High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

Date: April 14, 2006
Creator: Wilson, Clay
Description: This report discusses the assessment of the Electromagnetic Pulse (EMP), which is an instantaneous, intense energy field that can overload or disrupt at a distance numerous electrical systems and high technology microcircuits.
Contributing Partner: UNT Libraries Government Documents Department
Information Operations and Cyberwar: Capabilities and Related Policy Issues

Information Operations and Cyberwar: Capabilities and Related Policy Issues

Date: September 14, 2006
Creator: Wilson, Clay
Description: This report describes the emerging areas of information operations in the context of U.S. national security. It assesses known U.S. capabilities and plans, and suggests related policy issues of potential interest to Congress.
Contributing Partner: UNT Libraries Government Documents Department
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Date: September 25, 2006
Creator: Wilson, Clay
Description: This report discusses Improvised Explosive Devices (IEDs, or roadside bombs) in Iraq and Afghanistan. IEDs have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. The threat includes vehicle-borne IEDs, in which extremists drive cars laden with explosives directly into a target. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Defense Program Issue: Global Information Grid, Bandwidth Expansion (GIG-BE)

Defense Program Issue: Global Information Grid, Bandwidth Expansion (GIG-BE)

Date: March 11, 2005
Creator: Wilson, Clay
Description: This report discusses the Global Information Grid (GIG), which is the enabling infrastructure for Network Centric Warfare (NCW), a concept that relies on communications technology to link together U.S. military personnel, ground vehicles, aircraft, and naval vessels through integrated wide and local area networks to provide improved battle space awareness for joint military forces
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Description: This report examines possible terrorists' objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime.
Contributing Partner: UNT Libraries Government Documents Department
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Date: September 25, 2006
Creator: Wilson, Clay
Description: Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. Department of Defense (DOD) efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Information Operations and Cyberwar: Capabilities and Related Policy Issues

Information Operations and Cyberwar: Capabilities and Related Policy Issues

Date: September 14, 2006
Creator: Wilson, Clay
Description: This report describes the emerging areas of information operations in the context of U.S. national security. It assesses known U.S. capabilities and plans, and suggests related policy issues of potential interest to Congress.
Contributing Partner: UNT Libraries Government Documents Department
Information Warfare and Cyberwar: Capabilities and Related Policy Issues

Information Warfare and Cyberwar: Capabilities and Related Policy Issues

Date: July 19, 2004
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Network Centric Warfare: Background and Oversight Issues for Congress

Network Centric Warfare: Background and Oversight Issues for Congress

Date: March 18, 2005
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Network Centric Warfare: Background and Oversight Issues for Congress

Network Centric Warfare: Background and Oversight Issues for Congress

Date: June 2, 2004
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department
Improvised Explosive Devices in Iraq: Effects and Countermeasures

Improvised Explosive Devices in Iraq: Effects and Countermeasures

Date: November 23, 2005
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

Date: August 20, 2004
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: October 20, 2005
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department