27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Karim Hamza and Van Dalen<br />

From a military point of view, there is an enemy defined and specific actions and procedures are<br />

prepared for defense or attack, but with eGovernance not all enemies are defined or detected which<br />

encourages delivering a concept to detect such enemies or threats.<br />

There were different definitions and concepts related to information warfare (Libicki, 1995)<br />

Command-and-Control Warfare [C2W];<br />

Intelligence-based Warfare [IBW];<br />

Electronic Warfare [EW];<br />

Psychological Operations [PSYOPS];<br />

Hacker war software-based attacks on information systems;<br />

Information Economic Warfare [IEW] war via the control of information trade;<br />

Cyberwar [combat in the virtual realm].<br />

As an example; The United States has substantial information-based resources, including complex<br />

management systems and infrastructures involving the control of electric power, money flow, air<br />

traffic, oil and gas, and other information-dependent items. U.S. allies and potential coalition partners<br />

are similarly increasingly dependent on various information infrastructures. Conceptually, if and when<br />

potential adversaries attempt to damage these systems using IW techniques, information warfare<br />

inevitably takes on a strategic aspect. (Roger, Molander, Riddile, Wilson, 1996)<br />

The Basic Features of Strategic Information Warfare:<br />

Low entry cost: Unlike traditional weapon technologies, development of information- based<br />

techniques does not require sizable financial resources or state sponsorship. Information systems<br />

expertise and access to important networks may be the only prerequisites.<br />

Blurred traditional boundaries: Traditional distinctions; public versus private interests, warlike<br />

versus criminal behavior and geographic boundaries, such as those between nations as<br />

historically defined, are complicated by the growing interaction within the information<br />

infrastructure.<br />

4. Types of information warfare: Cyber war / cyber crime / espionage<br />

The Department of Defense (DoD) defines cyberspace as follows: A global domain within the<br />

information environment consisting of the interdependent network of information technology<br />

infrastructures, including the Internet, telecommunications networks, computer systems, and<br />

embedded processors and controllers. (DoD Dictionary of Military, 2008)<br />

Recently, cyberspace which is becoming the main field of information warfare started to develop as a<br />

military domain. To join the historic domains of land, sea, air, and space. All this might lead to a belief<br />

that the historic constructs of war like force, offense, defense, and deterrence can be applied to<br />

cyberspace with a little modification. But it must be understood in its own terms, and policy decisions<br />

being made for these and other new commands must reflect such understanding. Attempts to transfer<br />

policy constructs from other forms of warfare will not only fail but also hinder policy and<br />

planning.(Libicki, 2009)<br />

Normally the main targets for an Information Attack as Denning (1999) outlines the potential elements<br />

in an information system that are prone to attack and exploitation as:<br />

Data stores: for example, computer and human memories.<br />

Communication channels: for example, humans, and telecommunication systems.<br />

Sensors/input devices: for example, scanners, cameras, microphones, human senses.<br />

Output devices: for example, disk writers, printers, human processes.<br />

Manipulators of data: for example, microprocessors, humans, software.<br />

Most related information warfare was as below:<br />

Strategic Cyber-War: A campaign of Cyber-Attacks launched by one entity against a state and<br />

its society, primarily but not exclusively for the purpose of affecting the target state’s behavior,<br />

would be strategic Cyber-War. The attacking entity can be a state or a non-state actor (Libicki, 2009)<br />

109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!