Katana VentraIP

Information warfare

Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare.[1][2] As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.[3]

Information warfare may involve the collection of tactical information, assurance(s) that one's information is valid, spreading of propaganda or disinformation to demoralize or manipulate[4] the enemy and the public, undermining the quality of the opposing force's information, and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.[5]


The United States Armed Forces' use of the term favors technology and hence tends to extend into the realms of electronic warfare, cyberwarfare, information assurance and computer network operations, attack, and defense. Other militaries use the much broader term information operations which, although making use of technology, focuses on the more human-related aspects of information use, including (amongst many others) social network analysis, decision analysis, and the human aspects of command and control.

internet and radio transmission(s) can be jammed to disrupt communications, or hijacked for a disinformation campaign.

Television

can be disabled.

Logistics networks

Enemy can be disabled or spoofed, especially online social communities in modern days.

communications networks

transactions can be sabotaged, either with electronic intervention, by leaking sensitive information or by placing disinformation.

Stock exchange

The use of and other surveillance robots or webcams.

drones

Communication management

Synthetic media

The organized use of social media and other online content-generation platforms can be used to influence public perceptions.

[8]

Information warfare has been described as "the use of information to achieve our national objectives."[6] According to NATO, "Information war is an operation conducted in order to gain an information advantage over the opponent."[7]


Information warfare can take many forms:


The United States Air Force has had Information Warfare Squadrons since the 1980s. In fact, the official mission of the U.S. Air Force is now "To fly, fight and win... in air, space and cyberspace",[9] with the latter referring to its information warfare role.


As the U.S. Air Force often risks aircraft and aircrews to attack strategic enemy communications targets, remotely disabling such targets using software and other means can provide a safer alternative. In addition, disabling such networks electronically (instead of explosively) also allows them to be quickly re-enabled after the enemy territory is occupied. Similarly, counter-information warfare units are employed to deny such capability to the enemy. The first application of these techniques was used against Iraqi communications networks in the Gulf War.


Also during the Gulf War, Dutch hackers allegedly stole information about U.S. troop movements from U.S. Defense Department computers and tried to sell it to the Iraqis, who thought it was a hoax and turned it down.[10] In January 1999, U.S. Air Intelligence computers were hit by a coordinated attack (Moonlight Maze), part of which came from a Russian mainframe. This could not be confirmed as a Russian cyber attack due to non-attribution – the principle that online identity may not serve as proof of real-world identity.[11][12][13]

New battlefield[edit]

The innovation of more advanced and autonomous ICTs has engendered a new revolution in military affairs, which encompasses nations' use of ICTs in both cyberspace and the physical battlefield to wage war against their adversaries. The three most prevalent revolutions in military affairs come in the form of cyberattacks, autonomous robots and communication management.


Within the realm of cyberspace, there are two primary weapons: network-centric warfare and C4ISR, which denotes integrated Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance. Furthermore, cyberspace attacks initiated by one nation against another nation have an underlying goal of gaining information superiority over the attacked party, which includes disrupting or denying the victimized party's ability to gather and distribute information. A real-world occurrence that illustrated the dangerous potential of cyberattacks transpired in 2007, when a strike from Israeli forces demolished an alleged nuclear reactor in Syria that was being constructed via a collaborative effort between Syria and North Korea. Accompanied by the strike was a cyberattack on Syria's air defenses, which left them blind to the attack on the nuclear reactor and, ultimately allowed for the attack to occur (New York Times 2014). An example of a more basic attack on a nation within cyberspace is a distributed denial of service (DDOS) attack, which is utilized to hinder networks or websites until they lose their primary functionality. As implied, cyberattacks do not just affect the military party being attacked, but rather the whole population of the victimized nation. Since more aspects of daily life are being integrated into networks in cyberspace, civilian populations can potentially be negatively affected during wartime. For example, if a nation chose to attack another nation's power grid servers in a specific area to disrupt communications, civilians and businesses in that area would also have to deal with power outages, which could potentially lead to economic disruptions as well.


