SlideShare ist ein Scribd-Unternehmen logo
1 von 26
The Information Warfare
   - how it can affect us -

            Luis Borges Gouveia
         lmbg@ufp.edu.pt (UFP)
one initial remark…
Ideas & concepts are great but…
One of the main topics in
           warfare in the 21st Century
• NETWORK-CENTRIC AND INFORMATION WARFARE,
  OPERATIONS, AND RELATED TECHNOLOGY
    – Networks (focus on computers and telecommunications)
    – Memory and storage & information analysis – intelligence
      (focus on digital information)
    – Electronic based tech to influence, alter, reduce and
      change information (focus on how humans process
      information)

• Gibish, E. (2003). WARFARE IN THE 21ST CENTURY - A Selected
  Bibliography. U.S. Army War College Library. Carlisle Barracks, PA. EUA
  http://www.carlisle.army.mil/library/bibs/warfar03.htm
Information warfare is a everyone
        concern – worldwide…
• Explore the Pakistan’s site Terminal X on
  Defence, intelligence and geopolitics
  – http://www.terminalx.org/2011/03/overview-modern-
    communication.html
One (big) example…
• On June 23 2009, the United States Secretary of Defense Robert Gates
  issued notifications for the establishment of the world's first dedicated
  CYBERCOM (Cyber Command), the USCYBERCOM based on growing
  concerns of Chinese military penetration into Pentagon defense systems.
  He outlined the objective in the following statement:

   "My own view is that the only way to counteract both criminal and
   espionage activity online is to be proactive. If the U.S. is taking a formal
   approach to this, then that has to be a good thing. The Chinese are
   viewed as the source of a great many attacks on Western infrastructure
   and just recently, the U.S. electrical grid. If that is determined to be an
   organized attack, I would want to go and take down the source of those
   attacks. The only problem is that the Internet, by its very nature, has no
   borders and if the U.S. takes on the mantle of the world's police; that
   might not go down so well."
Another one…
•   On January 15 2011, the NY Times reported:
    Over the past two years, according to intelligence and military experts familiar
    with its operations, Dimona has taken on a new, equally secret role — as a critical
    testing ground in a joint American and Israeli effort to undermine Iran’s efforts to
    make a bomb of its own.
    Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges
    virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to
    enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer
    worm, a destructive program that appears to have wiped out roughly a fifth of
    Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to
    make its first nuclear arms.

•   Conflicting reports just recently now suggest that it was the US which was behind
    the design, trial and injection of the Stuxnet worm. There can be a strong
    possibility that both Israel and the US cyber commands worked in tandem against
    Irani cyber command which was setup to "prevent espionage and sabotage in
    Information Technology (IT) tools" according to General Syed Kamal Hadianfar,
    Head of the Information Production and Exchange Department of the Law
    Enforcement Police in Iran.
Cyberwar non human nature…
Working Definition
Information warfare is comprised of operations
  directed against information in any form,
  transmitted over any media, including
  operations against information content, its
  supporting systems and software, the physical
  hardware device that stores the data or
  instructions, and also human practices and
  perceptions
Information Operations (IO)
• Military Information Warfare
• IO is conducted during time of crisis or
  conflict to affect adversary information and
  information systems while defending one's
  own information and systems
peace as an ultimate goal
". . . attaining one hundred victories in one
   hundred battles is not the pinnacle of
   excellence. Subjugating the enemy's army
   without fighting is the true pinnacle of
   excellence."

                   Sun Tzu, The Art of War
Better than brute force
"There are but two powers in the world, the
sword and the mind. In the long run the
sword is always beaten by the mind."

                  Napoleon Bonaparte
Core Capabilities
•   Psychological Operations (PSYOPS)
•   Military Deception (MILDEC)
•   Operations Security (OPSEC)
•   Computer Network Operations (CNO)
•   Electronic Warfare (EW)
Environment Shaping
Political Power                                                 Overt Peacetime
Economic Power                    Shaping the
                                                                          PSYOP
Public Affairs                 Information Space                      Deception
Public Diplomacy                                                  Covert Action
                                                                       Deterrent
                                                                    Capabilities
                             Information Operations

                                                             Public Diplomacy
 International Power              Shaping the
                                                                  Public Affairs
 Force Disposition               Conflict Space
                                                             Network Security
 Psychological Operations
                                                           Operational Security
 Covert Action & Deception
                                    Information
                                      Warfare

