48:
2300:
3938:
2275:, are capable of autonomous decisions. Despite piloting drones from remote locations, a proportion of drone pilots still suffer from stress factors of more traditional warfare. According to NPR, a study performed by the Pentagon in 2011 found that 29% of drone pilots are "burned out" and undergo high levels of stress. Furthermore, approximately 17% of the drone pilots surveyed as the study were labeled "clinically distressed" with some of those pilots also showing signs of
2256:(DDOS) attack, which is utilized to hinder networks or websites until they lose their primary functionality. As implied, cyberattacks do not just affect the military party being attacked, but rather the whole population of the victimized nation. Since more aspects of daily life are being integrated into networks in cyberspace, civilian populations can potentially be negatively affected during wartime. For example, if a nation chose to attack another nation's
5824:
4213:
3529:
watching these phones, whether or not they are using encrypted apps,' he said. The
Ukrainians then block Russian phones from their local networks at key moments, further jamming their communications. 'Then you suddenly see Russian soldiers grabbing cell phones off Ukrainians on the street, raiding repair shops for sims,' he said. 'This is not sophisticated stuff. It’s quite puzzling."
2210:
As the U.S. Air Force often risks aircraft and aircrews to attack strategic enemy communications targets, remotely disabling such targets using software and other means can provide a safer alternative. In addition, disabling such networks electronically (instead of explosively) also allows them to be
2528:
The mass-integration of ICT into our system of war makes it much harder to assess accountability for situations that may arise when using robotic and/or cyber attacks. For robotic weapons and automated systems, it's becoming increasingly hard to determine who is responsible for any particular event
2251:
that was being constructed via a collaborative effort between Syria and North Korea. Accompanied by the strike was a cyberattack on Syria's air defenses, which left them blind to the attack on the nuclear reactor and, ultimately allowed for the attack to occur (New York Times 2014). An example of a
2041:
that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a
3528:
European official: "instead of communicating solely through encrypted military-grade phones, Russian commanders are sometimes piggybacking on
Ukrainian cell phone networks to communicate, at times simply by using their Russian cell phones. 'The Ukrainians love it—there is so much data in simply
2444:
reported in 2024 that China and Russia were promoting Pro
Palestinian influencers in order to manipulate British public opinion in favour of Russian and Chinese interests. NBC reported that Russia was using different tools to cause division within the US, by delegitimizing US police operations
2524:
Information communication technologies (ICT) are so immersed in the modern world that a very wide range of technologies are at risk of a cyberattack. Specifically, civilian technologies can be targeted for cyberattacks and attacks can even potentially be launched through civilian computers or
2430:
Research suggests that Russia and the West are also engaged in an information war. For instance, Russia believes that the West is undermining its leader through the encouragement of overthrowing authoritarian regimes and liberal values. In response, Russia promotes the anti-liberal sentiments,
2393:
To build support before it invaded
Ukraine, Russia perpetuated a narrative that claimed the Ukrainian government was committing violence against its own Russian speaking population. By publishing large amounts of disinformation on the internet, the alternate narrative was picked up in search
2507:
While information warfare has yielded many advances in the types of attack that a government can make, it has also raised concerns about the moral and legal ambiguities surrounding this particularly new form of war. Traditionally, wars have been analyzed by moral scholars according to
2282:
Modern ICTs have also brought advancements to communications management among military forces. Communication is a vital aspect of war for any involved party and, through the implementation of new ICTs such as data-enabled devices, military forces are now able to
2823:. This weakness was unearthed during the use of open communication ("Russian commanders are sometimes piggybacking on Ukrainian cell phone networks to communicate") when FSB was discussing the deaths of their generals: Vitaly Gerasimov, killed 7 Mar 2022;
3615:
2211:
quickly re-enabled after the enemy territory is occupied. Similarly, counter-information warfare units are employed to deny such capability to the enemy. The first application of these techniques was used against Iraqi communications networks in the
2389:
have taken advantage of deficiencies in
Russian communications by allowing them to piggyback on Ukrainian networks, connect, and communicate. Ukrainian forces then eavesdrop, and cut off Russian communications at a crucial part of the conversation.
2525:
websites. As such, it is harder to enforce control of civilian infrastructures than a physical space. Attempting to do so would also raise many ethical concerns about the right to privacy, making defending against such attacks even tougher.
3488:, successor agency to the KGB) officers discuss Gerasimov's death amid the destruction of 3G/4G cell towers in Ukraine, and the loss of Russian encrypted communications (Era), which compromised the FSB officer's sim-card-enabled phone call.
2549:. A key point of concern was the targeting of civilian institutions for cyberattacks, to which the general promised to try to maintain a mindset similar to that of traditional war, in which they will seek to limit the impact on civilians.
2246:
over the attacked party, which includes disrupting or denying the victimized party's ability to gather and distribute information. A real-world occurrence that illustrated the dangerous potential of cyberattacks transpired in 2007, when
2445:
against Pro
Palestinian protests and by pivoting public conversation from the Russian invasion in Ukraine to the Israeli-Palestinian conflict. Russian media activity increased by 400% in the weeks after Hamas’ Oct. 7 attack on Israel.
3406:
2242:, which denotes integrated Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance. Furthermore, cyberspace attacks initiated by one nation against another nation have an underlying goal of gaining
2206:
has had
Information Warfare Squadrons since the 1980s. In fact, the official mission of the U.S. Air Force is now "To fly, fight and win... in air, space and cyberspace", with the latter referring to its information warfare role.
3873:
2516:
The risk for the party or nation initiating the cyberattack is substantially lower than the risk for a party or nation initiating a traditional attack. This makes it easier for governments, as well as potential terrorist or
2271:) into the battlefield to carry out duties such as patrolling borders and attacking ground targets. Humans from remote locations pilot many of the unmanned drones, however, some of the more advanced robots, such as the
2512:. However, with Information Warfare, Just War Theory fails because the theory is based on the traditional conception of war. Information Warfare has three main issues surrounding it compared to traditional warfare:
3521:
2230:), part of which came from a Russian mainframe. This could not be confirmed as a Russian cyber attack due to non-attribution – the principle that online identity may not serve as proof of real-world identity.
3686:
3607:
3501:
3561:
2069:
the enemy and the public, undermining the quality of the opposing force's information, and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to
3393:
4235:
3863:
3813:
3724:
3002:
3586:
3656:
2226:
computers and tried to sell it to the Iraqis, who thought it was a hoax and turned it down. In
January 1999, U.S. Air Intelligence computers were hit by a coordinated attack (
3518:
3447:
3542:
3254:
3028:
3678:
6708:
3746:
2243:
6921:
2529:
that happens. This issue is exacerbated in the case of cyberattacks, as sometimes it is virtually impossible to trace who initiated the attack in the first place.
2407:
6472:
4280:
3980:
2718:
2469:
vaccine, including using fake social media accounts to spread the disinformation that the
Sinovac vaccine contained pork-derived ingredients and was therefore
2380:
2331:
2325:
3477:
3498:
2342:(CCP). Laid out in the Chinese Defence White Paper of 2008, informatized warfare includes the utilization of information-based weapons and forces, including
3558:
6718:
4603:
3401:
2545:, noted that there was a "mismatch between our technical capabilities to conduct operations and the governing laws and policies" when writing to the
6957:
4405:
Information
Warfare: Terrorism, Crime, and National Security @ Department of Computer Science, Georgetown University (1997–2002) (Dorothy Denning).
3329:
2267:
Moreover, physical ICTs have also been implemented into the latest revolution in military affairs by deploying new, more autonomous robots (i.e. –
3367:
4587:
4354:
3608:"Rosyjska ingerencja w amerykańskie wybory prezydenckie w latach 2016 i 2020 jako próba realizacji rewolucyjnego scenariusza walki informacyjnej"
2819:
may be a factor in the lack of Russian PGM availability, and the use of 3G/4G cell towers for Russian encrypted communications (Era) during the
5718:
4667:, Presentation (PDF slides) to the Bantle - Institute for National Security and Counterterrorism (INSCT) Symposium, Syracuse University (2006).
2431:
including racism, antisemitism, homophobia, and misogyny. Russia has sought to promote the idea that the American democratic state is failing.
3638:"Wybory prezydenckie jako narzędzie destabilizacji państw w teorii i praktyce rosyjskich operacji informacyjno-psychologicznych w XX i XXI w."
3163:
4428:
6851:
6515:
6308:
4704:
3795:
3716:
4383:
4166:
6947:
6498:
6465:
2995:
3578:
2098:
which, although making use of technology, focuses on the more human-related aspects of information use, including (amongst many others)
3637:
2046:
6962:
6914:
6555:
6262:
3959:
4642:
4636:
4570:
4118:
Anthony H. Cordesman, Cyber-threats, Information Warfare, and Critical Infrastructure Protection: DEFENDING THE US HOMELAND (2002) (
6952:
4999:
2411:
2032:
971:
3107:
2376:
1398:
3432:
3394:"Capabilities of the Chinese People's Liberation Army to Carry Out Military Action in the Event of a Regional Military Conflict"
6743:
6713:
6458:
3539:
2865:
2780:
2093:
3073:
6896:
6239:
4550:
3246:
3048:
4411:
Information Conflict (Honours) @ School of Computer Science and Software Engineering, Monash University (2006) (Carlo Kopp).
4402:
3128:
2903:
2198:
The organized use of social media and other online content-generation platforms can be used to influence public perceptions.
6545:
3777:
6270:
2790:
2260:
servers in a specific area to disrupt communications, civilians and businesses in that area would also have to deal with
1754:
47:
4556:
Taddeo, Mariarosaria (2012). Information Warfare: A Philosophical Perspective. Philosophy and Technology 25 (1):105-120.
6489:
5711:
4097:
2973:
2930:
1949:
1727:
342:
4448:
6202:
4469:
4261:
4062:
3362:
2785:
1403:
2118:
Information warfare has been described as "the use of information to achieve our national objectives." According to
6846:
6838:
6301:
5998:
5655:
4697:
4543:
Literature, Rhetoric and Values: Selected Proceedings of a Conference held at University of Waterloo, 3–5 June 2011
3923:
3474:
2820:
2480:
1481:
4304:
6967:
6856:
6252:
5648:
5436:
4538:
4373:
4322:
4179:
2546:
2458:
2418:. According to NBC, Russia is conducting disinformation campaigns in the 2024 US elections against US president,
1826:
1464:
1251:
96:
6787:
6612:
6527:
4198:
4153:
4138:
4123:
4112:
4082:
4047:
4032:
4004:
3223:
2775:
2276:
1590:
4664:
4659:
Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism
4566:
6481:
6065:
5704:
2747:
2343:
2253:
2007:
1454:
4289:
3842:
2846:
Glenn. Jerome C. Global Challenge 10, State of the Future 19.1, The Millennium Project, Washington, DC 2018
2659:
2122:, "Information war is an operation conducted in order to gain an information advantage over the opponent."
1944:
648:
408:
2495:. The campaign ran from 2020 to mid-2021. The primary contractor for the U.S. military on the project was
2355:
6904:
6294:
6257:
6178:
5978:
5459:
4690:
2584:
2335:
2312:
2089:
1954:
1141:
943:
814:
352:
3864:"Pentagon Stands by Secret Anti-Vaccination Disinformation Campaign in Philippines After Reuters Report"
6353:
6234:
6192:
5848:
4595:
3354:
2733:
2614:
2145:
2077:
2066:
1418:
4455:, Cyberspace and Information Operations Study Center, Air War College, Air University, U.S. Air Force.
4351:
6095:
5813:
5416:
4777:
4611:
4574:
2689:
2347:
2284:
2178:, either with electronic intervention, by leaking sensitive information or by placing disinformation.
1528:
1036:
385:
259:
113:
4490:
3937:
3153:
2042:
result, it is not clear when information warfare begins, ends, and how strong or destructive it is.
6819:
6550:
6080:
5958:
5853:
4955:
4950:
4392:
Nature's Exploitation of Information to Win Survival Contests, Monash University, Computer Science.
