Information Warfare Essay, Research Paper
As we entered the third wave, we traded in our pens and notebooks, for keyboards and CPU s. A simple wire connected from a phoneline to a modem to your CPU, brings the whole world into your hands. And you into the worlds hand as well. Political realism is defined as doing what is necessary for survival. One must depend on themselves, because no one else will look out for them. Information Warfare has become a massly used tactic by individuals as well as companies looking out for their own survival, in a world of commerce, and politics.
Information Warfare is an innovative and dangerous new way to harm your opponents. When one thinks of warfare the mind is usually bombarded by thoughts of M16 s, grenades, and hand to hand combat. In this new era of technology that we are living in warfare has come to mean so much more. Information warfare is the use of any type of information used to injure your opponent s progress and further your own. The power of Information Warfare spans a broad scope of uses, from the gathering information about companies, to personal blackmail. It s used not only by individuals against other persons, but companies and even the nation as well. As the third wave, defined by Tofflers, becomes more widely spread across the nation and world we can only expect a far larger usage of such technological tactics, being used in the home, workplace, and even international politics. Schwartau s definition of Information Warfare is, the use of information, and information systems as both weapons and targets in a conflict, (Schwartau 12). We are now living in a time when knowledge is power, and what is knowledge made up of? Quite simply, information.
Information Warfare is not only becoming more rampantly used among people, but they are using different types as well. There are three different classifications of Information Warfare. The first one deals with personal information warfare. This is inclusive with all the information that is available about an individual. Class two deals with corporate information warfare, which involves how information effects companies, businesses, and all economic interests. Of all the classes the third one has the broadest margin. The third class is global information warfare. This purpose of this class is to deal with all aspects of information warfare that deal with the national interest.
Each classification of Information Warfare has its own issues that are relevant to its use. Class one is predominantly involved with personal privacy and protection from outsiders. With the introduction of the Internet into our lives, electronic privacy as we know it has come to a halt. Almost all our information is stored on some sort of computer, whether it be at DMV, our Insurance company, state and federal government, video rentals, and even the EZ-Pass. While in the reality everything may indeed be objective, things in cyberspace are subjective.
Type two is more on a corporate level bringing individuals together in mass and attacking their businesses. Businesses today are making more money than ever, producing more and more products. With this comes the increased danger in releasing information regarding the companies assets and progress.
The final type, three, is the biggest and most detrimental to the people as a whole. One of the most fundamental weapons of a nation is information. These days we have more federal agencies than ever solely dedicated towards protecting and gaining information. Just to name a few: the CIA, DOJ, IA, and Pentagon. One of the hardest parts of protecting information, is the concept of how to hold on to an intangible object. In order to effectively execute a sufficient plan of attack in both economic and political situations, information has become the most valuable key to a nation.
Part II
The first amendment of the United States Constitution explicitly states that the American people are entitled to free speech. The people s thoughts and writings should be free from censorship, and they have the right to say and feel what they want. The safety of the people relies on their undeniable freedoms, listed in the amendments. By taking one of these away, or by redefining their meaning to constrict the people s liberty, we are only lessening the value of our great nation.
When the Internet was introduced into our lives, free speech in a verbal perspective, became free speech in a typed perspective. It brought a new meaning to the concept of expressing your self freely, as cyberspace opened a whole New World. Cyberspace allowed for a person in China to converse with a person in New Mexico. Such programs as America Online and Prodigy connect people on an even larger scale. With chatrooms and WebPages people can now express their views more clearly on the Internet than ever before. But are these new freedoms without flaw? Or is it possible that by providing the people with a more extensive way to show how they feel are they really imposing their views on others.
It also opens the door to the sick and perverted, who can take away the innocence of our children. Child pornography and scheduled meetings between a sick pedophile and a seven-year child have become all too common.
There are a variety of ways to look at the newfound freedom that the Internet provides. One is a positive outlook, which points to the fact that by having cyberspace in our lives; it opens the door to so much more. But one the other side of the spectrum is that of the pedophile.
Many different policies can be issued to help control the use of free speech on the Internet. In early November a new bill was introduced, S. 1482, which constricts commercial online distributors of material deemed harmful to minors. Violators of this new statute could spend up to six months in jail and have to pay a $50,000 dollar fine. Any company making material available for the public to be seen on the Internet, without requiring a credit card number could be found liable. The ACLU (American Civil Liberties Union), said that this new statute is restricting adults from being able to access constitutionally protected speech. Another problem is how do we define what is in fact harmful to minors? There has to be a set standard that we can follow in order to enact laws.
