Information Warfare: Chaos on the Electronic Superhighway

Overview

As the National Information Infrastructure grows and evolves into everyman's electronic superhighway, are we opening the doors to an electronic cold war? Or are we on the edge of a brave new precipice overlooking the dawn of the information revolution? With over 125,000,000 computers inextricably tying our economy together through complex land and satellite-based communications systems, a major portion of our domestic 6 trillion dollar economy depends on their consistent and reliable operation. In a serious and ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (24) from $1.99   
  • New (3) from $4.61   
  • Used (21) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$4.61
Seller since 2010

Feedback rating:

(136)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New BRAND NEW..01B.

Ships from: Sussex, WI

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$18.50
Seller since 2007

Feedback rating:

(321)

Condition: New
1st Edition, Fine/Fine Clean, tight & bright. NO ink names, bookplates, DJ tears etc. Price unclipped. ISBN 1560250801

Ships from: Troy, NY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$50.00
Seller since 2014

Feedback rating:

(178)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

As the National Information Infrastructure grows and evolves into everyman's electronic superhighway, are we opening the doors to an electronic cold war? Or are we on the edge of a brave new precipice overlooking the dawn of the information revolution? With over 125,000,000 computers inextricably tying our economy together through complex land and satellite-based communications systems, a major portion of our domestic 6 trillion dollar economy depends on their consistent and reliable operation. In a serious and inviting manner, Information Warfare: Chaos on the Electronic Superhighway examines the awesome potential for industrial and international espionage. Through sabotage, theft, data manipulation, and other means, our economy could be crippled beyond anything in recent history. Currently within the banking community it is common practice for banks to use creative accounting to hide millions of dollars lost every year through Information Warfare. In Information Warfare the "digital persona" plays the role of victim and perpetrator. The wrong hands could extract the most personal information about the "digital you," not the least of which could be medical, financial, business, legal, and criminal documentation. An individual could alter his/her own records to eradicate nefarious histories. Or an individual could alter anyone's electronic documentation for any reason. Information Warfare outlines almost every kind of informational disaster imaginable leaving the reader to think there may be no way out of the quagmire that is the new information age. However, author Winn Schwartau details current trends in Information Warfare and inspires the dialogue necessary to establish a National Information Policy, a constitution for Cyberspace and an Electronic Bill of Rights.

Will the electronic superhighway open the doors to an electronic cold war, or will it be the dawn of an information revolution? This book examines both these possibilities in a serious and inviting manner, outlining almost every kind of information disaster imaginable, and asserting that it is a simple matter of awareness and attention that can be our salvation.

Read More Show Less

Editorial Reviews

Publishers Weekly - Publisher's Weekly
Hackers who break into companies' computers, steal or scramble data and plant ``viruses'' are only the most publicized threat to electronic security, according to this shocking and eye-opening report. It shows that the computer systems and information highways of U.S. businesses, government and the military are surprisingly vulnerable to theft, data manipulation and sabotage by ``information warriors'' such as corporate employees, business competitors, organized crime, drug cartels, terrorists, law enforcement officials, insurance companies and others. Schwartau, an information security specialist, tells of electromagnetic eavesdroppers who use a modified TV set to pick up computer screens' emissions; HERF (high-energy radio frequency) guns that can zap an entire computer network; and microchip manufacturers who insert cloned or counterfeit chips so that complex equipment will eventually crash. He outlines a national information policy (which he was asked to present to the Clinton administration), a blueprint to safeguard electronic privacy. Schwartau closes with a practical chapter for individuals or companies seeking to ward off snoops and electronic troublemakers. (May)
Library Journal
Lyon (sociology, Queen's Univ., Ontario) has written a detailed, scholarly work on the use of technology for surveillance. He describes our present culture as the ``surveillance society,'' reminding us that explicit details of our personal lives are gathered, stored, sorted, retrieved, and processed every day among the massive computer databases of large corporations and government departments. But surveillance, as explored by Lyon, is not overwhelmingly negative in its effects. Nor does he conclude that surveillance is inherently evil. Citing the efforts of the Computer Professionals for Social Responsibility, Lyon instead encourages public awareness of surveillance issues. He lauds mobilized efforts to restrict inappropriate use of electronic surveillance and to block attempts to make personal information publicly available. A noteworthy study of an important issue, this is intended for informed readers. A general audience will find Schwartau's Information Warfare more appealing. Schwartau, an expert on information security and electronic privacy, presents an overview of ``information warfare,'' a confict in which electronic information is a vital asset and a strategic target for conquest or destruction. Showing that the essence of our individual and corporate selves is being distributed across thousands of computer databases over which we have little or no control, Schwartau paints a grim picture of what could happen if the very records that define us become subject to malicious modification, theft, unauthorized disclosure, or outright destruction. Personal, corporate, and global information warfare currently costs the United States hundreds of billions of dollars a year. Schwartau describes almost every kind of information disaster imaginable and compels us to establish a National Information Policy to serve as the foundation for our future: a constitution for Cyberspace. This book presents disturbing answers to some simple questions about our personal and national stake in the Global Network. Highly recommended for public and academic libraries.-Joe Accardi, Northeastern Illinois Univ. Lib., Chicago
Read More Show Less