4331:
4243:
4239:
4223:
3485:
2926:"How China's Cognitive Warfare Works: A Frontline Perspective of Taiwan's Anti-Disinformation Wars"
2188:
2062:
1979:
1846:
1393:
1086:
904:
752:
3475:(7 March 2022) Russian Officer Complains About Dead General and Comms Meltdown in Intercepted Call
6972:
6871:
6861:
6809:
6540:
6168:
6120:
5783:
5680:
5617:
5328:
5265:
5207:
5149:
5139:
4852:
4837:
4414:
2704:
2664:
2579:
2569:
2386:
2339:
2308:
2223:
2203:
2099:
1932:
1914:
1670:
1229:
1151:
1096:
694:
357:
4352:
Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare
6886:
6824:
6804:
6753:
6510:
5333:
5029:
4545:, editors Shelley Hulan, Murray McArthur and Randy Allen Harris, Cambridge Scholars Publishing
3347:
2723:
2669:
2634:
2604:
2599:
2272:
2165:
1799:
1774:
1496:
1408:
1281:
1156:
757:
734:
180:
79:
3983:, "Future Mind" Chapter 9. Defense p. 195-201. Acropolis Books LTD, Washington, DC (1989)
6942:
6773:
6365:
6209:
5943:
5600:
5552:
5532:
5451:
5441:
5225:
5109:
4305:
Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
4231:
2684:
2639:
2629:
2619:
2533:
Recently, legal concerns have arisen centered on these issues, specifically the issue of the
2518:
2070:
2050:
1388:
1321:
1274:
928:
891:
854:
772:
724:
608:
418:
226:
135:
4461:
Cutting Through the Tangled Web: An Information-Theoretic Perspective on Information Warfare
4389:
3997:
Information Warfare: Cyberterrorism: Protecting your personal security in the electronic age
3796:"Russia and China 'manipulating UK public opinion by promoting pro-Palestinian influencers'"
6876:
6814:
6700:
6656:
6641:
6590:
6535:
6331:
6229:
6141:
6090:
6035:
5903:
5876:
5858:
5756:
5727:
5567:
5358:
5308:
5044:
5039:
5009:
4872:
3951:
3385:
3277:
2624:
2363:
2304:
2238:
Within the realm of cyberspace, there are two primary weapons: network-centric warfare and
2152:
1779:
1681:
1538:
1533:
1351:
1316:
1051:
871:
729:
665:
519:
489:
86:
5823:
4380:
Information Warriors is web forum dedicated to the discussion of Navy Information Warfare.
4193:
3989:, "Information Warfare: Chaos on the Electronic Superhighway" Thunder's Mouth Press (1993)
3433:"Telling China's Story: The Chinese Communist Party's Campaign to Shape Global Narratives"
8:
6909:
6783:
6600:
6573:
6425:
6360:
6013:
5746:
5527:
5517:
5245:
5072:
5034:
4930:
4665:
Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas
3800:
3439:
2440:
2359:
2351:
2299:
2107:
1630:
1615:
1491:
1378:
1356:
1331:
1291:
1201:
1011:
916:
866:
633:
623:
380:
370:
140:
64:
6881:
6866:
6758:
6733:
6671:
6622:
6607:
6317:
6197:
6125:
6030:
5638:
5401:
5300:
5290:
5240:
5159:
4940:
4935:
4827:
4713:
4526:
4408:
3915:
3769:
3443:
3310:
3215:
3054:
2824:
2728:
2594:
2538:
2410:, has been described as information warfare. Russia has also begun to interfere in the
2081:
1964:
1819:
1739:
1660:
1605:
1580:
1501:
1447:
1413:
1344:
1261:
1171:
1076:
1021:
911:
876:
829:
704:
675:
628:
566:
541:
375:
189:
108:
3099:
6723:
6420:
6245:
6003:
5938:
5888:
5835:
5793:
5741:
5547:
5484:
5260:
5230:
5192:
5187:
5182:
5087:
5067:
4925:
4910:
4862:
4807:
4653:
4648:
4631:
4626:
4546:
4530:
4518:
4510:
4149:
4134:
4119:
4108:
4093:
4078:
4068:
4058:
4043:
4028:
4000:
3907:
3805:
3773:
3648:
3519:
The secret US mission to bolster Ukraine’s cyber defences ahead of Russia’s invasion
3058:
3044:
2949:
2674:
2644:
2248:
2219:
2158:
2103:
2000:
1909:
1856:
1759:
1749:
1744:
1714:
1697:
1692:
1665:
1610:
1311:
1301:
1296:
1286:
1206:
1196:
1191:
1166:
1136:
1026:
996:
991:
981:
976:
966:
881:
834:
804:
643:
436:
413:
347:
4658:
4011:
3314:
3219:
3190:"Mariarosaria Taddeo, Information Warfare: A Philosophical Perspective - PhilPapers"
3077:
3035:. HT '22. New York, NY, USA: Association for Computing Machinery. pp. 259–262.
2857:
1969:
6778:
6728:
6214:
6154:
5918:
5908:
5803:
5685:
5509:
5489:
5391:
5353:
5338:
5129:
5104:
4978:
4960:
4920:
4817:
4732:
4676:
Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet
4502:
3761:
3559:(3 Mar 2022) Ukraine forces say Chechen commander Magomed Tushayev killed near Kyiv
3300:
3292:
3205:
3197:
3036:
2939:
2885:
Glenn. Jerome. Chapter 9 Defense, Future Mind, Acropolis Books, Washington, DC 1989
2694:
2564:
2534:
2496:
2492:
2287:
faster than ever before. For example, some militaries are now employing the use of
2035:(ICT) in pursuit of a competitive advantage over an opponent. It is different from
1974:
1939:
1871:
1764:
1702:
1595:
1523:
1516:
1373:
1306:
1256:
1246:
1121:
1041:
1001:
986:
953:
938:
809:
794:
747:
655:
613:
556:
551:
509:
332:
309:
216:
145:
74:
57:
4506:
3765:
3499:'Idiots': Russian military phone calls hacked after own soldiers destroy 3G towers
3473:
Jamie Ross, who cites Christo Grozev of Bellingcat: (Tue, March 8, 2022, 5:32 AM)
2895:
6666:
6595:
6105:
6085:
5983:
5808:
5798:
5675:
5660:
5605:
5426:
5202:
5049:
5024:
4989:
4832:
4452:
4417:
from Cybercrime, Cyberterrorism and Digital Law Enforcement, New York Law School.
4377:
4358:
4326:
4293:
3679:"Russia's 2024 Election Influence Campaign Has Started, Microsoft Analysis Finds"
3565:
3546:
3525:
3505:
3481:
3132:
2559:
2509:
2462:
2193:
2080:' use of the term favors technology and hence tends to extend into the realms of
1784:
1769:
1687:
1643:
1585:
1241:
1236:
1126:
1116:
1031:
1006:
948:
789:
719:
709:
561:
546:
469:
441:
241:
221:
69:
2168:
can be disabled or spoofed, especially online social communities in modern days.
6763:
6583:
6440:
6390:
6372:
6336:
6275:
6173:
6023:
5973:
5948:
5913:
5893:
5773:
5761:
5557:
5421:
5406:
5368:
5348:
5285:
5124:
5099:
5004:
4887:
4867:
4822:
4800:
3992:
3986:
3517:
MEHUL SRIVASTAVA, MADHUMITA MURGIA, AND HANNAH MURPHY, FT (3/9/2022, 8:33 AM)
2762:
2589:
2268:
2227:
2171:
2149:
2058:
1959:
1707:
1131:
1091:
1069:
1056:
1046:
1016:
933:
886:
689:
680:
571:
524:
504:
494:
464:
431:
319:
276:
231:
103:
36:
4522:
4459:
4346:
Information Warfare, Information Operations and Electronic Attack Capabilities
4040:
The Next World War: Computers are the Weapons and the Front line is Everywhere
3296:
3201:
3129:"Technology News, Analysis, Comments and Product Reviews for IT Professionals"
6936:
6681:
6661:
6646:
6185:
6146:
6115:
6110:
5963:
5953:
5923:
5665:
5622:
5431:
5411:
5250:
4994:
4842:
4747:
4670:
4514:
3911:
3809:
3652:
2953:
2521:, to make these attacks more frequently than they could with traditional war.
2141:
1806:
1794:
1650:
1570:
1486:
1469:
1326:
1181:
1161:
844:
839:
819:
799:
714:
685:
660:
536:
514:
499:
474:
314:
236:
199:
194:
91:
4146:
War and Media Operations: The US Military and the Press from Vietnam to Iraq
3040:
2969:
2944:
2925:
6768:
6686:
6676:
6617:
6414:
6219:
6075:
5778:
5670:
5590:
5585:
5469:
5313:
5255:
5235:
4742:
4445:
4437:
3868:
2699:
2574:
2542:
2261:
2249:
a strike from Israeli forces demolished an alleged nuclear reactor in Syria
2085:
2037:
1993:
1919:
1899:
1894:
1789:
1734:
1368:
1363:
1186:
1101:
849:
583:
484:
281:
185:
6450:
3843:"Pentagon Ran Secret Anti-Vax Campaign to Undermine China during Pandemic"
2358:). However, some media and analyst reports also uses the term to describe
16:
Battlespace use and management of information and communication technology
6578:
6159:
5993:
5968:
5933:
5768:
5562:
5522:
5373:
5280:
5275:
5144:
5134:
5119:
4945:
4915:
4897:
4762:
3747:"Discolored Revolutions: Information Warfare ins Russia's Grand Strategy"
2768:
2484:
2395:
2028:
1904:
1655:
1620:
1459:
1146:
1111:
824:
767:
670:
454:
175:
170:
3919:
3895:
2483:
directed against the U.S. The campaign primarily targeted people in the
6651:
6341:
6224:
6040:
5988:
5871:
5751:
5696:
5643:
5542:
5499:
5464:
5383:
5323:
5217:
5154:
4973:
4857:
4847:
4772:
4757:
4752:
4727:
4364:
3511:
3391:
2795:
2757:
2679:
2257:
2129:
2054:
1861:
1831:
1553:
922:
4319:
3717:"Russia is trying to exploit America's divisions over the war in Gaza"
3540:(8 Mar 2022) Ukraine claims Russian general has been killed in Kharkiv
6632:
6627:
6565:
6286:
6100:
6055:
6050:
5898:
5866:
5363:
5343:
5318:
5197:
5169:
5082:
5019:
4905:
4767:
4737:
4682:
4370:
4345:
4309:
4090:
The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture
3305:
3210:
3027:
Haq, Ehsan-Ul; Tyson, Gareth; Braud, Tristan; Hui, Pan (2022-06-28).
2772:, a documentary about the Pentagon's approach to news coverage of war
2654:
2609:
2419:
2415:
1851:
1675:
1625:
1575:
1565:
1560:
1425:
1216:
1211:
1176:
618:
304:
271:
160:
4314:
4133:
Joint Forces Staff College and the National Security Agency (2004) (
3033:
Proceedings of the 33rd ACM Conference on Hypertext and Social Media
2291:
to upload data and information gathered by drones in the same area.
6636:
6060:
6018:
5881:
5494:
5270:
5094:
5077:
5014:
4877:
4795:
4787:
4242:
external links, and converting useful links where appropriate into
3189:
2466:
2212:
2175:
2133:
1866:
1841:
1474:
1106:
1081:
699:
254:
128:
4674:
4620:
2092:, attack, and defense. Other militaries use the much broader term
6070:
6045:
6008:
5610:
5595:
5479:
5396:
5114:
4882:
4812:
4286:
3896:"Russian Information Warfare: Implications for Deterrence Theory"
3847:
3579:"The surprising performance of Kremlin propaganda on Google News"
3100:"Computer security experts: Dutch hackers stole Gulf War secrets"
2816:
2488:
2454:
2448:
2239:
1876:
1836:
1600:
1434:
1430:
777:
762:
638:
299:
294:
264:
203:
165:
4070:
Networks and Netwars: The Future of Terror, Crime, and Militancy
2264:, which could potentially lead to economic disruptions as well.
6400:
5928:
5843:
5537:
2476:
2288:
1383:
784:
601:
337:
4491:"The mythical 'Gerasimov Doctrine' and the language of threat"
4337:
The Electronic Warfare and Information Operations Association.
3508:
3G/4G Towers Needed For Russian encrypted communications (Era)
2338:(PLA) and other organizations affiliated or controlled by the
6395:
5577:
5177:
4367:, Global Information Society Project, World Policy Institute.
3029:"Weaponising Social Media for Information Divide and Warfare"
2471:
2434:
2334:
is the implementation of information warfare (IW) within the
2137:
859:
395:
390:
2406:
Russian interference in foreign elections, most notably the
2401:
2222:
allegedly stole information about U.S. troop movements from
5059:
4661:, Yale Information Society Project Conference Paper (2005).
