638
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

INFORMATION WARFARE AND THE FUTURE OF THE SPY

Pages 115-133 | Published online: 02 Dec 2010

REFERENCES

  • Adams, J. (1994) The New Spies: Exploring the Frontiers of Espionage, London: Hutchinson.
  • Andrew, C. and Gordievsky, O. (1991) KGB: The Inside Story of Its Foreign Operations, London: Hodder & Stoughton.
  • Arquilla, J. (1998) The Great Cyberwar of 2002', Wired 6.02 February.
  • Arquilla, J. and Ronfeldt, D. (1996) Cyberwar is Coming, available HTTP: http://sd.nps.navy.mil/jmorale/cyberwar.html (15 January 1996).
  • Bamford, J. (1983) The Puzzle Palace, London: Sidgwick & Jackson.
  • BBC (1993) On Her Majesty's Secret Service', Panorama BBC Television, 22 November.
  • Blake, G. (1990) No Other Choice, London: Jonathan Cape.
  • Bontchev, V. (1995) The Bulgarian Virus Factories. Available HTTP: http://www.einet.net/galaxy/Engineering-and-Technology/ComputerTechnology/Security/david-hull/bulgfect.html (20 December 1995).
  • Boren, D.L. (1994) 'The Intelligence Community: How Crucial?', Foreign Affairs.
  • Campbell, D. (1997) 'More Naked Gun than Top Gun' The Guardian, 26 November.
  • Davies, P.H.J. (1995) Organisational Politics and the Development of Britain's Intelligence Producer/Consumer Interface', Intelligence and National Security 10(4) (October).
  • Davies, P.H.J. (1998) 'Infowar, Infosec and Asian Security', Asian Defence and Diplomacy 4(9) September.
  • Department of Trade and Industry (1997) 'Licensing of Trusted Third Parties for the Provision of Encryption Services'. Available HTTP: http://dtiinfol.dti.gov.uk/pubs/ (5 August).
  • Der Derian, J. (1994) 'Cyber-Deterrence', Wired September.
  • Devost, M., Houghton, B. and Pollard, N. (1997) 'Information Terrorism: Political Violence in an Information Age', Terrorism and Political Violence 9(1) (Spring).
  • Gibson, W. (1987) Count Zero, New York: Ace.
  • Haeni, R.E. and Hoffman, L.J. (1996) An Introduction to Information Warfare, available HTTP: http://www.seas.gwu.edu/student/reto/infowar/infowar.html (15 January).
  • Heather, R.W. (1987) SDI and Soviet Active Measures: Mackenzie Paper No 14, Toronto: Mackenzie Institute.
  • Hinsley RH. and Simkins C.A.G. (1991) British Intelligence in the Second World War VoI IV: Counter-Espionage and Security, London: HMSO.
  • Hoffman, B. (1996) 'Intelligence and Terrorism: Emerging Threats and New Security Challenges in die Post Cold-War Era', Intelligence and National Security 11 (2) (April).
  • Johnson, L.S. (1997) 'Toward a Functional Model of Information Warfare', Studies in Intelligence no. 1 1997 (unclassified edition).
  • Kupperman, R. (1991) 'Emerging Techno-Terror ism', in J. Marks and I. Belaiev (eds) Common Grounds on Terrorism, New York: W.W. Norton.
  • Landau, H. (1934) All's Fair: The Story of British Secret Service behind German Lines, New York: Puttnam.
  • Laqueur, W (1985) A World of Secrets: The Uses and Limits of Intelligence, New York: Basic Books.
  • Levy, S. (1996) 'Wisecrackers', Wired 2.03 March.
  • Libicki, M. (1995) What Is Information Warfare?, Washington, DC: US Government Printing Office, also available HTTP: http://www.ndu.edu/inss/actpubs/ (19 December).
  • Madsen, W (1993) 'Intelligence Threats to Computer Security', International Journal of Intelligence and Counterintelligence 6(4) (Winter).
  • Molander, R., Riddile, A. and Wilson, P. (1996) Strategie Information Warfare: A New Face of War, Santa Monica: RAND.
  • New Straits Times (1998) 'Third Suspect Held for Spreading Email Rumours', New Straits Times (14 August).
  • RAND Research Review Information Warfare and Cyberspace Security (1995), available HTTP: http://rand.org/RRR/RRR.fall95.cyber (19 December).
  • Richelson, J.T. (1989) The US Intelligence Community, 2nd edition, New York: Ballinger.
  • Scallingi, P. (1995) 'Proliferation and Arms Control', Intelligence and National Security 10(4) (October).
  • Schoben, A. (ed.) (1995) 'Information Warfare: A Two-Edged Sword', Rand Research Review: Information Warfare and Cyberspace Security, available HTTP: http://rand.org/RRR/RRR.fall95.cyber (19 December).
  • Schwartau, W. (1996) Information Warfare, 2nd edn, New York: Thunder's Mouth.
  • Security Service Commissioner (1995) 1995 Annual Report of the Security Commissioner, CMD 2827, London: HMSO.
  • Shulsky, A. (1991) Silent Warfare: Understanding the World of Intelligence, London : Brasseys.
  • Stafford, D. (1983) Britain and European Resistance 1940-1945, Toronto: University of Toronto Press.
  • Stengers, J. (1984) 'The French, the British, the Poles and Enigma', in C. Andrew and D. Dilks (eds) The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century, Chicago: University of Chicago Press.
  • Stoll, C. (1990) The Cuckoo's Egg, London: Pan.
  • Toffler, A. and Toffler, H. (1995) War and Antiwar, New York: Warner.
  • Verrier, A. (1983) Through the Looking Glass, London: Jonathan Cape.
  • Walker, M. (1996) 'Datastream Cowboy Fixes Pentagon in his Sights', the Guardian, 24 May.
  • Ward, M. (1997a) 'Coded Message Plan Too Complex', New Scientist, 26 April.
  • Ward, M. (1997b) 'Net Surfers Set Cracking Pace', New Scientist, 28 June.
  • Ward, M. (1997c) The Secret's Out', New Scientist, 6 September.
  • Whitacker, R. (1996) The "Bristow Affair": A Crisis of Accountability in Canadian Security Intelligence', Intelligence and National Security 11 (2) April.
  • Wiggins, G. (1996) 'Data Needs of Academic Research on the Internet', available HTTP: http://www.indiana.edu/cheminfo/gw/nist_csanewsl.html (24 January 1997).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.