Author: John Greenewald

Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one’s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare. Declassified Documents Relevant Documents Information Warfare Technologies: Survey of Selected Civil Sector Activities, February 1996 [164  Pages, 5.51mb] – This document has been prepared to set forth the results of a technology…

Read More

A National Security Letter (NSL) is a form of administrative subpoena used by the United States Federal Bureau of Investigation and reportedly by other U.S. Government Agencies including the Central Intelligence Agency and the Department of Defense. It is a demand letter issued to a particular entity or organization to turn over various record and data pertaining to individuals. They require no probable cause or judicial oversight. They also contain a gag order, preventing the recipient of the letter from disclosing that the letter was ever issued. Declassified Documents Federal Bureau of Investigation (FBI) / Office of the Inspector General…

Read More

Under Operation Ghost Dancer the US Army National Guard operates airborne drug interdiction program Reconnaissance and Interdiction Detachments (RAID). The RAID units use the surveillance capabilities of the National Guard’s OH-58 Kiowa helicopters, outfitted with thermal imaging systems, to support local law enforcement agencies in states where drug trafficking is highest. The Guard assists with airborne evidence gathering activities, such as locating and identifying probable marijuana growing operations. Actual law enforcement is handled by local agencies. In one such operation, on 15 December 1992 members of the Oregon National Guard (ORNG) Counterdrug Support Program assisted the DEA, BATF, US marshals,…

Read More

The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States. The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec’s Security Technology…

Read More

The following documents pertain to Strategic Gaming, the war game scenarios carried out by the military to further enhance their defense and offensive strategies.  Unintended Consequences of Strategic Gaming, 02 May 1977 [ 50 Pages, 7.8MB ] – Strategic planning is an essential element of modern defense. It synthesizes the doctrine, politics, weapons and occasionally even the philosophy of the nation state. Because a country embodies its program for continued existence and the destruction of its opposition in it, strategic planning can directly affect many hundreds of millions of people.

Read More