Information Warfare (eBook)
John Wiley & Sons (Verlag)
978-1-119-27734-7 (ISBN)
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations.
This book deals with the concept of 'information war', covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "e;information war"e;, covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
Daniel Ventre is an engineer for CNRS, a researcher for CESDIP (Centre de recherches sociologiques sur le droit et les institutions pénales), and in charge of courses at Télécom ParisTech and at the ESSEC Business School. He is the author of a number of articles and works, in France and abroad, on the themes of cyberwar, information warfare, cyberconflict, cybersecurity and cyberdefense.
Introduction ix
Chapter 1. The United States 1
1.1. Information warfare in the 1990s 1
1.1.1. Points of view from security experts 1
1.1.2. US Air Force Doctrine: AFDD 2-5 (1998) 7
1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998) 10
1.1.4. Components of information warfare 14
1.2. Information warfare in the 2000s 23
1.2.1. Dictionary of the Department of Defense 23
1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006) 24
1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006) 26
1.3. Information warfare in the 2010s 28
1.4. Important concepts and reflections 43
1.4.1. Information operations 44
1.4.2. Information superiority 51
1.4.3. The "value" of information 62
1.4.4. Information system 65
1.4.5. Command and control warfare: C2W 66
1.4.6. Effect-based operations (EBOs) 68
1.4.7. The OODA loop 69
1.4.8. RMA 70
1.4.9. C4ISR 72
1.4.10. Network centric warfare (NCW) 73
1.4.11. ISR: intelligence, surveillance, reconnaissance 74
1.4.12. Cyberwar 75
1.4.13. Netwar 89
Chapter 2. China 91
2.1. Significant publications 91
2.2. Strategic and doctrinal thinking about information warfare. Genesis 96
2.2.1. General Wang Pufeng: one of the pioneers 97
2.2.2. Wang Baocun and Li Fei 100
2.2.3. Wei Jincheng 104
2.2.4. Colonels Qiao Liang and Wang Xiangsui: unrestricted warfare 105
2.2.5. General Dai Qingmin and Wang Baocun 111
2.2.6. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui 114
2.2.7. 2004 White Paper on national defense 115
2.3. Recent policies and strategies on information and cyber security 117
2.3.1. The Science of Military Strategy 2013 118
2.3.2. Defense White Paper 2013 118
2.3.3 Sino-Russian cybersecurity agreement 2015 119
2.3.4. PLA Daily editorial on 20 May 2015 121
2.3.5. Defense White Paper of 26 May 2015 122
2.3.6. The national cybersecurity bill of July 2015 125
2.4. Reflections 125
2.4.1. The American perspective on Chinese information warfare, modernization and informatization of the PLA 125
2.4.2. Evolution of analyses and discourse about Chinese strategy 163
2.4.3. China as a "victim" 172
2.4.4. The strategy of active defense 173
Chapter 3. Russia 177
3.1. Military doctrines and national security strategies 180
3.2. Information warfare in practice 185
3.2.1. Cyber attacks against Estonia. Who is the culprit? 186
3.2.2. The Russia-Georgia conflict 194
3.2.3. Ukraine 214
3.3. Comments 220
3.3.1. Characteristics of the Russian idea of information warfare 220
3.3.2. Aggressiveness 222
3.3.3. Type of Cold War 223
3.3.4. Challenges, objectives and targets 224
3.3.5. Psychological information warfare 229
3.3.6. Players of information warfare 233
3.3.7. Hybrid warfare and information warfare 236
3.3.8. Information warfare: what is new... 240
Chapter 4. Concepts and Theories: Discussions 247
4.1. Doctrines 247
4.2. Information warfare: definitions, models 256
4.2.1. The information environment 257
4.2.2. Definitions and models for information warfare 261
4.3. Information warfare or data warfare? 281
4.3.1. Defining data 284
4.3.2. Some theories about data 289
4.3.3. Visualization 296
4.3.4. Data warfare? 306
Conclusion 325
Index 329
Introduction
The issue of information warfare was at the heart of the debate about the revolution in military matters, from the turn of the 1980s to the 1990s. It was not so much a question of doubt as to the actual relevance of the concept (the importance of information in warfare has been well known for centuries), as a redefinition of the way in which military strategy was to be viewed, in light of a radical technological and societal transformation, and how that information was now to be produced and used in these contexts.
The concept of “information warfare” appears to be used less nowadays than it once was, but it is by no means obsolete.
