INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Cyber Crime and Technology
IAEA International Atomic Energy Agency EPR-Public Communications L-09 Audiences and Communication Channels.
Air Force Core Functions
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Chapter 2 Digital Terrorism.
INTRODUCTION TO SPECIAL OPERATIONSUnclassified Special Operations Overview Click arrow below to continue WARNING - This document contains technical data.
Special Operations Center of Excellence
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Global Media (Straubhaar & LaRose, 2006). Globalization “Globalization of media is probably most pervasive at the level of media industry models – ways.
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
What is Globalization? The increasing interdependence and interconnectedness The increasing interdependence and interconnectedness of places globally.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
C4ISR and Information Warfare
Introduction to Organizational Communication
Submitted by: Abhashree Pradhan CA (1)
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Chapter 7 The Mass Media.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
The Study of Geography Why it Matters?? Globalization: The increasing interdependence and interconnectedness of places globally.The increasing interdependence.
Application of Air power. Promoting International Relations Preserving Peace When disaster strikes in whatever form - famine, flood or earthquake - speed.
Information Warfare Playgrounds to Battlegrounds.
List 10 things that students today hope for and 10 things that they fear.
Security in Computer System 491 CS-G(172) By Manesh T
Objectives Describe the development of the computer and its impact on business and industry. Analyze the impact of new technology on communications. Explain.
Situating International Humanitarian Law (IHL) ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Copyright © 2011 Pearson Education, Inc. Publishing as Longman.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
Changed Nature of Intl Security, Human Security, Securitization Jang, Hanna.
C4ISR and Information Warfare Naval Weapons Systems.
Indicators and methods - to study childhood in the center of social and economic transformation in China.
Information Warfare Playgrounds to Battlegrounds.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
By CPT Robert L. Crabtree
Chapter Six, Section Three “Making Foreign Policy”
Operations Overview The levels of war are doctrinal perspectives that clarify the links between strategic objectives and tactical actions.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
American Foreign Policy. America the Giant United States foreign policy has a profound impact around the world militarily, politically, culturally and.
Civil Military Operations and the Fundamentals of Joint Operations.
“Making Foreign Policy”. “Foreign Policy” “Foreign Policy” is the overall plan for dealing with other nations. It essentially deals with four (4) goals.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Peace Support Training Centre / Centre de formation pour le soutien de la paix INTRO TO PSYOPS AIYJ PSTC Template designed by Maj McQueen.
Tuesday, January 19th Good Morning, Happy Tuesday! 
Historical Review of Information Warfare
WEEK 4 September 11th, Global Terrorism and War on Terrorism
7 Communication C H A P T E R Copyright © Allyn and Bacon 2009
Lessons for the 21st Century
Command Indoctrination Operations Security DD MMM YY
Chapter1 introcuction.
Operations Security (OPSEC)
Chapter Six, Section Three “Making Foreign Policy”
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Small unit proficiency
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection, storage, analysis, and transmission of information. Presentation Courtesy of Chris Shar, PhD Student, PSU

Defining Information Warfare Information Warfare: Any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against those actions; and exploiting our own military information functions.

Direct and Indirect Information Warfare Direct Information Warfare changes the adversary’s information without involving the intervening perceptive and analytical functions. Indirect Information Warfare changes the adversary’s information by creating phenomena that the adversary must then observe and analyze.

Information Warfare: Past and Present Information warfare is not a new phenomenon. For centuries, cryptography has been used to conceal and reveal messages. The word cipher is derived from the seventh century Arabic word sifr, meaning “nothing.”

Two of the more famous information warfare examples include the German Enigma machine and the use of Native American “codetalkers.” Since the 1970s, extraordinary improvements in the technical means of collecting, storing, analyzing, and transmitting information have contributed to codemaking and codebreaking as well as begun the shift toward a “Revolution in Military Affairs.”

USS Gearing, DD710 during WWII

USS Gearing, DD710 in the late 1960s

USS Gary, FFG 51

Technology and the Revolution in Military Affairs From optical to electrical telegraphy, from telegraphy over radio to satellite links, warfare over the last two centuries has evolved exponentially. Not without reason are delay times also called dead times in technical-military jargon. He who knows a few seconds too late is punished by a hostile first strike.

Telecommunications technologies have the ability in the civilian realm to transform cultures. Switching from a print-based culture to one encompassing radio, television, telephones, and the Internet has a profound effect. Likewise, the mindset of military affairs must also adapt to incredible changes in the technology of communications.

Information Age Warfare Vs. Information Warfare Information Age Warfare Information technology is a tool to impart combat operations with unprecedented economies of time and force. Information Warfare Information warfare views information itself as a separate realm, potent weapon, and lucrative target.

What Constitutes Information Warfare? Traditional forms of Information Warfare 1. Psychological Operations 2. Electronic Warfare 3. Physical Destruction 4. Security Measures 5. Information Attack

Psychological Ops Psychological operations use information to affect the enemy’s reasoning. “We can be sure that the global battlefield of the 21st century will be over information -- the dissemination or withholding of facts, the interpretation of events, the presentation or distortion of ideas and ideologies, and the communication of messages and symbols carefully prepared to provoke a particular reaction, either conscious or unconscious, from a target audience.”

Electronic Warfare Electronic Warfare denies accurate information to the enemy. Any military action involving the use of electromagnetic energy to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum and the action which retains friendly use of the electromagnetic spectrum. The three divisions within EW include electronic countermeasures, electronic counter-countermeasures, and electronic warfare support measures.

Military Deception Military deception misleads the enemy about our capabilities or intentions. Successful deception causes enemies to derive and accept desired appreciations of military capabilities, intentions, operations, or other activities that evoke foreign actions that contribute to the originator’s objectives.

Physical Destruction Physical destruction can assist information warfare by affecting information system elements through destructive power. The means of physical attack range from conventional bombs to electromagnetic pulse weapons. This is one of the most important areas where the United States may be vulnerable to attack.

Security Measures Security measures seek to keep the adversary from learning about our military capabilities and intentions.

Cyberterrorism and Other Potenial Attacks What types of information are at risk? 1. Power delivery 2. Communications 3. Aviation 4. Financial services 5. Medical records 6. Criminal records 7. Business plans

The Clash of Civilizations There will be an increase of non-state actors participating on the world stage of events. This makes any nation concerned with cyberterroism consider an entire host of new options when it comes to threats to national security.

New Ways of Conceiving the Global World Incredibly powerful and vastly expanding communications technologies have forced us to consider the world as a smaller environment. Multinational corporations and communications networks have also helped to diminish the importance of national borders.

As Westernized nations permeate the global communications markets, questions of cultural imperialism raise the potential for other nations to challenge the encroaching influence that the United States and similar nations have on politics, economics, and communications. Economic Success Breeds Resentment

All four branches of the military as well as intelligence agencies are increasingly recognizing the importance of information as an asset and weapon. Communications scholars and researchers should assume a role as participants in the discussion and execution of Information Warfare practice. Beyond Peace