Artigo Revisado por pares

Intelligence, information technology, and information warfare

2002; Wiley; Volume: 36; Issue: 1 Linguagem: Inglês

10.1002/aris.1440360108

ISSN

1550-8382

Autores

Philip H. J. Davies,

Tópico(s)

Chaos-based Image/Signal Encryption

Resumo

Annual Review of Information Science and TechnologyVolume 36, Issue 1 p. 312-352 Intelligence and Strategy Intelligence, information technology, and information warfare Philip H. J. Davies, Philip H. J. Davies University of MalayaSearch for more papers by this author Philip H. J. Davies, Philip H. J. Davies University of MalayaSearch for more papers by this author First published: 01 February 2005 https://doi.org/10.1002/aris.1440360108Citations: 13Read the full textAboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onEmailFacebookTwitterLinkedInRedditWechat Bibliography Adams, J. (1994). The new spies: Exploring the frontiers of espionage. London: Hutchinson. Google Scholar Adams, J. (1995). Sell out: Aldrich Ames and the corruption of the CIA. New York: Viking. Google Scholar Andrew, C., & Gordievsky, O. (1991). KGB: The inside story of its foreign operations. London: Hodder & Stoughton. Google Scholar Andrew, C. M. (1987). Her Majesty's Secret Service: The making of the British intelligence community. London: Sceptre. Google Scholar Arquilla, J. (1998). The great cyberwar of 2002. Wired 6.02. Retrieved March 6, 2001, from the World Wide Web: http://www.wired.com/archive/6.02/cyberwar.html Google Scholar Arquilla, J., & Ronfeldt, D. (1996). Cyberwar is coming. Retrieved November 15, 1996, from the World Wide Web: http://stl.nps.navy.mil/∼jmorale/cyberwar.html Google Scholar Badsey, S. (1999). The conceptual origins of information warfare. London: Global Transformation Research Group. Google Scholar Bamford, J. (1983). The puzzle palace: America's National Security Agency and its special relationship with Britain's GCHQ. London: Sidgwick & Jackson. Google Scholar Barron, J. (1987). Breaking the ring: The rise and fall of the Walker family spy network. New York: Avon. Google Scholar Bazna, E. (1962). I was Cicero. London: Andre Deutsch. Google Scholar Benjamin, R. (1994). Five lives in one: An insider's view of the defence and intelligence world. Tunbridge Wells: Parapress. Google Scholar Boren, D. L. (1992). The intelligence community: How crucial? Foreign Affairs, 71(3), 52–62. 10.2307/20045229 Web of Science®Google Scholar British Broadcasting Corporation. (1993). On Her Majesty's Secret Service. Panorama BBC Television, 22 November. Google Scholar Brock, J. L. (1996). Information security: Computer attacks at Department of Defense pose increasing risk. (GAO/T-AIMD-96-92 May 22). Washington, DC: General Accounting Office. Retrieved March 1, 2001, from the World Wide Web: http://www.fas.org/irp/gao/aim96084.htm Google Scholar Brooks, C. R. (1994). Testimony before the House Science, Space and Technology Committee's Technology, Environment and Aviation Subcommittee. Retrieved December 19, 1998, from the World Wide Web: www.eff.org/pub/Privacy/Clipper/brooks_nsa_clip._dt.testimony Google Scholar Brown, A. C. (1987). 'C': The secret life of Stewart Graham Menzies, spymaster to Winston Churchill. New York: Macmillan. Google Scholar Brown, M. L. (1996). The revolution in military affairs: The information dimension. In A. D. Campen, D. H. Dearth, & R. T. Goodden (Eds.), Cyberwar: Security, strategy and conflict in the information age (pp. 31–52). Fairfax, VA: AFCEA International Press. Google Scholar Bulloch, J. (1963). MI 5: Origin and history of the British counter-intelligence service. London: Transworld. Google Scholar Burrows, W. E. (1988). Deep black: Space espionage and national security. New York: Berkley Books. Google Scholar