Chapter 2 Flashcards
what did toeffler identified
the three waves in the evolution of warfare
1st Wave
agrarian (Farming) based on the theme of economic production at the time. people used clubs arrows and knives for killing
2nd wave
the industrial wave: based on the shift of economic production at the beginning with the industrial revolution. the civil war made the shift in the types of weapons like accurate and deadly rifles and artillery
Wave 3
the post industrial waves. information warfare including the use of high tech weapons (software) that invades computer systems in order to destroy nation states without the use of traditional armies
Information warfare is..
when the United States or our allies does it
Cyber terrorism is
When our enemies oppose the United States
psychological operations
techniques used to influence the state of mind of an adversary
example: in the industrial era involves civilian bombing campaigns designed to break the will of the enemy
physical destruction
These involve physical attacks on information systems (computer networks) where information warfare is used to ultimately create physical destruction.
example: stuxnet
Information attacks
These involve the direct corruption of data without the physical destruction of facilities.
An example would be the introduction of malicious software (computer virus) designed to hobble the normal operation of software within a computer network.
computer virus
a piece of computer code that attaches to other software and uses it to spread across computer systems. This generally requires some action on the part of the legitimate user of the computer system (e.g. clicking on an email attachment).
computer worm
a piece of computer code or program that reproduces itself over computer networks. These “seek out” computers and systems it is designed to infiltrate independent of the actions of legitimate users
Denial of service attacks
These simply prevent the use of computer systems by legitimate users.
example social media
promotion/ propaganda
recruitment of new members with the use of technology
what do terrorist groups effectively use to recruit new members
websites and social media networks
ISIS
middle eastern terrorist group, islamic state. fought them in Iraq (2003-2011)