OPNAV Notice 5450: Establishment of Commander, Naval Information Technology and Information Operations Central Command (COMNAVITIOCENTCOM), Norfolk, VA and Change in Reporting Procedures for Fleet Information Warfare Center

2001 ◽  
Author(s):  
WASHINGTON UNIV ST LOUIS MO
2018 ◽  
Vol 28 (6) ◽  
pp. 1855-1864
Author(s):  
Olga Zoric ◽  
Katarina Jonev ◽  
Ivan Rancic

The author starts from the informational dimension of the operational environment in a strategic reality and deal with the problem of defining informational power from the theoretical and practical aspect of information warfare.The deliberations in the work are aimed to initiate a procedure for auditing of the security documents in order to create a legal basis for the operationalization of the content of information security, as one of the aspects of integral security of the Republic of Serbia. The paper deals with the conceptual determinations and importance of information, information warfare and information operations, as well as the content of information warfare, pointing out the strategic and doctrinal definitions of the information warfare of the United States of America, the Russian Federation and the Republic of Serbia. It is necessary to accurately and objectively observe world achievements in the field of national security and the relation of the most powerful world powers to the problem of information warfare. Based on a comparative analysis of world trends and the state of the theoretical and practical aspects of information security of the Republic of Serbia, the focus is on work, where measures are proposed to improve the security function in the fourth unit of work.


Author(s):  
Terry T. Kidd

The rapid expansion and dramatic advances in information technology in recent years have without question generated tremendous benefits to business and organizations. At the same time, this expansion has created significant, unprecedented risks to organization operations. Computer security has, in turn, become much more important as organizations utilize information systems and security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Such use of computer security is essential in minimizing the risk of malicious attacks from individuals and groups. To be effective in ensuring accountability, management and information technology security personnel must be able to evaluate information systems security and offer recommendations for reducing security risks to an acceptable level. To do so, they must possess the appropriate resources, skills, and knowledge.


Author(s):  
M. J. Warren

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.


Author(s):  
Kenneth James Boyte

This comparative international case study provides a context for considering the evolution of cyber technologies as elements of hybrid warfare, including information operations (IO), capable of killing people, as well as impacting political elections and physical infrastructure (such as power grids and satellite-based communications and weapons systems). Threatened by “autonomous battle networks,” the “Internet of Battle Things” has been considered a domain of modern warfare by the United States since 2011 and by NATO since 2016. Focusing on three historic cyberattacks against three modern democracies—Estonia in 2007, the United States in 2012, and Ukraine during the 2013-2015 conflict—the study shows how computer warfare, first reported in the 1990s, has become integral in warfare for both state and non-state actors—particularly for information warfare waged by proxies to create confusion and manipulate public opinion via satellites that can penetrate national boundaries and firewalls with armies of zombies and botnets.


