. Macedonia, Michael R. “Information Technology in Desert Storm.” Military Review 72 (1992): 34-41.

369. Macgregor, Douglas A. “Closing With the Enemy.” Military Review 73 (1993): 64-71.

370. ———. “Future Battle: the Merging Levels of War.” Parameters 22 (1992-1993): 33-47.

371. Mackay, Leo S. “Naval Aviation, Information, and the Future.” Naval War College Review 45 (1992): 7-19.

372. MacNulty, Christine A. R. “Changing Social Values and Their Implications for the Ethics of Information Warfare.”InfoWar Con 96, Sect. D-2, 3-16.

373. Madsen, Wayne. “Intelligence Agency Threats to Computer Security.” International Journal of Intelligence and Counterintelligence 6 (1993): 413-88.

374. Mahnken, Thomas G. “War in the Information Age.” Joint Force Quarterly , no. 10 (1995-1996): 39-43.

375. Mann, Edward. “Desert Storm: the First Information War?” Airpower Journal 8, no. 4 (1994): 4-14.

376. Mann, Edward C. Thunder and Lightning. Maxwell AFB, AL: Air University Press, 1995.

377. Mann, Steven R. “Chaos, Criticality and Strategic Thought.” Essays on Strategy. 9 ed., editor Thomas C. Gill, 33-54. FtMcNair, DC: National Defense University Press, 1993.

378. Martin, William J. The Information Society. London: Aslib, 1988.

379. Maurer, Martha. Coalition Command and Control. FtMcNair, DC: National Defense University Press, 1994.

380. ———. Coalition Command and Control. Washington, DC: National Defense University Press, 1994.

381. Maxwell, Arthur G., Jr. Joint Training for Information Managers. FtMcNair, DC: National Defense University Press, 1996.

382. Mazaar, Michael. The Revolution in Military Affairs: Framework for Defense Planning. Carlisle Barracks, PA: U.S. Army War College, 1994.

383. Mazarr, Michael, Jeffrey Shaffer, and Benjamin Ederington. The Military Technical Revolution: a Structural Framework. Washington, DC: Center for Strategic and International Studies, 1993.

384. National Security in the Information AgeJames P. McCarthy.

385. McConnell, J. M. “New World, New Challenges: NSA in the 21st Century.” American Intelligence Journal 15 (1994): 7-10.

386. McGee, James V., and Laurence Prusak. Managing Information Strategically. New York: John Wiley & Sons, 1993.

387. McGinnis, Michael L., and George F. Stone. “Decision Support Technology.” Military Review 74 (1994): 68-75.

388. McKnight, Clarence E. Control of Joint Forces: a New Perspective. Fairfax, VA: AFCEA International Press, 1989.

389. McLendon, James W. “Information Warfare: Impacts and Concerns.” Battlefield of the Future. editors Barry R. Schneider, and Lawrence E. Grinter, 171-99. Maxwell AFB, AL: Air University Press, 1995.

390. Meadows, Sandra I. “Satellite Links Bestow Commanders With Split-Second Combat Spectacle.” National Defense  (1995): 24-26.

391. Menoher, Paul E. “Where Do We Go From Here?” American Intelligence Journal 15 (1994): 11-14.

392. Merry, Uri. Coping With Uncertainity: Insights From the New Sciences of Chaos, Self-Organization and Complexity. Westport, CT: Praeger, 1995.

393. Metz, Steven. Strategic Horizons: the Military Implications of Alternative Futures. Carlisle Barracks, PA: Strategic Studies Institite, US Army War College, 1997.

394. Metzgar, Terry. “Hostile Intercepts Aimed at Information Systems.” National Defense 77 (1993): 24-26.

395. Minihan, Kenneth A. “Information Dominance: Meeting the Intelligence Needs of the 21st Century.” American Intelligence Journal 15 (1994): 15-19.

396. ———. “Information Dominance: Winning in the New Dimension of Warfare.” Spokesman 34 (1994): 10-12.

397. Minnihan, Kenneth A. “Information Dominance Edges Toward New Conflict Frontier.” Signal 48 (1994): 37-40.

398. Molander, Roger C., Andrew S. Riddile, and Peter A. Wilson. “Strategic Information Warfare; a New Face of War.” Parameters 26, no. 3 (1996): 81-92.