Campbell, D. (1997, November 27). More naked gun than top gun. The Guardian, 2. Retrieved March 16, 2001, from the World Wide Web: http://www.gn.apc.org/duncan/880564579-fumble.html Google Scholar Campbell, D. (1999). Development of surveillance technology and risk of abuse of economic information. PE 168/184/Part 3/4. Luxembourg: European Parliament. Google Scholar Campen, A. D., Dearth, D. H., & Goodden, R. T. (1996). Cyberwar: Security, strategy and conflict in the information age. Fairfax, VA AFCEA International Press. Google Scholar Commission of Inquiry Concerning Certain Activities of the Royal Canadian Mounted Police (1981). Certain R.C.M.P. activities and the question of governmental knowledge: Third report. Ottawa: Canadian Government Publishing Centre. Google Scholar Commission on the Roles and Capabilities of the United States Intelligence Community (1996). Preparing for the 21st century: An appraisal of U.S. intelligence. Washington, DC: U.S. Government Printing Office. Google Scholar Cox, C. (1999). U.S. national security and military/commercial concerns with the People's Republic of China. Report 105–81. Washington, DC: U.S. Government Printing Office. Google Scholar Crozier, B. (1993). Free agent: The unseen war, 1941–1991. London: HarperCollins. Google Scholar Davies, P. H. J. (1999). Information warfare and the future of the spy. Information, Communication and Society, 2(2), 115–133. 10.1080/136911899359664 Google Scholar Davies, P. H. J. (2000). MI 6's Requirements Directorate: Integrating intelligence into the machinery of British central government. Public Administration, 78(1), 29–49. 10.1111/1467-9299.00191 Web of Science®Google Scholar Denning, D. (1999). Information warfare and security. Harlow, U.K.: Addison Wesley. Google Scholar Denniston, A. G. (1986). The Government Code and Cipher School between the wars. Intelligence and National Security, 1, 48–70. 10.1080/02684528608431841 Google Scholar Devost, M. G., Houghton, B. K., & Pollard, N. A. (1997). Information terrorism: Political violence in the information age. Terrorism and Political Violence, 9, 72–83. 10.1080/09546559708427387 Web of Science®Google Scholar Dilks, D., & Andrew, C. M. (1984). The missing dimension: Governments and intelligence communities in the twentieth century. London: Macmillan. Google Scholar Dorril, S. (2000). MI 6: Fifty years of special operations. London: Macmillan. Google Scholar Dorrils, S. (2000). MI 6: Fifty years of special operations. London: Fourth Estate. Google Scholar Electronic Frontier Foundation. (2000). EFF clipper-key escrow archive. Retrieved December 19, 1995, from the World Wide Web: http://www.eff.org/pub/Privacy/Clipper Google Scholar Elliott, N. (1993). I spy with my little eye. Wilton, U.K.: Michael Joseph. Google Scholar Emerson, S. A., & Del Sesto, C. (1991). Terrorist: The inside story of the highest-ranking Iraqi terrorist ever to defect to the west. New York: Villard. Google Scholar Foot, M. R. D. (1984). SOE: The outline of the Special Operations Executive 1940–46. London: BBC. Google Scholar Frost, M., & Gratton, M. (1994). Spyworld: Inside the Canadian and American intelligence establishments. Toronto: Doubleday. Google Scholar Gill, P. (1994). Policing politics: Security intelligence and the liberal democratic state. London: Frank Cass. Google Scholar Godson, R. (1979). Intelligence requirements for the 1980s: Elements of intelligence. Washington, DC: National Strategy Information Center. Google Scholar Godson, R. (1980a). Intelligence requirements for the 1980s: Analysis and estimates. Washington, DC: National Strategy Information Center. Google Scholar Godson, R. (1980b). Intelligence requirements for the 1980s: Counter-intelligence. Washington, DC: National Strategy Information Center. Google