6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Karim Hamza and Van Dalen<br />
From a military point of view, there is an enemy defined and specific actions and procedures are<br />
prepared for defense or attack, but with eGovernance not all enemies are defined or detected which<br />
encourages delivering a concept to detect such enemies or threats.<br />
There were different definitions and concepts related to information warfare (Libicki, 1995)<br />
Command-and-Control Warfare [C2W];<br />
Intelligence-based Warfare [IBW];<br />
Electronic Warfare [EW];<br />
Psychological Operations [PSYOPS];<br />
Hacker war software-based attacks on information systems;<br />
Information Economic Warfare [IEW] war via the control of information trade;<br />
Cyberwar [combat in the virtual realm].<br />
As an example; The United States has substantial information-based resources, including complex<br />
management systems and infrastructures involving the control of electric power, money flow, air<br />
traffic, oil and gas, and other information-dependent items. U.S. allies and potential coalition partners<br />
are similarly increasingly dependent on various information infrastructures. Conceptually, if and when<br />
potential adversaries attempt to damage these systems using IW techniques, information warfare<br />
inevitably takes on a strategic aspect. (Roger, Molander, Riddile, Wilson, 1996)<br />
The Basic Features of Strategic Information Warfare:<br />
Low entry cost: Unlike traditional weapon technologies, development of information- based<br />
techniques does not require sizable financial resources or state sponsorship. Information systems<br />
expertise and access to important networks may be the only prerequisites.<br />
Blurred traditional boundaries: Traditional distinctions; public versus private interests, warlike<br />
versus criminal behavior and geographic boundaries, such as those between nations as<br />
historically defined, are complicated by the growing interaction within the information<br />
infrastructure.<br />
4. Types of information warfare: Cyber war / cyber crime / espionage<br />
The Department of Defense (DoD) defines cyberspace as follows: A global domain within the<br />
information environment consisting of the interdependent network of information technology<br />
infrastructures, including the Internet, telecommunications networks, computer systems, and<br />
embedded processors and controllers. (DoD Dictionary of Military, 2008)<br />
Recently, cyberspace which is becoming the main field of information warfare started to develop as a<br />
military domain. To join the historic domains of land, sea, air, and space. All this might lead to a belief<br />
that the historic constructs of war like force, offense, defense, and deterrence can be applied to<br />
cyberspace with a little modification. But it must be understood in its own terms, and policy decisions<br />
being made for these and other new commands must reflect such understanding. Attempts to transfer<br />
policy constructs from other forms of warfare will not only fail but also hinder policy and<br />
planning.(Libicki, 2009)<br />
Normally the main targets for an Information Attack as Denning (1999) outlines the potential elements<br />
in an information system that are prone to attack and exploitation as:<br />
Data stores: for example, computer and human memories.<br />
Communication channels: for example, humans, and telecommunication systems.<br />
Sensors/input devices: for example, scanners, cameras, microphones, human senses.<br />
Output devices: for example, disk writers, printers, human processes.<br />
Manipulators of data: for example, microprocessors, humans, software.<br />
Most related information warfare was as below:<br />
Strategic Cyber-War: A campaign of Cyber-Attacks launched by one entity against a state and<br />
its society, primarily but not exclusively for the purpose of affecting the target state’s behavior,<br />
would be strategic Cyber-War. The attacking entity can be a state or a non-state actor (Libicki, 2009)<br />
109