Historical Review of Information Warfare

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Cyber Crime and Technology
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Chapter 2 Digital Terrorism.
Special Operations Center of Excellence
Introduction to Information Operations Attaché Corps- SEP 09
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Intangible Cultural Heritage Section
INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,
1 Chapter 17 Advertising Effects. 2 Advertising in Today’s Media Environment Medium “Any transmission vehicle or device through which communication may.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
THE VITAL ROLE OF PEOPLE SKILLS TO THE ADMINISTRATIVE PROFESSION INTERNATIONAL ADMINISTRATIVE PROFESSIONALS DAY NATIONAL ASSOCIATION OF SECRETARIES & ADMINISTRATIVE.
Building Capacities for Management of IPRs in Countries in Transition. WIPO Tools. Tbilisi, November 12, 2012 Mr. Michal Svantner, Director, Division for.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Application of Air power. Promoting International Relations Preserving Peace When disaster strikes in whatever form - famine, flood or earthquake - speed.
Information Warfare Playgrounds to Battlegrounds.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Joint Vision Why a New Document n Sustain and build on momentum of Joint Vision process ã Continue evolution of the joint force n Lessons learned.
C4ISR and Information Warfare Naval Weapons Systems.
Branch Orientation Benjamin Brownlee MS-I W&J ROTC.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Ret) Peter Leentjes Center of Excellence in Disaster.
7/10/1973: Syria captures southern Golan Heights 8/10/1973: Israel launches first counterattack 28/10/1973: 12/10/1973: U.S. sends additional arms to Israel.
Information Warfare Playgrounds to Battlegrounds.
By CPT Robert L. Crabtree
UNDERSTANDING THE NEW U.S. NATIONAL SPACE POLICY John M. Logsdon Director, Space Policy Institute Elliott School of International Affairs The George Washington.
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
Section 2: The Cold War Abroad and at Home.  Objectives:  Explain how the Marshall Plan, Berlin airlift, and the creation of NATO helped achieve American.
Specific traits of globalization in culture. Globalization is a process of interaction and integration among the people, companies, and governments of.
Cable Locator. About US We are additionally Electronic Counter Surveillance master's prompting government and law authorization offices worldwide on financially.
SUSTAINABLE TOURISM A paper to be presented at the sustainable Tourism course at Ngurndoto Lodge in Arusha, February 19th – 26th, By Antiquities.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
ARE THE CURRENT LAWS AND SENTENCES DISPENSED TO OFFENDERS FOR ACTS OF VIOLENCE AGAINST WOMEN SUFFICIENT AND A REFLECTION OF SOCIETIES ATTITUDES TODAY?
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
SEMINAR ON SEMINAR ON RADAR JAMMING RADAR JAMMING PRESENTED PRESENTED BY BY K PAVAN KUMAR SATEESH KUMAR P K PAVAN KUMAR SATEESH KUMAR P REG NO.:
The Role of Telecommunications in Our Society
CS457 Introduction to Information Security Systems
OF THE ХI KAZENERGY EURASIAN FORUM “SECURING THE FUTURE OF ENERGY”
Topics in Today's World #3b: Conflict in the Middle East & the U.S.A.
International Terrorism: Defined
What is Cyber Security Cyber War Cyber Power?
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Describe the U.S. congressional act that created JROTC
Auditing Sustainable Development Goals
Unit 6 Academic Vocabulary
WEEK 4 September 11th, Global Terrorism and War on Terrorism
Introduction to the Victorian state disability plan 2013–2016
Diffusion of Innovation
ROTARY INTERNATIONAL DISTRICT 3141
Digital citizenship
Digital Signature.
How ICT Regulation Creates a Framework to Enhance Economic Development
Multi-Domain Battle: Achieving Cross-Domain Synergy
Introduction to Social Power
CULTURAL DIVERSITY Part 1.
Operations Security (OPSEC)
UNIT FOUR| DEFENSE & SECURITY
Introducing History.
Defence Requirements Authority for Culture and Language (DRACL)
Technology and society
CONSUMER RIGHTS AND ICT
ICT Policy سياسات تكنولوجيا المعلومات والاتصالات
Joint Vision 2020.
CYBERTERRORISM.
Presentation transcript:

Historical Review of Information Warfare Week_3

INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection, storage, analysis, and transmission of information.

Information Warfare Definition Information Warfare: Any activity to deny, abuse, degenerate, or decimate the adversary's data and its capacities; ensuring ourselves against those activities; and misusing our own military data capacities. .