399. Moore, George M., Vic Budura, and Joan Johnson-Freeze. “Joint Space Doctrine: Catapulting into the Future.” Joint Force Quarterly , no. 5 (1994): 71-76.

400. ” Information Applications, editor Charles L. Morefield. New World Vistas: Air and Space Power for the 21st Century, Gene H. McCall. Washington, DC: Scientific Advisory Board, 1995.

401. Morris, Charles. Signs, Language and Behavior. New York: Prentice-Hall, 1946.

402. Morris, Chris, Janet Morris, and Thomas Baines. “Weapons of Mass Protection: Nonlethality, Information Warfare, and Airpower in the Age of Chaos.” Airpower Journal 9, no. 1 (1995): 15-29.

403. Morris, Janet. “Enter Nonlethal Weaponry.” IEEE Spectrum 28 (1991): 58.

404. Morrison, David C. “Bang! Bang! Tou’Ve Been Inhibited.” National Journal 24 (1992): 758-59.

405. Mowery, Beverly P. “Technology Opens New Strategies for Future Battlefield Operations.” Signal 48 (1994): 61.

406. Munro, Neil. The Quick and the Dead: Electronic Combat and Modern War. NY: St. Martin’s Press, 1991.

407. ———. “U.S. Boosts Information Warfare Initiative.” Defense News 8 (1993): 1+.

408. Munro, Neil, and Barbara Opall. “Military Studies Unusual Arsenal.” Defense News 7 (1992): 3+.

409. Mussington, David. “Throwing the Switch in Cyberspace.” Jane’s Intelligence Review 8, no. 7 (1996): 331-34.

410. ———. “Throwing the Switch in Cyberspace.” Jane’s Intelligence Review 8, no. 7 (1996): 331.

411. Nair, V. K. War in the Gulf: Lessons for the Third World. New Delhi, India: Lancer International, 1991.

412. Nance, Barry. “The Future of Network Operating Systems.” BYTE  (1991): 268-72.

413. National Research Council. The Changing Nature of Telecommunications/Information Infrastructure. Washington, DC: National Academy Press, 1995.

414. ———. Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness. Washington, DC: National Academy Press, 1989.

415. ———. Realizing the Information Future: the Internet and Beyond. Washington, DC: National Academy Press, 1994.

416. Naval War College. Symposium Report: Evolving the National Information Infrastructure. Newport, RI: Naval War College, 1995.

417. Naylor, Sean D. “Info War: “Digitizatiion” Will Shape How Future Wars Are Fought.” Army Times 53 (1993): 12-14.

418. ———. “U.S. Army War Game Reveals Satellite Vulnerability.” Defense News 12, no. 10 (1997): 50.

419. Negroponte, Nicholas. Being Digital. New York: Vintage Books, 1995.

420. Nichiporuk, Brian, and Carl H. Builder. Information Technologies and the Future of Land Warfare. Santa Monica, CA: RAND, 1995.

421. Nicholls, David, and Todar D. Tagarev. “What Does Chaos Theory Mean to Warfare?” Airpower Journal 8, no. 3 (1994): 48-57.

422. ” Networks and Organizations: Structure, Form and Action, editors Nitin Nohira, and Robert G. Eccles. Boston: Harvard Business School Press, 1992.

423. Nordwall, Bruce D. “Swedish-Developed Radar to Penetrate Foliage, Ground.” Aviation Week & Space Technology , no. 138 (1993): 52-55.

424. Nye, Joseph S., and William A. Owens. “America’s Information Edge.” Foreign Affairs 75, no. 2 (1996): 20-36.

425. Office of Technology Assessment. Accessibility and Integrity of Networked Information Collections. Washington, DC: National Technical Information Service, 1993.

426. ———. Electronic Enterprises: Looking to the Future. Washington, DC: Government Printing Office, 1994.

427. ———. Finding a Balance: Computer Software, Intellectual Property, and the Challenge of Technological Change. Washington, DC: Government Printing Office, 1992.

428. ———. Information Security and Privacy in Network Environments. Washington, DC: Government Printing Office, 1994.

429. ———. Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage. Washington, DC: Government Printing Office, 1990.

430. Office of the Chief of Naval Operations.  Space and Electronic Warfare: a Navy Policy Paper on a New Warfare Area. Washington DC: Government Printing Office, 1992.

