Information Warfare: February 25, 2003


A major military use of the Internet is for collecting intelligence on current, or potential, enemies. To do this, the Department of Defense has developed some powerful snooping tools. There are search tools that will quickly look at files no matter what their format (plain text, various word processor format, spreadsheet, Power Point, graphic, music and video) and look for specific bits of information. While this sort of tool can be used for Internet searches, it can also be used if military hackers break into a server belonging to another nation. This is an electronic version of the old "black bag jobs" (breaking and entering followed by searching through file cabinets.) Like the old fashioned break ins, you have to be careful not to get caught.




Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close