
- •Glossary of information warfare terms
- •Introduction to Information war. Military use.
- •Introduction to Information Warfare.
- •II. Read and translate the text.
- •III. Answer questions.
- •Industrial wave
- •Information wave
- •III. Complete the sentences
- •IV. Say it in Russian:
- •V. Say it in English.
- •IV. Look through the table below and answer:
- •I. Read and translate the text.
- •II. Say it in English.
- •III. Choose the proper variant to complete the following:
- •Information Warfare in Use
- •I. Read texts. Who uses (or could use) Information Warfare
- •Who is vulnerable?
- •II. Answer the following questions.
- •III. Find in what sentence the following word-combinations are used in the texts.
- •IV. Summarize texts in 5 sentences. Present your summary in written form.
- •I. Read the text (time limite 10 min).
- •I. Scan the text trying to define differences between Netwar and Cyberwar. List them. Expand on your ideas referring to the text.
- •II. Find Russian equivalents for the words and word-combinations.
- •III. Say it in Russian.
- •IV. Write a paragraph about Cyberwar and Netwar Point out:
- •I. Read and translate the text.
- •II. Compress paragraphs leaving only the sentences expressing the main idea of the text.
- •III. Give the most literary translation of the following sentences. Present your translation in written form.
- •IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.
- •V. Fill in gaps.
- •VI. Read the extract (time limite 3 min).
- •Unit 2 Business Intelligence
- •II. Answer the following questions.
- •III. Now read the text again and translate it.
- •IV. Say it in Enclish.
- •I. Read the text (time limite 3 min). What is the text about?
- •II. Translate the following words and word-combinations.
- •III. Translate the passage into English.
- •I. Read the text.
- •II. Answer the following questions.
- •I. Read the advertisement. Translate it.
- •"What You Say in Private is Your Business; Keeping it That Way is Ours" ©
- •I. Read the text and divide it into logical parts. Give a headline for each of them.
- •II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
- •III. Find Russian equivalents for the following words and word-combinations:
- •IV. Fill in gaps.
- •V. Translate into English
- •VI. Translate into English the extracts below.
- •Unit 3 Psychoactive drugs. (Biological effects of electromagnetic radiation)
- •I. Read the text.
- •II. Answer questions.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Find Russian equivalents for the following words and word-combinations.
- •V. Give the most literary written translation.
- •I. Read the text.
- •II. Find Russian equivalents for the following words and word-combinations.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Translate the following extracts. Present your translations in written form.
- •V. Read and comment two extracts below. Then give your arguments for and against microwave weapon.
- •VI. Answer questions.
Content
I. Glossary of Information Warfare
II. Unit I
Introduction to Information war. Military use.
Text I Introduction to Information Warfare.
Text II.
History of Warfare
Text III.
Examples of available (or possible) IW weapons
Text IV.
Information Warfare in Use
III. Unit II
Business Intelligence.
Text I.
Information War. The need for Business Intelligence
Text II
Spooks warn Canuck firms being haunted
Text III
"U.S. Firms' '97 Losses to Spies Put at $300 Billion"
Text IV
The Bug that Got Away
IV. Unit III
Psychoactive Drugs.
(Biological effects of electromagnetic radiation.)
Text I.
Electromagnetics and the Mind
Text II.
Wonder Weapons
List of words
Glossary of information warfare terms
AIA
Air Intelligence Agency at Kelly Air Force Base.
AFIWC
Air Force Information Warfare Center
C2W
Command-and-control warfare. Command systems, rather than commanders, are the chief target, as in Persian Gulf War.
C4I
Command, Control, Communications, Computers, and Intelligence
Copernicus
The code-name under which the Navy plans to reformulate its command and control structures in response to the realization that information is a weapon. Through Copernicus warfighters will get the information that they need to make tactical decisions. The architecture of Copernicus was designed by Vice Admiral Jerry 0. Turtle.
DES
Data Encryption Standard
DISA
Defense Information Security Administration. Military organization charged with resposibility to provide information systems support to fighting units.
DoD
Department of Defense.
van Eck monitoring
Monitoring the activity of a computer or other electronic equipment by detecting low levels of electromagnetic emissions from the device. Named after Dr. Wim van Eck who published on the topic in 1985.
EMP/T Bomb
A device similar to a HERF Gun but many times more powerful.
EW
Electronic warfare.
GCCS
Global Command and Control System.
HERF
High Energy Radio Frequency. As in HERF gun: a device that can disrupt the normal operation of digital equipment such as computers and navigational equipment by directing HERF emissions at them.
IBW
Intelligence-based warfare
NAIC
National Air Intelligence Center at Wright Patterson Air Force Base.
INFOSEC
Protection of classified information that is stored on computers or transmitted by radio, telephone teletype, or any other means.
IW/C2W
Information warfare/command and control warfare
JC2WC
The Joint Command and Control Warfare Center.
NSA
National Security Agency. This agency is charged with the tasks of exploiting foreign electromagnetic signals and protecting the electronic information critical to U. S. national security.
RMA
Revolution in Military Affairs. The realization by the military that information, and information technologies must be considered as a weapon in achieving national objectives via military activity.
SIGINT
The interception and analysis of electromagnetic signals
TEMPEST
Military code-name for activities related to van Eck monitoring, and technology to defend against such monitoring.
SET
Secure Electronic Transactions
SSL
Secure Socket Layer
SHTTP
Secure Hyper Text Transfer Protocol
CSIS
Canadian Security Intelligence Service
ASIS
American Society for Industrial Security
EEA
Economic Espionage Act
BECCA
Business Espionage Controls and Countermeasures Association
TSCM
Technical Surveillance Counter Measures
CSA
Computers Security Association
CNET
Unit 1
Introduction to Information war. Military use.
“Communications without intelligence is noise; intelligence without communications is irrelevant.”
Gen. Alfred M. Grey, USMS
“...attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy’s army without fighting is true pinnacle of excellence.”
Sun Tzu, The Art of War
I. Pre-reading task.
Think and answer
How do you understand epigraphs?
What do you know about information warfare?
Text I.