Scholar Godson, R. (1981). Intelligence requirements for the 1980s: Covert action. Washington, DC: National Strategy Information Center. Google Scholar Godson, R. (1982). Intelligence requirements for the 1980s: Clandestine collection. Washington, DC: National Strategy Information Center. Google Scholar Godson, R. (1986a). Intelligence requirements for the 1980s: Domestic intelligence. Washington, DC: National Strategy Information Center. Google Scholar Godson, R. (1986b). Intelligence requirements for the 1980s: Intelligence and policy. Washington, DC: National Strategy Information Center. Google Scholar Haeni, R. E., & Hoffman, L. J. (1996). An introduction to information warfare. Retrieved November 11, 1996, from the World Wide Web: http://www.seas.gwu.edu/student/reto/infowar/info-war.html Google Scholar Hager, N. (1996). Secret power. Nelson, NZ: Craig Potton. Google Scholar Herman, M. (1995). Assessment machinery: British and American models. Intelligence and National Security, 10 (4), 13–33. 10.1080/02684529508432323 Google Scholar Herman, M. (1996). Intelligence power in peace and war. Cambridge: Cambridge University Press. 10.1017/CBO9780511521737 Google Scholar Hibbert, R. (1990). Intelligence and policy. Intelligence and National Security, 5, 110–128. 10.1080/02684529008432037 Google Scholar Hughes-Wilson, J. (1999). Military intelligence blunders. London: Robinson. Google Scholar Johnson, L. K. (2000). SPIES. Foreign Policy, 120, 18–24. 10.2307/1149708 Web of Science®Google Scholar Johnson, L. S. (1997). Toward a functional model of information warfare. Studies in Intelligence, 1 (unclassified ed.), 49–56. Google Scholar Kahn, D. (1973). The codebreakers: The story of secret writing. New York: New American Library. Google Scholar Kent, S. (1949). Strategic intelligence for American world policy. Princeton, NJ: Princeton University Press. Google Scholar Kinsella, W. (1992). Unholy alliances: Terrorists, extremists, front companies, and the Libyan connection to Canada. Toronto: Lester. Google Scholar Koehler, J. O. (1999). STASI: The untold story of the East German secret police. Boulder, CO: Westview. Google Scholar Laqueur, W. (1985). A world of secrets: The uses and limits of intelligence. New York: Basic. Google Scholar Leppard, D., & Levy, A. (1994, July 31). The black widow. The Sunday Times (London), p. 13. Google Scholar Libicki, M. (1995). What is information warfare? Washington, DC: National Defense University, Institute for National Strategic Studies. Retrieved November 19, 1995, from the World Wide Web: http://www.ndu.edu/inss/actpubs 10.21236/ADA385640 Google Scholar Lockhart, J. B. L. (1987). Intelligence: A British view. In K. G. Robertson (Eds.), British and American approaches to intelligence (pp. 37–51). Basingstroke: MacMillan. Google Scholar Lucas, W. S., & Morris, C. J., (1992). A very British crusade: The Information Research Department and the beginning of the cold war. In R. J. Aldrich (Eds.), British intelligence, strategy and the cold war 1945–51 (pp. 85–107). London: Routlege. Google Scholar Macintyre, B. (2001, February 21). Russia's FBI spy "inspired by Kim Philby". The Times (London), p. 1. Google Scholar Mackenzie, A. (1997). Secrets: The CIA's war at home. Berkeley, CA: University of California Press. Google Scholar Madsen, W. (1993). Intelligence agency threats to computer security. International Journal of Intelligence and Counter Intelligence, 6, 413–488. 10.1080/08850609308435228 Google Scholar Magnan, S. W. (2000). Safeguarding information operations. Studies in Intelligence, 9, Retrieved June 4, 2001, from the World Wide Web: http://www.cia.gov/csi/studies/summer00/art08.html Google Scholar Martin, F. T. (1998). Top secret intranet: How U.S. intelligence built InteLink—the world's largest, most secure network. New York: Prentice-Hall. Google Scholar May, E. R. (1992). Intelligence: Backing into the future. Foreign Affairs, 71 (3), 63–72. 