Presentation is loading. Please wait.

Presentation is loading. Please wait.

Historical Review of Information Warfare

Similar presentations


Presentation on theme: "Historical Review of Information Warfare"— Presentation transcript:

1 Historical Review of Information Warfare
Week_3

2 INFORMATION WARFARE Information is not a new component to conflict.
The Information Age, however, has ushered in extraordinary improvements in collection, storage, analysis, and transmission of information.

3 Information Warfare Definition
Information Warfare: Any activity to deny, abuse, degenerate, or decimate the adversary's data and its capacities; ensuring ourselves against those activities; and misusing our own military data capacities. .

4 Types of Information Warfare
Direct Information Coordinate Information Warfare changes the enemy's data without including the mediating keen and expository capacities Indirect Information Roundabout Information Warfare changes the foe's data by making wonders that the foe should then watch and break down. .

5 Information Warfare Background
Information warfare has a proven history and not a new innovation or application For quite a long time, cryptography has been utilized to hide and uncover messages. The word figure is gotten from the seventh century Arabic word sifr, signifying "nothing."

6 Information warfare examples
Since the 1970s, remarkable enhancements in the specialized methods for gathering, putting away, breaking down, and transmitting data have added to code making and codebreaking and started the move toward an “Revolution in Military Affairs.

7 USS Gearing, DD710 during WWII

8 USS Gearing, DD710 in the late 1960s

9 USS Gary, FFG 51

10 Military Affairs Technology Revolution
From optical to electrical telecommunication, from telecommunication over radio to satellite connections, fighting in the course of the most recent two centuries has advanced exponentially. Not immediately times likewise called dead circumstances in specialized military language. He who knows a couple of moments past the point of no return is rebuffed by a threatening first strike. (Leyden, 2007)

11 Broadcast communications advancements have the capacity in the regular citizen domain to change societies. Changing from a print-based culture to one incorporating radio, TV, phones, and the Internet has a significant impact. In like manner, the attitude of military issues should likewise adjust to amazing changes in the innovation of interchanges.

12 Customary types of Information Warfare
Mental Operations Electronic Warfare Physical Destruction Safety efforts Data Attack

13 Psychological Ops Psychological operations utilized various information types and source to manipulate the enemies. “We can make certain that the worldwide combat zone of the 21st century will be over data - the spread or withholding of realities, the elucidation of occasions, the introduction or twisting of thoughts and belief systems, and the correspondence of messages and images deliberately arranged to incite a specific response, either cognizant or oblivious, from an intended interest group” (Fulghum, 2007).

14 Electronic Warfare Electronic Warfare does not provide any accurate information to the enemies i.e. provide misleading information Any military activity including the utilization of electromagnetic vitality to decide, misuse, lessen, or avert unfriendly utilization of the electromagnetic range and the activity which holds inviting utilization of the electromagnetic range. The three divisions inside EW incorporate electronic countermeasures, electronic counter-countermeasures, and electronic fighting bolster measures.

15 Military Trickery It is also a type of misleading the enemies
Fruitful trickery makes foes infer and acknowledge wanted thanks of military capacities, aims, operations, or different exercises that summon outside activities that add to the originator's targets.

16 Physical Damage It is achieved through a destructive power
The methods for physical assault go from traditional bombs to electromagnetic heartbeat weapons. This is a standout amongst the most imperative territories where the United States might be helpless against assault.. (Fulghum, 2007). .

17 Security Measures It is set up to learn about military adherence t guidance, understanding resources capability. It sets to measure rates of success in every operation (Fulghum, 2007).

18 Modern Society Conflicts
There will be an expansion of non-state performing artists taking an interest on the world phase of occasions. This makes any country worried with cyber-terroism consider a whole host of new alternatives with regards to dangers to national security.

19 New Approach and Methods
Unbelievably intense and endlessly extending interchanges advancements have constrained us to consider the world as a littler situation. Multinational companies and interchanges systems have likewise reduced the significance of national fringes. (Fulghum, 2007).

20 Economic Approach Westernized countries penetrate the worldwide interchanges markets, inquiries of social dominion raise the potential for different countries to challenge the infringing impact that the United States and comparative countries have on governmental issues, financial aspects, and correspondences. (Fulghum, 2007). Devolution

21 Achieving Peace Each of the four branches of the military and in addition knowledge offices are progressively perceiving the significance of data as an advantage and weapon. Interchanges researchers and analysts ought to accept a part as members in the discourse and execution of Information Warfare hone..

22 References Leyden, J. (4 October 2007). "Israel suspected of 'hacking' Syrian air defences". The Register. Retrieved Fulghum, D. A. (3 October 2007). "Why Syria's Air Defenses Failed to Detect Israelis". Aviation Week and Space Technology. Retrieved Fulghum, D. A. (14 January 2007). "Technology Will Be Key to Iraq Buildup". Aviation Week and Space Technology. DOCUMENT CALLED IO IN OEF AND IF -saved in your folder "SOMS-B 2 MRBS Antenna System". Federal Business Opportunities. Retrieved


Download ppt "Historical Review of Information Warfare"

Similar presentations


Ads by Google