Information Warfare: Related Issues
Communication without "intelligence" is noise,
intelligence" without communication is irrelevant
of excellence. Subjugating the opposing army without a
fight is the true exponent of excellence.
Sun Tzu, The Art of War
Information warfare is one of the pleasant sounding terms to which we have grown accustomed
over the past decade. It is normally associated with both military and civilian arenas.
Despite the fact that this topic has been the object of several studies done by both strategy
analysts and defense organizations, no one has been able to precisely define "information
warfare." However, everyone agrees on one thing: in the digital era, information and its
dissemination have reached the status of a vital strategic resource. In light of this situation, a
large number of’ military and civilian organizations have already established their work
processes and methods so as to include and integrate this "new" concept in their fields.
The term "information warfare" means to perform the same tasks we used to perform but at a
much faster rate by occasionally using equipment derived from our society’s technological
evolution. In fact, there is nothing really new at the root of the term. One can even ascertain that
the basic ideas of the information warfare concept have been around for centuries.
The real problem concerning the information warfare concept lies in the fact that we have a set
of old concepts dressed in new clothing. Depending on whom we talk to, information warfare
encompasses attack on command and control systems, operational security, cyberwar, and
electronic warfare. Hacking, information-based warfare, and even psychological warfare.
Attack on command and control systems
Attack on command and control systems takes place through actions that make it more difficult
for the enemy to control his forces and communicate with them. This embodies one of the oldest
principles of war, and, even if our forefathers did not call it information warfare, it is probably its
most important aspect. The key to the problem is the ability to make decisions faster than the
opponent and then act according to those decisions.
The decision cycle contains no mysteries -- it is a fact of life. Everything we do is based on
decision cycles. In the military arena, the decision cycle can be encapsulated in the acronym
OODA (Observe, Orient our attention toward what has just happened, Decide how to proceed.
and Act). Information warfare can, for example deny our observation. The lack of information
prevents us from adequately orienting our attention, making a decision, and, most importantly,
acting in an effective way.
As an example, let us suppose that a computer genius was able to enter one of the networks that
serve NATO’s information systems. The enemy hacker deleted some information and changed
data so as to create a false picture of what was happening on the Kosovo battlefield. After the
operation, NATO commands would see a false version of reality and would inescapably end up
making disastrous decisions, such as bombing areas where Serhian munitions warehouses or
armored vehicles were supposed to be, but where in fact Albanian refugee camps are located.
Operational Security
Operational security is designed to ensure the preservation of our secrets and the place where
they are kept. It is accomplished by safeguarding secret documents in safe places, thus assuring
that electronic messages be coded and not easily accessed by the enemy, and by training our
troops to keep important information only to themselves. Known as OPSEC in the civilian
business world, this concept gave rise to some famous World War II slogans, such as "loose lips
sink ships" and "the enemy is listening."
Electronic Warfare
Electronic warfare uses electronic means to neutralize enemy command and control systems,
working on their communication and electronic systems while ensuring the integrity of their own
systems. This type of action has existed since the military began using the telegraph in 1850.
Equipment specific to electronic warfare began to appear in an efficient and coordinated way in
World War II. Today, it is a standard component of any army’s inventory.
Cyberwar
The cyberwar concept, though at times referred to as being different from the electronic warfare
concept, can be considered as one of its integral parts. Thus, cyberwar encompasses the use of all
electronic and information systems "tools" available to bring down enemy electronic and
communication systems while keeping our own systems operational. Many of the actions to be
developed in this area are still not clearly defined due basically to the fact that new equipment is
emerging continuously and that only recently did the military start considering this technological
area as a new way of war. Some elements typical of cyberwar appear here and there in an
irregular and not very systematic way as opportunities for their use emerge. "Cybersoldiers" are
normally confined to combat information centers (CIC) equipped with monitors, computers, and
other high-technology equipment maintained by expert technicians. Their mission consists of
ensuring that commanders receive current data about the situation on the battlefield.
