0% found this document useful (0 votes)
13 views9 pages

Information

Information warfare encompasses various tactics aimed at manipulating and controlling information to gain strategic advantages in military and civilian contexts. It includes concepts such as cyberwar, operational security, electronic warfare, and psychological warfare, all of which have historical roots but have evolved with technological advancements. The document emphasizes the importance of information as a vital resource in modern conflicts and the need for organizations to adapt their methods accordingly.

Uploaded by

akingbalafavour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Information

Information warfare encompasses various tactics aimed at manipulating and controlling information to gain strategic advantages in military and civilian contexts. It includes concepts such as cyberwar, operational security, electronic warfare, and psychological warfare, all of which have historical roots but have evolved with technological advancements. The document emphasizes the importance of information as a vital resource in modern conflicts and the need for organizations to adapt their methods accordingly.

Uploaded by

akingbalafavour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Information Warfare: Related Issues

Communication without "intelligence" is noise,

intelligence" without communication is irrelevant

of excellence. Subjugating the opposing army without a

fight is the true exponent of excellence.

Sun Tzu, The Art of War

Information warfare is one of the pleasant sounding terms to which we have grown accustomed

over the past decade. It is normally associated with both military and civilian arenas.

Despite the fact that this topic has been the object of several studies done by both strategy

analysts and defense organizations, no one has been able to precisely define "information

warfare." However, everyone agrees on one thing: in the digital era, information and its

dissemination have reached the status of a vital strategic resource. In light of this situation, a

large number of’ military and civilian organizations have already established their work

processes and methods so as to include and integrate this "new" concept in their fields.

The term "information warfare" means to perform the same tasks we used to perform but at a

much faster rate by occasionally using equipment derived from our society’s technological
evolution. In fact, there is nothing really new at the root of the term. One can even ascertain that

the basic ideas of the information warfare concept have been around for centuries.

The real problem concerning the information warfare concept lies in the fact that we have a set

of old concepts dressed in new clothing. Depending on whom we talk to, information warfare

encompasses attack on command and control systems, operational security, cyberwar, and

electronic warfare. Hacking, information-based warfare, and even psychological warfare.

Attack on command and control systems

Attack on command and control systems takes place through actions that make it more difficult

for the enemy to control his forces and communicate with them. This embodies one of the oldest

principles of war, and, even if our forefathers did not call it information warfare, it is probably its

most important aspect. The key to the problem is the ability to make decisions faster than the

opponent and then act according to those decisions.

The decision cycle contains no mysteries -- it is a fact of life. Everything we do is based on

decision cycles. In the military arena, the decision cycle can be encapsulated in the acronym

OODA (Observe, Orient our attention toward what has just happened, Decide how to proceed.

and Act). Information warfare can, for example deny our observation. The lack of information
prevents us from adequately orienting our attention, making a decision, and, most importantly,

acting in an effective way.

As an example, let us suppose that a computer genius was able to enter one of the networks that

serve NATO’s information systems. The enemy hacker deleted some information and changed

data so as to create a false picture of what was happening on the Kosovo battlefield. After the

operation, NATO commands would see a false version of reality and would inescapably end up

making disastrous decisions, such as bombing areas where Serhian munitions warehouses or

armored vehicles were supposed to be, but where in fact Albanian refugee camps are located.

Operational Security

Operational security is designed to ensure the preservation of our secrets and the place where

they are kept. It is accomplished by safeguarding secret documents in safe places, thus assuring

that electronic messages be coded and not easily accessed by the enemy, and by training our

troops to keep important information only to themselves. Known as OPSEC in the civilian

business world, this concept gave rise to some famous World War II slogans, such as "loose lips

sink ships" and "the enemy is listening."

Electronic Warfare
Electronic warfare uses electronic means to neutralize enemy command and control systems,

working on their communication and electronic systems while ensuring the integrity of their own

systems. This type of action has existed since the military began using the telegraph in 1850.

Equipment specific to electronic warfare began to appear in an efficient and coordinated way in

World War II. Today, it is a standard component of any army’s inventory.

