From
http://en.wikipedia.org/wiki/Information_warfare See that short page for all the links to further information.
Information warfare
From Wikipedia, the free encyclopedia
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate<1> the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.
Contents
* 1 Overview
* 2 Information Operations
* 3 Non-military
* 4 See also
* 5 References
* 6 Bibliography
o 6.1 Books
o 6.2 Other
* 7 External links
o 7.1 Resources
o 7.2 Course Syllabi
o 7.3 Papers: Research and Theory
o 7.4 Papers: Other
o 7.5 News articles
* 8 United States Department of Defense IO Doctrine
Overview
Information warfare can take many forms:
* Television and radio transmission(s) can be jammed.
* Television and radio transmission(s) can be hijacked for a disinformation campaign.
* Logistics networks can be disabled.
* Enemy communications networks can be disabled or spoofed.
* Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation.
The US Air Force has had Information Warfare Squadrons since the 1980s. In fact, the official mission of the US Air Force is now "To fly, fight and win...in air, space and cyberspace,"<2> with the latter referring to its Information Warfare role.
As the Air Force often risks aircraft and aircrews to attack strategic enemy communications targets, remotely disabling such targets using software and other means can provide a safer alternative. In addition, disabling such networks electronically (instead of explosively) also allows them to be quickly re-enabled after the enemy territory is occupied. Similarly, counter information warfare units are employed to deny such capability to the enemy. The first application of these techniques were used against Iraqi communications networks in the first Gulf War.
Also during the 1991 Gulf War, Dutch hackers stole information about U.S. troop movements from U.S. Defense Department computers and tried to sell it to the Iraqis, who thought it was a hoax and turned it down. In January 1999, U.S. Air Intelligence computers were hit by a co-ordinated attack, part of which appeared to come from Israeli and French hacking.<3>
Information Operations
This section does not cite any references or sources.
Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (December 2007)
Information Operations (Info Ops) is an evolving discipline within the military. It has emerged from earlier concepts such as "Command & Control Warfare" and "Information Warfare" - mainly US-dominated, originating in the 1990s and considering lessons learned from the Gulf War(s), phenomena like the so-called "CNN Effect" and enormous advances in Information Technology.
Today, Germany leads a multinational effort on developing Info Ops as an integrating function / joint mission area within the military, called the "Multinational Information Operations Experiment" (MNIOE). The current 20 MNIOE partners define Info Ops as: "The advice to and co-ordination of military activities affecting information and information systems – including system behaviour and capabilities – in order to create desired effects". This definition - and its related context - differs from extant national views (e.g. those of the USA or the UK) and provides an advanced approach to multinational and interagency information activities in support of crisis management and effects-based operations.
Designing and implementing guidance for Coalition actions to affect information and information systems (information activities) is a challenge; it applies to the whole scope of civil-military efforts from pre-crisis situations to post-conflict reconstruction, and spans all levels of involvement.
Non-military
Organized teams of non-military, even non-governmental information fighters become an increasingly common phenomenon. They can advance different political agendas, be involved in astroturfing or participate in election campaigns.<4>
See also
* Political Warfare
* Cyberwarfare
* iWar
* Communications security
* Command and control warfare
* Gatekeeper (politics)
* Disinformation
* Black propaganda
* Taliban propaganda
* Network-centric warfare
* Psychological warfare
* Public affairs (military)
* Biologically Inspired Tactical Security Infrastructure
* Irregular Warfare
* Economic and Industrial Espionage
US specific:
* Enemy Image, a documentary about The Pentagon's approach to news coverage of war
* Information Operations Roadmap
* CIA
* COINTELPRO
* Special Activities Division
* Pentagon military analyst program
Edit to add the copyright notice: Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.