Product Details

  • ISBN-13: 9781560250807
  • Publisher: Avalon Publishing Group
  • Publication date: 4/22/1994
  • Edition description: 1st ed
  • Edition number: 1
  • Pages: 432
  • Product dimensions: 6.38 (w) x 9.29 (h) x 1.48 (d)

Table of Contents

Contributors 3
Introduction to Information Warfare, 2nd Edition 8
Dedication and Acknowledgements 15
Prologue 16
Summary of Views on IW 23
Model Disclaimer Between Former Adults 25
An Introduction to Information Warfare 27
Electronic Civil Defense 43
1 The Econo-Politics of Information Warfare 49
2 Computers Everywhere and the Global Network 71
Strategic Assessment: The Internet 87
3 Binary Schizophrenia 95
PsyOps 112
An Information Warfare SIIOP 115
Computer Decency Act 125
4 On the Nature of Insidious 131
Hiding in Plain View 144
5 Influenza, Malicious Software, and OOPS! 148
The Plausibility of UNIX Virus Attacks 167
6 Sniffers and the Switch 175
Puzzle Palace Conducting Internet Surveillance 198
Future Problems With Firewalls 199
Countering Nonlethal Information Warfare 201
Telewar 212
7 The World of Mr. Van Eck 221
8 Cryptography 232
The Three Little Pigs 244
The Bio-Cyber Future 244
The True Story of PGP 247
9 Chipping: Silicon-Based Malicious Software 254
Denial of Service 265
10 HERF Guns and EMP/T Bombs 269
More About HERF 288
The E-Bomb 296
11 Hackers: The First Information Warriors in Cyberspace 334
Declaring War on France 359
Social Engineering, Hackers of Planet Earth 360
Hackers as a National Resource 366
12 Who Are the Information Warriors? 370
Cyber-Civil Disobedience 404
Should Spies Be Cops? 408
Assassination Politics 420
13 The Military Perspective 426
Iraqi Virus Hoax Update 435
Sometimes the Dragon Wins 436
Worldwide Threat Assessment 453
Nonlethal Weapons 459
Ethical Conundra of Information Warfare 462
The Fourth Force 469
14 Class 1: Personal Information Warfare 473
No Privacy 486
Personal Information Warfare 488
Information Warfare: The Personal Front 494
How to Beat Goliath 497
Church and Statutes 501
Privacy in the Workplace 507
15 Class 2: Corporate Information Warfare 513
Corporate Civil Defense 533
Diary of an Industrial Spy 537
16 Class 3: Global Information Warfare 540
Information Warfare 561
Export Control 572
Information Warfare Delphi 579
17 Defense Before Defeat 588
Deterring Information Attacks 592
The Use of Cognitive Maps 601
From InfoWar to Knowledge Warfare 611
Protecting the NII 626
America, The Last Empire 632
18 Outline of a National Information Policy: Defining America's Future 636
An Electronic Bill of Rights 648
A Declaration of the Independence of Cyberspace 655
19 The Future of Information Warfare 658
Afterword: Practical Proactive Security and Privacy 671
Resources: Who Ya Gonna Call? 688
Who's Who in Information Warfare 716
Footnotes 746
Index 753
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)