Figure I.1. Google Trends. Evolution in number of searches for the term “Information Warfare”1
Figure I.2. Google Trends. Evoluttion in number of searches for the term “Information Operations”2
Certainly, the Defensee Departmennt officially removed thhe term froom its vocabbulary in 20006. However,, whilst the UUS Army optts to use other formulations, information warfare is still the subject of theorizing, expansion, description and analysis. The concept is still used in the military world, including ini the United States3. Numerous publications ((books, reports and articles) have been devoted to information warfare in recent years, which is indicative of the interest it continues too arouse and its relevannce in strateggic debates ((Roland Heickerö, 20 104; Wang Rong-Hui, Jin Li-Ya, Yuan Yi, 20105; J. Martins et al., 20126; William Hutchinson, Mathew Warren, 20127; K. Prislan, I. Bernik, 20128; Alan Chong, 20129; He Su-Hong, Chen Lei, 201210; Brett van Niekerk, Manoj S. Maharaj, 201111; Roland Heickerö and Martin Peterson, 201212; Derek S. Reveron, 201213; Khurshid Khan, 201214; Monika Chansoria, 201215; Richard A. Poisel, 201316; Daniel Gold, 201317; Isaac R. Porche III et al., 201318; William Hagestad, 201319; Alan Chong, 201320; Michael Raska, 201321; Danny Bradbury, 201322; Stephen Blank, 201323; Tim Stevens, 201324; V.I. Kuznetsov et al., 201325; Zhanshan Ma, 201326; Andrew Jones, Gerald L. Kovacich, 201427; Larry Wortzel, 201428; Dean A. Nowowiejski, 201429; Michael Raska, 201430; Luciano Floridi and Mariarosaria Taddeo, 201431; N.V. Lapotina, 201432; Haroro J. Ingram, 201433; Timothy Thomas, 201434; Thomas S. Hyslip, 201535; M.N. Sirohi, 201536; Patrick Molenda, 201537; M. Jaitner, P.A. Mattsson, 201538). All these publications deal with the concept in its civil and military dimensions, using approaches taken from strategic studies, political science, information sciences, computing/telecoms, and judicial, ethical and philosophical thinking. They set out to explain the profound changes that have come about in the modern field of battle, because of the evolution of the information space – its continuous and accelerated expansion over the past two decades. A number of these works are based on observations of national strategies in regard to information warfare (the conflict between North and South Korea, Russia, China, etc.).
Information warfare – though military doctrine today rather favors the concept of “information operations” – is demonstrably an essential component in modern conflicts. This is attested by recent events such as Russia’s annexation of Crimea or Daesh’s growing influence on the international scene, and the efforts made by certain states to counter terrorist propaganda. Both State- and non-State actors in conflicts are constantly investing in the informational sphere, placing their actions of communication, influence, propaganda, their psychological operations, at the heart of their strategies. Today, “information warfare” and “cyber” overlap. In addition, it is on this “cyber” aspect of information warfare which we focus in this book. The questions and issues are identical to those that were present in the 1990s: how best to take advantage of information and of information technologies, to gain an edge over the adversary, the enemy or the competitor. The starting point for our study in the first edition of this book (2007 in French; 2009 for the English-language equivalent) was the Gulf War (1991), reflecting how important a milestone that war was in the history of conflicts. It allowed the Americans to demonstrate astonishing might and military efficiency, and marked the beginning of a new era of conflict where information, computer systems and networks would play a major role in the organization and manifestation of that power. Numerous countries then launched a process of reflection to restructure and reorganize their forces. Although the American power could not be rivaled, it nonetheless served as a model, which at least provides the key conceptual elements. It was during the 1990s that the majority of the key concepts which are employed today in conflict strategies – and especially cyberconflict strategies – were lain down, formulated and defined: network-centric warfare (NCW), netwar, information warfare (IW), cyber warfare and big data, to cite just a few. The concept of “information warfare” has met with varying degrees of success from one State to another, and has even been officially withdrawn from the lexicon used by the US Defense Department. However, in today’s world, where the strategies employed include concepts such as the influence of the media and social networks in the organization of armies and in the conducting of conflicts; where they include concepts such as psychological warfare in combination with the use of the media, propaganda, influence; where States at war or experiencing periods of revolt or insurrection impose censorship and cut off Internet access; where intelligence agencies trawl cyberspace in search of strategic information, or collect vast masses of data to be processed, analyzed, made to “talk” and support the missions of security and national defense; everyone is involved in the quest for information mastery. When these activities take place in the context of armed conflicts, between different States or within a State, we speak of information warfare.
Recent years have seen a drastic increase in armed conflicts (i.e. wars, though theoreticians, politicians or strategists often refuse to use that term), all of which have confirmed the importance of the role of information – especially information travelling through cyberspace: examples include the Russo–Georgian conflict in 2008, the Arab Spring wave of revolutions in 2010–2011, the war in Libya, in Syria, the expansion of Islamic State-controlled territory, the Russian–Ukrainian conflict, etc.
This second edition of the book focuses on three states: the USA (Chapter 1), China (Chapter 2) and Russia (Chapter 3), and offers a detailed analysis of the evolution of the theories, concepts and doctrines employed in those countries (Chapter 4). In this book, which is intended to be a modest contribution to the strategic study of modern conflict, we discuss the following questions:
- – Today, do the terms “information warfare”, “information operations” and “cyberoperations” all denote the same reality?
- – Do states perceive and talk about the same threats today as they did 20 years ago?
- – Do the actors, principles and logics of information warfare still remain the same?
| Erscheint lt. Verlag | 10.2.2016 |
|---|---|
| Sprache | englisch |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Mathematik / Informatik ► Informatik ► Theorie / Studium | |
| Sozialwissenschaften ► Politik / Verwaltung | |
| Schlagworte | chiefs • Committee • components • Computer Science • Department • dictionary • Doctrine • Experts • force • Informatik • Information • Informationstechnologie • Information Technologies • Introduction • Joint • Points • security • Staff • US • View • warfare |
| ISBN-10 | 1-119-27734-5 / 1119277345 |
| ISBN-13 | 978-1-119-27734-7 / 9781119277347 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich