The RMA Debate
A gateway to full-text online resources about the Revolution in Military Affairs, information war, and asymmetrical warfare.
sponsored by
Project on Defense Alternatives
E-mail This Page |  Tag This Page (

Strategic Information Warfare
and Defense

Full Text Resources
Terrorism and Counter-terrorism
Homeland Security

RMA Overview
History and Context
Information Warfare
Strategic Information Warfare and Defense
Asymmetric Warfare
Future Warfare
Network Centric Warfare

U.S. Transformation
Joint & Defense Wide
Service Visions
Air Power
Space Power
Army Transformation
Sea Power
Nuclear Issues
Intelligence Issues
New Technology
Urban Warfare, Counter-Insurgency, & Operations Other Than War
RMA & US Defense Strategy

Second Thoughts on the RMA
Allied Perspectives
RMA Outside the West
Arms Control, Ethics, and International Law

Online Books


Research Sites


PDA Sponsored Sites

War Report

Online Resources about U.S. Defense Strategy, Force Planning, and Policy Reviews -- Project on Defense Alternatives

Online Resources about Chinese Military Policy & Capabilities -- Chinese Military Power Page

Defense Strategy Review Page

PDA Bulletin
8 to 12 editions a year
Enter your e-mail address:

(email address privacy assured)

Cyberwar, Anyone?
Col. Alan D. Campen. Signal Magazine, January 2008.

Air Force and the Cyberspace Mission Defending the Air Force's Computer Network in the Future
Lt. Col. Shane P. Courville. Center for Strategy and Technology, Air War College, December 2007 (.pdf file).

Analysis: A New USAF Cyber-War Doctrine
Shaun Waterman. United Press International, 17 October 2007.

Hackers Take Down the Most Wired Country in Europe
Joshua Davis. Wired Magazine, 21 August 2007.

Cyber Attacks Explained
James A. Lewis. Center for Strategic and International Studies, 15 June 2007. Posted on the Commonwealth Institute website (.pdf file).

Cyber Mobilization: The Neglected Aspect of Information Operations and Counterinsurgency Doctrine
Timothy L. Thomas. Foreign Military Studies Office, U.S. Army, June 2007 (.pdf file).

The Pentagon's Brand New Plan for Winning the Battle of Ideas Against Terrorists
Linda Robinson. U.S. News and World Report, 29 May 2006.

High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments
Clay Wilson. Congressional Research Service, 14 April 2006 (.pdf file).

America's War on the Web
Sunday Herald, Scotland, 02 April 2006. Posted on the Find Articles website.

Cyberstrategy 2.0
Frank J. Cilluffo and J. Paul Nicholas. The Journal of International Security Affairs, Spring 2006.

Clausewitz's Theory of War and Information Operations
William M. Darley. Joint Force Quarterly, January 2006 (.pdf file).

The New Reality of International Telecommunications Strategy
Robert C. Fonow. Center for Technology and National Security Policy, National Defense University, January 2006 (.pdf file).

The New Reality of International Telecommunications Strategy
Robert C. Fonow. Center for Technology and National Security Policy, January 2006 (.pdf file).

Information Battleground
Adam J. Hebert. Air Force Magazine, December 2005.

Who Will Control the Internet
Kenneth Neil Cukier. Foreign Affairs, November-December 2005.

Seminar Report: Asymmetric Information War at CNA
M.A. Harlow. Johns Hopkins University Applied Physics Laboratory, 28 June 2005 (.pdf file).

Report of the Commission to Asses the Threat to the United States From Electromagnetic Pulse (EMP) Attack
John S. Foster, Jr. et al. The Information Warfare Site, 2004 (.pdf file).

Use and Abuse of Media in Vulnerable Societies
Mark Frohardt and Jonathan Temin. US Institute of Peace, October 2003 (.pdf file).

Creating a Common Communications Culture
Richard Solomon and Sheryl J. Brown US Institute of Peace, 12 September 2003.

The Al-Jazeera News Network:  Opportunity or Challenge for US Foreign Policy in the Middle East?
Jeremy M. Sharp. Congressional Research Service, 23 July 2003.