     Force Disposition                                              Deception
                                  Shaping the
     Fire Power                                           Operational Security
                                  Battle-Space
     Electronic Warfare                               Psychological Operations
Evolution of Terminology
•   Propaganda & Political Warfare
•   Psychological Warfare
•   Psychological Operations
•   Information Warfare
•   Information Operations
•   Influence Attitudes / Strategic Influence /
    Perception Management
IO & IW formal definitions
• Information Operations Doctrine (OTAN)
   - Information Warfare:
   “ Information operations conducted during time of crisis
      or conflict to achieve or promote specific objectives
      over a specific adversary or adversaries.”
   - Information Operations:
     “Actions taken to affect adversary information and
      information systems while defending one’s own
      information and information system’s.”
Information Age Conflict

INFORMATION         INFORMATION
IN WARFARE          WARFARE

Intelligence        Influence Attitudes
Surveillance
                     Deny/Protect
Reconnaissance
                     Deceive
Weather
Geographic          Exploit/Attack
Other
Potential vulnerability due to
        information war in our society
• the vulnerability of democracies to false, misleading, or carefully
  crafted attacks orchestrated through the news media;
• attacks by creative individuals skilled and determined enough to
  exploit communications systems and computer networks for illegal
  gain or to disrupt society;
• criminal organizations (terrorists, drug smugglers, illegal arms
  merchants, international poachers, and rogue banking groups) that
  sit across any one country's boundaries represent a poorly-met
  challenge;
• coalition warfare in which military cooperation and interoperability
  are essential, but political goals are not fully compatible and
  intelligence sources and methods must be protected; and
• psychological warfare waged against a general population in order
  to undermine confidence in leaders or the wisdom of their
  actions, often exploiting ethnic, social or moral cleavages in the
  target society.

 http://www.iwar.org.uk/iwar/resources/deterrence/iwdAppb.htm
Final
remarks
Cyberpower targets
                      Intra cyberspace              Extra cyberspace
Digital info tools    Hard: denial of service       Hard: atacks to SCADA
                      attacks                       systems
                      Soft: creaty standards and    Soft: public opinion
                      procedures                    campain and diplomacy to
                                                    influence

Physical info tools   Hard: campanies               Hard: routing and cabling
                      governmental control          destruction
                      Soft: software to support     Soft: protests to identify
                      human rights & others         and embaressement
                      activists                     suppliers


 Nye, J. (2010) The Future of Power. PublicAffairs.
 See also: http://www.amacad.org/publications/bulletin/spring2011/power.pdf
Three cyberpower tactics
           (familiar with these?)
• A tell B what to do
     - if not the case, B will not do that
• A do not allow choice to B
     - including barriers to B apply its own
     strategies
• A shapes the B preferences
     - this way, B never consider some of the
        available strategies
Major players in information war
• leading governments (most powerful Nations)
  – Vulnerabilities: depend on complex systems, also
    fragile, political instability, possible loss of reputation
• Multinational organizations and high structured
  networks
  – Vulnerabilities: Legal action, intellectual property
    theft, system failure, public censorship
• Individuals and less structured networks
  – Vulnerabilities: legal and ilegal stress by governments
    and big organizations, when caught
One more (general) conclusion…
• Defensive information warfare, unlike warfare
  of other sorts, cannot be left solely to the
  government.
  It must be seen as the business of every
  organization likely to be a target

• MacNulty, C. (1996). Changing Social Values and their
  Implications for Information Warfare. INFOWARCON 5.
  Washington DC. September.
  http://www.exploit-the-future.com/paper1/paper1.htm

Weitere ähnliche Inhalte

Was ist angesagt?

War and Technology
War and Technology War and Technology
War and Technology Asjad Ali
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the worldZubair
 
Chapter 10 National, Regional and Global Security(FASS)
Chapter 10 National, Regional and Global Security(FASS)Chapter 10 National, Regional and Global Security(FASS)
Chapter 10 National, Regional and Global Security(FASS)Md Shaifullar Rabbi
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorismAishaAL9
 
The Role of Social Media in Cyber Warfare
The Role of Social Media in Cyber WarfareThe Role of Social Media in Cyber Warfare
The Role of Social Media in Cyber WarfareLydia Snider
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) SecurityComputer Aid, Inc
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 

Was ist angesagt? (20)

War and Technology
War and Technology War and Technology
War and Technology
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
 
Chapter 10 National, Regional and Global Security(FASS)
Chapter 10 National, Regional and Global Security(FASS)Chapter 10 National, Regional and Global Security(FASS)
Chapter 10 National, Regional and Global Security(FASS)
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
The Role of Social Media in Cyber Warfare
The Role of Social Media in Cyber WarfareThe Role of Social Media in Cyber Warfare
The Role of Social Media in Cyber Warfare
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) Security
 