431. Office of the Manager, National Communications System. The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications. Arlington, VA: Government Printing Office, 1994.

432. Ohno, Taiichi. Toyota Production System: Beyond Large-Scale Production. Cambridge, MA: Productivity Press, 1988.

433. Olbrys, Elizabeth B. Information Culture in DoD: Preparing for the Third Wave. Washington, DC: Industrial College of the Armed Forces, 1994.

434. Oliva, George, and Theodore Pfeiffer. “Winning the Information War: the Army’s Answer to Command and Control.” Army RD&A Bulletin  (1994): 35-38.

435. Oliveri, Frank. “Unmanned Aircraft May Dominate Air Warfare.” Defense News 11, no. 9 (1996): 8+.

436. Opall, Barbara. “Pentagon Forges Strategy on Non-Lethal Warfare.” Defense News 7 (1992): 1+.

437. Opall, Barbara, and Neil Munro. “Pentagon Official Says US Arms Technology Far Outpaces Doctrine.” Defense News 7 (1992): 20+.

438. Orr, George E. Combat Operations C3I: Fundamentals and Interactions. Maxwell AFB, AL: Air University Press, 1983.

439. Owens, William A. “The American Revolution in Military Affairs.” Joint Force Quarterly , no. 10 (1995-1996): 37-38.

440. ———. “The Emerging System of Systems.” U.S. Naval Institute Proceedings 121, no. 5 (1995): 35-39.

441. ———. “The Emerging System of Systems.” U.S. Naval Institute Proceedings 121/5/1107 (1995): 35-39.

442. ———. “Four Revolutions in Military Thinking.” The Officer: ROA National Security Report  (1995): 29-32, 44.

443. ———. “JROC: Harnessing the Revolution in Military Affairs.” Joint Force Quarterly , no. 5 (1994): 55-57.

444. Parker, Thomas S., and Leon O. Chua. Practical Numerical Algorithms for Chaotic Systems. New York: Springer-Verlag, 1989.

445. Pellegrini, Robert P. The Links Between Science and Philosophy and Military Theory. Maxwell AFB, AL: School of Advanced Airpower Studies, 1995.

446. Pelton, Joseph N. Future View: Communications Technology and Society in the 21st Century. Boulder, CO: Baylin Publishing, 1992.

447. Peters, Ralph. “After the Revolution.” Parameters 25, no. 2 (1995).

448. Petersen, John L. “Information Warfare: the Next Generation.”InfoWar Con 96, 3-10.

449. Peterson, A. Padgett. “Tactical Computers Vulnerable to Malicious Software Attacks.” Signal , no. 48 (1993): 74-75.

450. Peterson, John H. “Info Wars.” U.S. Naval Institute Proceedings 119 (1993): 85-92.

451. Platt, Charles. “Hackers: Threat or Menace?” Wired 2 (1994): 82-85+.

452. Pogue, Jim. “Radio Democracy: Up and Flying Over Haiti.” Monitoring Times 13, no. 9 (1994): 14+.

453. Pollard, Neal. “Computer Terrorism and the Information Infrastructure.”InfoWar Con 1995, I3-I23.

454. Powell, Colin L. “Information-Age Warriors.” Byte 17 (1992): 370.

455. Powers, W. T. Behavior, the Control of Perception. Chicago, IL: Aldine Press, 1973.

456. ” Psychological Operations and Political Warfare in Long-Term Strategic Planning, editor Janos Radvanyi. New York: Praeger, 1990.

457. Reed, Carol. “Silicon Valley Heads the New Frontierism.” Jane’s Defence Weekly 25, no. 20 (1996): 28.

458. Reich, Robert B. The Work of Nations. New York: Alfred A. Knopf, 1991.

459. Reisman, W. Michael, and Chris T. Antoniou, editors. “The Laws of War: a Comprehensive Collection of Primary Documents on International Laws Governing Armed Conflict.”. New York: Vintage Books, 1994.

460. Reynolds, Richard T. Heart of the Storm. Maxwell AFB, AL: Air University Press, 1995.

461. Riccardelli, Richard F. “Information and Intelligence Revolution.” Military Review 75, no. 5 (1995): 82-87.

462. Ricks, Thomas E. “Information-Warfare Defense Is Urged.” The Wall Street Journal, 6 January 1997, sec. B, p. 2.

463. Riddell, Rob. “Doom Goes to War: the Marines Are Looking for a Few Good Games.” Wired (1997): 114-.

464. Rinaldi, Steven M. Beyond the Industrial Web: Economic Synergies and Targeting Methodologies. Maxwell AFB, AL: Air University Press, 1995.

