has chosen to take an inclusive approach to the topic
information warfare, not limiting the material to attacks
military" targets. Given the state of physical warfare,
to be quite realistic. It does mean that the book tends
to read like
a high level computer security text (small wonder) with
an emphasis on
intrusions and the more overt aspects of computer crime.
one is a foundation and background for the material
Chapter one looks at the great many information aspects
to the Gulf
War and Operation Desert Storm. One of the unusual factors
is that of propaganda, or "perception management." A
infowar is the intent of chapter two, which outlines
positions in a variety of ways. The theory is somewhat
being strongly dependent upon the idea of the value of
being attacked or defended, and this is an area that
work. Another possibly problematic area is the reliance
on a "win-lose" model for data warfare, when
there have been numerous instances
of intruders, upon sufficient provocation, being willing
themselves a resource by damaging it, on the basis that
stand to lose far more. (On the other hand, "bragging
rights" seem to
have a lot of value in the computer underground.) More
detail on the
players involved, and the possible types of attacks that
occurred, and might occur, are presented in chapter three.
two looks at the specifics of offensive information
Chapter four is extremely interesting, showing that "open
publicly available information, can and has been used
and criminal undertakings in a variety of ways. Disinformation
reviewed in chapter five, including the odd phenomenon
legends and Internet hoaxes. The problem of damage from
including, finally, a documented case of a salami attack
rather clumsy one), is covered in chapter six. Chapter
discusses the interception of information and communications
variety of ways, and, as a sideline, jamming and alteration.
variety of methods of computer intrusion are presented
eight. False identity, both identity theft and outright
examined in chapter nine. The material on viruses and
chapter ten, is solid, although I was sorry to see that
a great many
possibilities for reproductive mayhem that have been
the years went unmentioned. ("Harlie," Dr.
Denning. "When *HARLIE*
Was One.") (Of course, when I sent the first draft,
I had, myself,
spelled "Harlie" incorrectly.)
three looks at the opposite side, that of defence.
eleven gives a good background to encryption, but, seemingly,
primarily as a general concept, rather than going into
specific uses for protection. Authentication is dealt
with in chapter
twelve, and uses some of the cryptologic background.
and detection bracketing chapter thirteen, the section
seems just slightly misplaced. Chapter fourteen looks
analysis, planning, and some resources. The final chapter
defence of the nation, and national policy in this regard,
particular emphasis on the current situation in the US.
content of this book not only presents a clear picture
of a number
of aspects of information warfare, but does so in a very
manner, informed by the need to use "real world" examples.
addition, the anecdotal evidence backing the material
makes the book
quite readable and interesting. As a text for a course
warfare, it is complete and solidly based. As a reference
security analysts and practitioners, it is clear and
provoking. For those who may merely have some interest
in the topic,
it is engaging and informative.
copyright Robert M. Slade, 1999 BKINWRSC.RVW 990212