The RMA Debate
A gateway to full-text online resources about the Revolution in Military Affairs, information war, and asymmetrical warfare.
sponsored by
Project on Defense Alternatives
E-mail This Page |  Tag This Page (

Information Warfare

Full Text Resources
Terrorism and Counter-terrorism
Homeland Security

RMA Overview
History and Context
Information Warfare
Strategic Information Warfare and Defense
Asymmetric Warfare
Future Warfare
Network Centric Warfare

U.S. Transformation
Joint & Defense Wide
Service Visions
Air Power
Space Power
Army Transformation
Sea Power
Nuclear Issues
Intelligence Issues
New Technology
Urban Warfare, Counter-Insurgency, & Operations Other Than War
RMA & US Defense Strategy

Second Thoughts on the RMA
Allied Perspectives
RMA Outside the West
Arms Control, Ethics, and International Law

Online Books


Research Sites


PDA Sponsored Sites

War Report

Online Resources about U.S. Defense Strategy, Force Planning, and Policy Reviews -- Project on Defense Alternatives

Online Resources about Chinese Military Policy & Capabilities -- Chinese Military Power Page

Defense Strategy Review Page

PDA Bulletin
8 to 12 editions a year
Enter your e-mail address:

(email address privacy assured)

Information Operations, Electronic Warfare and Cyberwar: Capabilities and Related Policy Issues
Clay Wilson. Congressional Research Service, updated 20 March 2007 (.pdf file).

Strategic Management of Information and Communication Technology: The United States Air Force Experience with Y2K
Mark Haselkorn. National Academies Press, 2007.

Information Operations Primer: Fundamentals of Information Operations
Department of Military Strategy, Planning and Operations, U.S. Army War College, November 2006 (.pdf file).

Lawmaker Wary of Progress in Defense IT Transformation
Winter Casey. National Journal, 06 April 2006.

Custer and Cognition
David C. Gompert and Richard L. Kugler. Joint Force Quarterly, April 2006 (.pdf file).

Custer in Cyberspace
David C. Gompert and Richard L. Kugler. Defense Horizons. Center for Technology and National Security Policy, National Defense University, February 2006 (.pdf file).

Making Better Use of Bandwidth: Data Compression and Network Management Technologies
John F. Pane and Leland Joe. RAND, 2006 (.pdf file).

DSB Task Force Wants More GPS 3 Satellites in Three Orbital Planes
Missy Frederick. The Journal of Net-Centric Warfare, 05 December 2005.

Robust Satellite Capacity Grows
Clarence A. Robinson Jr. Signal Magazine, December 2005.

Persistent Surveillance and Its Implications for the Common Operating Picture
David W. Pendall. Military Review, November/December 2005 (.pdf file).

The Future of the Global Positioning System
Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, October 2005 (.pdf file).

Operational Command and Control in the Information Age
Milan N. Vego. Joint Force Quarterly, 11 January 2005 (.pdf file).

Information Operations and Millennium Challenge
Mark W. Maiers and Timothy L. Rahn. Joint Force Quarterly, 11 January 2005 (.pdf file).

Pentagon Envisioning a Costly Internet for War
Tim Weiner. The New York Times, 13 November 2004.

Military Applications of Information Technologies
Paul W. Phister, Jr. Air & Space Power Journal, Spring 2004.

Router Protection: Key to Network Defense
Harrison Donnelly. Military Information Technology, 2004.

Military Applications of Information Technologies
Paul W. Phister Jr., PhD, and Igor G. Plonisch. Air & Space Power Journal, Spring 2004.

Danger: Fiber Optic Intruders - Military Information Technology
Mickey McCarter. Military Information Technology, 2004.

Bandwidth Bonanza
J. Michael Brower. Military Information Technology, 31 December 2003.

Worms Turn on Military Networks
Mickey McCarter. Military Information Technology, 29 November 2003.

Bandwidth in Iraq a Subject of Debate
Matthew French. Federal Computer Week, 20 October 2003.

Is The IW Paradigm Outdated?
Timothy L. Thomas. Journal of Information Warfare, Vol. 2, No. 3, 2003. Posted on the Foreign Military Studies Office web site.

Power to the Edge:  Command and Control in the Information Age
David S. Alberts and Richard E. Hayes. US DoD Command and Control Research Program, June 2003 (.pdf file).

Iraq's Crash Course in Cyberwar
Brian McWilliams. Wired News, 22 May 2003.

Tools of the Unknown Hunter
Ted McKenna. Journal of Electronic Defense, April 2003.