465. Robinson, Clarence A. “Artificial Intelligence Cuts Complex Information Snags.” Signal 46 (1992): 16-19+.

466. ———. “Encryption Dominates Information Warfare Defense.” Signal 50, no. 9 (1996): 34.

467. ———. “Information Dominance Edges Toward New Conflict Frontier.” Signal 48, no. 12 (1994): 37-40.

468. ———. “Information Warfare Strings Trip Wire Warning Strategy: Modern Technology Infrastructure Consolidates, Provides Single Electronic Backbone.” Signal 50, no. 9 (1996): 29-33.

469. ———. “Redundancy, Robustness Protect Vital National Information Links: Increased Awareness of Risks Is Initial Step in Detecting, Reacting to Informatioin Warfare.” Signal 50, no. 9 (1996): 36-39.

470. Rohde, William E. “What Is Info Warfare?” U.S. Naval Institute Procedings 122 (1996): 34-38.

471. Rona, Thomas. Weapon Systems and Information War. Seattle, WA: Boeing Aerospace Co., 1976.

472. Rona, Thomas P. “Information Warfare: an Age-Old Concept With New Insights.” Defense Intelligence Journal 5, no. 1 (1996): 53-67.

473. Ronfeldt, David F. Cyberocracy, Cyberspace, and Cyberology: Political Effects of the Information Revolution. Santa Monica, CA: RAND, 1991.

474. ———. “Cyberocracy Is Coming.” The Information Society 8, no. 4 (1992): 243-96.

475. ———. Tribes, Institutions, Markets, Networks – a Framework About Societal Evolution. Santa Monica, CA: RAND, 1996.

476. Roos, John G. “InfoTech InfoPower.” Armed Forces Journal International  (1994): 31-36.

477. Rose, Lance. Netlaw: Your Rights in the on-Line World. Osborne McGraw-Hill, 1995.

478. Rosen, Stephen P. Winning the Next War. Ithaca, NY: Cornell University Press, 1991.

479. Ross, Bruce A. “The Case for Targeting Leadership in War.” Naval War College Review 46, no. 1 (1993): 73-93.

480. Ross, Jimmy D. “Winning the Information War.” Army 44 (1994): 26-28+.

481. Roszak, Theodore. The Cult of Information: a Neo-Luddite  Treatise on High-Tech, Artificial Intelligence, and the True Art of Thinking, 2nd Ed. Berkeley, CA: University of California Press, 1994.

482. Rothrock, John. “Information Warfare: Time for Some Constructive Skepticism.” American Intelligence Journal 15 (1994): 71-76.

483. Ruelle, David. Chaotic Evolution and Strange Attractors: the Statistical Analysis of Time Series for Deterministic Nonliner Systems. Cambridge, UK: Cambridge University Press, 1989.

484. Ryan, Donald E. “Implications of Information-Based Warfare.” Joint Forces Quarterly , no. 6 (1994): 114-16.

485. Sakkas, Peter E. “Espionage and Sabotage in the Computer World.” International Journal of Intelligence and Counterintelligence 5 (1991): 155-202.

486. Satyanarayanan, M. “Mobile Computing.” Computer 26, no. 9 (1993): 81-82.

487. Schaeffer, Beverly T. “Data Security Looms Crucial in Changing World Climate.” Signal 48, no. 12 (1994): 63.

488. Schleher, D. Curtis. Introduction to Electronic Warfare. Norwood, MA: Artech House, 1986.

489. Schnitt, David L. “Reengineering the Organization Using Information Technology.” Journal of Systems Management 44 (1993): 14-20,41-42.

490. Schwartau, Winn. “Export Control As a Proactive Defensive Information Warfare Mechanism.” InfoWar Con 1995 : 117-27.

491. ———. Information Warfare: Chaos on the Eletronic Superhighway. NY: Thunder’s Mountain Press, 1994.

492. Schwartz, Peter. “Warrior in the Age of Intelligent Machines.” Wired 3 (1993): 139-39.

493. Science Applications International Corporation. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Washington, DC: The Pentagon, 1994.