The school system can also keep the children in their school, from accessing undesirable cites on the world wide web. The Queensland school system has been connected to the Internet, providing the children with a whole new world of opportunities. The parents however are worried about the children being able to visit such cites that would have pornography, and/or other material unsuitable for youngsters. The school has installed a program so that if the kids were to access prohibited cites an automatic alarm would notify Education Queensland s network administrators. By taking control of the cites that the children can visit, the school system is helping to keep the children from visiting undesireable cites.
There are programs available to those parents who feel it is necessary to monitor their childs use of the Internet. Cybersitter can be purchased for around $39.95, and can help to regulate your web browser keeping your childs access to the world wide web restricted. There is even and option in which incoming and outgoing e-mails for inappropriate material.
While it is possible to intercept and not allow such things on the internet on the Internet such as pornography, or material containing racist or violent content, in order to really do so the entire net would have to be controlled. An important question that has to be asked is who will do the monitoring, and what will they base their criteria on.
Другие работы по теме:
Vietman War Essay Research Paper The Viet
Vietman War Essay, Research Paper The Viet Cong were experts at the use of several unconventional battle tactics, namely, Guerilla Warfare. This is how they won many of the battles in the Vietnam War. The Viet Cong, during ground battles used small arms, some of which they had made themselves. Another technique they used was psychological warfare.
Guerilla Warfare Essay Research Paper Guerrilla WarfareThe
Guerilla Warfare Essay, Research Paper Guerrilla Warfare The term guerrilla (Spanish, little war ) originated in the early 19th century during the Peninsular war when, after the defeat of Spain s regular forces, Spanish irregulars and civilians rose up against the French occupying forces. The practice of guerrilla warfare, however, dates from antiquity; for example, the Bible tells of the Israelite conquest of Canaan, led by Joshua, involving harassment and ambush of the enemy.
Sexual Abuse Essay Research Paper I have
Sexual Abuse Essay, Research Paper I have decided to do my paper on the repression of sexual abuse in adults. In my research though I came across a lot of things that I didn?t agree on.
The Computer Age Essay Research Paper Ben
The Computer Age Essay, Research Paper Ben Purdue 8/24/01 It is my prediction that the biggest issue we will face in the coming century not only as a nation but also as a planet is finding a blind between security of protected information and freedom of information. I say this because as a computer security consultant I understand the need for security of important information, however I as a programmer I understand such issues as the battle for open source code and freedom of information as a hole.
Vdg Essay Research Paper Raintree
Vdg Essay, Research Paper Raintree’s website is dedicated to providing information and education on the important plants of the Amazon Rainforest, therefore this section is the most extensive. The Plant Database section is continuously under construction as we continue to add more rainforest plants which are under research.
The Illiad Essay Research Paper The IliadThe
The Illiad Essay, Research Paper The Iliad The way Homer wrote this text is similar to warfare today, especially the feelings. There are some differences though. At the end of the passage, Homer wrote War is men s business; and this war is the business of everyone in Ilium, myself above all. That is stating that only men fight in wars.
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
The Cookie Controversy Essay Research Paper The
The Cookie Controversy Essay, Research Paper The Cookie Controversy Most of us know cookies as tasty treats that are baked in the oven but now there is a new kind of cookie and it is stirring up privacy issues with Internet users. A cookie is a text-only file that gets entered into the memory of a web browser. Various web sights use cookies to help with on-line sales and services, tracking popular links, and demographics.
Space Report Essay Research Paper Space and
Space Report Essay, Research Paper Space and the technology to study space have improved rapidly over the years. Space travel also is a big deal in the way we get our sources for galaxies and nebulas. The Hubble Space Telescope has been the best way to get our information for everything from millions of light years away from Earth.
The Internet Vs The Library Essay Research
Paper The Internet vs. the Library Overall, when one compares the Internet vs. the Library, the Library is superior. This is because, though it takes a bit longer to use, the Library has a standard information research tool; the Dewey decimal system. This organized system makes finding books simple, and with the added assistance of a librarian, finding information can be easy.
Chemical Warfare Essay Research Paper Chemical warfare
Chemical Warfare Essay, Research Paper Chemical warfare is war fought with chemicals. The development of chemical weapons and defenses against these weapons are usually considered together in military training. These weapons can be designed to kill large numbers of people, disable them for a while, or destroy their food supplies.
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Computers Essay Research Paper Why We StartedInternet
Computers! Essay, Research Paper Why We Started Internet Mental Health is a free encyclopedia of mental health information. It was designed by a Canadian psychiatrist, Dr. Phillip Long, and programmed by his colleague, Brian Chow.
Crypt Essay Research Paper Cryptography Cryptography is
Crypt Essay, Research Paper Cryptography Cryptography is way you can keep information secure. A person who does not know the method used to change the information to keep it secure cannot copy the method used or reverse the change. The basic components of cryptographic systems are used to encipher (scramble) information so that it is difficult to determine the meaning without the appropriate key or key(s) to decipher (unscramble) the information.
