Information Warfare

Defeat the enemy before battle - a warfare revolution in the 21 st century ?

by Gunilla Ivefors
MDA Group
October 22, 1996
Linköping University
Gunillas home page

URL: http://www.ida.liu.se/~guniv/Infowar


What is Information Warfare?

The contents on this site are based mainly on an article by USAF Capt Daniel Magsig: "Information Warfare in the Information Age," published on the web: "http://www.seas.gwu.edu/student/dmagsig/infowar.html", but unfortunately no longer accessible at that site, but still recommended for reading as an introduction to the area!

There are many definitons of information warfare. One definition is:

"Actions taken to achieve information superiority in support of national military strategy by affecting adversary information and information systems while leveraging and defending our information and systems"

(Emmet Paige, assistant secretary of Defense for Command and Control, Communications and Computers, 1995)

Another is:

"Any action to deny, exploit, corrupt, or destroy the enemyís information and itís functions; protecting ourselves against those actions; exploiting our own military information functions"
(U.S. Air Force definition)

One approach is to view Information Warfare from a socio-technical perspective. The elements to consider include: people, technology (e.g. information systems), organisations, and culture. This complicates the issues that need to be looked at and it provides a richer basis for not only defining Information Warfare, but also in using different types of Information Warfare.

What different kinds of Information Warfare are there?

The term Information Warfare is by Dr Martin Libicki divided into seven kinds of warfare:

There are no sharp divisions between these categories: they are somewhat intertwined and IW measures can be used in an interrelated way.

"Information warfare operations can be highly inexpensive, highly effective, and executed by almost anyone anywhere" (Magsig, 1995)

Spectrum ranges over international political and economic competition, military operations other than war, crises, overt conflict, termination of conflict, and restoration of normal political and economic competion.

Arenas of conflict stretch all over society and include military, technological, economic, political, social, and ideological/religious issues.

Information warfare is both offensive and defensive. (Magsig, 1995)

The Persian Gulf war has been classified as the first information war by some researchers. Al Campenís book "The First Information War" (Campen, 1992) describes the elements of information warfare during the Gulf War.

Even though information warfare is not new, we now have the ability to transfer in a targeted manner more information, faster, to more people than ever before.

Rougly 2/3 of the U.S. population is today employed in jobs where the essential product is information, and is therefore vulnerable to information warfare.

Command and control warfare

In the military world, command and control warfare is the most important information warfare.

Intelligence based warfare

Intelligence based warfare is the traditional component of information warfare. However it needs to be updated to reflect the broader scope of information warfare.

Electronic warfare

Electronic warfare is the high-tech ingredient in information warfare specific to military operations and has traditionally been concerned with dominating the electromagnetic spectrum. Electronic warfare needs to be integrated more closely with other forms of warfare.
Chaos on the internet could be seen as one of those integrations.

Psychological operations

Psychological operations include the human aspect of information warfare.
Actions taken by Aideedís forces in Somalia, like braoadcasting images of dead Americans dragged through the streets, succeded in eliminating most public US support for involvement in Somalia.

Hacker warfare

A famous example of Cold War information warfare can be found in Clifford Stollís: The Cuckooís Egg. Tracking a spy through the maze of Computer Espionage.

The book describes international espionage over the internet.

Economic information warfare

Economic information warfare includes crashing stock markets, attacking bank accounts, attacks on currency etc.

Cyberwarfare

Cyberwarfare represents the elements of information warfare that may or may not be realistic at present. It is the science fiction part of information warfare. Cyberwarfare refers to information warfare in a military context while netwar refers to information warfare in a larger societal context.

Countermeasures

Countermeasures to information warfare can be:


References

Alger, J. I. (1995) . Information Warfare, Hackers, Crackers and the Projection of Power. Seminar Notes, GWU.

BBC. The i bomb. (1995) (video, 30 min, BBC Horizon).

Campen, A. D. (1992) . The First Information War: The Story of Communications, Computers, and Intelligence Systems in the Persian Gulf War. Fairfax, Va: AFCEA International Press.

Haeni, R (1996) An introduction to Information Warfare . http://www.seas.gwu.edu/student/reto/infowar/info-war.html

Hoffman, L J (1995) . Building in Big Brother, the cryptographic policy debate.
Springer Verlag.

Institute for the Advanced Study of Information Warfare (IASIW) http://www.psycom.net/iwar.1.html

Magsig, D. (1995) . Information Warfare in the Information Age. ("http://www.seas.gwu.edu/student/dmagsig/infowar.html"). No longer accessible at that site.

Peterson, A. Padgett. (1993) . "Tactical Computers Vulnerable to Malicious Software Attacks." Signal 48 (November): 74-5.

Russel, D., Gangemi, G. T. (1994) . Computer Security Basics. OíReilly & Associates.

Schwartau, W. (1994) . Information Warfare, Chaos on the electronic superhighway.
Thunder´s mounth press.

Sterling, B. (1993) . The Hacker Crackdown. Bantam Books.

Stoll, C. (1989) . The Cuckooís Egg. Tracking a spy through the maze of Computer Espionage. N.Y.: Doubleday, 1989. (Describes international espionage over the internet)

Szafranski, R. (1995) . A theory of Information Warfare. Preparing for 2020. Airpower Journal, Spring: 56-65. http://www.cdsar.af.mil/apj/szfran.html

Waller, D. (1995) . Onward Cyber Soldiers. Time, August 24:38-46.


Last modified: 14-Mar-97 by Gunilla Ivefors, FOA.
<Ivefors@lin.foa.se>