494. Scott, Richard. “Windows Open for Command Support.” Jane’s Defence Weekly 25, no. 8 (1996): 30.

495. Scott, William B. “Global Broadcast Potential Explored.” Aviation Week & Space Technology 144, no. 6 (1996): 61-62.

496. ———. “High Demand Stretches NRO Intelligence Assets.” Aviation Week & Space Technology 138 (1993): 49+.

497. ———. “Information Warfare Demands New Approach.” Aviation Week and Space Technology 142 (1995): 85-86+.

498. Seaquist, Larry. “Defense Intelligence in a Disorderly World.” Defense Intelligence Journal 1 (1992): 31-53.

499. Shannon, Claude E., and Warren Weaver. The Mathematical Theory of Communication. Urbana, IL: The University of Illinois Press, 1949.

500. Sharp, Walter Gary. “Cyberspace and the Use of Force: Information Warfare, the Law of War, and the United States Standing Rules of Engagement.”.

501. Shereck, James. “Computer Hackers Attack!” Spokesman 34 (1994): 15-16.

502. Shukman, David. Tomorrow’s War: the Threat of High-Technology Weapons. New York: Harcourt Brace & Co., 1996.

503. Singh, Ajay. “The Fundamentals of Information Warfare.” Strategic Analysis 18, no. 8 (1995): 1047-58.

504. ———. “Time: the New Dimension in War.” Joint Force Quarterly , no. 10 (1995-1996): 56-61.

505. Slouka, Mark. War of the Worlds: Cyberspace and the High-Tech Assault on Reality. New York: Basic Books, 1995.

506. Snyder, Frank M. Command and Control: the Literature and Commentaries. Ft.McNair, DC: National Defense University Press, 1993.

507. Spencer, John, Deputy Director, OASD(C3I). “Information Warfare.”1995.

508. Stallings, William. Network and Internet Security. Prentice-Hall, 1995.

509. Stankiewicz, Paul R. “Psyop: Winning Wars by Saving Lives.” Asia-Pacific Defense Forum 17 (1992-1993): 8-14.

510. Starr, Barbara. “The Jane’s Interview: Lt Gen Kenneth Minihan (DIA).” Jane’s Defence Weekly 25, no. 3 (1996): 32.

511. Steele, Robert D. “The Military Perspective on Information Warfare: Apocalypse Now.”InfoWar Con 1995, K3-K19.

512. Stein, George. US Information Warfare. Surrey, UK & Alexandria, VA: Jane’s Information Group, 1997.

513. Stein, George J. “Information Attack: Information Warfare in 2025.” 2025 Study: Power and InfluenceAir University, 91-115. White Papers, Vol.3, Book 1. Maxwell, AFB, AL: Air University Press, 1996.

514. ———. “Information War – Cyberwar – Netwar.” Battlefield of the Future. editors Barry R. Schneider, and Lawrence E Grinter, 153-70. Maxwell AFB, AL: Air University Press, 1995.

515. ———. “Information Warfare.” Airpower Journal 9, no. 1 (1995): 30-39.

516. Steinbruner, John. The Cybernetic Theory of Decision. Princeton, NJ: Princeton University Press, 1974.

517. Sterling, Bruce. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam Books, 1992.

518. Stevens, Thomas F. “Cryptology From the Sea.” American Intelligence Journal 15 (1994): 21-24.

519. Stewart, Ian. Does God Play Dice? the Mathematics of Chaos. Cambridge, MA: Basil Blackwell, 1989.

520. Stoll, Clifford. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. NY: Doubleday, 1989.

521. Strassmann, Paul A. Information Payoff: the Transformation of Work in the Electronic Age. New York: Free Press, 1985.

522. ———. “Information Terrorism.”1995.

523. ———. “Integrating C4I for Low-Intensity Conflict.”AFCEA Computing Conference.

524. ———. The Politics of Information Management. New Canaan, CT: The Information Economics Press, 1995.

525. Struble, Dan. “What Is Command and Control Warfare?” Naval War College Review 48, no. 3 (1995): 89-98.

526. Sullivan, Gordon R. “A New Force for a New Century.” Army 44 (1994): 24-26.

527. Sullivan, Gordon R., and James M. Dubik.  War in the Information Age. Carlisle Barracks, PA: US Army War College, 1994.