Technological Advances In World War 2 Essay
, Research Paper New advances in technology changed warfare in WW2. The change in technology since WW1 has produced such things as Atom Bomb, and new and improved sea and air warfare. New techniques had to be used because of technology, techniques such as ?mouseholing?. More people were killed because of technology, as more people died in WW2 than WW1.The technological advances in WW2 changed the battlefield completely as more deadly auxiliary was introduced.
Microwaves Essay Research Paper WARNING
Microwaves Essay, Research Paper WARNING ! ! ! ****** BE CAREFUL Microwaving Water To Heat it Up!!! ****** Please be aware of the following information if you or someone you know, is a person that uses a microwave oven to heat water.
Functions Of Memory Essay Research Paper THE
Functions Of Memory Essay, Research Paper THE FUNCTIONS OF MEMORY Memory is the ability to remember past events, images, ideas, or previously learned information or skills. Memory is also the storage system that allows a person to retain and retrieve previously learned information.
Geographical Information System Essay Research Paper GIS
Geographical Information System Essay, Research Paper GIS Geographical Information System originated in the 1960s. During the early days of the technology the use was limited to a small group of practicioners. It is a information technology which analizes, stores, and displays both spatial and non-spatial data.
Human Papillomavirus Virus Essay Research Paper Human
Human Papillomavirus Virus Essay, Research Paper Human Papillomavirus, or HPV, is probably one of the most common STDs. HPV is the virus that causes both genital warts and/or cervical dysplasia (this means an abnormal pap smear). If you’ve just been diagnosed with HPV and are desperately seeking information, or if your boyfriend or girlfriend or best friend just got told they have it, then this is the site for you.
New Employee Essay Research Paper Dear New
New Employee Essay, Research Paper Dear New Employee, Welcome to your new job! The position you have decided to undertake is one, which welcomes great variety on a day-to-day basis. The following information is meant to help you as you learn more about Best Buy and the things that make it run.
Myths Essay Research Paper Is Information Technology
Myths Essay, Research Paper Is Information Technology a good thing? With the invention of the silicon chip, fiber optic cable and satellite communications the information superhighway is real. This global network of computers makes it possible to move massive amounts of information virtually anyplace.
Computer Privacy Essay Research Paper Computer PrivacyIn
Computer Privacy Essay, Research Paper Computer Privacy In the information technology world today there is a problem that can ruin a company. Bad publicity and finger pointing usually precede the problem. After this the federal government steps in and regulates things. The problem I am referring to is computer privacy.
Odysseus The Great Essay Research Paper Odysseus
Odysseus The Great Essay, Research Paper Odysseus the Great Of all the mythological heroes, Odysseus would have to be the greatest. His adventures strengthened him and made him wiser. Although his men assisted him in his warfare, Odysseus was always at the heart of the battle. Odysseus was a true epic hero.
Thomas Edison Essay Research Paper BibliographyThomas A
Thomas Edison Essay, Research Paper Bibliography Thomas A. Edison and his Kinetographic Motion Pictures. Rutgers University Press. 1995. This book gave me a lot of the information I needed on the basic history of Thomas Edison?s work in the motion picture industry. There were also pictures
Information Technology Essay Research Paper Information TechnologyThe
Information Technology Essay, Research Paper Information Technology The purpose of my article is to study the impact of information technology and artificial intelligence on the organization, privacy and control, research and instructional practices and ethics. Evolution of information technology has affected all these practices, and has helped them in improving their performance in some way.
The Randle Report Essay Research Paper The
The Randle Report Essay, Research Paper The Randle Report, by Kevin D. Randle explores UFO research in the1990’s. In reading his book I have gained much knowledge of how to determine whether
How To Writing A Research Essay Essay
, Research Paper How To Writing A Research Essay The toughest part of the essay, for me, was taking all the information I had gained and reduce it to a mere few pages essay. After all, quality is better
Cover Letter Essay Research Paper February 14
Cover Letter Essay, Research Paper February 14, 2001 XXX Inc PO Box 827 Angola, IN-46703 Dear Ms XXX: I am applying for the summer internship in information systems, which we discussed during the Career Exposition at Tri-State University in Fort Wayne on (02/12/01). My bachelor’s degree in Information Systems and academic record are my strongest qualifications for this position.
Aids In Africa Essay Research Paper Dear
Aids In Africa Essay, Research Paper Dear, Dr. Feedlebom of ?Conspiracies and Cover ups? magazine. I would like to share with you some information concerning the Aids epidemic in Africa. HIV, which causes