
- •Glossary of information warfare terms
- •Introduction to Information war. Military use.
- •Introduction to Information Warfare.
- •II. Read and translate the text.
- •III. Answer questions.
- •Industrial wave
- •Information wave
- •III. Complete the sentences
- •IV. Say it in Russian:
- •V. Say it in English.
- •IV. Look through the table below and answer:
- •I. Read and translate the text.
- •II. Say it in English.
- •III. Choose the proper variant to complete the following:
- •Information Warfare in Use
- •I. Read texts. Who uses (or could use) Information Warfare
- •Who is vulnerable?
- •II. Answer the following questions.
- •III. Find in what sentence the following word-combinations are used in the texts.
- •IV. Summarize texts in 5 sentences. Present your summary in written form.
- •I. Read the text (time limite 10 min).
- •I. Scan the text trying to define differences between Netwar and Cyberwar. List them. Expand on your ideas referring to the text.
- •II. Find Russian equivalents for the words and word-combinations.
- •III. Say it in Russian.
- •IV. Write a paragraph about Cyberwar and Netwar Point out:
- •I. Read and translate the text.
- •II. Compress paragraphs leaving only the sentences expressing the main idea of the text.
- •III. Give the most literary translation of the following sentences. Present your translation in written form.
- •IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.
- •V. Fill in gaps.
- •VI. Read the extract (time limite 3 min).
- •Unit 2 Business Intelligence
- •II. Answer the following questions.
- •III. Now read the text again and translate it.
- •IV. Say it in Enclish.
- •I. Read the text (time limite 3 min). What is the text about?
- •II. Translate the following words and word-combinations.
- •III. Translate the passage into English.
- •I. Read the text.
- •II. Answer the following questions.
- •I. Read the advertisement. Translate it.
- •"What You Say in Private is Your Business; Keeping it That Way is Ours" ©
- •I. Read the text and divide it into logical parts. Give a headline for each of them.
- •II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
- •III. Find Russian equivalents for the following words and word-combinations:
- •IV. Fill in gaps.
- •V. Translate into English
- •VI. Translate into English the extracts below.
- •Unit 3 Psychoactive drugs. (Biological effects of electromagnetic radiation)
- •I. Read the text.
- •II. Answer questions.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Find Russian equivalents for the following words and word-combinations.
- •V. Give the most literary written translation.
- •I. Read the text.
- •II. Find Russian equivalents for the following words and word-combinations.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Translate the following extracts. Present your translations in written form.
- •V. Read and comment two extracts below. Then give your arguments for and against microwave weapon.
- •VI. Answer questions.
II. Say it in English.
Вирус действует только, когда начинает выполняться основная программа.
Поскольку современные телефонные системы управляются компьютерами, вы сможете выводить их из строя, или, по крайней мере, добиться их массового отказа при помощи вирусов.
“Червь” может быть легко изменен так, чтобы стирать данные или вызывать еще более сильные разрушения.
Хорошо написанный “троянский конь” не оставляет следов своего присутствия, и, т.к. он не вызывает явных разрушений, его сложно обнаружить.
“Троянский конь” может быть замаскирован как инструмент защиты.
Активизация может быть произведена извне.
Через “люк” проектировщик способен пробраться в систему минуя защиту.
Это особенно целесообразно в случаях военного стратегического моделирования и планирования, и обеспечения разведки жизненно важной информацией.
Они (чипы) могут быть настроены так, чтобы отказать в конкретное время после получения сигнала на определенной частоте.
В отличие от вирусов, мы можем использовать их, чтобы атаковать не программное обеспечение, а аппаратные средства компьютерной системы.
Электронные схемы более уязвимы при перегрузках, чем предполагает большинство людей, что с большим успехом используется HERF пушками.
ЕМР вырабатывает электронный импульс. Источником может быть ядерная или неядерная детонация.
III. Choose the proper variant to complete the following:
A virus is a) an independent program; b) a code fragment that copies itself.
Nano machines are a) tiny robots; b) integrated circuits.
Trap door is a) a type of Trojan horse; b) a mechanism that’s built into a system.
Trojan horse is a) a code fragment that hides; b) a code fragment that copies itself.
Electronic jamming is used: a) to shoot a high power radio signal; b) to overwhelm enemy with incorrect information.
Text IV.
Information Warfare in Use
I. Read texts. Who uses (or could use) Information Warfare
Who uses Information Warfare against who today and the military use ofIW is not officially known, at least only from public sources. There has been a wide discussion on whether IW tools were used in the Persian Gulf War and whether the CIA had overtaken a wireless network of the Iraqi Army, but these messages were fake or could not be proven. Desert Storm was mostly a war where "smart" weapons were used to destroy the enemy's headquarters.
Soft War was widely used to demoralize the enemy troops in Desert Storm. Ten of thousands of pamphlets were dropped over enemy forces, part of them in thousands of plastic cans to draw the attention of the Iraqis toward the sea.
Information Warfare, in its wider sense, is daily used between individuals and corporations. Computer system penetrations are reported daily to emergency report teams that are in charge to take countermeasures. Often, the attackers (crackers) are arguing that they do not commit a crime but improving the security of the system by pointing to its weaknesses. However, data disclosure and denial of service are a serious problem.