Moreover, physical ICTs have also been implemented into the latest revolution in military affairs by deploying new, more autonomous robots (i.e. – unmanned drones) into the battlefield to carry out duties such as patrolling borders and attacking ground targets. Humans from remote locations pilot many of the unmanned drones, however, some of the more advanced robots, such as the Northrop Grumman X-47B, are capable of autonomous decisions. Despite piloting drones from remote locations, a proportion of drone pilots still suffer from stress factors of more traditional warfare. According to NPR, a study performed by the Pentagon in 2011 found that 29% of drone pilots are "burned out" and undergo high levels of stress. Furthermore, approximately 17% of the drone pilots surveyed as the study were labeled "clinically distressed" with some of those pilots also showing signs of post-traumatic stress disorder.[14]


Modern ICTs have also brought advancements to communications management among military forces. Communication is a vital aspect of war for any involved party and, through the implementation of new ICTs such as data-enabled devices, military forces are now able to disseminate information faster than ever before. For example, some militaries are now employing the use of iPhones to upload data and information gathered by drones in the same area.[15][16]

"Future Mind" Chapter 9. Defense p. 195-201. Acropolis Books LTD, Washington, DC (1989)

Jerome Clayton Glenn

"Information Warfare: Chaos on the Electronic Superhighway" Thunder's Mouth Press (1993)

Winn Schwartau

ed, Information Warfare: Cyberterrorism: Protecting your personal security in the electronic age, Thunder's Mouth Press, 2nd ed, (1996) (ISBN 1560251328).

Winn Schwartau

John Arquilla and David Ronfeldt, , RAND (1997).

In Athena's Camp

Dorothy Denning, Information Warfare and Security, Addison-Wesley (1998) ( 0201433036).

ISBN

James Adams, The Next World War: Computers are the Weapons and the Front line is Everywhere, Simon and Schuster (1998) ( 0684834529).

ISBN

Edward Waltz, Information Warfare Principles and Operations, Artech House, 1998,  0-89006-511-X

ISBN

John Arquilla and David Ronfeldt, , RAND (2001) (ISBN 0833030302).

Networks and Netwars: The Future of Terror, Crime, and Militancy

Ishmael Jones, The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture, Encounter Books, New York (2010) ( 978-1594032233). Information/intelligence warfare.

ISBN

Gregory J. Rattray, Strategic Warfare in Cyberspace, MIT Press (2001) ( 0262182092).

ISBN

Anthony H. Cordesman, Cyber-threats, Information Warfare, and Critical Infrastructure Protection: DEFENDING THE US HOMELAND (2002) ( 0275974235).

ISBN

Leigh Armistead, Information Operations: The Hard Reality of Soft Power, Joint Forces Staff College and the National Security Agency (2004) ( 1574886991).

ISBN

Thomas Rid, War and Media Operations: The US Military and the Press from Vietnam to Iraq, Routledge (2007) ( 0415416590).

ISBN

Politically Motivated Computer Crime

Archived 2007-10-31 at the Wayback Machine, Air University, U.S. Air Force.

Cyberspace and Information Operations Study Center

IWS - The Information Warfare Site

Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)

Twitter: InfowarMonitor

Information Warfare, I-War, IW, C4I, Cyberwar

Archived 2007-10-14 at the Wayback Machine

Federation of American Scientists - IW Resources

http://www.crows.org The Electronic Warfare and Information Operations Association.

Association of Old Crows

C4I.org - Computer Security & Intelligence

Air Power Australia.

Information Warfare, Information Operations and Electronic Attack Capabilities

Archived 2017-06-11 at the Wayback Machine, The National Academies.

Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare

Global Information Society Project, World Policy Institute.

Program on Information and Warfare

Archived 2020-10-27 at the Wayback Machine Information Warriors is web forum dedicated to the discussion of Navy Information Warfare.

Information Warriors

Mastermind Corporation Information Warfare Tactics Analysis

Nature's Exploitation of Information to Win Survival Contests, Monash University, Computer Science.

Information Warfare in Biology