Information Warfare: February 25, 2003


A major military use of the Internet is for collecting intelligence on current, or potential, enemies. To do this, the Department of Defense has developed some powerful snooping tools. There are search tools that will quickly look at files no matter what their format (plain text, various word processor format, spreadsheet, Power Point, graphic, music and video) and look for specific bits of information. While this sort of tool can be used for Internet searches, it can also be used if military hackers break into a server belonging to another nation. This is an electronic version of the old "black bag jobs" (breaking and entering followed by searching through file cabinets.) Like the old fashioned break ins, you have to be careful not to get caught.


Article Archive

Information Warfare: Current 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 



Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close