10.2307/20045230 PubMedWeb of Science®Google Scholar Molander, R., Riddile, A., & Wilson, P. (1996). Strategic information warfare: A new face of war. Santa Monica: Rand. 10.7249/MR661 Google Scholar Moyzisch, L. C. (1952). Operation Cicero (C. Fitzgibbon & H. Fraenkel, Trans.). London: Pocket Book. Google Scholar Page, B., Knightley, P., & Leitch, D. (1979). Philby: The spy who betrayed a generation. London: Sphere. Google Scholar Philby, K. (1983). My silent war. New York: Ballantine. Google Scholar Phillips, D. A. (1977). The night watch. New York: Atheneum. Google Scholar Ransom, H. H. (1970). The intelligence establishment. Cambridge, MA: Harvard University Press. 10.4159/harvard.9780674368699 Google Scholar Rathmell, A. (2000). Information warfare and sub-state actors: An organizational approach. In D. Thomas & B. D. Loader (Eds.), Cybercrime: Law enforcement, security and surveillance in the information age (pp. 221–233). London: Routlege. Google Scholar Richelson, J. T. (1989). The U.S. intelligence community. New York: Ballinger. Google Scholar Richelson, J. T. (1999). The U.S. intelligence community ( 4th ed.). Boulder, CO: Westview Press. Google Scholar Robertson, K. G. (1987a). Editorial comment: An agenda for intelligence research. Defence Analysis, 3, 95–102. 10.1080/07430178708405287 Google Scholar Robertson, K. G. (1987b). Intelligence, terrorism and civil liberties. Conflict Quarterly, 7(2), 43–62. PubMedGoogle Scholar Rudman, G. (1999). Science at its best, security at its worst: Hearing before the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, First Session, June 22, 1999. Washington, DC: U.S. Government Printing Office. Google Scholar Sakkas, P. (1991). Espionage and sabotage in the computer world. International Journal of Intelligence and Counterintelligence, 5(2), 155–202. 10.1080/08850609108435177 Google Scholar Sample, I. (2000, July 1). Just a normal town, New Scientist 167, 20–24. Web of Science®Google Scholar Sawatsky, J. (1980). The men in the shadows: The RCMP Security Service. Toronto: Totem. Web of Science®Google Scholar Schechter, J., & Deriabin, P. (1992). The spy who saved the world: How a Soviet colonel changed the course of the cold war. New York: Charles Scribner. Google Scholar Schlesinger, S., & Kinzer, S. (1983). Bitter fruit: The untold story of the American coup in Guatemala. New York: Anchor. Google Scholar Schwartau, W. (1996). Information warfare: Cyberterrorism-protecting your personal security in the electronic age. New York: Thunder's Mouth. Web of Science®Google Scholar Segell, G., (2000). French cryptography policy: The turnabout of 1999. International Journal of Intelligence and Counter Intelligence, 13, 345–358. 10.1080/08850600050140625 Google Scholar Sharfman, P. (1994). Intelligence analysis in an age of electronic dissemination. Intelligence and National Security, 10(4), 201–211. 10.1080/02684529508432333 Google Scholar Shoben, A. (1995). Information warfare: A two-edged sword. Rand Research Review: Information Warfare and Cyberspace Security. Retrieved May 20, 2001, from the World Wide Web: http://www.rand.org/publications/randreview/issues/RRR.fall95.cyber/infor_war.html Google Scholar Smith, M. (1996). New cloak, old dagger: How Britain's spies came in from the cold. London: Gollancz. Google Scholar Snider, L. B. (1999). Unlucky SHAMROCK: Recollections from the Church Committee's Investigation of NSA. Studies in Intelligence, 43, 43–51. Google Scholar Steele, R. D. (1996). Creating a smart nation: Information strategy, virtual intelligence, and information warfare. In