MS. GUIDANCE :
INFORMATION WARFARE and PSYCHOLOGICAL OPERATIONS
ARTICLES and DOCUMENTS
UNCLASSIFIED, NON-SENSITIVE, NON-PRIVACY ACT USE ONLY!!!
DO NOT DISCUSS, ENTER, TRANSFER, PROCESS, OR TRANSMIT CLASSIFIED/SENSITIVE
NATIONAL SECURITY INFORMATION OF GREATER SENSITIVITY THAN THAT FOR WHICH
THIS SYSTEM IS AUTHORIZED.
DOD computer systems are provided for the processing of official U.S. Government information only. The system is monitored to ensure information
security, system integrity, and the limitation of use to official purposes.
Parts of this server are available for use by non DOD individuals.
You may use any link that is not locked to you. (If the area is locked there
will be a small padlock next to the link or you will receive an "access
denied" error when attempting to follow the link). Your use of this system
is subject to monitoring at all times. Unauthorized or illegal activities,
involving this system, can result in criminal prosecution under the Computer
Fraud and Abuse Act of 1986.
As generally understood, propaganda is opinion expressed for the purpose of influencing actions of individuals or groups...
The Age of Disinformation
By Jonathan Vankin and John Whalen
Resource Page, Glossary of Military And Associated Terms
"As modern technology provides humankind with capabilities never even imagined by many of us a decade ago, we can be sure that the global battlefield of the 21st century will be over information -- the dissemination or withholding of facts, the interpretation of events, the presentation or distortion of ideas and ideologies, and the communication of messages and symbols to which people react, whether consciously or unconsciously. The importance of communications in the context of the north-south conflict can scarcely be under-estimated. By using communications as a tool of control, wealthy nations will be able to re-establish their colonial empires (as has already been done in some places) through the "invisible dominance" of the media, economies, and social policies. "
"We've faced many challenges to our existence since 2600 began publishing back in 1984. None has proven to be as ominous and threatening as recent events involving the Secret Service."
Covert Action Quarterly has won numerous awards for investigative journalism. It is read around the world
by investigative reporters, activists, scholars, intelligence buffs, news junkies, and anyone who wants to
know the news and analysis behind the soundbites and headlines.
Recommended by Noam Chomsky; targeted by the CIA.
Official Publication of the Association of Old Crows (you have to register!) March 96 Issue on SIGINT/ELINT. From ther questionaire:
My organization is best described as: (Enter a number in box or fill in "Other" box) 1. Military / Government 2. Military Systems Supplier 3. Military Subsystems Supplier 4. Component / Device Supplier 5. Support / Instrumentation Equipment Supplier 6. Computer / EDP / Peripheral Supplier 7. Engineering Services / Software
Phrack Magazine is one of the longest running electronic magazines in existence. Since 1985, Phrack has been providing the hacker community with information on operating systems, networking technologies, and telephony, as well as relaying other topics of interest to the international computer underground.
Opening communications through dialogue and free media to people living in a state of WAR. US Domestic Covert Operations
FAS Intelligence Reform Project
Federation of American Scientists: Information Warfare and
Information Security on the Web, Intelligence Documents
This metapage is a comprehensive guide to information warfare resources on the Web, as well as a directory of points of entry to related resources. It is updated every month or so.
Military and Political Intelligence and CounterIntelligence (Page 1)
Extensive reference!! Spying The Oldest Profession, Cyber War, Poor Men's Nuclear War -Biochemical Attacks
Commercial and Personal Intelligence and CounterIntelligence (Page 2)
Commercial Intelligence Industrial Espionage, Security Resources
The Counter-Terrorism Page
The Counter-Terrorism Page is an attempt to provide a single resource for people interested in the areas of Terrorism, Counter-Terrorism and International Crime.
Law Enforcement Sites Part 1 of 2
Law Enforcement Sites Part 2 of 2
Open Source Solutions, Inc.
Intelligence: Information gathering and analysis
Institute for the Advanced Study of Information Warfare
The purpose of the IASIW ( a virtual nongovernmental organization) is to facilitate an understanding of information warfare with reference to both military and civilian life. Information warfare is the offensive and defensive use of information and information systems to exploit, corrupt, or destroy, an adversary's information and information systems, while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.
English Server Cyber: Technology and Culture
Al Gore on Global Information Poster:Culture and Computer Mediation, Cyberdemocracy: Internet and the Public Sphere, Thinking Robots and an Aware Internet,
As We May Think by Vannevar Bush
Bush, the US Defense Department's most revered engineer, ran the Office of Scientific Research and Development during World War II, the world's first organized and coherent military-industrial complex. He founded the National Science Foundation and provided not only its intellectual underpinnings but also its political rationale. First described by Vannevar Bush in his seminal article "As We May Think," the Memex is the protoypical hypermedia machine. Memex had all the features now associated with the multimedia computer workstation including: hyperlinked text and images, networking capabilities, display terminal, keyboard for inputing text, and data storage.
50 Greatest Conspiracies of All Time Archive
With Big Brother's Checklist and other niceties "Eye of Big Bro'" created by Nick Cassway Editor's Note: If you've ever felt like THEY were watching you, here's your chance to prove it. Help Big Brother expand his list until it becomes absolutely all-consuming, not unlike Big Brother himself.
