What is information warfare?

in #informationwar6 years ago

large_yDKauHPRLMFOkzxOgjmIAirSne9rJgkFdV9Wzi2sJCM.jpg

In the 21st century, a known form of war where physical damage was imposed on opposing military forces and infrastructure has been a form of attack. Instead, the state is increasingly launching non-lethal attacks against enemy information systems - this is the emergence of an information war.

And Kuehl of the National Defense University defines informational wars as "conflict or struggle between two or more groups in the information environment". You might say that it sounds like a better way to describe hacking. Actually it's much more sinister and far more dangerous than its somewhat docile name.

Western leaders invest billions to develop suitable capabilities with China and Russia, forming a military command to attack, defend and exploit the vulnerability of electronic communications networks. Information warfare combines electronic warfare, cyberwarfare and psy-ops (psychological operations) into an organization of fighters, and this will be the center of all future warfare.

150722-which-countries-best-prepared-cyberattacks.png


Anatomy of war information


Free flow of information within and among the nation's nations is critical to business, international relations and social cohesion, as much information is critical to the ability of military forces to resist. Current communications are heavily dependent on the Internet, or through communications using different parts of the electromagnetic spectrum (such as radio or microwaves) through terrestrial communication networks or satellite networks in space. We live in a very connected world, but there is not much need to overcome instability or even chaos.

Electronic warfare is used to disrupt or neutralize this electromagnetic transmission. This may be the act of electronic counters and disruptions used to paralyze military communications or weapons guidance systems. Or it may include civilian use, such as the air traffic control systemADS-B used by the aircraft to avoid in-flight collisions, or the recently adopted European Trainage Management System (ERTMS) that replaces railroad signaling and providing full control over trains. Damaging or demeaning one of these will cause chaos.

We have become familiar with cyber attacks launched over the internet against digital networks, which can make it impossible for businesses to operate. Major damages can follow, in cost and reputation, as seen from Sony Pictures and TalkTalk attacks. Bringing stock exchanges can cause huge financial losses. Cyber ​​attacks can also be directed at industrial control systems used in manufacturing plants or in power, water and gas utilities. With the capacity to influence the life of a vast national infrastructure will be threatened.

Psy-ops are more aimed at undermining the morale and welfare of citizens. This may include spreading false information, rumors, and fears through social media and news outlets. The great degree of connectedness that the population possesses today is power, but directly connected means that false information and fear can also spread rapidly, causing panic.

Information warfare, then, is the integration of electronic warfare, cyberwarfare and psychological operations, both for assault and defense.


War of information has broken


It is alleged that Russia has launched a sophisticated non-lethal attack against its neighbors, for example against Estonian, Georgia and Ukraine, which suffered electronic onslaughts, cyber attacks and psychological operations.

There is indirect evidence to suggest that the Baku-Tbilisi-Ceyhan gas pipeline in Georgia is targeted using sophisticated computer viruses causing unbridled pressure that causes explosions. Even the so-called Islamic State has shown that they have a good understanding of how to use and manipulate social media for use in psychological warfare. IS reportedly builds greater cyber warfare and electronic war skills, as he recognizes that winning the information war is the key.


Unconventional responses to war


In response to the threat of information warfare, the British Army has formed two new formations: the 77th Brigade to handle psychological operations, and First Intelligence, Reconnaissance and Surveillance Brigades that combine electronic warfare and intelligence. Hundreds of computer experts will be recruited as reserve forces, trained with the help of the GCQ Combined Cyber ​​Units.

This is moving in the right direction, but the approach is too little by little. The RAND Corporation report recently outlined a highly integrated approach to all aspects of information warfare to bring about effective defense forces. In the US, Rear Admiral Michael S. Rogers released the Mayan Command Vision statement, illustrating how he will defend Defense Department networks, systems and information against cyber attacks and provide support for military and contingency operations. The US approach is more integrated but this is only a case in the military - from a national perspective the two countries have no overall integrated approach with a joint command structure that covers threats to civil infrastructure.

So while the concept of information war seems to be well understood, its aspects are not discussed together, and such siled thinking can lead to loopholes in our security. The Western government has failed to fully understand the vulnerability of electronic communications and its substantial risks to critical infrastructure, transportation, and safety of civilians.

The director of US intelligence has emphasized the cyber threat facing the United States, while British General Sir Nicholas Houghton in a speech at Chatham House observed that most of the current physical warfare combines online aspects, in which social networks are used to manipulate opinions and perceptions. He also acknowledged that the tactics employed by Russia combined the aspects of information warfare as well as counter-intelligence, espionage, economic warfare and sponsoring proxies.

We need to better understand the full coverage of information warfare as it develops, identify where we are most vulnerable, and then establish a point of responsibility for implementing defense mechanisms. Because enemies unrestricted by western policy, or by code of ethics or law, can and will exploit our vulnerabilities.

fa6rcf7wcadagaykk8iz.jpg

Image: The illustration illustrates the projection of a binary code on a man holding a laptop computer. REUTERS / Kacper Pempel.



Interested in joining or supporting the Information War?
U5dtmATJwqbvZ5BoKtMKe3zryg1Q4nU_1680x8400.png

Use tag #informationwar to post your own stories about the lies and propaganda being pushed on the public.

@informationwar will up vote posts worthy of the cause.

Join the discord: https://discord.gg/JsXbzFMchat with like minded individuals like myself and share your articles to receive additional support.

Delegating Steem Power: Another way you can support is to delegate SP to @informationwar.

Delegate 25 SP

Delegate 50 SP

Delegate 100 SP.Note: remember to keep around 50SP in your account so you don't run into any bandwidth problems.

How to delegate SP, join the fan base and more:

https://steemit.com/informationwar/@truthforce/you-can-make-a-difference-join-the-informationwar-and-help-support-others-today


Find out more about the Information War. Click Banner!
IW_Banner.png

I am not responsible for if you think, how you think, what you think or do. You are. If you like my post consider following and up voting. Peace!

Sort:  

Curated for #informationwar (by @openparadigm)
Relevance: Information War in the modern age.
Our Purpose

Removed vote because of plagiarism.

Coin Marketplace

STEEM 0.32
TRX 0.11
JST 0.034
BTC 66785.29
ETH 3229.75
USDT 1.00
SBD 4.30