A. D. Campen, D. H. Dearth, & R. T. Goodden (Eds.), Cyberwar: Security, strategy and conflict in the information age (pp. 77–88). Fairfax, VA: AFCEA International Press. Google Scholar Steele, R. D. (1999). Virtual intelligence: Conflict avoidance and resolution through information peacekeeping. Journal of Conflict Studies, 29, 69–105. Google Scholar Stengers, J. (1984). The French, the British, the Poles and Enigma. In C. Andrew & D. Dilks (Eds.), The missing dimension: Governments and intelligence communities in the twentieth century (pp. 126–137). Urbana, IL: University of Illinois Press. Google Scholar Sterling, C. (1981). The terror network: The secret war of international terrorism. New York: Rinehart & Winston. Google Scholar Stoll, C. (1991). The cuckoo's egg. London: Bodley Head. Google Scholar Toffler, A., & Toffler, H. (1995). War and anti-war. New York: Warner. Google Scholar Trevor-Roper, H. (1968). The Philby affair: Espionage, treason, and secret service. London: Kimber. Google Scholar U.K. Cabinet Office. (1993). Central intelligence machinery. London: The Stationery Office. Google Scholar U.K. Communications Electronics Security Group. (1997). CESG Home Page. Retrieved August 5, 1997, from the World Wide Web: http://www.cesg.gov.uk Google Scholar U.K. Department of Trade and Industry. (1997). Licensing of trusted third parties for the provision of encryption services. Retrieved August 5, 1997, from the World Wide Web: http://dtiinfo1.dti.gov.org.uk/pubs Google Scholar U.K. Intelligence and Security Committee. (2000). Intelligence and Security Committee: Annual Report 199–2000. Cm. 4897. London: The Stationery Office. Google Scholar U.K. Security Commission. (1983). Report of the Security Commission. Cm. 1381. London: The Stationery Office. Google Scholar U.S. Central Intelligence Agency. (1996). Analysis: Directorate of Intelligence in the 21st century: Strategic plan. Washington, DC: CIA. Google Scholar U.S. Joint Chiefs of Staff. (1998). Joint doctrine for information operations. Joint Pub. 3–13. Washington, DC: Department of Defense. Google Scholar U.S. National Security Agency. (1998). The NSA/CSS INFOSEC Page. Retrieved May 1, 1998, from the World Wide Web: http://www.nsa.gov/isso Google Scholar Urban, M. (1996). U.K. eyes Alpha: Inside British intelligence. London: Faber & Faber. Google Scholar Walker, M. (1996, May 24). Datastream cowboy fixes Pentagon in his sights. The Guardian (London), pp. 1, 2. Google Scholar Waller, J. M. (1994). Secret empire: The KGB in Russia today. Boulder, CO: Westview Press. Google Scholar Ward, M. (1997, April 26). Coded message plan "too complex", New Scientist, 154, 7. Google Scholar Wark, W. (1987). Great investigations: The public debate on intelligence in the U.S. after 1945. Defence Analysis, 3, 119–132. 10.1080/07430178708405289 Google Scholar Whine, M. (2000). Far-right extremists on the Internet. In D. Thomas & B. D. Loader (Eds.), Cybercrime: Law enforcement, surveillance and security in the information age (pp. 234–250). London: Routledge. Google Scholar Whitacker, R. (1996). The "Bristow Affair": A crisis of accountability in Canadian security intelligence. Intelligence and National Security, 11, 279–305. 10.1080/02684529608432357 Google Scholar Winterbotham, F. W. (1974). The Ultra secret. New York: Dell. Google Scholar Wise, D. (1989). The spy who got away: The inside story of the CIA agent who betrayed his country. London: Fontana. Google Scholar Wise, D., & Ross, T. B. (1964). The invisible government. New York: Random House. Google Scholar Wright, P. (1987). Spycatcher: The candid autobiography of a senior intelligence officer. Toronto: Stoddart. Google Scholar Citing Literature Volume36, Issue12002Pages 312-352 ReferencesRelatedInformation

Referência(s)