Types of Information Warfare Direct Information Coordinate Information Warfare changes the enemy's data without including the mediating keen and expository capacities Indirect Information Roundabout Information Warfare changes the foe's data by making wonders that the foe should then watch and break down. .

Information Warfare Background Information warfare has a proven history and not a new innovation or application For quite a long time, cryptography has been utilized to hide and uncover messages. The word figure is gotten from the seventh century Arabic word sifr, signifying "nothing."

Information warfare examples Since the 1970s, remarkable enhancements in the specialized methods for gathering, putting away, breaking down, and transmitting data have added to code making and codebreaking and started the move toward an “Revolution in Military Affairs.

USS Gearing, DD710 during WWII

USS Gearing, DD710 in the late 1960s

USS Gary, FFG 51

Military Affairs Technology Revolution From optical to electrical telecommunication, from telecommunication over radio to satellite connections, fighting in the course of the most recent two centuries has advanced exponentially. Not immediately times likewise called dead circumstances in specialized military language. He who knows a couple of moments past the point of no return is rebuffed by a threatening first strike. (Leyden, 2007)

Broadcast communications advancements have the capacity in the regular citizen domain to change societies. Changing from a print-based culture to one incorporating radio, TV, phones, and the Internet has a significant impact. In like manner, the attitude of military issues should likewise adjust to amazing changes in the innovation of interchanges.

Customary types of Information Warfare Mental Operations Electronic Warfare Physical Destruction Safety efforts Data Attack

Psychological Ops Psychological operations utilized various information types and source to manipulate the enemies. “We can make certain that the worldwide combat zone of the 21st century will be over data - the spread or withholding of realities, the elucidation of occasions, the introduction or twisting of thoughts and belief systems, and the correspondence of messages and images deliberately arranged to incite a specific response, either cognizant or oblivious, from an intended interest group” (Fulghum, 2007).

Electronic Warfare Electronic Warfare does not provide any accurate information to the enemies i.e. provide misleading information Any military activity including the utilization of electromagnetic vitality to decide, misuse, lessen, or avert unfriendly utilization of the electromagnetic range and the activity which holds inviting utilization of the electromagnetic range. The three divisions inside EW incorporate electronic countermeasures, electronic counter-countermeasures, and electronic fighting bolster measures.

Military Trickery It is also a type of misleading the enemies Fruitful trickery makes foes infer and acknowledge wanted thanks of military capacities, aims, operations, or different exercises that summon outside activities that add to the originator's targets.

Physical Damage It is achieved through a destructive power The methods for physical assault go from traditional bombs to electromagnetic heartbeat weapons. This is a standout amongst the most imperative territories where the United States might be helpless against assault.. (Fulghum, 2007). .

Security Measures It is set up to learn about military adherence t guidance, understanding resources capability. It sets to measure rates of success in every operation (Fulghum, 2007).

Modern Society Conflicts There will be an expansion of non-state performing artists taking an interest on the world phase of occasions. This makes any country worried with cyber-terroism consider a whole host of new alternatives with regards to dangers to national security.

New Approach and Methods Unbelievably intense and endlessly extending interchanges advancements have constrained us to consider the world as a littler situation. Multinational companies and interchanges systems have likewise reduced the significance of national fringes. (Fulghum, 2007).

Economic Approach Westernized countries penetrate the worldwide interchanges markets, inquiries of social dominion raise the potential for different countries to challenge the infringing impact that the United States and comparative countries have on governmental issues, financial aspects, and correspondences. (Fulghum, 2007). Devolution

Achieving Peace Each of the four branches of the military and in addition knowledge offices are progressively perceiving the significance of data as an advantage and weapon. Interchanges researchers and analysts ought to accept a part as members in the discourse and execution of Information Warfare hone..

References Leyden, J. (4 October 2007). "Israel suspected of 'hacking' Syrian air defences". The Register. Retrieved 2007-10-05. Fulghum, D. A. (3 October 2007). "Why Syria's Air Defenses Failed to Detect Israelis". Aviation Week and Space Technology. Retrieved 2007-10-05. Fulghum, D. A. (14 January 2007). "Technology Will Be Key to Iraq Buildup". Aviation Week and Space Technology. DOCUMENT CALLED IO IN OEF AND IF -saved in your folder "SOMS-B 2 MRBS Antenna System". Federal Business Opportunities. Retrieved 2012-04-18.