Cyberwar

The cyberwar concept, though at times referred to as being different from the electronic warfare

concept, can be considered as one of its integral parts. Thus, cyberwar encompasses the use of all

electronic and information systems "tools" available to bring down enemy electronic and

communication systems while keeping our own systems operational. Many of the actions to be

developed in this area are still not clearly defined due basically to the fact that new equipment is

emerging continuously and that only recently did the military start considering this technological

area as a new way of war. Some elements typical of cyberwar appear here and there in an

irregular and not very systematic way as opportunities for their use emerge. "Cybersoldiers" are

normally confined to combat information centers (CIC) equipped with monitors, computers, and

other high-technology equipment maintained by expert technicians. Their mission consists of


ensuring that commanders receive current data about the situation on the battlefield.

The US Navy introduced the use of CICs for the first time about 50 years ago. Since then, their

use has expanded. They have also been adopted by the other branches of the US military as well

as by the armed forces of other countries.

Hacking

Hacking or "electronic guerrilla warfare" can be used by any person at any place in the world.

All one needs are a computer, a modem, and some determination. This phenomenon is

something recent due to the fact that it only has been a few years since we began to witness the

introduction of international computer networks that virtually anyone can access. The Internet is

the best example of this.

A large number computer programmers, technicians, and surfers with free time in their hands

and malicious intentions surf computer networks in search of security holes or breaches in

information systems belonging to the armed forces or major corporations. This has been taking

place on a consistent basis for more than a decade due to a certain lack of organization in the

network structures operated by the government and some corporations. Over the past decade

there have been a few attempts to turn the hacker problem into a "military weapon." This process
has neither been agreed to nor easily put into practice, but in light of the major advantage one

can gain by penetrating the enemy information system in times of war, it is worthy of serious

consideration. This has happened only in fiction, but many countries are already working toward

using this scenario in the next conflict in which they are involved.

Today, hacking is an extremely attractive strategic activity for international terrorism. A

testimony to that fact is the news disseminated by the 21 August 1991 Correio da Manhã,

whereby Ramos Horta threatened Jakarta with computer terrorism activities to be carried out by

100 hackers (from Europe. Canada, and the United States) against the Indonesian banking

systems.

Information Jamming

Information jamming is a variation of the concept underlying the old practice of physically

blocking an enemy’s territory, thus preventing him from receiving resources and goods. Due to

the extreme importance of today’s information, it is possible to effect a real "information

jamming" if we shoot down the satellites and destroy the cable links and microwave antennas

that channel information into enemy territory. After some time, this situation will he extremely

difficult to overcome, especially in the more technical areas.


Information-Based Warfare

This is an area that is more associated with the concept we are attempting to define. In the 1960s,

it was discovered that the mass media could make a decisive impact on the political decisionmaking
process. Even before then, several governments in all parts of the world realized the

importance of controlling the media (especially the print medium) and directing them to meet

their own interests. As an increasing number of people began to see the way the media

operates—collecting and disseminating information—more people began to participate in the

handling of the news, thus influencing what is disseminated by the mass media.

A good example of information-based warfare could be observed during the 1991 Gulf War,

when CNN, through Peter Arnett, showed the war live via satellite to the whole world. We

watched the US use television as a way of bringing pressure to bear on national and international

public opinion.

Iraq also tried, with some success, to sway public opinion in its favor. The Iraqi cause remained

popular among the general population of many Arab and third world countries due to the way the

Iraqi leadership exploited the visibility CNN and other international media gave the conflict. The

"media offensive" did affect public opinion somewhat in the nations involved in the conflict.
More recent examples of the use of the mass media as elements to pressure public opinion and

the international community are the recent conflict in Kosovo and the ongoing process for the

independence of East Timor.

Psychological Warfare

Widely used, psychological warfare is nothing more than disseminating misleading information

designed to demoralize the enemy. This type of action continues to be frequently used with

marked success. However, there is another aspect of information warfare that has to he

considered. Information warfare is defined largely by the way information is used as a weapon

against enemy forces. Within a context of psychological warfare, we can work on the

information that travels through the enemy’s systems to prevent him from using it, or we can

defend ourselves against this type of action by attempting to delete the information the enemy

covertly handles and sends to us via computer, telephone, or even through any other means.

The Gulf War, often described as the first information war, is once again a good example of that

type of action. The coalition carried out an extremely effective psychological warfare campaign

against Iraqi forces, at least if we consider the number of Iraqi soldiers and how quickly they

would surrender whenever Allied ground troops would approach them. In fact, this operation
went as planned since the pamphlets that were dropped over Iraqi troops told them exactly how

they should surrender and showed the advantages of surrendering (becoming guests of honor of

the Saudis). Both sides also used the media to reinforce the operation in an attempt to influence

the enemy forces’ will to fight.

You might also like