The Eyes and Ears of War
Usha Lee McFarling. Los Angeles Times, 24 April 2003. Posted on the Globalsecurity website.

Planning for the Next Cyberwar
Elliot Borin. Wired News, 18 April 2003.

Military Transformation:  Intelligence, Surveillance and Reconnaissance
Judy G. Chizek. Report for Congress, 17 January 2003. Posted on the Federation of American Scientists website (.pdf file).

Exploring Information Superiority
Walter Perry, David Signori, and John Boon. Rand, 2003 (.pdf file).

Computer Offensive
Mickey McCarter. Military Information Technology, 15 November 2002.

Next Steps in Electronic Attack
John A. Tirpak. Air Force Magazine, June 2002.

Information Operations
Perspectives Report #2001/11. Canadian Security Intelligence Service, 06 May 2002.

Using Information Technologies to Reduce the Army's Echelons
Brig. Gen Huba Wass de Czege. Army Magazine, April 2002.

Information Warfare Pioneers Take Top Pentagon Positions
Elizabeth G. Book. National Defense Magazine, January 2002.

Information Is a Weapon. What will happen when every soldier is armed with it?
Daintry Duffy. Darwin Magazine, November 2001.

Sensemaking Symposium: Final Report
Dennis K. Leedom. Command and Control Research Program, Department of Defense, 23-25 October 2001.

Building A Battlespace Wide Web
Lt. Col. Robert A. Colella. Aerospace Chronicles, 10 October 2001.

Communications Electronic Warfare and the Digitised Battlefield
Michael Frater and Michael Ryan. Working Paper #116. Land Warfare Studies Centre, October 2001.

IT Requirements for "Policekeeping"
Lt. Col. Timothy L. Thomas. Military Review, September-October 2001.

Crucified on a Cross of Goldwater-Nichols
James M. Simon, Jr. Seminar presentation, Center for Information Policy Research, Harvard University, July 2001.

Commercial Observation Satellites: At the Leading Edge of Global Transparency
John C. Baker, Kevin M. O'Connell, and Ray A. Williamson, eds. Santa Monica: Rand, May 2001.

The Global Technology Revolution: Bio/Nano/Materials Trends and Their Synergies with Information Technology by 2015
Philip S. Antón, Richard Silberglitt, and James Schneider. Santa Monica: Rand, April 2001. Book online.

Information Age Anthology, Vol. III: The Information Age Military (pdf, 20 mb)
David Alberts and Daniel Papp, eds. DoD C4ISR Cooperative Research Program, March 2001. NOTE: save document to computer to use.

Information Age Anthology, Vol II: National Security Implications of the Information Age (pdf 25 mb)
David Alberts and Daniel Papp, eds. DoD C4ISR Cooperative Research Program, March 2001. NOTE: save document to computer to use.

Information Warfare Isn't What You Think
David A. Fulghum and Robert Wall. Aviation Week & Space Technology, 26 Feb 2001. Posted on

Hacktivism: An Emerging Threat to Diplomacy
Dorothy E. Denning. Foreign Service Journal (September 2000)

Shunning the Frumious Bandersnatch: Current Literature on Information Warfare and Deterrence
Geoffrey S. French. Terrorism Research Center Inc., August 2000.

The Information Revolution and National Security
Thomas E. Copeland. Carlisle, PA: Strategic Studies Institute, Army War College, August 2000.

A Proposal for an International Convention on Cyber Crime and Terrorism
Abraham Sofaer, Seymour Goodman, et. al. August 2000. Posted on IWS: The Information Warfare Site.

Are Cyberterrorists For Real?
Dan Verton., 3 July 2000.

The World Wide Military Command and Control System: Evolution and Effectiveness
David E. Pearson. Air University Press, June 2000.

Intelligence Is the Long Pole in The Information Operations Tent
Col. Alan D. Campen. Signal (March 2000)

Cyber Warfare: Protecting Military Systems
Lt. Col. Lionel D. Alford. Acquisition Review Quarterly, Spring 2000. Truth About Computer Virus Myths & Hoaxes
Internet site about computer virus myths, hoaxes, urban legends, hysteria and the implications if you believe in them.

Eligible Receiver: A Pentagon ghost story
Crypt Newsletter,October 1999.

Infosphere Threats
Timothy L. Thomas. Military Review (Sept-Oct 1999). Posted on FMSO Website.