Espionage
EspionageEspionage
Espionage
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 

Ähnlich wie The Information Warfare: how it can affect us

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllJarno Limnéll
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 

Ähnlich wie The Information Warfare: how it can affect us (20)

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 

Mehr von Luis Borges Gouveia

A Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémicoA Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémicoLuis Borges Gouveia
 
Sharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learningSharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learningLuis Borges Gouveia
 
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...Luis Borges Gouveia
 
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...Luis Borges Gouveia
 
Inteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militarInteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militarLuis Borges Gouveia
 
Curadoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a DistânciaCuradoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a DistânciaLuis Borges Gouveia
 
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...Luis Borges Gouveia
 
Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020Luis Borges Gouveia
 
O Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafiosO Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafiosLuis Borges Gouveia
 
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...Luis Borges Gouveia
 
A oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superiorA oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superiorLuis Borges Gouveia
 
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...Luis Borges Gouveia
 
Transformação digital e gestão da informação
Transformação digital e gestão da informaçãoTransformação digital e gestão da informação
Transformação digital e gestão da informaçãoLuis Borges Gouveia
 
O momento da Transformação digital
O momento da Transformação digitalO momento da Transformação digital
O momento da Transformação digitalLuis Borges Gouveia
 
Emerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystemEmerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystemLuis Borges Gouveia
 
O lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digitalO lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digitalLuis Borges Gouveia
 
Responder a um contexto digital nas IES
Responder a um contexto digital nas IESResponder a um contexto digital nas IES
Responder a um contexto digital nas IES Luis Borges Gouveia
 

Mehr von Luis Borges Gouveia (20)

A Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémicoA Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémico
 
Sharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learningSharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learning
 
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
 
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
 
Inteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militarInteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militar
 
Eventos PhD CI SiTEGI UFP
Eventos PhD CI SiTEGI UFPEventos PhD CI SiTEGI UFP
Eventos PhD CI SiTEGI UFP
 
Information Science PhD event
Information Science PhD eventInformation Science PhD event
Information Science PhD event
 
Curadoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a DistânciaCuradoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a Distância
 
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
 
Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020
 
O Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafiosO Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafios
 
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
 
A oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superiorA oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superior
 
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
 
Transformação digital e gestão da informação
Transformação digital e gestão da informaçãoTransformação digital e gestão da informação
Transformação digital e gestão da informação
 
O momento da Transformação digital
O momento da Transformação digitalO momento da Transformação digital
O momento da Transformação digital
 
Emerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystemEmerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystem
 
Sobre Cultura Digital
Sobre Cultura DigitalSobre Cultura Digital
Sobre Cultura Digital
 
O lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digitalO lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digital
 
Responder a um contexto digital nas IES
Responder a um contexto digital nas IESResponder a um contexto digital nas IES
Responder a um contexto digital nas IES
 

Kürzlich hochgeladen

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Kürzlich hochgeladen (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