4384:
Mastermind Corporation Information Warfare Tactics Analysis
4074:
4017:
2649:
2119:
155:
150:
2541:, who served as the head of Cyber Command under President
4299:
3158:
2752:
2182:
28:
4567:
An essay on Information Operations by Zachary P. Hubbard
2408:
Russian interference in the 2016 United States elections
6922:
Counterintelligence and counter-terrorism organizations
4334:
4131:
Information Operations: The Hard Reality of Soft Power,
3577:
Wirtschafter, Jessica Brandt and Valerie (2022-03-01).
3491:
3247:"Report: High Levels Of 'Burnout' In U.S. Drone Pilots"
2719:
Chinese information operations and information warfare
2381:
Disinformation in the 2022 Russian invasion of Ukraine
2326:
Chinese information operations and information warfare
4340:
3183:
3181:
2252:
more basic attack on a nation within cyberspace is a
4589:
Army, Air Force seek to go on offensive in cyber war
4415:
Information Warfare, Cyberterrorism, and Hacktivism
4281:
Hacktivism and Politically Motivated Computer Crime
3275:
3187:
4287:Cyberspace and Information Operations Study Center
3402:U.S.-China Economic and Security Review Commission
3278:"Information Warfare: A Philosophical Perspective"
3178:
4470:"I'm Sorry for Creating the 'Gerasimov Doctrine'"
4226:may not follow Knowledge's policies or guidelines
3330:"Syria War Stirs New U.S. Debate on Cyberattacks"
3074:"About the Air Force: Our Mission - airforce.com"
6934:
4679:, 16 National Strategy F. Rev. 14 (Summer 2007).
4654:Joint Doctrine for Public Affairs (JP 3-61 2005)
4320:Federation of American Scientists - IW Resources
3794:Turner, Camilla; Lisbona, Natalie (2024-05-18).
3026:
4621:United States Department of Defense IO Doctrine
3841:Bing, Chris; Schechtman, Joel (June 14, 2024).
3392:Dr. Eric C. Anderson; Mr. Jeffrey G. Engstrom.
3327:
2809:
4421:
4341:C4I.org - Computer Security & Intelligence
3840:
3154:"The Warnings? - Cyber War! - FRONTLINE - PBS"
2537:in the United States of America. Lt. General
2479:. The campaign was described as "payback" for
2449:United States COVID-19 disinformation campaign
2318:
2053:that one's information is valid, spreading of
6466:
6351:
6302:
5712:
4698:
4539:Black Logos: Rhetoric and Information Warfare
4315:Information Warfare, I-War, IW, C4I, Cyberwar
4055:Information Warfare Principles and Operations
3893:
3793:
2924:Hung, Tzu-Chieh; Hung, Tzu-Wei (2022-07-19).
2502:
2499:, which received $ 493 million for its role.
2001:
6370:
4597:NATO says urgent need to tackle cyber attack
3576:
2461:campaign to spread disinformation about the
6480:
4605:America prepares for 'cyber war' with China
6473:
6459:
6309:
6295:
5719:
5705:
4705:
4691:
3551:
3532:
2435:Russia, China and Pro Palestinian protests
2008:
1994:
6263:Security information and event management
4627:Information Operations Roadmap (DOD 2003)
4262:Learn how and when to remove this message
3999:, Thunder's Mouth Press, 2nd ed, (1996) (
3635:
3469:
3467:
3304:
3209:
2943:
2402:Russian interference in foreign elections
2185:and other surveillance robots or webcams.
2125:Information warfare can take many forms:
5726:
4488:
4467:
3894:Ajir, Media; Vailliant, Bethany (2018).
2961:
2923:
2298:
2033:information and communication technology
972:List of military strategies and concepts
6958:Propaganda techniques using information
6887:Scientific & Technical intelligence
4649:Joint Doctrine for PSYOP (JP 3-53 2003)
3861:
3430:
2377:Russian information war against Ukraine
6935:
6316:
4712:
4613:NATO, US gear up for cyberpunk warfare
3464:
2988:
2781:Information Operations (United States)
2370:
6454:
6290:
6240:Host-based intrusion detection system
5700:
4686:
4632:Information Operations (JP 3-13 2006)
3836:
3834:
3832:
3830:
3711:
3709:
3707:
3705:
3703:
3166:from the original on 19 February 2015
2976:from the original on November 5, 2018
6709:By alliances, nations and industries
4206:
4100:). Information/intelligence warfare.
4092:, Encounter Books, New York (2010) (
3744:
3641:Przegląd Bezpieczeństwa Wewnętrznego
3412:from the original on 18 October 2020
3008:from the original on January 2, 2021
2896:"Information Warfare: What and How?"
2045:Information warfare may involve the
6271:Runtime application self-protection
4167:Science at War: Information Warfare
3962:from the original on 19 April 2010.
3952:"Cyberwar Nominee Sees Gaps in Law"
3676:
2958:(DOI Free Access added 31 May 2024)
2855:
2791:State-sponsored Internet propaganda
2294:
13:
6948:Information operations and warfare
5822:
4608:, Telegraph.uk.co (June 15, 2007).
4501:(2). Informa UK Limited: 157–161.
4433:Aerospace Power Chronicles (1999).
4365:Program on Information and Warfare
4300:IWS - The Information Warfare Site
4067:John Arquilla and David Ronfeldt,
4010:John Arquilla and David Ronfeldt,
3862:Toropin, Konstantin (2024-06-14).
3827:
3700:
3355:"China's National Defense in 2008"
3226:from the original on 9 August 2020
2931:Journal of Global Security Studies
2233:
14:
6984:
6203:Security-focused operating system
4577:- working link added 31 May 2024)
4439:A Fundamental Paradigm of Infowar
4396:
4296:, Air University, U.S. Air Force.
4173:
3453:from the original on 20 July 2020
3373:from the original on 15 July 2021
3363:Federation of American Scientists
3257:from the original on 3 April 2018
2967:
2786:Pentagon military analyst program
2425:
6963:Psychological warfare techniques
5999:Insecure direct object reference
4581:
4560:
4427:Col Andrew Borden, USAF (Ret.),
4211:
4025:Information Warfare and Security
3936:
3236:(journal name added 31 May 2024)
2972:. Air University (U.S.). Press.
2821:2022 Russian invasion of Ukraine
2481:COVID-19 disinformation by China
2324:This section is an excerpt from
2218:Also during the Gulf War, Dutch
46:
6953:Propaganda in the United States
6857:Words of estimative probability
6719:Operational platforms by nation
6253:Information security management
5349:Party platforms (or manifestos)
4637:Operations Security (JP 3-13.3)
4616:, The Register (June 15, 2007).
4468:Galeotti, Mark (5 March 2018).
4105:Strategic Warfare in Cyberspace
3969:
3944:
3926:from the original on 2021-02-09
3887:
3876:from the original on 2024-06-14
3855:
3816:from the original on 2024-06-04
3787:
3738:
3727:from the original on 2024-06-13
3689:from the original on 2024-05-30
3670:
3659:from the original on 2022-04-28
3629:
3618:from the original on 2022-05-22
3600:
3589:from the original on 2022-05-24
3570:
3431:DiResta, Renée (20 July 2020).
3424:
3321:
3269:
3239:
3146:
3121:
3110:from the original on 2019-10-20
3092:
2906:from the original on 2019-09-09
2868:from the original on 2022-10-24
2547:Senate Armed Services Committee
4643:Military Deception (JP 3-13.4)
4592:, GovExec.com (June 13, 2007).
4390:Information Warfare in Biology
3538:Rob Picheta and Jack Guy, CNN
3328:DAVID E. SANGER (2014-02-24).
3066:
3020:
2917:
2888:
2879:
2849:
2840:
2776:Information Operations Roadmap
2412:2024 US presidential elections
2344:battlefield management systems
2277:post-traumatic stress disorder
2144:to disrupt communications, or
1:
4507:10.1080/21624887.2018.1441623
4169:, The History Channel (1998).
4042:, Simon and Schuster (1998) (
3766:10.1080/0163660X.2022.2057113
2834:
2748:Active Measures Working Group
2366:efforts of the Chinese state.
2348:precision-strike capabilities
2332:Informatized warfare of China
2254:distributed denial of service
5437:Rally 'round the flag effect
4495:Critical Studies on Security
4430:What is Information Warfare?
4274:
4199:Resources in other libraries
3276:Taddeo Mariarosaria (2012).
3188:Mariarosaria Taddeo (2012).
2660:List of cyber warfare forces
2491:for "China is the virus" in
2088:, information assurance and
7:
6905:Intelligence cycle security
6352:
6258:Information risk management
6179:Multi-factor authentication
5735:Related security categories
4446:Research & Theory Links
4422:Papers: research and theory
3900:Strategic Studies Quarterly
3285:Philosophy & Technology
3194:Philosophy & Technology
2585:Command and control warfare
2552:
2319:Chinese information warfare
2313:Russian invasion of Ukraine
2113:
2106:, and the human aspects of
2090:computer network operations
1465:Military–industrial complex
944:Operational manoeuvre group
10:
6989:
6235:Intrusion detection system
6193:Computer security software
5849:Advanced persistent threat
4600:, Reuters (June 14, 2007).
4537:Michael MacDonald (2012) "
3636:Wojnowski, Michał (2019).
2734:White Paper on El Salvador
2615:Fifth Dimension Operations
2503:Legal and ethical concerns
2457:, the United States ran a
2374:
2350:, and technology-assisted
2323:
2078:United States Armed Forces
6895:
6837:
6797:
6742:
6699:
6564:
6526:
6506:
6497:
6488:
6434:
6409:
6383:
6324:
6134:
5834:
5820:
5814:Digital rights management
5734:
5631:
5576:
5508:
5450:
5382:
5299:
5216:
5168:
5058:
4969:
4896:
4786:
4778:Manipulation (psychology)
4720:
4361:, The National Academies.
4194:Resources in your library
4027:, Addison-Wesley (1998) (
3614:(in Polish). 2021-07-03.
3297:10.1007/s13347-011-0040-9
3202:10.1007/s13347-011-0040-9
2690:Public affairs (military)
2453:According to a report by
2049:of tactical information,
1529:Loss-of-strength gradient
386:Combat information center
5959:Denial-of-service attack
5854:Arbitrary code execution
4956:Criticism of advertising
4458:Lachlan Brumley et al.,
4332:Association of Old Crows
4160:
3974:
3754:The Washington Quarterly
3486:Federal Security Service
2802:
2487:and used a social media
2336:People's Liberation Army
2189:Communication management
1847:Military science fiction
1332:Technology and equipment
753:List of military tactics
6872:Intelligence assessment
6862:All-source intelligence
6482:Intelligence management
6169:Computer access control
6121:Rogue security software
5784:Electromagnetic warfare
5618:Promotional merchandise
5329:Character assassination
5266:Narcotizing dysfunction
5140:Photograph manipulation
4853:Guerrilla communication
4489:Galeotti, Mark (2018).
4310:Twitter: InfowarMonitor
3497:Rob Waugh (8 Mar 2022)
3041:10.1145/3511095.3536372
2665:Network-centric warfare
2580:Communications security
2570:Character assassination
2387:Armed Forces of Ukraine
2340:Chinese Communist Party
2309:Armed Forces of Ukraine
2285:disseminate information
2244:information superiority
2224:U.S. Defense Department
2204:United States Air Force
2166:communications networks
2140:transmission(s) can be
2100:social network analysis
1915:Wartime sexual violence
1671:Full-spectrum dominance
1482:Supply-chain management
6968:21st-century conflicts
6556:Operational techniques
6511:Special reconnaissance
6371:
6215:Obfuscation (software)
5944:Browser Helper Objects
5828:
5601:Product demonstrations
5030:Historical negationism
4057:, Artech House, 1998,
2724:Cyberwarfare in Russia
2670:New generation warfare
2635:Information operations
2605:Historical negationism
2600:Historical revisionism
2519:criminal organizations
2315:
2273:Northrop Grumman X-47B
2095:information operations
2031:use and management of
1827:Awards and decorations
1800:Peace through strength
1775:Low-intensity conflict
1409:Conscientious objector
1282:Area of responsibility
6366:Psychological warfare
6210:Data-centric security
6091:Remote access trojans
5826:
5533:Reputation management
5452:Psychological warfare
5301:Political campaigning
5110:Firehose of falsehood
3564:11 April 2022 at the
3545:16 March 2022 at the
2996:"Information warfare"
2970:"Information warfare"
2945:10.1093/jogss/ogac016
2858:"Information Warfare"
2827:, killed 28 Feb 2022.
