Information and Cyber Warfare Flashcards
4 Motivating Factors in Hacking
- Play: hacking/cracking, phreaking
- crime: illegal acts including intellectual property crime and computer fraud and abuse
- individual rights: conflicts over free speech and privacy
- national security: foreign intelligence operations, war and military conflicts, terrorism, and operations against a nation by nonstate players
Information Warfare is about…
Money Power Fear Politics Survival
‘Actions taken to achieve information superiority by affecting an adversary information, information-based processes, information systems, and computer-based networks while defending one’s own information, information-based processes, information systems, and computer-based networks.’
Information Warfare
C2W
Command-and control-warfare is the military strategy that implements Information Warfare (DoD Directive TS- 3600.1, 21 December 1992, “Information Warfare”) on the battlefield and integrates physical destruction. Its objective is to decapitate the enemy’s command structure from its body of command forces.
IBW
Intelligence-Based Warfare occurs when intelligence is fed directly into operations (notably, targeting and battle damage assessment), rather than used as an input for overall command and control. IBW results directly in the application of steel to target (rather than corrupted bytes).
EW
Electronic Warfare - War in the realm of communications (radioelectronic and cryptographic). Attempts to degrade the physical basis for transferring information, while cryptographic warfare works between bits and bytes.
Psychological Warfare
Encompasses the use of information against the human mind (rather than against computer support). There are four categories of psychological warfare: (i) operations against the national will, (ii) operations against opposing commanders, (iii) operations against troops, and – a category much respected abroad – (iv) cultural conflict.
IO
Information Operations
Information Blockade
The effectiveness of an information blockade presumes an era in which the well-being of societies will be as affected by information flows as they are today by flows of material supplies. Nations would strangle others’ access to external data.
Information Imperialism
Trade is war. Nations struggle with one another to dominate strategic economic industries. Nations specialize in certain industries. The good industries command high wages and, usually, feature high growth rates. They tend to be knowledge- intensive. The constant exchange of information, in particular, early access to interesting technical questions and information resources, provides one an edge in coming up with interesting solutions.
Information Terrorism
Information terrorism would target information about a specific individual to affect their actions.
Semantic Attack
A system under semantic attack operates and will be perceived as operating correctly (otherwise the semantic attack is a failure), but it will generate answers at variance with reality.
Simula-warfare
Could fighting a simulated war prove to the enemy that it will lose?
Gibson-warfare
Think conflict on the Internet, maybe at first only in the guise of virtual stalkers, sexual harassers, or flame wars. Now consider technologies’ capability to, in effect, launch a simulacrum into the net, armed with its master’s wants and needs, to make reservations, acquire goods, hand over assets, and, with work, to negotiate terms for enforceable contracts. Now take the next step and allow an individual’s online agents to conduct their own info battle. – TRON.
Michael Brow’s Three Types of IO
Type I: Perception Management
Type II: Denial, Destruction, degradation, distortion
Type III: Exploiting enemy information flows