
- •Glossary of information warfare terms
- •Introduction to Information war. Military use.
- •Introduction to Information Warfare.
- •II. Read and translate the text.
- •III. Answer questions.
- •Industrial wave
- •Information wave
- •III. Complete the sentences
- •IV. Say it in Russian:
- •V. Say it in English.
- •IV. Look through the table below and answer:
- •I. Read and translate the text.
- •II. Say it in English.
- •III. Choose the proper variant to complete the following:
- •Information Warfare in Use
- •I. Read texts. Who uses (or could use) Information Warfare
- •Who is vulnerable?
- •II. Answer the following questions.
- •III. Find in what sentence the following word-combinations are used in the texts.
- •IV. Summarize texts in 5 sentences. Present your summary in written form.
- •I. Read the text (time limite 10 min).
- •I. Scan the text trying to define differences between Netwar and Cyberwar. List them. Expand on your ideas referring to the text.
- •II. Find Russian equivalents for the words and word-combinations.
- •III. Say it in Russian.
- •IV. Write a paragraph about Cyberwar and Netwar Point out:
- •I. Read and translate the text.
- •II. Compress paragraphs leaving only the sentences expressing the main idea of the text.
- •III. Give the most literary translation of the following sentences. Present your translation in written form.
- •IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.
- •V. Fill in gaps.
- •VI. Read the extract (time limite 3 min).
- •Unit 2 Business Intelligence
- •II. Answer the following questions.
- •III. Now read the text again and translate it.
- •IV. Say it in Enclish.
- •I. Read the text (time limite 3 min). What is the text about?
- •II. Translate the following words and word-combinations.
- •III. Translate the passage into English.
- •I. Read the text.
- •II. Answer the following questions.
- •I. Read the advertisement. Translate it.
- •"What You Say in Private is Your Business; Keeping it That Way is Ours" ©
- •I. Read the text and divide it into logical parts. Give a headline for each of them.
- •II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
- •III. Find Russian equivalents for the following words and word-combinations:
- •IV. Fill in gaps.
- •V. Translate into English
- •VI. Translate into English the extracts below.
- •Unit 3 Psychoactive drugs. (Biological effects of electromagnetic radiation)
- •I. Read the text.
- •II. Answer questions.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Find Russian equivalents for the following words and word-combinations.
- •V. Give the most literary written translation.
- •I. Read the text.
- •II. Find Russian equivalents for the following words and word-combinations.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Translate the following extracts. Present your translations in written form.
- •V. Read and comment two extracts below. Then give your arguments for and against microwave weapon.
- •VI. Answer questions.
IV. Write a paragraph about Cyberwar and Netwar Point out:
a) what they refer to;
b) what they involve;
c) various forms of them.
Text VII.
Who Are the Potential Villains?
I. Read and translate the text.
The explosive expansion of cyberspace activities gives rise to a new set of vulnerabilities—for governments, the military, businesses, individuals and society as a whole—that can be exploited by a wide spectrum of "bad guys" for a variety of motives. These include hackers, disgruntled employees, criminals, terrorists, commercial organizations, and nations. The case of hacker Kevin Mitnick provides some insight into the first type. He led authorities on a high-speed chase through cyberspace after lifting 20,000 credit card numbers from various computer systems. Mitnick did not try to cash in on the ill-gotten bonanza, apparently more interested in thrills than profits, and was caught only after deliberately provoking the attention of a top computer security expert. Mitnick hacked into the file's of Tsutomu Shimomura, who then tracked him down for authorities.
The resources required to cause harm in this cyberspace world are relatively small:
one (or at most a few) computer experts with computer terminals hooked into the worldwide network can do considerable damage. The resources required for a nation or group to do significant damage to the military, economy, or society of another nation are larger, but far fewer than those required to acquire and use major weapon systems. The preparations can also be well hidden, if done carefully. As more and more people become "computer smart" and as villains of many different stripes become more and more aware of the opportunities for mayhem in cyberspace, the resources for major attacks could be within the reach of many nations and some malevolent groups.
To further complicate matters, cyberspace attacks mounted by these different actors are indistinguishable from each other, as are attacks mounted by domestic and foreign-based perpetrators, insofar as the perceptions of the victims are concerned. The distinction between "crime" and "warfare," "accident" and "attack," becomes blurred as does the distinction between police and military responsibilities.
In the authors' view, the danger of more (and more serious) threats in cyberspace is multiplying alarmingly. Statistics support their concern. The number of reported (many incidents go unreported) Internet penetrations rose from six in 1988 to 1,172 in the first six months of 1994. So far, at least, no major disasters have occurred, but the potential certainly exists. For example, it might be possible in the future for some perpetrators (nations or major terrorist groups) to inflict substantial damage by bringing down key parts of the nation's air traffic control system, or the electric power grid, or the international monetary transfer system, even if for a limited time.
Nor is a military disaster out of the question. If an enemy cyberspace attack disrupted a vital military logistics system, or the telecommunications network on which it depends, for a critical period during a campaign, the campaign could be jeopardized.
But taming this wild frontier won't be easy. In addition to the chaotic growth of cyberspace and the blurring of lines of local, national and international authority over activities conducted there, the authors identify another problem. Many individual users neither understand nor accept the need for communal responsibility in safeguarding cyberspace.
In suggesting the elements of a strategy for cyberspace security, the authors draw on a familiar metaphor. Like frontier towns, let each local enclave (business, university, research organization, government agency) see to its own protection, at least for the present, relying on available computer security software and firewalls (security strategies that control electronic access by outsiders but allow insiders, who presumably are trustworthy, to travel the information highways and byways with comparative freedom). But these are little more than stopgap measures, the authors conclude. Barring a technological breakthrough that is not now on the horizon, effective control of cyberspace will require a combination of laws, regulations, the education and training of users, and the cooperation of countries worldwide.
R.O.Hundley
R.H.Anderson