See also GISP Information Warfare Program.
K. A. Taipale, Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle, forthcoming 2008).
Kim Taipale, "Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas," presentated at the Bantle - Institute for National Security and Counterterrorism (INSCT) Symposium: "Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas" at Syracuse University, March 29-30, 2006.
DOWNLOAD: [presentation slides] (415 KB PDF)
K. A. Taipale, Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet, Nat'l Strategy F. Rev., Vol. XVI (Summer 2007).
K. A. Taipale, "Deconstructing Information Warfare," presented to the Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC (Oct. 30, 2006) [download presentation slides] (240 KB PDF)
K. A. Taipale, "Information as Warfare: Disrupting Terrorist Networks" presented at the Yale Information Society Project, "Global Flow of Information" Conference, Yale Law School (Apr. 1-3, 2005). [abstract]
National Security Council Strategy:
Information Operations Roadmap (DOD 2003) (HTML) Information Operations (JP 3-13 2006) (JEL)
Joint Doctrine for Electronic Warfare (JP 3-51) (2003)
Joint Doctrine for PSYOPS (JP 3-53 2003) (JEL)
Joint Doctrine for Public Affairs (JP 3-61 2005) (JEL)
Joint Doctrine for Civil Affairs (JP 3-57.1 2003) (JEL)
Joint Doctrine for Military Deception (JP 3-13.4) (2006)
Quadrennial Defense Review (2006) (QDR)
DoD S-3600.1, Information Operations (IO) (1996)
DoD 5240.1-R, Procedures Governing the Activities of DOD Intelligence Components that Affect United
States Persons (1982)
DoD 8500.1, Information Assurance (2002)
DoD O-8530.1, Computer Network Defense (CND) (2001)
CJCS 3210.01A, Joint Information Operations Policy (1998)
CJCS 6510.01D, Information Assurance (IA) and Computer Network Defense (CND) (2004)
USAF Policy Doc. 10-7 Information Operations (2006)
Fourth Generation Warfare:
William S. Lind, et al., The Changing Face of War: Into the Fourth Generation, The Marine Corps Gazette (Oct. 1989)
Maj. Gen. G.A. Berezkin, et al. Lessons From the War in Iraq, Military Thought (May 2003)
Unrestricted Warfare, by Qiao Liang and Wang Xiangsui (Beijing: PLA Lit. and Arts. Publ. House, 1999)
Donald H. Rumsfeld, Speech to the Council on Foreign Relations (Feb. 17, 2006)
Small Wars Manual (SWM) (Marine Corps, USN 1940)
Military Operations Other that War (MOOTW) (JP 3-07 1995) (JEL)
Joint Tactics, Techniques, and Procedures for Foreign Internal Defense (FID) (JP 3-07.1 1996, 2004) (JEL)
Counterinsurgency Operations (FMI 3-07.22 2004)
U.S. Army Special Operations Forces Field Manual (FM 3-05 Sep. 20, 2006)
"Counterinsurgency," U.S. Army Field Manual 3-24, December 15, 2006 (12.9 MB PDF)
Osama Bin Laden, Declaration of War against Americans Occupying the Land of the Two Holy Places (1996)
Osama Bin Laden, et al., Jihad Against the Jews and Crusaders, World Islamic Front Statement (1998).
A Military Guide to Terrorism in the 21st Century (TRACDOC, DCSINT, HB No. 1, Version 3.0, Aug. 2005)
Networks and Netwars (Arquilla & Ronfeldt 2001)
The Pentagon’s New Map (Thomas Barnett 2004)
Terror in the Name of God (Stern 2003)
Inside Terrorism (Hoffman 1999)
Understanding Terror Networks (Sageman 2004)
The Center for Advanced Studies in Science and Technology Policy ("CAS") is a private, non-partisan research and advisory organization focused on information, technology and national security policy and related issues.
The Center seeks to inform and influence national and international policy- and decision-makers in both the public and private sectors by providing sound, objective analysis and advice, in particular by identifying and articulating issues that lie at the intersection of technologically enabled change and existing practice in policy, law, government, and industry.
In addition to its independent research activities and public engagements, the Center provides select advisory services to policy-makers in government and decision-makers in the private sector.
CAS Areas of Focus:
Information Policy: Global, national and domestic security policy, civil liberties (including privacy), cybersecurity and computer crime, telecommunications and spectrum, intellectual property, innovation and antitrust, internet and free speech. Information policy and free trade, globalization and global security, international jurisdiction, internet governance. Information management, institutional and organizational architecture, and business process engineering.
Enabling Technologies: Data aggregation, data integration, data fusion, data analysis, data mining, artificial intelligence, decision support, distributed networks, enterprise architecture, distributed computing, wireless communication, remote sensing, identification, authentication, network and computer security, biometrics, cryptography, rule-based processing, digital rights management, knowledge management.
Security Applications: Foreign intelligence, defense intelligence, counter-intelligence (CI), domestic intelligence, law enforcement, counter-terrorism, counter-insurgency, regulatory compliance, corporate and enterprise security, corporate intelligence, competitive intelligence, systems security, cybersecurity, information security, communication security, information assurance (IA), information warfare (IW), perception management, strategic influence, information operations (IO), psychological operations (PSYOPS), military deception, operations security (OPSEC), electronic warfare (EW), computer network operations (CNO), computer network attack (CNA), computer network defense (CND), netcentric strategy, environmental monitoring, international relations and global security.
Related Areas of Research Interest: Technology innovation and adoption, social change, knowledge-creation, deciscion-making, risk-analysis, risk-management, conflict resolution, deviation analysis, pedagogy, communications, media analysis, information economics, control theory, network theory, emergence, complexity, history of technology, and cultural history.
CAS Research Programs:
Other research programs
ACADEMIC CENTERS AND INSTITUTIONS
INFORMATION WARFARE SITES
IWS - The Information Warfare Site
The Information Warfare Monitor
Information Warfare, I-War, IW, C4I, Cyberwar
Federation of American Scientists - IW Resources