Advertisement

Information Warfare in the Trenches

Experiences from the Firing Range
  • Scott D. Lathrop
  • Gregory J. Conti
  • Daniel J. Ragsdale
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)

Abstract

With the increased potential of a bona fide cyber terrorist attack and the possibility of a future “war in the wires”, we must continue to improve the education and training of individuals responsible for defending our national borders—whether those borders are physical or electronic. The Information Analysis and Research (IWAR) laboratory at the United States Military Academy (USMA) has proven to be an exceptional resource for such an education for our cadets and faculty studying information warfare and information assurance. The laboratory has also been successful in motivating the need for continued education and training in this area on a much larger scope. This paper justifies why information warfare laboratories are necessary, describes the phenomenon that is occurring as a result of the IWAR lab, explains the current configuration, and presents lessons learned that others might use in designing an Information Warfare laboratory. While this paper has a military context, the results apply to any university, corporation, or nonprofit organization desiring to increase awareness and improve education in the area of information warfare

Key words

Information warfare information assurance education educational laboratories 

References

  1. 1.
    J. Schafer, D. J. Ragsdale, J. R. Surdu, and C. A. Carver, “The IWAR range: a laboratory for undergraduate information assurance education,” presented at Consortium for Computing in Small Colleges, Middlebury, Vermont, 2001.Google Scholar
  2. 2.
    D. W. Welch, D. J. Ragsdale, and W. Schepens, “Training for Information Assurance,” IEEE Computer, pp. 2–9, 2002.Google Scholar
  3. 3.
    J. Garamone, “Capabilities, Strategy Must Converge to Face New Threats,”, accessed on May 9, 2002.http://www.defenselink.mil Google Scholar
  4. 4.
    Department of Defense Report to Congress, “Network Centric Warfare,”, accessed on April 23, 2002.http://www.c3i.osd.mil Google Scholar
  5. 5.
    J. Garamone, “Land Warrior Coming to a Grunt Near You,”, accessed on April 15, 2002.http://www.defenselink.mill Google Scholar
  6. 6.
    G. Blackwell, “802.11’s in the Army Now,” accessed on April 15, 2002.http://www.80211planet.com/columns/article/0,4000,1781_1000821,00.htmlGoogle Scholar
  7. 7.
    CERT/CC Advisory CA-2001–23, “Continued Threat of the ”Code Red“ Worm,” , accessed on April 15, 2002.http://www.cert.org/advisories/CA-2001–23.html
  8. 8.
    R. M. Felder, “Reaching the Second Tie-Learning and Teaching Styles in College Science Education,” Journal of College Science Teaching, vol. 23, pp. 286–290, 1993.Google Scholar
  9. 9.
    C. E. Kaucher and J. H. Saunders, “Building an information assurance laboratory for graduate-level education,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.Google Scholar
  10. 10.
    M. Brakewood,“Question,” email to D. J. Ragsdale, March 05, 2002.Google Scholar
  11. 11.
    A. Yasinsac, J. Frazier, and M. Bogdanov, “Developing an Academic Security Laboratory,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.Google Scholar
  12. 12.
    G. A. Francia and R. K. Smith, “The Design and Implementation of a Heterogeneous Computer Networking Laboratory,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.Google Scholar
  13. .J. H. Saunders, “Simulation Approaches in Information Security Education,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.Google Scholar
  14. 14.
    C. A. J. Carver, J. R. Surdu, J. M. D. Hill, D. J. Ragsdale, S. D. Lathrop, and T. Presby, “Military Academy Attack/Defense Network,” presented at 3rd Annual IEEE Information Assurance Workshop, West Point, NY, 2002.Google Scholar
  15. 15.
    VMware, VMware Workstation 3.0 User’s Manual, 2001.Google Scholar
  16. 16.
    The Honeynet Project, Know Your Enemy Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Boston: Addison-Wesley, 2002.Google Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Scott D. Lathrop
    • 1
  • Gregory J. Conti
    • 1
  • Daniel J. Ragsdale
    • 1
  1. 1.U.S. Military AcademyWest PointUSA

Personalised recommendations