528. Sullivan, Mark P. The Mechanism for Strategic Coercion: Denial or Second Order Change? Maxwell AFB, AL: Air University Press, 1995.

529. Swan, Patrick A. “The Ethics of Photo Digital Manipulation.” Military Review 75, no. 6 (1995): 80-83.

530. Szafranski, Richard. “Neocortical Warfare? the Acme of Skill.” Military Review 74 (1994): 41-55.

531. ———. “Parallel War and Hyperwar: Is Every Want a Weakness?” Battlefield of the Future. editors Barry R. Schneider, and Lawrence E. Grinter, 125-48. Maxwell AFB, AL: Air University Press, 1995.

532. ———. “Parallel War: Promise and Problems.” U.S. Naval Institute Proceedings 121, no. 8 (1995): 57-61.

533. ———. “A Theory of Information Warfare: Preparing for 2020.” Airpower Journal 9, no. 1 (1995): 56-65.

534. ———. “When Waves Collide: Future Conflict.” Joint Force Quarterly , no. 7 (1995): 77-84.

535. Tapscott, Don, and Art Caston. Paradigm Shift: the New Promise of Information Technology. New York: McGraw-Hill, 1993.

536. Tapscott, Mark. “Paradigm Changing From Simulators to Simulation.” Defense Electronics 25 (1993): 33+.

537. Tapscott, Mark, and Kay Atwal. “New Weapons That Win Without Killing on DoD’s Horizon.” Defense Electronics 25 (1993): 41-46.

538. Taylor, David A. Object-Oriented Technology: a Manager’s Guide. Reading, PA: Addison-Wesley, 1990.

539. Taylor, John W. “Strategic Military Employment Options: Theory and Applications.” Comparative Strategy 10, no. 2 (1991): 155-64.

540. Taylor, M. M. Information for Action: Perceptual Principles Related to Remote Sensing. North York Ontario, CA: Defence and Civilian Institute of Environmental Medicine, 1971.

541. ———. Principles for Intelligent Human-Computer Interaction: a Tutorial on Layered Protocol Theory. North York, Ontario, CA: Defence and Civilian Institute of Environmental Medicine, 1993.

542. Tempestilli, Mark. “Network Force (Information Warfare).” U.S. Naval Institute Proceedings 122 (1996): 42-46.

543. Thomas, Timothy L. “Russian Views on Information Warfare.” Airpower Journal Special edition, no. SE10 (1996): 25-35.

544. Tigner, Brooks. “U.S. Will Fund Central European C2 Effort.” Defense News 11, no. 37 (1996): 3+.

545. Timmes, Thomas A. “Military Psychological Operations in the 1990s.” Special Warfare 7 (1994): 19-21.

546. Tirpak, John A., Senior Editor. “The New World of Information Warfare.” Air Force Magazine 79, no. 6 (1996): 30-35.

547. Todd, David. “Gird for Information War: U.S. Must Control Combat in Cyberspace Front.” Defense News 10 (1995): 20.

548. Toffler, Alvin. “Knowledge-Based Strategies Propel Software Over Steel.” Signal 48 (1994): 49-51.

549. ———. Power Shift. New York: Bantam Books, 1990.

550. ———. The Third Wave. New York: Bantam Books, 1980.

551. Toffler, Alvin, and Heidi Toffler. War and Anti-War: Survival at the Dawn of the 21st Century. NY: Little, Brown and Co., 1993.

552. Turner, Jackie. “Emergence and Convergence: Information Warfare in the Early 20th Century.” Spokesman 34 (1994): 17-18.

553. Ucles, Jose L., and John M. Siliato. “Hierarchical Models Give New Simulation Accuracy.” Signal 44 (1990): 29-32.

554. Ullman, Harlan K. In Irons: US Military Might in the New Century. Washington, DC: National Defense University Press, 1995.

555. Vaccaro, Dennis D. Electronic Warfare Receiving Systems. Norwood, MA: Artech House, 1993.

556. van Creveld, Martin. Command in War. Cambridge, MA: Harvard University Press, 1985.

557. ———. Technology and War. New York: The Free Press, 1989.

558. ———. The Transformation of War. New York: The Free Press, 1991.

559. Van Vuuren, Ian. “Intelligence and the New SADF – Necessary for Effective C4I?” Armed Forces {2South Africa}2  (1993): 19-22.