2685:Psychological warfare
2640:Internet manipulation
2630:Information assurance
2620:Gatekeeper (politics)
2302:
2071:psychological warfare
419:Torpedo data computer
409:Ship gun fire-control
6877:Medical intelligence
6847:Competing hypotheses
6657:Industrial espionage
6642:Denial and deception
6332:Denial and deception
6142:Application security
6036:Privilege escalation
5904:Cross-site scripting
5757:Cybersex trafficking
5728:Information security
5568:Corporate propaganda
4541:", pages 189–220 in
4371:Information Warriors
4348:Air Power Australia.
4335:http://www.crows.org
4232:improve this article
4148:, Routledge (2007) (
4107:, MIT Press (2001) (
4103:Gregory J. Rattray,
3981:Jerome Clayton Glenn
3480:8 April 2023 at the
3253:. 18 December 2011.
2625:Industrial espionage
2364:influence operations
2305:Russian web brigades
2174:transactions can be
1945:Military occupations
1780:Military engineering
1682:Unrestricted Warfare
1539:Force multiplication
437:Military manoeuvrers
6910:Counterintelligence
6825:Technical (TECHINT)
6820:Open-source (OSINT)
6810:Geospatial (GEOINT)
6784:Casualty estimation
6361:Military camouflage
6347:Information warfare
5789:Information warfare
5747:Automotive security
5656:Media concentration
5528:Non-apology apology
5518:Cult of personality
5246:Emotive conjugation
5000:Burying of scholars
4244:footnote references
4185:Information warfare
3440:Stanford University
3080:on 21 November 2015
2497:General Dynamics IT
2371:Russo-Ukrainian War
2352:command and control
2108:command and control
2021:Information warfare
1631:Penal military unit
1616:Rules of engagement
1292:Command and control
917:Operations research
381:Director (military)
371:Fire-control system
141:Command and control
22:Part of a series on
6882:Military geography
6867:Basic intelligence
6805:Financial (FININT)
6746:signature (MASINT)
6672:One-way voice link
6608:Concealment device
6318:Military deception
6198:Antivirus software
6066:Social engineering
6031:Polymorphic engine
5984:Fraudulent dialers
5889:Hardware backdoors
5829:
5639:Influence-for-hire
5432:National mythology
5402:Crowd manipulation
5291:Tabloid journalism
5160:Video manipulation
5105:Fictitious entries
4828:Civil disobedience
4714:Media manipulation
4451:2007-10-30 at the
4376:2020-10-27 at the
4357:2017-06-11 at the
4325:2007-10-14 at the
4292:2007-10-31 at the
3956:The New York Times
3745:Sohl, Ben (2022).
3524:2022-03-31 at the
3504:2022-04-11 at the
3444:Hoover Institution
3334:The New York Times
2825:Andrei Sukhovetsky
2729:Taliban propaganda
2595:Electronic warfare
2539:Keith B. Alexander
2316:
2303:An office used by
2159:Logistics networks
2082:electronic warfare
1740:Counter-insurgency
1661:Command of the sea
1606:Jewish laws on war
1581:Geneva Conventions
1117:Divide and conquer
912:Military operation
877:Tactical objective
376:Fire-control radar
353:Electronic-warfare
6930:
6929:
6833:
6832:
6724:Direction finding
6714:In modern history
6695:
6694:
6448:
6447:
6284:
6283:
6246:Anomaly detection
6151:Secure by default
6004:Keystroke loggers
5939:Drive-by download
5827:vectorial version
5794:Internet security
5742:Computer security
5694:
5693:
5460:Airborne leaflets
5339:Election promises
5193:Product placement
5068:Alternative facts
4808:Alternative media
4551:978-1-4438-4175-7
4272:
4271:
4264:
4180:Library resources
4129:Leigh Armistead,
4023:Dorothy Denning,
3958:. 15 April 2010.
3783:on 25 April 2022.
3050:978-1-4503-9233-4
2968:Stein, George J.
2675:Political warfare
2645:Irregular warfare
2394:results, such as
2104:decision analysis
2018:
2017:
1910:Horses in warfare
1857:Anti-war movement
1760:Gunboat diplomacy
1750:Disaster response
1698:Philosophy of war
1693:Principles of war
1666:Deterrence theory
1611:Right of conquest
1534:Lanchester's laws
1302:Principles of war
992:Counter-offensive
977:Military campaign
882:Target saturation
805:Counterinsurgency
414:Gun data computer
348:Close air support
310:Aircraft carriers
6980:
6729:Traffic analysis
6701:Signals (SIGINT)
6536:Asset recruiting
6504:
6503:
6495:
6494:
6475:
6468:
6461:
6452:
6451:
6376:
6357:
6311:
6304:
6297:
6288:
6287:
6155:Secure by design
6086:Hardware Trojans
5919:History sniffing
5909:Cross-site leaks
5804:Network security
5721:
5714:
5707:
5698:
5697:
5686:Media proprietor
5510:Public relations
5490:Public diplomacy
5475:Information (IT)
5354:Name recognition
4979:Media regulation
4961:Annoyance factor
4818:Call-out culture
4733:Crowd psychology
4707:
4700:
4693:
4684:
4683:
4573:(Doc file) from
4534:
4485:
4483:
4481:
4442:(February 2000).
4267:
4260:
4256:
4253:
4247:
4215:
4214:
4207:
4013:In Athena's Camp
3964:
3963:
3948:
3942:
3941:
3940:
3934:
3932:
3931:
3891:
3885:
3884:
3882:
3881:
3859:
3853:
3852:
3838:
3825:
3824:
3822:
3821:
3791:
3785:
3784:
3782:
3776:. Archived from
3751:
3742:
3736:
3735:
3733:
3732:
3713:
3698:
3697:
3695:
3694:
3677:Farrell, James.
3674:
3668:
3667:
3665:
3664:
3633:
3627:
3626:
3624:
3623:
3612:Warsaw Institute
3604:
3598:
3597:
3595:
3594:
3574:
3568:
3557:Doug Cunningham
3555:
3549:
3536:
3530:
3515:
3509:
3495:
3489:
3471:
3462:
3461:
3459:
3458:
3452:
3437:
3428:
3422:
3421:
3419:
3417:
3411:
3398:
3389:
3383:
3382:
3380:
3378:
3372:
3359:
3351:
3345:
3344:
3342:
3340:
3325:
3319:
3318:
3308:
3282:
3273:
3267:
3266:
3264:
3262:
3243:
3237:
3235:
3233:
3231:
3213:
3185:
3176:
3175:
3173:
3171:
3150:
3144:
3143:
3141:
3140:
3131:. Archived from
3125:
3119:
3118:
3116:
3115:
3096:
3090:
3089:
3087:
3085:
3076:. Archived from
3070:
3064:
3062:
3024:
3018:
3017:
3015:
3013:
3007:
3000:
2992:
2986:
2985:
2983:
2981:
2965:
2959:
2957:
2947:
2921:
2915:
2914:
2912:
2911:
2892:
2886:
2883:
2877:
2876:
2874:
2873:
2856:Brian C, Lewis.
2853:
2847:
2844:
2828:
2815:Connectivity to
2813:
2695:Public relations
2565:Black propaganda
2535:right to privacy
2307:captured by the
2295:Notable examples
2161:can be disabled.
2010:
2003:
1996:
1765:Humanitarian aid
1703:Security dilemma
1524:Power projection
1307:Economy of force
1287:Chain of command
1002:Defence in depth
987:Commerce raiding
810:Defeat in detail
146:Defense ministry
50:
41:
40:
31:
19:
18:
6988:
6987:
6983:
6982:
6981:
6979:
6978:
6977:
6933:
6932:
6931:
6926:
6891:
6829:
6815:Imagery (IMINT)
6793:
6754:Electro-optical
6745:
6744:Measurement and
6738:
6691:
6667:Numbers station
6596:Black operation
6560:
6522:
6484:
6479:
6449:
6444:
6430:
6405:
6379:
6320:
6315:
6285:
6280:
6130:
5830:
5818:
5809:Copy protection
5799:Mobile security
5730:
5725:
5695:
5690:
5681:Media influence
5676:Media franchise
5661:Media democracy
5627:
5572:
5504:
5446:
5427:Loaded language
5378:
5295:
5212:
5164:
5054:
4983:
4965:
4892:
4833:Culture jamming
4782:
4716:
4711:
4623:
4584:
4563:
4479:
4477:
4464:(October 2012).
4453:Wayback Machine
4436:Dr Carlo Kopp,
4424:
4399:
4378:Wayback Machine
4359:Wayback Machine
4327:Wayback Machine
4294:Wayback Machine
4277:
4268:
4257:
4251:
4248:
4229:
4220:This article's
4216:
4212:
4205:
4204:
4203:
4188:
4187:
4183:
4176:
4163:
4088:Ishmael Jones,
3977:
3972:
3967:
3950:
3949:
3945:
3935:
3929:
3927:
3892:
3888:
3879:
3877:
3860:
3856:
3839:
3828:
3819:
3817:
3792:
3788:
3780:
3749:
3743:
3739:
3730:
3728:
3715:
3714:
3701:
3692:
3690:
3675:
3671:
3662:
3660:
3634:
3630:
3621:
3619:
3606:
3605:
3601:
3592:
3590:
3575:
3571:
3566:Wayback Machine
3556:
3552:
3547:Wayback Machine
3537:
3533:
3526:Wayback Machine
3516:
3512:
3506:Wayback Machine
3496:
3492:
3482:Wayback Machine
3472:
3465:
3456:
3454:
3450:
3435:
3429:
3425:
3415:
3413:
3409:
3396:
3390:
3386:
3376:
3374:
3370:
3357:
3353:
3352:
3348:
3338:
3336:
3326:
3322:
3280:
3274:
3270:
3260:
3258:
3245:
3244:
3240:
3229:
3227:
3186:
3179:
3169:
3167:
3152:
3151:
3147:
3138:
3136:
3127:
3126:
3122:
3113:
3111:
3098:
3097:
3093:
3083:
3081:
3072:
3071:
3067:
3051:
3025:
3021:
3011:
3009:
3005:
2998:
2994:
2993:
2989:
2979:
2977:
2966:
2962:
2922:
2918:
2909:
2907:
2894:
2893:
2889:
2884:
2880:
2871:
2869:
2854:
2850:
2845:
2841:
2837:
2832:
2831:
2814:
2810:
2805:
2800:
2738:
2712:Group specific:
2709:
2560:Active measures
2555:
2510:just war theory
2505:
2451:
2437:
2428:
2404:
2383:
2375:Main articles:
2373:
2368:
2367:
2329:
2321:
2297:
2269:unmanned drones
2236:
2234:New battlefield
2194:Synthetic media
2116:
2014:
1985:
1984:
1935:
1925:
1924:
1890:
1882:
1881:
1822:
1812:
1811:
1785:Multilateralism
1770:Law enforcement
1730:
1720:
1719:
1688:Just war theory
1646:
1636:
1635:
1586:Geneva Protocol
1556:
1546:
1545:
1519:
1509:
1508:
1450:
1440:
1439:
1347:
1337:
1336:
1277:
1267:
1266:
1232:
1222:
1221:
1152:Network-centric
1072:
1062:
1061:
969:
959:
958:
907:
897:
896:
845:Rapid dominance
750:
740:
739:
695:Electromagnetic
604:
594:
593:
580:
533:
481:
457:
447:
446:
442:Combat training
423:
400:
366:Combat systems:
362:
324:
320:Auxiliary ships
286:
246:
242:Military police
208:
131:
121:
120:
60:
34:
33:
32:
27:
17:
12:
11:
5:
6986:
6976:
6975:
6973:Disinformation
6970:
6965:
6960:
6955:
6950:
6945:
6928:
6927:
6925:
6924:
6919:
6918:
6917:
6907:
6901:
6899:
6893:
6892:
6890:
6889:
6884:
6879:
6874:
6869:
6864:
6859:
6854:
6852:Target-centric
6849:
6843:
6841:
6835:
6834:
6831:
6830:
6828:
6827:
6822:
6817:
6812:
6807:
6801:
6799:
6795:
6794:
6792:
6791:
6781:
6776:
6774:Radiofrequency
6771:
6766:
6761:
6756:
6750:
6748:
6740:
6739:
6737:
6736:
6731:
6726:
6721:
6716:
6711:
6705:
6703:
6697:
6696:
6693:
6692:
6690:
6689:
6684:
6679:
6674:
6669:
6664:
6659:
6654:
6649:
6644:
6639:
6630:
6625:
6620:
6615:
6610:
6605:
6604:
6603:
6593:
6588:
6587:
6586:
6581:
6570:
6568:
6562:
6561:
6559:
6558:
6553:
6548:
6543:
6538:
6532:
6530:
6524:
6523:
6521:
6520:
6519:
6518:
6507:
6501:
6499:Human (HUMINT)
6492:
6486:
6485:
6478:
6477:
6470:
6463:
6455:
6446:
6445:
6441:The Art of War
6438:
6436:
6432:
6431:
6429:
6428:
6423:
6413:
6411:
6407:
6406:
6404:
6403:
6398:
6393:
6391:Military dummy
6387:
6385:
6381:
6380:
6378:
6377:
6373:Ruse de guerre
6368:
6363:
6358:
6349:
6344:
6339:
6337:Disinformation
6334:
6328:
6326:
6322:
6321:
6314:
6313:
6306:
6299:
6291:
6282:
6281:
6279:
6278:
6276:Site isolation
6273:
6268:
6267:
6266:
6260:
6250:
6249:
6248:
6243:
6232:
6227:
6222:
6217:
6212:
6207:
6206:
6205:
6200:
6190:
6189:
6188:
6183:
6182:
6181:
6174:Authentication
6166:
6165:
6164:
6163:
6162:
6152:
6149:
6138:
6136:
6132:
6131:
6129:
6128:
6123:
6118:
6113:
6108:
6103:
6098:
6093:
6088:
6083:
6078:
6073:
6068:
6063:
6058:
6053:
6048:
6043:
6038:
6033:
6028:
6027:
6026:
6016:
6011:
6006:
6001:
5996:
5991:
5986:
5981:
5976:
5974:Email spoofing
5971:
5966:
5961:
5956:
5951:
5946:
5941:
5936:
5931:
5926:
5921:
5916:
5914:DOM clobbering
5911:
5906:
5901:
5896:
5894:Code injection
5891:
5886:
5885:
5884:
5879:
5874:
5869:
5861:
5856:
5851:
5846:
5840:
5838:
5832:
5831:
5821:
5819:
5817:
5816:
5811:
5806:
5801:
5796:
5791:
5786:
5781:
5776:
5774:Cyberterrorism
5771:
5766:
5765:
5764:
5762:Computer fraud
5759:
5749:
5744:
5738:
5736:
5732:
5731:
5724:
5723:
5716:
5709:
5701:
5692:
5691:
5689:
5688:
5683:
5678:
5673:
5668:
5663:
5658:
5653:
5652:
5651:
5641:
5635:
5633:
5629:
5628:
5626:
5625:
5620:
5615:
5614:
5613:
5603:
5598:
5593:
5588:
5582:
5580:
5574:
5573:
5571:
5570:
5565:
5560:
5558:Understatement
5555:
5550:
5545:
5540:
5535:
5530:
5525:
5520:
5514:
5512:
5506:
5505:
5503:
5502:
5497:
5492:
5487:
5482:
5477:
5472:
5467:
5462:
5456:
5454:
5448:
5447:
5445:
5444:
5439:
5434:
5429:
5424:
5422:Indoctrination
5419:
5414:
5409:
5407:Disinformation
5404:
5399:
5394:
5388:
5386:
5380:
5379:
5377:
5376:
5371:
5369:Smear campaign
5366:
5361:
5356:
5351:
5346:
5341:
5336:
5331:
5326:
5321:
5316:
5311:
5305:
5303:
5297:
5296:
5294:
5293:
5288:
5286:Sensationalism
5283:
5278:
5273:
5268:
5263:
5258:
5253:
5248:
5243:
5238:
5233:
5228:
5226:Agenda-setting
5222:
5220:
5214:
5213:
5211:
5210:
5205:
5200:
5195:
5190:
5185:
5180:
5174:
5172:
5166:
5165:
5163:
5162:
5157:
5152:
5147:
5142:
5137:
5132:
5127:
5122:
5117:
5112:
5107:
5102:
5100:False document
5097:
5092:
5091:
5090:
5080:
5075:
5070:
5064:
5062:
5056:
5055:
5053:
5052:
5047:
5042:
5037:
5032:
5027:
5022:
5017:
5012:
5007:
5005:Catch and kill
5002:
4997:
4992:
4986:
4984:
4982:
4981:
4976:
4970:
4967:
4966:
4964:
4963:
4958:
4953:
4948:
4943:
4938:
4933:
4928:
4923:
4918:
4913:
4908:
4902:
4900:
4894:
4893:
4891:
4890:
4885:
4880:
4875:
4870:
4865:
4860:
4855:
4850:
4845:
4840:
4838:Demonstrations
4835:
4830:
4825:
4823:Cancel culture
4820:
4815:
4810:
4805:
4804:
4803:
4792:
4790:
4784:
4783:
4781:
4780:
4775:
4770:
4765:
4760:
4755:
4750:
4745:
4740:
4735:
4730:
4724:
4722:
4718:
4717:
4710:
4709:
4702:
4695:
4687:
4681:
4680:
4668:
4662:
4656:
4651:
4646:
4640:
4634:
4629:
4622:
4619:
4618:
4617:
4609:
4601:
4593:
4583:
4580:
4579:
4578:
4562:
4559:
4558:
4557:
4554:
4535:
4486:
4474:Foreign Policy
4465:
4456:
4443:
4434:
4423:
4420:
4419:
4418:
4412:
4406:
4398:
4397:Course syllabi
4395:
4394:
4393:
4387:
4381:
4368:
4362:
4349:
4343:
4338:
4329:
4317:
4312:
4307:
4302:
4297:
4284:
4276:
4273:
4270:
4269:
4252:September 2022
4224:external links
4219:
4217:
4210:
4202:
4201:
4196:
4190:
4189:
4178:
4177:
4175:
4174:External links
4172:
4171:
4170:
4162:
4159:
4158:
4157:
4142:
4127:
4116:
4101:
4098:978-1594032233
4086:
4065:
4053:Edward Waltz,
4051:
4036:
4021:
4008:
3993:Winn Schwartau
3990:
3987:Winn Schwartau
3984:
3976:
3973:
3971:
3968:
3966:
3965:
3943:
3886:
3854:
3826:
3786:
3737:
3723:. 2024-04-30.
3699:
3669:
3628:
3599:
3569:
3550:
3531:
3510:
3490:
3463:
3423:
3384:
3346:
3320:
3268:
3238:
3177:
3145:
3120:
3091:
3065:
3049:
3019:
2987:
2960:
2938:(4): ogac016.
2916:
2900:www.cs.cmu.edu
2887:
2878:
2848:
2838:
2836:
2833:
2830:
2829:
2807:
2806:
2804:
2801:
2799:
2798:
2793:
2788:
2783:
2778:
2773:
2765:
2763:Edward Bernays
2760:
2755:
2750:
2744:
2737:
2736:
2731:
2726:
2721:
2715:
2708:
2707:
2702:
2697:
2692:
2687:
2682:
2677:
2672:
2667:
2662:
2657:
2652:
2647:
2642:
2637:
2632:
2627:
2622:
2617:
2612:
2607:
2602:
2597:
2592:
2590:Disinformation
2587:
2582:
2577:
2572:
2567:
2562:
2556:
2554:
2551:
2531:
2530:
2526:
2522:
2504:
2501:
2450:
2447:
2436:
2433:
2427:
2426:Russia vs West
2424:
2403:
2400:
2372:
2369:
2330:
2322:
2320:
2317:
2296:
2293:
2235:
2232:
2228:Moonlight Maze
2200:
2199:
2196:
2191:
2186:
2179:
2172:Stock exchange
2169:
2162:
2156:
2150:disinformation
2115:
2112:
2059:disinformation
2016:
2015:
2013:
2012:
2005:
1998:
1990:
1987:
1986:
1983:
1982:
1977:
1972:
1967:
1962:
1957:
1952:
1950:Military terms
1947:
1942:
1936:
1931:
1930:
1927:
1926:
1923:
1922:
1917:
1912:
1907:
1902:
1897:
1891:
1888:
1887:
1884:
1883:
1880:
1879:
1874:
1869:
1864:
1859:
1854:
1849:
1844:
1839:
1834:
1829:
1823:
1818:
1817:
1814:
1813:
1810:
1809:
1804:
1803:
1802:
1797:
1787:
1782:
1777:
1772:
1767:
1762:
1757:
1752:
1747:
1742:
1737:
1731:
1726:
1725:
1722:
1721:
1718:
1717:
1712:
1711:
1710:
1708:Tripwire force
1700:
1695:
1690:
1685:
1678:
1673:
1668:
1663:
1658:
1653:
1647:
1642:
1641:
1638:
1637:
1634:
1633:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1593:
1588:
1583:
1578:
1573:
1568:
1563:
1557:
1552:
1551:
1548:
1547:
1544:
1543:
1542:
1541:
1531:
1526:
1520:
1515:
1514:
1511:
1510:
1507:
1506:
1505:
1504:
1499:
1494:
1484:
1479:
1478:
1477:
1472:
1462:
1457:
1451:
1446:
1445:
1442:
1441:
1438:
1437:
1428:
1423:
1422:
1421:
1411:
1406:
1401:
1396:
1391:
1386:
1381:
1376:
1371:
1366:
1361:
1360:
1359:
1348:
1343:
1342:
1339:
1338:
1335:
1334:
1329:
1324:
1319:
1314:
1309:
1304:
1299:
1294:
1289:
1284:
1278:
1273:
1272:
1269:
1268:
1265:
1264:
1259:
1254:
1249:
1244:
1239:
1233:
1230:Administrative
1228:
1227:
1224:
1223:
1220:
1219:
1214:
1209:
1204:
1199:
1194:
1189:
1184:
1179:
1174:
1169:
1164:
1159:
1157:New generation
1154:
1149:
1144:
1139:
1134:
1132:Fleet in being
1129:
1124:
1119:
1114:
1109:
1104:
1099:
1094:
1089:
1084:
1079:
1073:
1070:Grand strategy
1068:
1067:
1064:
1063:
1060:
1059:
1057:Scorched earth
1054:
1049:
1044:
1039:
1034:
1029:
1024:
1019:
1014:
1009:
1004:
999:
994:
989:
984:
979:
970:
965:
964:
961:
960:
957:
956:
951:
946:
941:
936:
934:Deep operation
931:
926:
919:
914:
908:
903:
902:
899:
898:
895:
894:
889:
884:
879:
874:
869:
864:
863:
862:
852:
847:
842:
837:
832:
827:
822:
817:
812:
807:
802:
797:
792:
787:
782:
781:
780:
775:
770:
760:
751:
746:
745:
742:
741:
738:
737:
735:Unconventional
732:
727:
722:
717:
712:
707:
702:
697:
692:
683:
681:Disinformation
678:
673:
668:
663:
658:
653:
652:
651:
646:
636:
631:
626:
621:
616:
611:
605:
600:
599:
596:
595:
592:
591:
586:
579:
578:
577:
576:
575:
574:
564:
559:
554:
549:
544:
532:
531:
530:
529:
528:
527:
517:
512:
507:
502:
497:
492:
480:
479:
478:
477:
472:
467:
458:
453:
452:
449:
448:
445:
444:
439:
434:
432:Basic training
429:
422:
421:
416:
411:
406:
399:
398:
393:
388:
383:
378:
373:
368:
361:
360:
358:Reconnaissance
355:
350:
345:
340:
335:
330:
323:
322:
317:
312:
307:
302:
297:
292:
285:
284:
279:
277:Special forces
274:
269:
268:
267:
257:
252:
245:
244:
239:
234:
232:Reconnaissance
229:
224:
219:
214:
207:
206:
197:
192:
183:
178:
173:
168:
163:
158:
153:
148:
143:
138:
132:
127:
126:
123:
122:
119:
118:
117:
116:
111:
101:
100:
99:
94:
84:
83:
82:
75:Post-classical
72:
67:
61:
56:
55:
52:
51:
43:
42:
24:
23:
15:
9:
6:
4:
3:
2:
6985:
6974:
6971:
6969:
6966:
6964:
6961:
6959:
6956:
6954:
6951:
6949:
6946:
6944:
6941:
6940:
6938:
6923:
6920:
6916:
6915:organizations
6913:
6912:
6911:
6908:
6906:
6903:
6902:
6900:
6898:
6897:Dissemination
6894:
6888:
6885:
6883:
6880:
6878:
6875:
6873:
6870:
6868:
6865:
6863:
6860:
6858:
6855:
6853:
6850:
6848:
6845:
6844:
6842:
6840:
6836:
6826:
6823:
6821:
6818:
6816:
6813:
6811:
6808:
6806:
6803:
6802:
6800:
6796:
6789:
6785:
6782:
6780:
6777:
6775:
6772:
6770:
6767:
6765:
6762:
6760:
6757:
6755:
6752:
6751:
6749:
6747:
6741:
6735:
6732:
6730:
6727:
6725:
6722:
6720:
6717:
6715:
6712:
6710:
6707:
6706:
6704:
6702:
6698:
6688:
6685:
6683:
6682:Steganography
6680:
6678:
6675:
6673:
6670:
6668:
6665:
6663:
6662:Interrogation
6660:
6658:
6655:
6653:
6650:
6648:
6647:Eavesdropping
6645:
6643:
6640:
6638:
6634:
6631:
6629:
6626:
6624:
6621:
6619:
6616:
6614:
6611:
6609:
6606:
6602:
6599:
6598:
6597:
6594:
6592:
6589:
6585:
6582:
6580:
6577:
6576:
6575:
6572:
6571:
6569:
6567:
6563:
6557:
6554:
6552:
6551:Direct action
6549:
6547:
6546:Covert action
6544:
6542:
6539:
6537:
6534:
6533:
6531:
6529:
6525:
6517:
6516:organizations
6514:
6513:
6512:
6509:
6508:
6505:
6502:
6500:
6496:
6493:
6491:
6487:
6483:
6476:
6471:
6469:
6464:
6462:
6457:
6456:
6453:
6443:
6442:
6437:
6433:
6427:
6424:
6422:
6419:
6418:
6416:
6412:
6408:
6402:
6399:
6397:
6394:
6392:
6389:
6388:
6386:
6382:
6375:
6374:
6369:
6367:
6364:
6362:
6359:
6356:
6355:
6350:
6348:
6345:
6343:
6340:
6338:
6335:
6333:
6330:
6329:
6327:
6323:
6319:
6312:
6307:
6305:
6300:
6298:
6293:
6292:
6289:
6277:
6274:
6272:
6269:
6264:
6261:
6259:
6256:
6255:
6254:
6251:
6247:
6244:
6241:
6238:
6237:
6236:
6233:
6231:
6228:
6226:
6223:
6221:
6218:
6216:
6213:
6211:
6208:
6204:
6201:
6199:
6196:
6195:
6194:
6191:
6187:
6186:Authorization
6184:
6180:
6177:
6176:
6175:
6172:
6171:
6170:
6167:
6161:
6158:
6157:
6156:
6153:
6150:
6148:
6147:Secure coding
6145:
6144:
6143:
6140:
6139:
6137:
6133:
6127:
6124:
6122:
6119:
6117:
6116:SQL injection
6114:
6112:
6109:
6107:
6104:
6102:
6099:
6097:
6096:Vulnerability
6094:
6092:
6089:
6087:
6084:
6082:
6081:Trojan horses
6079:
6077:
6076:Software bugs
6074:
6072:
6069:
6067:
6064:
6062:
6059:
6057:
6054:
6052:
6049:
6047:
6044:
6042:
6039:
6037:
6034:
6032:
6029:
6025:
6022:
6021:
6020:
6017:
6015:
6012:
6010:
6007:
6005:
6002:
6000:
5997:
5995:
5992:
5990:
5987:
5985:
5982:
5980:
5977:
5975:
5972:
5970:
5967:
5965:
5964:Eavesdropping
5962:
5960:
5957:
5955:
5954:Data scraping
5952:
5950:
5947:
5945:
5942:
5940:
5937:
5935:
5932:
5930:
5927:
5925:
5924:Cryptojacking
5922:
5920:
5917:
5915:
5912:
5910:
5907:
5905:
5902:
5900:
5897:
5895:
5892:
5890:
5887:
5883:
5880:
5878:
5875:
5873:
5870:
5868:
5865:
5864:
5862:
5860:
5857:
5855:
5852:
5850:
5847:
5845:
5842:
5841:
5839:
5837:
5833:
5825:
5815:
5812:
5810:
5807:
5805:
5802:
5800:
5797:
5795:
5792:
5790:
5787:
5785:
5782:
5780:
5777:
5775:
5772:
5770:
5767:
5763:
5760:
5758:
5755:
5754:
5753:
5750:
5748:
5745:
5743:
5740:
5739:
5737:
5733:
5729:
5722:
5717:
5715:
5710:
5708:
5703:
5702:
5699:
5687:
5684:
5682:
5679:
5677:
5674:
5672:
5669:
5667:
5666:Media ecology
5664:
5662:
5659:
5657:
5654:
5650:
5649:United States
5647:
5646:
5645:
5642:
5640:
5637:
5636:
5634:
5630:
5624:
5623:Telemarketing
5621:
5619:
5616:
5612:
5609:
5608:
5607:
5604:
5602:
5599:
5597:
5594:
5592:
5589:
5587:
5584:
5583:
5581:
5579:
5575:
5569:
5566:
5564:
5561:
5559:
5556:
5554:
5551:
5549:
5546:
5544:
5541:
5539:
5536:
5534:
5531:
5529:
5526:
5524:
5521:
5519:
5516:
5515:
5513:
5511:
5507:
5501:
5498:
5496:
5493:
5491:
5488:
5486:
5483:
5481:
5478:
5476:
5473:
5471:
5468:
5466:
5463:
5461:
5458:
5457:
5455:
5453:
5449:
5443:
5440:
5438:
5435:
5433:
5430:
5428:
5425:
5423:
5420:
5418:
5415:
5413:
5412:Fearmongering
5410:
5408:
5405:
5403:
5400:
5398:
5395:
5393:
5390:
5389:
5387:
5385:
5381:
5375:
5372:
5370:
5367:
5365:
5362:
5360:
5357:
5355:
5352:
5350:
5347:
5345:
5342:
5340:
5337:
5335:
5332:
5330:
5327:
5325:
5322:
5320:
5317:
5315:
5312:
5310:
5307:
5306:
5304:
5302:
5298:
5292:
5289:
5287:
5284:
5282:
5279:
5277:
5274:
5272:
5269:
5267:
5264:
5262:
5259:
5257:
5254:
5252:
5251:False balance
5249:
5247:
5244:
5242:
5239:
5237:
5234:
5232:
5229:
5227:
5224:
5223:
5221:
5219:
5215:
5209:
5208:Word of mouth
5206:
5204:
5201:
5199:
5196:
5194:
5191:
5189:
5186:
5184:
5181:
5179:
5176:
5175:
5173:
5171:
5167:
5161:
5158:
5156:
5153:
5151:
5148:
5146:
5143:
5141:
5138:
5136:
5133:
5131:
5128:
5126:
5123:
5121:
5118:
5116:
5113:
5111:
5108:
5106:
5103:
5101:
5098:
5096:
5093:
5089:
5086:
5085:
5084:
5081:
5079:
5076:
5074:
5071:
5069:
5066:
5065:
5063:
5061:
5057:
5051:
5048:
5046:
5043:
5041:
5038:
5036:
5033:
5031:
5028:
5026:
5023:
5021:
5018:
5016:
5013:
5011:
5008:
5006:
5003:
5001:
4998:
4996:
4995:Broadcast law
4993:
4991:
4988:
4987:
4985:
4980:
4977:
4975:
4972:
4971:
4968:
4962:
4959:
4957:
4954:
4952:
4949:
4947:
4944:
4942:
4939:
4937:
4934:
4932:
4929:
4927:
4924:
4922:
4919:
4917:
4914:
4912:
4909:
4907:
4904:
4903:
4901:
4899:
4895:
4889:
4886:
4884:
4881:
4879:
4876:
4874:
4871:
4869:
4866:
4864:
4861:
4859:
4856:
4854:
4851:
4849:
4846:
4844:
4843:Deplatforming
4841:
4839:
4836:
4834:
4831:
4829:
4826:
4824:
4821:
4819:
4816:
4814:
4811:
4809:
4806:
4802:
4799:
4798:
4797:
4794:
4793:
4791:
4789:
4785:
4779:
4776:
4774:
4771:
4769:
4766:
4764:
4761:
4759:
4756:
4754:
4751:
4749:
4748:False balance
4746:
4744:
4741:
4739:
4736:
4734:
4731:
4729:
4726:
4725:
4723:
4719:
4715:
4708:
4703:
4701:
4696:
4694:
4689:
4688:
4685:
4678:
4677:
4672:
4671:K. A. Taipale
4669:
4666:
4663:
4660:
4657:
4655:
4652:
4650:
4647:
4644:
4641:
4638:
4635:
4633:
4630:
4628:
4625:
4624:
4615:
4614:
4610:
4607:
4606:
4602:
4599:
4598:
4594:
4591:
4590:
4586:
4585:
4582:News articles
4576:
4572:
4568:
4565:
4564:
4561:Papers: Other
4555:
4552:
4548:
4544:
4540:
4536:
4532:
4528:
4524:
4520:
4516:
4512:
4508:
4504:
4500:
4496:
4492:
4487:
4476:. Slate Group
4475:
4471:
4466:
4463:
4462:
4457:
4454:
4450:
4447:
4444:
4441:
4440:
4435:
4432:
4431:
4426:
4425:
4416:
4413:
4410:
4407:
4404:
4401:
4400:
4391:
4388:
4385:
4382:
4379:
4375:
4372:
4369:
4366:
4363:
4360:
4356:
4353:
4350:
4347:
4344:
4342:
4339:
4336:
4333:
4330:
4328:
4324:
4321:
4318:
4316:
4313:
4311:
4308:
4306:
4303:
4301:
4298:
4295:
4291:
4288:
4285:
4282:
4279:
4278:
4266:
4263:
4255:
4245:
4241:
4240:inappropriate
4237:
4233:
4227:
4225:
4218:
4209:
4208:
4200:
4197:
4195:
4192:
4191:
4186:
4181:
4168:
4165:
4164:
4155:
4151:
4147:
4143:
4140:
4136:
4132:
4128:
4125:
4121:
4117:
4114:
4110:
4106:
4102:
4099:
4095:
4091:
4087:
4084:
4080:
4076:
4072:
4071:
4066:
4064:
4063:0-89006-511-X
4060:
4056:
4052:
4049:
4045:
4041:
4038:James Adams,
4037:
4034:
4030:
4026:
4022:
4019:
4015:
4014:
4009:
4006:
4002:
3998:
3994:
3991:
3988:
3985:
3982:
3979:
3978:
3961:
3957:
3953:
3947:
3939:
3925:
3921:
3917:
3913:
3909:
3905:
3901:
3897:
3890:
3875:
3871:
3870:
3865:
3858:
3850:
3849:
3844:
3837:
3835:
3833:
3831:
3815:
3811:
3807:
3803:
3802:
3801:The Telegraph
3797:
3790:
3779:
3775:
3771:
3767:
3763:
3760:(1): 97–111.
3759:
3755:
3748:
3741:
3726:
3722:
3718:
3712:
3710:
3708:
3706:
3704:
3688:
3684:
3680:
3673:
3658:
3654:
3650:
3647:(21): 13–43.
3646:
3643:(in Polish).
