Information warfare may include giving the enemy special information (commonly referred to as Â“propagandaÂ”) to persuade the enemy to surrender, or withholding from the enemy important information that might result in the enemyÂ’s resistance. Information warfare may also include feeding Â“disinformationÂ” to oneÂ’s own people, either to build support for the war effort or to counter the effects of the enemyÂ’s propaganda campaign. Finally, information warfare may include designing a strategic plan for a multiple-stage attack against an adversaryÂ’s information systems while protecting oneÂ’s own information network and capitalizing on oneÂ’s own information Â“edge.Â”
In contrast to traditional wars fought on soil, information warfare has no front line or boundaries. Potential battlefields can consist of any networked system that can be accessed. For this reason, the United States and other countries are concerned about information wars focusing on Information Technology controlling critical infrastructures targetsÂ—oil and gas pipelines, electric power grids, nuclear power stations, and telephone switching networks, to name a few. The vulnerability of networked systems is why security experts in the United States and elsewhere fear an impending cyber Apocalypse.
Information warfare damage can manifest in countless ways. For example, railroad trains and jets could be rerouted and caused to crash; stock exchanges could be cracked and then sabotaged by Â“sniffersÂ”Â—thereby corrupting international networks for funds transfer; and radio and television signals could be taken over and used for Â“misinformationÂ” campaigns.
Finally, recent events have confirmed that information warfare has been implemented. During the Gulf War, for example, Dutch crackers exploited U.S. Defense Department computers and seized troop-Âmovement information. They then tried to offer, for a handsome price, the secret information to the Iraqis, who turned down the offer, thinking the plot was a hoax. Moreover, in January 1999, U.S. Air Intelligence computers were hijacked by a coordinated attack, a portion of which appeared to be Russian driven.
See Information Warfare in Computer
Also called "cyberterrorism" and "cyberwarfare," it refers to creating havoc by disrupting the computers that manage stock exchanges, power grids, air traffic control and telecommunications. While the term often deals with attacks against a nation, it may also refer to attacks on organizations and the general public. For example, devastating viruses may be considered information warfare.
Learn more about Information Warfare