The Information Warfare: how it can affect us

  • 1. The Information Warfare - how it can affect us - Luis Borges Gouveia lmbg@ufp.edu.pt (UFP)
  • 3. Ideas & concepts are great but…
  • 4. One of the main topics in warfare in the 21st Century • NETWORK-CENTRIC AND INFORMATION WARFARE, OPERATIONS, AND RELATED TECHNOLOGY – Networks (focus on computers and telecommunications) – Memory and storage & information analysis – intelligence (focus on digital information) – Electronic based tech to influence, alter, reduce and change information (focus on how humans process information) • Gibish, E. (2003). WARFARE IN THE 21ST CENTURY - A Selected Bibliography. U.S. Army War College Library. Carlisle Barracks, PA. EUA http://www.carlisle.army.mil/library/bibs/warfar03.htm
  • 5. Information warfare is a everyone concern – worldwide… • Explore the Pakistan’s site Terminal X on Defence, intelligence and geopolitics – http://www.terminalx.org/2011/03/overview-modern- communication.html
  • 6. One (big) example… • On June 23 2009, the United States Secretary of Defense Robert Gates issued notifications for the establishment of the world's first dedicated CYBERCOM (Cyber Command), the USCYBERCOM based on growing concerns of Chinese military penetration into Pentagon defense systems. He outlined the objective in the following statement: "My own view is that the only way to counteract both criminal and espionage activity online is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on Western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well."
  • 7. Another one… • On January 15 2011, the NY Times reported: Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own. Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms. • Conflicting reports just recently now suggest that it was the US which was behind the design, trial and injection of the Stuxnet worm. There can be a strong possibility that both Israel and the US cyber commands worked in tandem against Irani cyber command which was setup to "prevent espionage and sabotage in Information Technology (IT) tools" according to General Syed Kamal Hadianfar, Head of the Information Production and Exchange Department of the Law Enforcement Police in Iran.
  • 8.
  • 9. Cyberwar non human nature…
  • 10. Working Definition Information warfare is comprised of operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions
  • 11. Information Operations (IO) • Military Information Warfare • IO is conducted during time of crisis or conflict to affect adversary information and information systems while defending one's own information and systems
  • 12. peace as an ultimate goal ". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence." Sun Tzu, The Art of War
  • 13. Better than brute force "There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind." Napoleon Bonaparte
  • 14. Core Capabilities • Psychological Operations (PSYOPS) • Military Deception (MILDEC) • Operations Security (OPSEC) • Computer Network Operations (CNO) • Electronic Warfare (EW)
  • 15. Environment Shaping Political Power Overt Peacetime Economic Power Shaping the PSYOP Public Affairs Information Space Deception Public Diplomacy Covert Action Deterrent Capabilities Information Operations Public Diplomacy International Power Shaping the Public Affairs Force Disposition Conflict Space Network Security Psychological Operations Operational Security Covert Action & Deception Information Warfare Force Disposition Deception Shaping the Fire Power Operational Security Battle-Space Electronic Warfare Psychological Operations
  • 16. Evolution of Terminology • Propaganda & Political Warfare • Psychological Warfare • Psychological Operations • Information Warfare • Information Operations • Influence Attitudes / Strategic Influence / Perception Management
  • 17. IO & IW formal definitions • Information Operations Doctrine (OTAN) - Information Warfare: “ Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.” - Information Operations: “Actions taken to affect adversary information and information systems while defending one’s own information and information system’s.”
  • 18. Information Age Conflict INFORMATION INFORMATION IN WARFARE WARFARE Intelligence  Influence Attitudes Surveillance  Deny/Protect Reconnaissance  Deceive Weather Geographic  Exploit/Attack Other
  • 19.
  • 20. Potential vulnerability due to information war in our society • the vulnerability of democracies to false, misleading, or carefully crafted attacks orchestrated through the news media; • attacks by creative individuals skilled and determined enough to exploit communications systems and computer networks for illegal gain or to disrupt society; • criminal organizations (terrorists, drug smugglers, illegal arms merchants, international poachers, and rogue banking groups) that sit across any one country's boundaries represent a poorly-met challenge; • coalition warfare in which military cooperation and interoperability are essential, but political goals are not fully compatible and intelligence sources and methods must be protected; and • psychological warfare waged against a general population in order to undermine confidence in leaders or the wisdom of their actions, often exploiting ethnic, social or moral cleavages in the target society. http://www.iwar.org.uk/iwar/resources/deterrence/iwdAppb.htm
  • 21.
  • 23. Cyberpower targets Intra cyberspace Extra cyberspace Digital info tools Hard: denial of service Hard: atacks to SCADA attacks systems Soft: creaty standards and Soft: public opinion procedures campain and diplomacy to influence Physical info tools Hard: campanies Hard: routing and cabling governmental control destruction Soft: software to support Soft: protests to identify human rights & others and embaressement activists suppliers Nye, J. (2010) The Future of Power. PublicAffairs. See also: http://www.amacad.org/publications/bulletin/spring2011/power.pdf
  • 24. Three cyberpower tactics (familiar with these?) • A tell B what to do - if not the case, B will not do that • A do not allow choice to B - including barriers to B apply its own strategies • A shapes the B preferences - this way, B never consider some of the available strategies
  • 25. Major players in information war • leading governments (most powerful Nations) – Vulnerabilities: depend on complex systems, also fragile, political instability, possible loss of reputation • Multinational organizations and high structured networks – Vulnerabilities: Legal action, intellectual property theft, system failure, public censorship • Individuals and less structured networks – Vulnerabilities: legal and ilegal stress by governments and big organizations, when caught
  • 26. One more (general) conclusion… • Defensive information warfare, unlike warfare of other sorts, cannot be left solely to the government. It must be seen as the business of every organization likely to be a target • MacNulty, C. (1996). Changing Social Values and their Implications for Information Warfare. INFOWARCON 5. Washington DC. September. http://www.exploit-the-future.com/paper1/paper1.htm