Information Superiority: What Is It? How to Achieve It? (pdf download)
Walter P. Fairbanks. Research Report, Program on Information Resources Policy. Cambridge MA: Harvard University, June 1999.

Information Warfare: Hype or Reality?
E. Anders Eriksson. The Nonproliferation Review (Spring-Summer 1999).

Interception Capabilities 2000
Duncan Campbell. European Parliament, Edinburgh, Scotland, April, 1999.

Proliferating Decision Makers: Root Cause of the Next RMA
Lt. Col. Arthur Corbet, USMC. Carlisle PA: Strategy Research Project, US Army War College, 1999.

Truth is The First Casualty of Cyberwar.
George Smith. Wall Street Journal, 8 September 1998.

Towards Bottom-Up Information Warfare Theory and Practice: Version 1.0
Stefan Wray. New York: New York University, 5 August 1998.

The Cultural Challenge of Information Technology
Captain James R. FitzSimonds. NWC Review(Summer 1998)

Information Operations, Deterrence, and the Use of Force
Roger W. Barnett. Naval War College Review (Spring 1998). Posted on the website.

Information Warfare and Nuclear Preemption
Stephen J. Cimbala. National Security Studies Quarterly, Spring 1998.

The Low-Tech Side of Information Warfare
Captain Alex Berger. Aerospace Power Chronicles, Contributors Corner, 1998.

An Introduction to Information Operations
USAF Air Command and Staff College, 1998.

Information War Power: Lessons from Air Power (pdf download)
Richard M. Jensen. Research Report, Program on Information Resources Policy. Cambridge MA: Harvard University, September 1997.

Information Dominance
Martin Libicki. Strategic Forum 132, Institute for National Strategic Studies, November 1997.

Information Superiority
Lt. Gen. Paul K. Van Riper. Marine Corps Gazette (June 1997).

Defining Information Power
Dan Kuehl. Strategic Forum 115, Institute for National Strategic Studies, June 1997.

Information as a Weapon
Maj YuLin Whitehead. Air Chronicles (April 1997). Posted on the Cryptome/JYA website.

Information Warfare: Time for Some Constructive Skepticism?
John Rothrock. From In Athena's Camp, eds., Arquilla and Ronfeldt. Santa Monica: Rand, 1997.

Cyberwar is Coming!
John Arquilla and David Ronfeldt. From In Athena's Camp, eds., Arquilla and Ronfeldt. Santa Monica: Rand, 1997.

Information Attack: Information Warfare in 2025
George J. Stein. Air War College, August 1996.

Cyberwar and Netwar: New Modes, Old Concepts, of Conflicts
John J. Arquilla and David F. Ronfeldt. Rand Research Review, Fall 1995.

Infowar and Disinformation: From the Pentagon to the Net
Daniel Brandt. NameBase Newsline (October-December 1995)

Information War-Cyberwar-Netwar
George J. Stein. From Battlefield of the Future: 21st Century Warfare Issues. . Maxwell AFB, Ala.: Air University Press, September 1995.

What is Information Warfare
Martin Libicki. Strategic Forum 28, Institute for National Strategic Studies, May 1995.

A Theory of Information Warfare. Preparing For 2020
Col. Richard Szafranski. Aerospace Chronicles (Spring 1995).

The Mesh and the Net: Speculations on Armed Conflict In an Age of Free Silicon
Martin Libicki. McNair Paper 28, Institute for National Strategic Studies, March 1994 (.pdf file).

Informational Warfare: US Organizational Activities
Appendix to a Joint Staff report. Posted on Information Warfare Research Center Website.

E-mail This Page

Please send us your comments, any corrections,
and your suggestions for additional resources.


powered by FreeFind

Home | Online Books | Specialists | Research Sites | Bibliography
Project on Defense Alternatives

PDA Publications:
US Defense Policy | Regional Security
Iraq & Afghanistan | Military & Strategic Studies
Terrorism | Alternative Security & Defense

Home | Buy Publications | What's New | About PDA
Links | Search This Site | In the News | E-mail PDA

War Report | RMA Debate Page
Defense Strategy Review Page | Chinese Military Power Page
Terrorism, Counter-Terrorism, Homeland Security | Occupation Distress

Become a PDA Sustainer

The Project on Defense Alternatives, The Commonwealth Institute
P.O.Box 398105, Inman Square Post Office
Cambridge, MA 02139, USA
Phone 617/547-4474, Fax 617/868-1267
Email: pda(at)

Site designed by IRN Internet Services
Copyright © The Commonwealth Institute. All Rights Reserved.