560. Vincent, Gary A. “A New Approach to Command and Control: the Cybernetic Design.” Airpower Journal 7, no. 2 (1993): 24-38.

561. Voegelin, Eric. “Necessary Moral Bases for Communication in a Democracy.” Problems of Communication in a Pluralistic Society. editor Marquette University Press, 53-68. Milwaukee, WI: Marquette University Press, 1956.

562. ———. The New Science of Politics. Chicago, IL: The University of Chicago Press, 1952.

563. ———. “World-Empire and the Unity of Mankind.” International Affairs 38 (1962): 170-188.

564. Waldorp, M. Mitchell. Complexity. New York: Simon & Schuster, 1992.

565. Waller, Douglas. “Onward Cyber Soldiers.” Time  (1995): 38-46.

566. Wallfesh, Saundra. “Measures of Effectiveness for Information Warfare in Theater Campaigns and Subordinate Operations.”InfoWar Con 1995, O3-O23.

567. Ward, Thomas E. Information Warfare: Is It Feasible? Carlisle Barracks, PA: U.S. Army War College, 1996.

568. Warden, John. The Air Campaign: Planning for Combat. Washington, DC: National Defense University Press, 1988.

569. Warden, John A. “The Enemy As a System.”  Airpower Journal 9, no. 1 (1995): 40-55.

570. Wardynski, E. Casey. “Labor Economics of Information Warfare.” Military Review 73, no. 3 (1995): 56-61.

571. ” The Invented Reality: How Do We Know What We Believe We Know?, editor Paul Watzlawick1972.

572. Watzlawick, Paul, John Weakland, and Richard Fisch. Change: Principles of Problem Formation and Problem Resolution. New York: W.W. Norton & Co., 1974.

573. Webb, R. C., and others. “The Commercial and Military Satellite Survivability Crisis.” Defense Electronics 27, no. 8 (1995): 21-25.

574. Weiser, Mark. “Ubiquitous Computing.” Computer 26, no. 10 (1993): 71-72.

575. Welch, Jonathan. “International Money Market: a Weapon in Waiting?” RUSI Journal 141, no. 2 (1996): 34-40.

576. ” Military Information Operations in a Conventional Warfare EnvironmentC. J. Westwood. Studies, 47. Air Power Studies Centre, Australia: Royal Australian Air Force, 1996.

577. Wheatley, Margaret J. Leadership and the New Science: Learning About Organization From an Orderly Universe. San Francisco, CA: Berrett-Koehler, 1994.

578. Wheeler, Douglas. “Spy Mania and the Information War: the Hour of the Counterspy 1914/1915.” American Intelligence Journal 14 (1992): 41-45.

579. Wiener, Norbert. Cybernetics: or Control and Communication in the Animal and the Machine. Cambridge, MA: MIT Press, 1949.

580. Williams, Robert. “Electronic Imaging Flowers Via Software Enhancements.” Signal 46 (1992): 41-43.

581. Williams. Robert . “Holographic Memory Offers Megabytes for Small Change.” Signal 47 (1993): 53-55.

582. Williamson, John. “Winning the Data War.” Jane’s Defence Weekly 23, no. 20 (1995): 44-46.

583. ” British Security in 2010, ed G. A. S. C. Wilson. Camberly, UK: Strategic and Combat Studies Institute, Staff College, 1995.

584. Wilson, G. I., and Frank Bunkers. “Uncorking the Information Genie.” Marine Corps Gazette 79, no. 10 (1995): 29-31.

585. Winkler, Ira. “Who Are the Hackers?”InfoWar Con 1995, E3-E8.

586. Witt, Michael J. “U.K. to Test Civil Computers in Secure Defense Arena.” Defense News 11, no. 13 (1996): 12.

587. Wood, Robert J. “Information Engineering: the Foundation of Information Warfare.” Air War College, 1995.

588. Wriston, Walter B. The Twilight of Sovereignty: How the Information Revolution Is Transforming Our World. New York: Scribner, 1992.

589. Wylie, J. C. Military Strategy: a General Theory of Power Control. New Brunswick, NJ: Rutgers University Press, 1967.

590. Xuesen, Qian. Military Systems Engineering. Beijing: China Defense Science and Technology Information Center, 1989.

Advertisements