C4I Professionals Mailing List
Hypermailarchive. The C4I-Pro mailing list (and associated digest) was created for use by anyone interested or involved in the area of Command, Control, Communications, Computers and Intelligence (C4I). Its purpose is to serve as a forum for (unclassified/non-sensitive) interaction and discussion on areas of interest to members of the C4I professional community. This community includes military and government civilian members (both in operational, acquisition and policy positions), C4I contractors and members of the academic community worldwide.
CTHEORY is an international, electronic review of books on theory, technology and culture. Sponsored by the Canadian Journal of Political and Social Theory, reviews are posted periodically of key books in contemporary discourse as well as theorisations of major "event-scenes" in the mediascape.
Outrageous & Banned Books
Books and Videos on Guns, Bombs, Military Science, Survival & Much More:
Life After Doomsday How To Open A Swiss Bank Account Homemade Submachine Gun Plans Electronic Eavesdropping Plans How to Build A Beer Can Mortar Criminal Use of False ID Mantrapping Surviving Doomsday CIA Explosives for Sabotage Covert Surveillance & Elec. Penetration CIA Get Out of Jail Free Card Mac 10/11 Submachine Gun Manual Poor Man's James Bond Vol 1 Terrorist Explosives Handbook Urban Survival Arsenal Submachine Gun Designer's Handbook Special Forces Operational Techniques CIA Improvised Sabotage Devices Guerilla Warfare & Sp. Forces Ops. How To Open Handcuffs Without Keys Psycological Ops. Bugs & Electronic Surveillance How to Find Anyone Anywhere How to Disappear and Never be Found Intelligence & Electronic Warfare Operations Tune-in-on Telephone Calls Clandestine Weapons Selective Assassination "Homemade Semtex C-4's, Ugly Sister Homemade Grenade Launchers 21 Techniques of Silent Killing
U.S. Army Civil Affairs and Psychological Operations Command (Airborne)
Psychological Operations are a vital part of the broad range of U.S. political, military, economic and ideological activities used by the U.S. government to secure national objectives. PSYOP is the dissemination of information to foreign audiences in support of U.S. policy and national objectives.
Sun Tzu: The Art of War
The Art of War , compiled well over two thousand years ago by a mysterious Chinese warrior-philospher, is still perhaps the most prestigious and influential book of strategy in the world today, as eagerly studied in Asia by modern politicians and executives as it has been by military leaders and strategists for the last two millenia and more.
NameBase Public Information Research
Infowar and Disinformation: From the Pentagon to the Net, The "Information Superhighway" and its Discontents, Cyberspace Wars: Microprocessing vs. Big Brother, Big Brother Covets the Internet
General Conspiracy Resources. "Whatever your personal bias or beliefs this page of links should serve as a starting point to explore the abundance of conspiracy
theories which are currently being propagated over the net."
Beware: Terrible things happen to those who know too much!
At the Activist Resource Center, Muslims can network to improve the exchange of knowledge, so that our real-world struggles for social justice and peace may bear fruit. The ultimate goal of every Muslim is Islam, the state of peace, of submission in the certainty and power of Allah.
The War On Drugs is a Scam
Each year the United States Government spends in excess of $16 billion waging a War on Drugs. Despite these astronomical expenditures, drug use in America is more common now than ever before, drugs of all kinds are more readily obtainable throughout all classes of American society, drug prices are generally cheaper than they were 20 years ago, and violence related to the illicit drug trade is on the rise.
The WELL Gopher: The Military
its People, Policies, and Practices. Cyberwar & Netwar: Warfare between Networks
Defense Advanced Research Projects Agency
The Defense Advanced Research Projects Agency (DARPA) is the central research and development organization for the Department of Defense (DoD). It manages and directs selected basic and applied research and development projects for DoD, and pursues research and technology where risk and payoff are both very high and where success may provide dramatic advances for traditional military roles and missions and dual-use applications.
National Security Agency
The National Security Agency/Central Security Service is responsible for the centralized coordination, direction, and performance of highly specialized
technical functions in support of U.S. Government activities to protect U.S. communications and produce foreign intelligence information.
Visit the National Cryptologic Museum Online!
Confidential Security Guidelines This handbook is designed to introduce you to some of the basic security principles and procedures with which all NSA employees must comply.
Articles: Retaining the Edge on Current and Future Battlefields, Status Report on Major C4I Issues; remarks by Emmett Paige, Jr. (ASD(C3I)) to the Catoctin Chapter of the Armed Forces Communications-Electronics Association.
The Central Imagery Office
The mission of CIO is to ensure responsive imagery support to the Intelligence Community, the Department of Defense, the National Security Council, and other US Government departments and agencies. As a Combat Support Agency, CIO is also responsible for ensuring timely imagery support to military operations during peace, crisis, and war.
Department of Operations Research
The mission of the OR Department is to provide operations research and general analysis support to DOD.
Delta Company 344th Military Intelligence Battalion
"In God We Trust, All Others We Monitor and Photograph..."