2011 ◽  
pp. 291-297
Author(s):  
Aki-Mauri Huhtinen

Information warfare (IW) has recently become of increasing importance to the military, the intelligence community, and the business world. The purpose of many actors, like decision makers, military advisers, non-governmental actors, or business people, is to facilitate an understanding of information warfare with reference to both military and civilian life (e.g., Huhtinen & Rantapelkonen, 2002; Kaldor, 2001). According to James Der Derian (2003), information warfare has become the umbrella concept for understanding cyberwar, hackerwar, netwar, virtual war, and other technological network-centric conflicts. Many of these concepts associate technology and digital equipment and refer to a specific kind of computer technology. But these concepts are also connected to the definition of conventional conflicts and warfare. The question of conflict or warfare is not only physical, but also a psychological issue. For example, the terrorist group would hit the automated teller machine systems (ATM) and steal the money of private people. The damage would be very small technically but the influence of psychological behaviour could have a long effect. The ATM systems work perfectly and safely after the damage has been done but people no longer want to use it because of bad rumours. Military operation other than war (MOOTW) has a history that goes back at least as far as Sun Tzu, who considered defeating an enemy without violence to be the “acme of skill” in warfare. Asymmetric, non-linear model of war underline the capability of perception and fast influence. The idea of avoiding open linear contact with the enemy and trying to seize the initiative to strike is the revival of the art of war. (Der Derian 2003, p. 453) Information warfare is concept of information society conflicts and threats. Information warfare means the use of information or information technology during a time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries. Cyberwar is an assault on electronic communication networks. “The POST-COLD WAR paradigm for U.S. forces in combat and in military operations other than war (MOOTW) is increasingly a nonlinear battlespace where brigades and battalions conduct independent operations in assigned sectors. In postcombat and peace-support operations, nonkinetic/nonlethal means are often the main effort. The new paradigm is changing the way the Army plans, coordinates, executes, and conducts information-operations (IO) and IO-effects assessment at brigade and below.” (Tulak, Broome, & Bennett, 2005) The action of information warfare is defined as information operation (IO). Information operation can be divided into offensive IO (e.g., computer network attack, command and control warfare, special information operations), civil affairs, public affairs (media warfare), and defensive IO (e.g., physical security, computer network defense, and counter propaganda) (Huhtinen & Rantapelkonen, 2002). Information superiority means the simultaneous joint operation with all aspects of information operation. For example, the lack of defensive IO aspect can put at risk offensive IO. Without civil affairs of public affairs capabilities there are risks at achieve success in offensive and defensive IO. Media is one of the most important parts of modern warfare.


Author(s):  
A. Huhtinen

Information warfare (IW) has recently become of increasing importance to the military, the intelligence community, and the business world. The purpose of many actors, like decision makers, military advisers, non-governmental actors, or business people, is to facilitate an understanding of information warfare with reference to both military and civilian life (e.g., Huhtinen & Rantapelkonen, 2002; Kaldor, 2001). According to James Der Derian (2003), information warfare has become the umbrella concept for understanding cyberwar, hackerwar, netwar, virtual war, and other technological network-centric conflicts. Many of these concepts associate technology and digital equipment and refer to a specific kind of computer technology. But these concepts are also connected to the definition of conventional conflicts and warfare. The question of conflict or warfare is not only physical, but also a psychological issue. For example, the terrorist group would hit the automated teller machine systems (ATM) and steal the money of private people. The damage would be very small technically but the influence of psychological behaviour could have a long effect. The ATM systems work perfectly and safely after the damage has been done but people no longer want to use it because of bad rumours. Military operation other than war (MOOTW) has a history that goes back at least as far as Sun Tzu, who considered defeating an enemy without violence to be the “acme of skill” in warfare. Asymmetric, non-linear model of war underline the capability of perception and fast influence. The idea of avoiding open linear contact with the enemy and trying to seize the initiative to strike is the revival of the art of war. (Der Derian 2003, p. 453) Information warfare is concept of information society conflicts and threats. Information warfare means the use of information or information technology during a time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries. Cyberwar is an assault on electronic communication networks. “The POST-COLD WAR paradigm for U.S. forces in combat and in military operations other than war (MOOTW) is increasingly a nonlinear battlespace where brigades and battalions conduct independent operations in assigned sectors. In postcombat and peace-support operations, nonkinetic/nonlethal means are often the main effort. The new paradigm is changing the way the Army plans, coordinates, executes, and conducts information-operations (IO) and IO-effects assessment at brigade and below.” (Tulak, Broome, & Bennett, 2005) The action of information warfare is defined as information operation (IO). Information operation can be divided into offensive IO (e.g., computer network attack, command and control warfare, special information operations), civil affairs, public affairs (media warfare), and defensive IO (e.g., physical security, computer network defense, and counter propaganda) (Huhtinen & Rantapelkonen, 2002). Information superiority means the simultaneous joint operation with all aspects of information operation. For example, the lack of defensive IO aspect can put at risk offensive IO. Without civil affairs of public affairs capabilities there are risks at achieve success in offensive and defensive IO. Media is one of the most important parts of modern warfare.


Sign in / Sign up

Export Citation Format

Share Document