The US Navy introduced the use of CICs for the first time about 50 years ago. Since then, their
use has expanded. They have also been adopted by the other branches of the US military as well
as by the armed forces of other countries.
Hacking
Hacking or "electronic guerrilla warfare" can be used by any person at any place in the world.
All one needs are a computer, a modem, and some determination. This phenomenon is
something recent due to the fact that it only has been a few years since we began to witness the
introduction of international computer networks that virtually anyone can access. The Internet is
the best example of this.
A large number computer programmers, technicians, and surfers with free time in their hands
and malicious intentions surf computer networks in search of security holes or breaches in
information systems belonging to the armed forces or major corporations. This has been taking
place on a consistent basis for more than a decade due to a certain lack of organization in the
network structures operated by the government and some corporations. Over the past decade
there have been a few attempts to turn the hacker problem into a "military weapon." This process
has neither been agreed to nor easily put into practice, but in light of the major advantage one
can gain by penetrating the enemy information system in times of war, it is worthy of serious
consideration. This has happened only in fiction, but many countries are already working toward
using this scenario in the next conflict in which they are involved.
Today, hacking is an extremely attractive strategic activity for international terrorism. A
testimony to that fact is the news disseminated by the 21 August 1991 Correio da Manhã,
whereby Ramos Horta threatened Jakarta with computer terrorism activities to be carried out by
100 hackers (from Europe. Canada, and the United States) against the Indonesian banking
systems.
Information Jamming
Information jamming is a variation of the concept underlying the old practice of physically
blocking an enemy’s territory, thus preventing him from receiving resources and goods. Due to
the extreme importance of today’s information, it is possible to effect a real "information
jamming" if we shoot down the satellites and destroy the cable links and microwave antennas
that channel information into enemy territory. After some time, this situation will he extremely
difficult to overcome, especially in the more technical areas.
Information-Based Warfare
This is an area that is more associated with the concept we are attempting to define. In the 1960s,
it was discovered that the mass media could make a decisive impact on the political decisionmaking
process. Even before then, several governments in all parts of the world realized the
importance of controlling the media (especially the print medium) and directing them to meet
their own interests. As an increasing number of people began to see the way the media
operates—collecting and disseminating information—more people began to participate in the
handling of the news, thus influencing what is disseminated by the mass media.
A good example of information-based warfare could be observed during the 1991 Gulf War,
when CNN, through Peter Arnett, showed the war live via satellite to the whole world. We
watched the US use television as a way of bringing pressure to bear on national and international
public opinion.
Iraq also tried, with some success, to sway public opinion in its favor. The Iraqi cause remained
popular among the general population of many Arab and third world countries due to the way the
Iraqi leadership exploited the visibility CNN and other international media gave the conflict. The
"media offensive" did affect public opinion somewhat in the nations involved in the conflict.
More recent examples of the use of the mass media as elements to pressure public opinion and
the international community are the recent conflict in Kosovo and the ongoing process for the
independence of East Timor.
Psychological Warfare
Widely used, psychological warfare is nothing more than disseminating misleading information
designed to demoralize the enemy. This type of action continues to be frequently used with
marked success. However, there is another aspect of information warfare that has to he
considered. Information warfare is defined largely by the way information is used as a weapon
against enemy forces. Within a context of psychological warfare, we can work on the
information that travels through the enemy’s systems to prevent him from using it, or we can
defend ourselves against this type of action by attempting to delete the information the enemy
covertly handles and sends to us via computer, telephone, or even through any other means.
The Gulf War, often described as the first information war, is once again a good example of that
type of action. The coalition carried out an extremely effective psychological warfare campaign
against Iraqi forces, at least if we consider the number of Iraqi soldiers and how quickly they
would surrender whenever Allied ground troops would approach them. In fact, this operation
went as planned since the pamphlets that were dropped over Iraqi troops told them exactly how
they should surrender and showed the advantages of surrendering (becoming guests of honor of
the Saudis). Both sides also used the media to reinforce the operation in an attempt to influence
the enemy forces’ will to fight.