Telewar:  Lessons of News Management in the Gulf Wars
Eviathar H. Ben-Zedeff. International Policy Institute for Counter-Terrorism, 19 June 2003.

The Dangers of Warfare in a Media Age
Roger Howard. In The National Interest, 23 April 2003.

Planning for the Next Cyberwar
Elliot Borin. Wired News, 18 April 2003.

Cyberwar Solution
Dominant Logistics Project, 28 February 2003.

Terrorists on the Net? Who Cares?
Noah Shachtman. Wired News, 20 December 2002.

Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
James A. Lewis. Center for Strategic and International Studies, December 2002 (.pdf file).

No Orwellian Scheme Behind DARPA's Total Information Awareness System
Michael Scardaville. WebMemo #175 Heritage Foundation, 20 November 2002.

Reality Bytes:  Cyberterrorism and the Terrorist 'Use' of the Internet
Maura Conway. First Monday, November 2002.

Wired Warfare: Computer Network Attack and Jus In Bello
Michael N. Schmitt. International Committee of the Red Cross, June 2002.

The Rise and Fall of the Office of Strategic Influence
James Der Derian, director, Information Technology, War, and Peace Project. Watson Institute, 4 March 2002.

Designing Information Resources for Transboundary Conflict Early Warning Networks (Executable file produces PDF)
Hayward R. Alker. Social Science Research Council, 5 February 2002.

Is Cyber Terror Next?
Dorothy Denning. Social Science Research Council, 18 January 2002.

Countering cyber war
Phil Williams. NATO Review, Winter 2001.

Information Power: International Affairs in the Cyber Age
Viktor Mayer-Schoenberger and Gernot Brodnig. Faculty Research Working Paper Series. KSG Harvard University, November 2001.

Cyber Protests: The Threat to the U.S. Information Infrastructure
National Infrastructure Protection Center, October 2001.

Cyber Attacks During the War on Terrorism: A Predictive Analysis
Michael A. Vatis. Institute for Security Technology Studies, 22 Sept. 2001.

Cyberwarriors: Activists and Terrorists Turn to Cyberspace
Dorothy Denning. Harvard International Review, Summer 2001. Posted on Georgetown University's Department of Computer Science website.

Hacker Warriors: Rebels, Freedom Fighters, and Terrorists Turn to Cyberspace
Dorthy Denning. Harvard International Review, Summer 2001. The internet and Psychological Operations
Angela Maria Lungu. Joint Force Quarterly, Spring/Summer 2001.

The Ethics of Computer Network Attack
William J. Bayles. Parameters (Spring 2001).

Defensive Information Operations: 2000 Summer Study Volume II
Office of the US Secretary of Defense, March 2001.

President's Commission on Critical Infrastructure Protection: Documents
Critical Infrastructure Assurance Office Website. July 2001.

Cyber Threats: Developing a National Strategy for Defending Our Cyberspace
Mark C. Montgomery. Incidental Paper. Seminar on Intelligence, Command, and Control sponsored by the Program on Information Resource Policy, Harvard University, July 2001.

Preparing the U.S. Army for Homeland Security: Concepts, Issues, and Options
Eric V. Larson and John E. Peters. Santa Monica, CA: Rand Corporation, 8 June 2001.

Information Warfare and the New Challenges to Waging Just War
Matthew Hirschland. Proceedings: Political Research Online, 7 March 2001.

The Internet and the Changing Face of International Relations and Security
Andreas Wenger. Information & Security, 2001.

Papers from the Conference on Homeland Protection (pdf download)
Max G. Manwaring, ed. Strategic Studies Institute, Washington, DC. October 2000.

Weapons of Mass Destruction
New Scientist, 5 July 2000. Posted on the Website.

Soldiers, Constables, Bankers, and Merchants: Managing National Security Risks in the Cyber Era (pdf download)
Peter H. Daly. Research Report, Program on Information Resources Policy. Cambridge MA: Harvard University, June 2000.

Whom the Gods Would Destroy: An Information Warfare Alternative for Deterrence and Compellence
Maj. Robert D. Critchlow. Navy War College Review. (Summer 2000)

Dorothy E. Denning. Testimony before the Special Oversight Panel on Terrorism, US House Committee on Armed Services, 23 May 2000. Posted on Dorthy Denning Homepage.

