text
stringlengths
97
836
CHAPTER 7 Information warfare opens new avenues for the conduct of politico-military operations.
INFORMATION WARFARE is defined as “action as taken to achieve information superiority by affecting an adversary information, information-based processes, information systems and computer-based networks while defending one's own information, information-based processes, information systems and computer-based networks.
Information Warfare (IW)-is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. IW is the manipulation of information trusted by a target without the target's awareness, so that the target will make decisions against their interest but in the interest of the one conducting information warfare. .
Information warfare can take many forms: Television, internet and radio transmission(s) can be jammed. Television, internet and radio transmission(s) can be hijacked for a disinformation campaign. Logistics networks can be disabled. Enemy communications networks can be disabled or spoofed, especially online social community in modern days. Stock exchange transactions can be sabotaged, either with electronic intervention, by leaking sensitive information or by placing disinformation. The use of drones and other surveillance robots or webcams. Communication management
WEAPONS OF INFORMATION WARFARE a. Information Collection Information collection is included as part of information warfare because “[t]he information revolution implies the rise of a mode of warfare in which... the side that knows more... will enjoy decisive advantages,”. The idea is that the more information one has, the higher his/her situational awareness, which leads to better battle plans and, hopefully, better outcomes. According to Singh, “[t]ill recently, knowing your position and that of the friendly forces was itself a huge task. Precision position locating technologies such as navigation based on the Global Positioning System (GPS) has eased those problems to a large extent. Knowing the position of the enemy has also been made possible to a degree through employment of renaissance and surveillance technologies. ”
b. Information Transport Collecting a large amount of comprehensive information is certainly good practice, but collection is little value if the information sits in a storage facility, unused. As such, the ability to transport information into the hands of those who need it, in a timely manner, is another essential aspect of information warfare. The tools used in this domain are not exactly weapons, but rather civilian technologies put to use in military situations. The most important of these tools is communication infrastructure, composed of networks of computers, router, telephone lines, fiber optic cable, telephones, televisions, radios, and other data transport technologies and protocols.
c. Information Protection One of the most broadly agreed upon aspects of information warfare is the need to minimize the amount of information to which your opponent has access. The weapons used to protect the security of our information fall in two classes. First are those technologies that physically protect our vital data storage facilities, computers, and transport mechanisms. Second, and perhaps more important, are technologies that prevent bits from being seen and intercepted by the enemy. This certainly includes basic computer security technologies such as passwords, as well as more sophisticated technologies like encryption.
d. Information Manipulation Information manipulation in the context of information warfare is the alteration of information with intent to distort the opponent's picture of reality. This can be done using a number of technologies, including computer software for editing text, graphics, video, audio, and other information transport forms. Design of the manipulated data is usually done manually so those in command have control over what picture is being presented to the enemy.
e. Information Disturbance, Degradation and Denial The final aspects of information warfare, according to our earlier definition, are disturbance, degradation, and denial. All three techniques are means to the same general end-preventing the enemy from getting complete, correct information. Because of their similarity, many of the same weapons are used to achieve one or more of the goals. As such, it makes sense to discuss them together. Some of the more popular weapons used to wage these types of information warfare are spoofing, noise introduction, jamming, and overloading.
Types of Information Warfare 1. Command and Control Warfare The integrated use of operations security, military deception, psychological operations, electronic warfare, and physical destruction, mutually supported by intelligence, to deny information to influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions.
2. Intelligence-Based Warfare Intelligence-Based Warfare is a unique concept, you wouldn't know what parts of the network to destroy in order to disrupt decision making if you didn't have good intelligence. 3. Electronic Warfare Electronic Warfare are those techniques that enhance, degrade or intercept the flow of information electronically.
4. Psychological Warfare The term used “to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people”. Psychological Warfare are planned operations to convey selected information and indicators to audiences to influence their emotions, motives, objective reasoning and ultimately the behavior of organizations, groups, and individuals.
5. Hacker Warfare Hacker Warfare is probably the most familiar portion of Information Warfare for most of us. This type of warfare is also known as Computer Network Operations (CNO) and is often portrayed in movies and headlines. One of the biggest areas of IW where the military and civilian lines get mixed up and you start to see military attacks on civilian companies to gain a desired effect on an enemy.
6. Economic Information Warfare It is defined as channeling or blocking information to pursue economic dominance. EIW can be defined as the economic impact of Information Warfare on country or company. There are two areas of EIW, information blockade and information imperialism. A nation or company would cut-off the targeted countries access to outside information. This blockade would cripple the economy of the targeted nation.
7. Cyberwarfare It is the use of information systems against the virtual personas of individuals or groups. It is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
7. 1 CYBER ESPIONAGE Espionage, according to Merriam-Webster, is “the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company. ” Cyberespionage involves the use of information and communication technology (ICT) by individuals, groups, or businesses for some economic benefit or personal gain.
7. 2 INTELLIGENCE GATHERING An intelligence gathering is collecting of information about a particular entity for the benefit of another through the use of more than one, inter-related source.
INTELLIGENCE GATHERING DISCIPLINE 1. Human Intelligence (HUMINT)-is intelligence gathered by means of interpersonal contact, as opposed to the more technical intelligence gathering disciplines. Can provide several kinds of information. It can provide observations during travel or other events from travelers, refugees, escaped friendly POWs, etc. It can provide date on things about which the subject has specific knowledge, which can be another human subject or, in the case of defectors and spies, sensitive information to which they had access. Finally, it can provide information on interpersonal relationship and network of internet.
2. Geospatial Intelligence (GEOINT)-is intelligence about human activity on earth derived from the exploitation and analysis of imagery and geospatial information that describes, assess and visually depicts physical features and geographically referenced activities on the earth.
3. Measurement and Signature Intelligence (MASINT)-is a technical branch of intelligence gathering which serves to detect, track, identify or describe the signature (distinctive characteristics) of fixed or dynamic target sources. This often includes radar intelligence, acoustic intelligence, nuclear intelligence and chemical and biological intelligence. MASINT is defined as scientific and technical intelligence derived from the analysis of data from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latter's measurement and identification.
4. Open-source Intelligence (OSINT)-is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available source (as opposed to covert or clandestine sources). It is not related to open-source software or public intelligence
5. Signals Intelligence (SIGINT)-is intelligence-gathering by interception of signals, whether communications between people (communication intelligence-abbreviate to COMINT) or from electronic signals not directly used in communications (electronic intelligence-abbreviated to ELINT) Signals intelligence is a subset of intelligence collection management. As sensitive information is often encrypted, signals intelligence in turn involves the use of cryptanalysis to decipher the messages. Traffic analysis-the study of who is signaling whom and in what quantity -is also used to derive information.
6. Technical Intelligence (TECHINT)-is intelligence about weapons and equipment used by the armed forces of foreign nations (often referred to as foreign material). The related term, scientific and technical intelligence, addresses information collected on the strategic (i. e. national) level. 7. Cyber Intelligence /Digital Network Intelligence (CYBINT/DNINT)-is gathered from cyberspace or interconnected technology. Technical intelligence is intended primarily to allow the armed forces to avoid technological surprise.
8. Financial Intelligence (FININT) -is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally, the term applies in the context of law enforcement and related activities. One of the main purposes of financial intelligence is to identify financial transactions that may involve tax evasion, money laundering or some other criminal activity. FININT may also be involved in identifying financing of criminal and terrorist organizations.
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
33
Edit dataset card