3642:
3639:
3632:
3617:
3613:
3609:
3603:
3588:
3584:
3580:
3573:
3567:
3563:
3560:
3554:
3548:
3544:
3541:
3535:
3527:
3523:
3520:
3514:
3507:
3503:
3500:
3494:
3487:
3483:
3479:
3476:
3470:
3468:
3449:
3445:
3441:
3434:
3427:
3408:
3404:
3403:
3395:
3388:
3369:
3365:
3364:
3356:
3350:
3335:
3331:
3324:
3316:
3312:
3307:
3302:
3298:
3294:
3290:
3286:
3279:
3272:
3256:
3252:
3248:
3242:
3225:
3221:
3217:
3212:
3207:
3203:
3199:
3195:
3191:
3184:
3182:
3165:
3161:
3160:
3155:
3149:
3135:on 2007-05-25
3134:
3130:
3124:
3109:
3105:
3101:
3095:
3079:
3075:
3069:
3060:
3056:
3052:
3046:
3042:
3038:
3034:
3030:
3023:
3004:
2997:
2991:
2975:
2971:
2964:
2955:
2951:
2946:
2941:
2937:
2933:
2932:
2927:
2920:
2905:
2901:
2897:
2891:
2882:
2867:
2863:
2859:
2852:
2843:
2839:
2826:
2822:
2818:
2812:
2808:
2797:
2794:
2792:
2789:
2787:
2784:
2782:
2779:
2777:
2774:
2771:
2770:
2766:
2764:
2761:
2759:
2756:
2754:
2751:
2749:
2746:
2745:
2743:
2742:
2735:
2732:
2730:
2727:
2725:
2722:
2720:
2717:
2716:
2714:
2713:
2706:
2703:
2701:
2698:
2696:
2693:
2691:
2688:
2686:
2683:
2681:
2678:
2676:
2673:
2671:
2668:
2666:
2663:
2661:
2658:
2656:
2653:
2651:
2648:
2646:
2643:
2641:
2638:
2636:
2633:
2631:
2628:
2626:
2623:
2621:
2618:
2616:
2613:
2611:
2608:
2606:
2603:
2601:
2598:
2596:
2593:
2591:
2588:
2586:
2583:
2581:
2578:
2576:
2573:
2571:
2568:
2566:
2563:
2561:
2558:
2557:
2550:
2548:
2544:
2540:
2536:
2527:
2523:
2520:
2515:
2514:
2513:
2511:
2500:
2498:
2494:
2490:
2486:
2482:
2478:
2474:
2473:
2468:
2464:
2460:
2456:
2446:
2443:
2442:
2441:The Telegraph
2432:
2423:
2421:
2417:
2414:according to
2413:
2409:
2399:
2397:
2391:
2388:
2385:In 2022, the
2382:
2378:
2365:
2361:
2357:
2353:
2349:
2345:
2341:
2337:
2333:
2327:
2314:
2310:
2306:
2301:
2292:
2290:
2286:
2280:
2278:
2274:
2270:
2265:
2263:
2262:power outages
2259:
2255:
2250:
2245:
2241:
2231:
2229:
2225:
2221:
2216:
2214:
2208:
2205:
2197:
2195:
2192:
2190:
2187:
2184:
2180:
2177:
2173:
2170:
2167:
2163:
2160:
2157:
2154:
2151:
2147:
2143:
2139:
2135:
2131:
2128:
2127:
2126:
2123:
2121:
2111:
2109:
2105:
2101:
2097:
2096:
2091:
2087:
2083:
2079:
2074:
2072:
2068:
2064:
2060:
2056:
2052:
2048:
2043:
2040:
2039:
2034:
2030:
2026:
2022:
2011:
2006:
2004:
1999:
1997:
1992:
1991:
1989:
1988:
1981:
1978:
1976:
1973:
1971:
1968:
1966:
1963:
1961:
1958:
1956:
1953:
1951:
1948:
1946:
1943:
1941:
1938:
1937:
1934:
1929:
1928:
1921:
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1892:
1886:
1885:
1878:
1875:
1873:
1870:
1868:
1865:
1863:
1860:
1858:
1855:
1853:
1850:
1848:
1845:
1843:
1840:
1838:
1837:Warrior caste
1835:
1833:
1830:
1828:
1825:
1824:
1821:
1816:
1815:
1808:
1807:Show of force
1805:
1801:
1798:
1796:
1795:Peacebuilding
1793:
1792:
1791:
1788:
1786:
1783:
1781:
1778:
1776:
1773:
1771:
1768:
1766:
1763:
1761:
1758:
1756:
1753:
1751:
1748:
1746:
1743:
1741:
1738:
1736:
1733:
1732:
1729:
1724:
1723:
1716:
1713:
1709:
1706:
1705:
1704:
1701:
1699:
1696:
1694:
1691:
1689:
1686:
1684:
1683:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1662:
1659:
1657:
1654:
1652:
1651:Air supremacy
1649:
1648:
1645:
1640:
1639:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1602:
1599:
1597:
1594:
1592:
1591:Islamic rules
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1572:
1571:Court-martial
1569:
1567:
1564:
1562:
1559:
1558:
1555:
1550:
1549:
1540:
1537:
1536:
1535:
1532:
1530:
1527:
1525:
1522:
1521:
1518:
1513:
1512:
1503:
1500:
1498:
1495:
1493:
1490:
1489:
1488:
1485:
1483:
1480:
1476:
1473:
1471:
1470:Arms industry
1468:
1467:
1466:
1463:
1461:
1458:
1456:
1453:
1452:
1449:
1444:
1443:
1436:
1432:
1429:
1427:
1424:
1420:
1417:
1416:
1415:
1412:
1410:
1407:
1405:
1402:
1400:
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1358:
1355:
1354:
1353:
1350:
1349:
1346:
1341:
1340:
1333:
1330:
1328:
1325:
1323:
1320:
1318:
1315:
1313:
1310:
1308:
1305:
1303:
1300:
1298:
1295:
1293:
1290:
1288:
1285:
1283:
1280:
1279:
1276:
1271:
1270:
1263:
1260:
1258:
1255:
1253:
1250:
1248:
1245:
1243:
1240:
1238:
1235:
1234:
1231:
1226:
1225:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1183:
1180:
1178:
1175:
1173:
1170:
1168:
1165:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1128:
1125:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1098:
1095:
1093:
1090:
1088:
1087:Broken-backed
1085:
1083:
1080:
1078:
1075:
1074:
1071:
1066:
1065:
1058:
1055:
1053:
1050:
1048:
1045:
1043:
1040:
1038:
1035:
1033:
1030:
1028:
1025:
1023:
1020:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
975:
974:
973:
968:
963:
962:
955:
952:
950:
947:
945:
942:
940:
937:
935:
932:
930:
929:Expeditionary
927:
925:
924:
920:
918:
915:
913:
910:
909:
906:
901:
900:
893:
890:
888:
885:
883:
880:
878:
875:
873:
870:
868:
865:
861:
858:
857:
856:
853:
851:
848:
846:
843:
841:
838:
836:
833:
831:
828:
826:
823:
821:
818:
816:
813:
811:
808:
806:
803:
801:
800:Counterattack
798:
796:
793:
791:
788:
786:
783:
779:
776:
774:
771:
769:
766:
765:
764:
761:
759:
756:
755:
754:
749:
744:
743:
736:
733:
731:
728:
726:
725:Psychological
723:
721:
718:
716:
713:
711:
708:
706:
703:
701:
698:
696:
693:
691:
687:
684:
682:
679:
677:
674:
672:
669:
667:
664:
662:
661:Combined arms
659:
657:
654:
650:
647:
645:
642:
641:
640:
637:
635:
632:
630:
627:
625:
622:
620:
617:
615:
612:
610:
607:
606:
603:
598:
597:
590:
587:
585:
582:
581:
573:
570:
569:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
539:
538:
535:
534:
526:
523:
522:
521:
518:
516:
513:
511:
508:
506:
503:
501:
500:Fortification
498:
496:
493:
491:
488:
487:
486:
483:
482:
476:
473:
471:
468:
466:
463:
462:
460:
459:
456:
451:
450:
443:
440:
438:
435:
433:
430:
428:
425:
424:
420:
417:
415:
412:
410:
407:
405:
402:
401:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
364:
363:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
325:
321:
318:
316:
315:Landing craft
313:
311:
308:
306:
303:
301:
298:
296:
293:
291:
288:
287:
283:
280:
278:
275:
273:
270:
266:
263:
262:
261:
258:
256:
253:
251:
248:
247:
243:
240:
238:
235:
233:
230:
228:
225:
223:
220:
218:
215:
213:
210:
209:
205:
201:
200:Standing army
198:
196:
193:
191:
187:
184:
182:
179:
177:
174:
172:
169:
167:
164:
162:
159:
157:
154:
152:
149:
147:
144:
142:
139:
137:
134:
133:
130:
125:
124:
115:
112:
110:
107:
106:
105:
102:
98:
95:
93:
92:pike and shot
90:
89:
88:
85:
81:
78:
77:
76:
73:
71:
68:
66:
63:
62:
59:
54:
53:
49:
45:
44:
38:
30:
26:
25:
21:
20:
6943:Cyberwarfare
6687:Surveillance
6677:Resident spy
6618:Cryptography
6439:
6415:World War II
6346:
6220:Data masking
5788:
5779:Cyberwarfare
5671:Media ethics
5591:Door-to-door
5586:Cold calling
5563:Weasel words
5474:
5470:Fifth column
5364:Push polling
5314:Astroturfing
5276:Pseudo-event
5256:Infotainment
5231:Broadcasting
5150:Urban legend
5073:April Fools'
4946:Testimonials
4916:Infomercials
4743:Dumbing down
4675:
4612:
4604:
4596:
4588:
4542:
4498:
4494:
4478:. Retrieved
4473:
4460:
4438:
4429:
4258:
4249:
4234:by removing
4221:
4184:
4145:
4144:Thomas Rid,
4130:
4104:
4089:
4069:
4054:
4039:
4024:
4012:
3996:
3970:Bibliography
3955:
3946:
3928:. Retrieved
3906:(3): 70–89.
3903:
3899:
3889:
3878:. Retrieved
3869:Military.com
3867:
3857:
3846:
3818:. Retrieved
3799:
3789:
3778:the original
3757:
3753:
3740:
3729:. Retrieved
3720:
3691:. Retrieved
3682:
3672:
3661:. Retrieved
3644:
3640:
3631:
3620:. Retrieved
3611:
3602:
3591:. Retrieved
3582:
3572:
3553:
3534:
3513:
3493:
3455:. Retrieved
3426:
3414:. Retrieved
3400:
3387:
3375:. Retrieved
3361:
3349:
3337:. Retrieved
3333:
3323:
3288:
3284:
3271:
3259:. Retrieved
3250:
3241:
3228:. Retrieved
3193:
3168:. Retrieved
3157:
3148:
3137:. Retrieved
3133:the original
3123:
3112:. Retrieved
3103:
3094:
3082:. Retrieved
3078:the original
3068:
3063:(PDF format)
3032:
3022:
3010:. Retrieved
2990:
2978:. Retrieved
2963:
2935:
2929:
2919:
2908:. Retrieved
2899:
2890:
2881:
2870:. Retrieved
2861:
2851:
2842:
2811:
2767:
2741:US specific:
2740:
2739:
2711:
2710:
2705:Transparency
2700:Storm botnet
2575:Cyberwarfare
2543:Barack Obama
2532:
2506:
2470:
2452:
2439:
2438:
2429:
2405:
2392:
2384:
2281:
2266:
2237:
2217:
2209:
2201:
2124:
2117:
2094:
2086:cyberwarfare
2075:
2051:assurance(s)
2044:
2038:cyberwarfare
2036:
2024:
2020:
2019:
1920:Fifth column
1900:War resister
1895:Women in war
1790:Peacekeeping
1735:Arms control
1680:
1369:Mobilization
1364:Conscription
1322:Intelligence
1275:Organization
921:
850:Encirclement
730:Radiological
666:Conventional
588:
520:Subterranean
427:Development:
426:
403:
365:
327:
290:Naval units:
289:
282:Signal corps
249:
227:Intelligence
212:Specialties:
211:
136:Organization
87:Early modern
6759:Geophysical
6541:Cell system
6528:Clandestine
6160:Misuse case
5994:Infostealer
5969:Email fraud
5934:Data breach
5769:Cybergeddon
5543:Sound bites
5523:Doublespeak
5374:Wedge issue
5334:Dog whistle
5309:Advertising
5135:Lying press
5120:Gaslighting
4898:Advertising
4873:Occupations
4763:Obfuscation
4753:Half-truths
3339:18 February
3291:: 105–120.