Resolving the Legal Issues Concerning Information Warfare and International Law: The Reach of the Existing Framework, and the Creation of a New Paradigm
Michael J. Robbat. Journal of Science & Technology Law, Spring 2000.

Electronic Pearl Harbor: A slogan for U.S. Info-warriors
Crypt Newsletter(January 2000)

Infowar of Words
George Smith. Information Security (January 2000).

Information Warfare: Time to Prepare
Bruce Berkowitz. Issues in Science and Technology (Winter 2000).

Defending America's Cyberspace. National Plan for Information Systems Protection Version 1.0
The White House. Washington, DC, 2000. Posted on the Federation of American Scientists (.pdf file).

The Defense of the Infrastructure
Charles M. Herzfeld. Information Impact Magazine(September 1999)

Information Operations Violates Protocol I
William Church., 23 June 1999.

The Emergence of Noopolitik: Towards An American Information Strategy
John Arquilla and David F. Ronfeldt. Santa Monica, CA: Rand Corp., 1999.

Securing the U.S. Defense Information Infrastructure: A Proposed Approach
Robert H. Anderson, et al. Santa Monica, CA: Rand Corp., 1999.

Cyberthreat: Protecting U.S. Information Networks
USIA Electronic Journal (November 1998).

The Revolution in Military Affairs-Special Report
Lothar Ibruegger. Report prepared for the North Atlantic Assembly Science and Technology Committee, November 1998. Posted on the Information Warfare website.

Asymmetric Warfare and the Threat to the American Homeland
Joseph C. Cyrulik. Landpower Essay Series, No. 99-8. November 1998. Institute of Land Warfare, AUSA.

Truth is the first casualty of cyberwar.
George Smith. Wall Street Journal, 8 September 1998. Posted on Crypt Newsletter Website.

An Electronic Pearl Harbor? Not Likely
George Smith. Issues in Science and Technology, Fall 1998.

Takedown: The Asymmetric Threat to the Nation
Robert David Steele. 22 June 1998 (Word document, save to computer).

Information Warfare and Nuclear Preemption
Stephen J. Cimbala. National Security Studies Quarterly, Spring 1998.

Conflict and the Computer: Information Warfare and Related Ethical Issues
Sam Nitzberg. Paper presented at the 21st National Systems Security Conference, Hyatt Regency Crystal City, Arlington, VA, 5-8 Feb 1998.

What is Strategic Information Warfare?
Roger C. Molander, et al. Strategic Information Warfare Rising. Santa Monica: Rand Corp., 1998.

Strategic Information Warfare Rising
Roger C. Molander, et al. Santa Monica: Rand Corp., 1998.

The Cyber-Posture of the National Information Infrastructure
Willis H. Ware. Santa Monica, CA: Rand Corp., 1998.

Information Warfare and Deterrence
Gary F. Wheatley and Richard E. Hayes. Washington D.C.: National Defense University Press, December 1996.

Defense Science Board Task Force on Info-War
Defense Science Board. Office of the Secretary of Defense, 25 November 1996. Posted on Web site.

Defensive Information Warfare
Dr. David S. Alberts. National Defense University Press, August 1996.

Information Warfare Database
Terrorism Research Center.

E-mail This Page

Please send us your comments, any corrections,
and your suggestions for additional resources.


powered by FreeFind

Home | Online Books | Specialists | Research Sites | Bibliography
Project on Defense Alternatives

PDA Publications:
US Defense Policy | Regional Security
Iraq & Afghanistan | Military & Strategic Studies
Terrorism | Alternative Security & Defense

Home | Buy Publications | What's New | About PDA
Links | Search This Site | In the News | E-mail PDA

War Report | RMA Debate Page
Defense Strategy Review Page | Chinese Military Power Page
Terrorism, Counter-Terrorism, Homeland Security | Occupation Distress

Become a PDA Sustainer

The Project on Defense Alternatives, The Commonwealth Institute
P.O.Box 398105, Inman Square Post Office
Cambridge, MA 02139, USA
Phone 617/547-4474, Fax 617/868-1267
Email: pda(at)

Site designed by IRN Internet Services
Copyright © The Commonwealth Institute. All Rights Reserved.