08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TABLE OF CONTENTS<br />

TABLE OF CONTENTS..................................................................................1<br />

FOREWORD.....................................................................................................5<br />

ACKNOWLEDGEMENT ................................................................................6<br />

INTRODUCTION.............................................................................................7<br />

PART ONE: UNDERSTANDING OUR CYBER ENVIRONMENT ........11<br />

CHAPTER ONE: ENGAGING CYBER OR INFORMATION<br />

UBIQUITY?.....................................................................................................13<br />

Information Age or Cyber Age? ....................................................................13<br />

The Emergence of the Civilian and <strong>Military</strong> Cyber Battlefields.................19<br />

Information Operations (IO) and the <strong>Military</strong>.............................................21<br />

Unintended Consequences of Cyber Age Technologies ...............................28<br />

CHAPTER TWO: AL QAEDA AND THE INTERNET: THE DANGER<br />

OF “CYBERPLANNING” .............................................................................32<br />

Introduction .....................................................................................................32<br />

Terrorist Methodologies .................................................................................34<br />

Conclusions ......................................................................................................44<br />

CHAPTER THREE: CYBERINSURGENCY ............................................46<br />

Introduction .....................................................................................................46<br />

Context .............................................................................................................47<br />

Adaptive Insurgent Organization and Doctrine...........................................49<br />

Mobilizing the Masses.....................................................................................50<br />

Potential and Actual Insurgent Tactics on the Internet...............................53<br />

Conclusions ......................................................................................................56<br />

PART TWO: TERMINOLOGY AND CONCEPTS ...................................59<br />

CHAPTER FOUR: IS THE IW PARADIGM OUTDATED? A<br />

DISCUSSION OF US IW THEORY .............................................................61<br />

Introduction .....................................................................................................61<br />

Terminology and the IO/IW Paradigm: The Early Decisions.....................62<br />

Other Information-Related Terms ................................................................65<br />

“Data-Processing Operations:” Another Way to Think about the<br />

Information Age ..............................................................................................68<br />

Conclusions ......................................................................................................72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!