3261:18 February
3230:18 February
3170:18 February
3084:18 February
2862:irp.fas.org
2769:Enemy Image
2485:Philippines
2477:Islamic law
2396:Google News
2311:during the
2181:The use of
2029:battlespace
1905:War studies
1728:Non-warfare
1656:Appeasement
1621:Martial law
1460:War economy
1399:Transgender
1352:Recruitment
1112:Containment
997:Culminating
905:Operational
825:Envelopment
768:Air assault
649:Air cavalry
609:Air defence
589:Information
490:Cold-region
455:Battlespace
404:Historical:
250:Land units:
176:Space force
171:Coast guard
104:Late modern
65:Prehistoric
6937:Categories
6788:earthquake
6652:False flag
6490:Collection
6410:Operations
6354:Maskirovka
6342:False flag
6325:Techniques
6225:Encryption
6101:Web shells
6041:Ransomware
5989:Hacktivism
5752:Cybercrime
5644:Media bias
5500:Subversion
5465:False flag
5442:Techniques
5384:Propaganda
5344:Lawn signs
5324:Canvassing
5218:News media
4974:Censorship
4906:Billboards
4858:Hacktivism
4848:Grassroots
4773:Persuasion
4523:8319522816
4154:0415416590
4139:1574886991
4124:0275974235
4113:0262182092
4083:0833030302
4048:0684834529
4033:0201433036
4005:1560251328
3930:2020-10-31
3880:2024-06-19
3820:2024-06-04
3731:2024-06-13
3693:2024-06-13
3663:2022-04-28
3622:2022-04-28
3593:2022-05-24
3457:2020-07-21
3416:5 November
3377:5 November
3139:2008-03-28
3114:2019-10-20
2910:2019-10-20
2872:2022-10-24
2835:References
2796:Titan Rain
2758:COINTELPRO
2680:Propaganda
2459:propaganda
2360:propaganda
2258:power grid
2130:Television
2067:manipulate
2063:demoralize
2055:propaganda
2047:collection
1965:War crimes
1955:Operations
1862:Foot drill
1832:Battle cry
1745:deterrence
1404:Harassment
1379:Specialism
1202:Technology
1197:Succession
1142:Liberation
1077:Asymmetric
1012:Empty fort
923:Blitzkrieg
892:Withdrawal
855:Investment
634:Camouflage
629:Biological
567:Underwater
542:Amphibious
461:Aerospace
328:Air units:
305:Submarines
114:fourth-gen
109:industrial
97:napoleonic
6779:Materials
6633:Defection
6628:Dead drop
6601:black bag
6566:Espionage
6426:Bodyguard
6384:Equipment
6056:Shellcode
6051:Scareware
5899:Crimeware
5859:Backdoors
5606:Promotion
5485:Political
5392:Bandwagon
5319:Attack ad
5198:Publicity
5170:Marketing
5083:Fake news
5045:Religious
5040:Political
5020:Euphemism
5015:Cover-ups
5010:Corporate
4878:Petitions
4768:Orwellian
4738:Deception
4575:this page
4571:Also Here
4531:159811828
4515:2162-4887
4275:Resources
4236:excessive
3912:1936-1815
3810:0307-1235
3774:248393195
3653:2080-1335
3583:Brookings
3306:2299/8987
3211:2299/8987
3059:249872702
3012:March 26,
2980:March 26,
2954:2057-3170
2655:Kompromat
2610:Fake news
2420:Joe Biden
2416:Microsoft
2176:sabotaged
2027:) is the
1852:War novel
1755:Grey-zone
1715:War games
1676:Overmatch
1626:War crime
1576:Desertion
1566:Ceasefire
1561:Armistice
1448:Logistics
1426:Mercenary
1414:Volunteer
1345:Personnel
1317:Engineers
1262:Sociology
1217:World war
1212:Total war
1192:Strategic
1182:Religious
1167:Political
1162:Perpetual
1137:Irregular
1052:Offensive
1027:Defensive
1022:Deception
982:Attrition
835:Guerrilla
830:Formation
773:Airbridge
705:Loitering
619:Artillery
272:Artillery
222:Engineers
190:Irregular
161:Air force
6839:Analysis
6637:Turncoat
6584:handling
6230:Firewall
6135:Defenses
6061:Spamming
6046:Rootkits
6019:Phishing
5979:Exploits
5553:Transfer
5495:Sedition
5359:Negative
5271:Newspeak
5261:Managing
5203:Research
5178:Branding
5130:Literary
5095:Fakelore
5088:websites
5078:Deepfake
5035:Internet
4926:Modeling
4883:Protests
4863:Internet
4796:Advocacy
4788:Activism
4480:19 March
4449:Archived
4403:COSC 511
4374:Archived
4355:Archived
4323:Archived
4290:Archived
4077:(2001) (
3960:Archived
3924:Archived
3920:26481910
3874:Archived
3814:Archived
3725:Archived
3721:NBC News
3687:Archived
3657:Archived
3616:Archived
3587:Archived
3562:Archived
3543:Archived
3522:Archived
3502:Archived
3478:Archived
3448:Archived
3407:Archived
3368:Archived
3315:17684656
3255:Archived
3224:Archived
3220:17684656
3164:Archived
3108:Archived
3003:Archived
3001:. NATO.
2974:Archived
2904:Archived
2866:Archived
2553:See also
2467:COVID-19
2465:Chinese
2213:Gulf War
2153:campaign
2146:hijacked
2134:internet
2114:Overview
1867:War song
1842:War film
1475:Materiel
1394:Children
1374:Training
1312:Medicine
1297:Doctrine
1252:Training
1187:Resource
1172:Princely
1122:Economic
1107:Conquest
1102:Colonial
1097:Cold war
1082:Blockade
967:Strategy
939:Maneuver
700:Infantry
656:Chemical
510:Mountain
470:Airborne
333:Fighters
300:Warships
255:Infantry
181:Reserves
129:Military
6786: (
6764:Nuclear
6734:TEMPEST
6421:Bertram
6071:Spyware
6014:Payload
6009:Malware
5949:Viruses
5929:Botnets
5836:Threats
5632:Related
5611:Spaving
5596:Pricing
5538:Slogans
5480:Lawfare
5417:Framing
5397:Big lie
5188:Product
5183:Loyalty
5115:Forgery
5060:Hoaxing
4941:Slogans
4921:Mobiles
4813:Boycott
4721:Context
4230:Please
4222:use of
4020:(1997).
3848:Reuters
3251:NPR.org
3104:AP NEWS
2817:GLONASS
2493:Tagalog
2489:hashtag
2463:Sinovac
2455:Reuters
2289:iPhones
2220:hackers
1980:Writers
1975:Weapons
1940:Battles
1889:Related
1877:Wargame
1872:Uniform
1820:Culture
1601:Perfidy
1596:Justice
1517:Science
1502:Outpost
1455:History
1435:Warrior
1431:Soldier
1419:foreign
1357:counter
1257:Service
1207:Theater
1147:Limited
1127:Endemic
1042:Nuclear
815:Foxhole
790:Cavalry
778:Airdrop
763:Airlift
748:Tactics
720:Nuclear
710:Missile
639:Cavalry
624:Barrage
602:Weapons
562:Surface
343:Command
338:Bombers
295:Frogman
265:Cavalry
237:Medical
204:Militia
186:Regular
166:Marines
80:castles
70:Ancient
58:History
37:outline
6623:Cutout
6574:Agents
6401:Q-ship
6265:(SIEM)
6242:(HIDS)
6126:Zombie
5863:Bombs
5844:Adware
5236:Circus
5145:Racial
4549:
4529:
4521:
4513:
4409:CSE468
4182:about
4152:
4137:
4122:
4111:
4096:
4081:
4061:
4046:
4031:
4003:
3995:, ed,
3918:
3910:
3808:
3772:
3683:Forbes
3651:
3313:
3218:
3057:
3047:
2952:
2475:under
2183:drones
2164:Enemy
2148:for a
2142:jammed
1960:Sieges
1644:Theory
1384:Morale
1242:Policy
1237:Branch
1017:Mosaic
1007:Fabian
954:Covert
887:Trench
872:Screen
795:Charge
785:Battle
758:Aerial
676:Denial
644:Horses
572:Seabed
525:Tunnel
505:Jungle
495:Desert
465:Aerial
6798:Other
6769:Radar
6613:Cover
6591:Asset
6579:field
6435:Texts
6396:Decoy
6111:Worms
6106:Wiper
6024:Voice
5872:Logic
5578:Sales
5281:Scrum
5241:Cycle
5155:Virus
5025:Films
4990:Books
4931:Radio
4911:False
4888:Youth
4868:Media
4801:group
4758:Media
4645:(PDF)
4639:(PDF)
4527:S2CID
4386:(PDF)
4283:(PDF)
4161:Other
3975:Books
3916:JSTOR
3781:(PDF)
3770:S2CID
3750:(PDF)
3484:FSB (
3451:(PDF)
3436:(PDF)
3410:(PDF)
3397:(PDF)
3371:(PDF)
3358:(PDF)
3311:S2CID
3281:(PDF)
3216:S2CID
3055:S2CID
3006:(PDF)
2999:(PDF)
2803:Notes
2472:haram
2356:C4ISR
2240:C4ISR
2138:radio
1933:Lists
1389:Women
1327:Ranks
1247:Staff
1177:Proxy
1092:Class
1047:Naval
1032:Depth
867:Swarm
860:Siege
840:Naval
820:Drone
715:Music
690:Robot
686:Drone
671:Cyber
614:Armor
584:Cyber
557:Green
552:Brown
515:Urban
475:Space
396:Radar
391:Sonar
260:Armor
217:Staff
195:Ranks
5877:Time
5867:Fork
5548:Spin
5125:List
5050:Self
4728:Bias
4547:ISBN
4519:OCLC
4511:ISSN
4482:2022
4150:ISBN
4135:ISBN
4120:ISBN
4109:ISBN
4094:ISBN
4079:ISBN
4075:RAND
4059:ISBN
4044:ISBN
4029:ISBN
4018:RAND
4001:ISBN
3908:ISSN
3806:ISSN
3649:ISSN
3418:2020
3379:2020
3341:2015
3263:2015
3232:2015
3172:2015
3086:2015
3045:ISBN
3014:2022
2982:2022
2950:ISSN
2650:iWar
2379:and
2362:and
2202:The
2136:and
2120:NATO
2076:The
1970:Wars
1487:Base
1037:Goal
949:Raid
547:Blue
485:Land
156:Navy
151:Army
5882:Zip
4936:Sex
4503:doi
4238:or
3762:doi
3301:hdl
3293:doi
3206:hdl
3198:doi
3159:PBS
3037:doi
2940:doi
2753:CIA
2065:or
2061:to
2057:or
1554:Law
1497:FOB
1492:MOB
537:Sea
29:War
6939::
6635:/
6417::
4951:TV
4673:,
4525:.
4517:.
4509:.
4497:.
4493:.
4472:.
4156:).
4141:).
4126:).
4115:).
4085:).
4073:,
4050:).
4035:).
4016:,
4007:).
3954:.
3922:.
3914:.
3904:12
3902:.
3898:.
3872:.
3866:.
3845:.
3829:^
3812:.
3804:.
3798:.
3768:.
3758:45
3756:.
3752:.
3719:.
3702:^
3685:.
3681:.
3655:.
3645:11
3610:.
3585:.
3581:.
3466:^
3446:.
3442:;
3438:.
3405:.
3399:.
3366:.
3360:.
3332:.
3309:.
3299:.
3289:25
3287:.
3283:.
3249:.
3222:.
3214:.
3204:.
3196:.
3192:.
3180:^
3162:.
3156:.
3106:.
3102:.
3053:.
3043:.
3031:.
2948:.
2934:.
2928:.
2902:.
2898:.
2864:.
2860:.
2422:.
2398:.
2346:,
2279:.
2215:.
2132:,
2110:.
2102:,
2084:,
2073:.
2025:IW
1433:/
688:/
202:/
188:/
6790:)
6474:e
6467:t
6460:v
6310:e
6303:t
6296:v
5720:e
5713:t
5706:v
4706:e
4699:t
4692:v
4569:(
4553:.
4533:.
4505::
4499:7
4484:.
4265:)
4259:(
4254:)
4250:(
4246:.
4228:.
3933:.
3883:.
3851:.
3823:.
3764::
3734:.
3696:.
3666:.
3625:.
3596:.
3460:.
3420:.
3381:.
3343:.
3317:.
3303::
3295::
3265:.
3234:.
3208::
3200::
3174:.
3142:.
3117:.
3088:.
3061:.
3039::
3016:.
2984:.
2956:.
2942::
2936:7
2913:.
2875:.
2354:(
2328:.
2155:.
2023:(
2009:e
2002:t
1995:v
39:)
35:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.