Advertisement

Information Warfare – From Doctrine to Permanent Conflict

  • Ingo RuhmannEmail author
  • Ute Bernhardt
Chapter

Abstract

In the final phase of the Cold War the relevance of information technology for the military had gained momentum, resulting in the formulation of the concept and soon thereafter also the doctrine of Information Warfare in NATO, Warsaw Pact and Asian countries. In all pioneering countries, Information Warfare was meant to use any technological and appropriate non-technological means to disrupt the ability of an adversary to purposefully pursue its goals in times of crisis and war. Information Warfare tactics employ means to influence public opinion and the media just as well as to disrupt computer systems, or physically destroy communication lines or military headquarters. Information War is waged by organisations in the fluid continuum between intelligence agencies and military intelligence units, thus complementing the tasks they have been executing continuously since the end of World War II. Today we see how these concepts of Information Warfare have evolved into an element of everyday life.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

Recommended Reading

  1. Altmann, J., Bernhardt, U., Nixdorf, K., Ruhmann, I. & Wöhrle, D. (2017). Naturwissenschaft – Rüstung - Frieden. Basiswissen für die Friedensforschung. Wiesbaden.Google Scholar
  2. Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, vol. 12, iss. 2, pp. 141–165. Retrieved from https://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf.
  3. Ruhmann, Ingo, & Bernhardt, Ute. (2014). Information Warfare und Informationsgesellschaft. Zivile und sicherheitspolitische Kosten des Informationskriegs. Wissenschaft & Frieden, vol. 1. Retrieved from http://wissenschaft-und-frieden.de/seite.php?dossierID=078.
  4. Schmitt, M. (Ed.) (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge, Cambridge University Press, 2013.Google Scholar

Bibliography

  1. A Borderless Dispute. (1995, February 20). Newsweek.Google Scholar
  2. Army, Secretary of the. (1996). Field Manual 100-6 “Information Operations.” Washington D.C. Retrieved from https://www.hsdl.org/?view&did=437397.
  3. Army, Secretary of the. (2004). Field Manual 1-02 “Operational Terms and Graphics.” Washington D.C.Google Scholar
  4. Army, Secretary of the. (2011). Field Manual 3-0 “Operations.” Washington D.C.Google Scholar
  5. Army, Secretary of the. (2012). Field Manual 3-13, Inform and influence activities. Washington D.C.Google Scholar
  6. Arquilla, John, & Ronfeldt, David. (1993). Cyberwar is coming! Comparative Strategy, vol. 12, iss. 2, pp. 141–165. Retrieved from https://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf .
  7. Barry, John (1991). The Nuklear Option: Thinking the Unthinkable; Newsweek, 14.1.1991, pp. 12-13.Google Scholar
  8. Bernhardt, Ute, & Ruhmann, Ingo. (1997). Der digitale Feldherrnhügel, Military Systems: Informationstechnik für Führung und Kontrolle. Dossier Nr. 24. Retrieved from http://www.wissenschaftund-frieden.de/seite.php?dossierID=050.
  9. Biermann, Kai. (2016, February 12). NSA-Software: Wozu braucht der Verfassungsschutz XKeyscore? | ZEIT ONLINE. Die Zeit. Retrieved from https://www.zeit.de/digital/datenschutz/2016-02/verfassungsschutz-bfv-nsa-xkeyscore.
  10. Bundesministerium des Innern, für Bau und Heimat (2018): Zusammenarbeit mit China durch erfolgreich durchgeführten ersten deutsch-chinesischen Cyberkonsultationsmechanismus untermauert, Pressemitteilung, 18th May, 2018, https://www.bmi.bund.de/SharedDocs/pressemitteilungen/DE/2018/05/deutsch-chinesischer-cyberkonsultationsmechanismus.pdf?__blob=publication-File&v=2.
  11. Bundeswehr. (n.d.). Die Cyber- und IT-Fähigkeiten der Streitkräfte. Retrieved May 18, 2018, from https://www.bundeswehrkarriere.de/it/cyber-und-it-faehigkeiten-der-streitkraefte.
  12. Calabresi, Massimo, & Rebala, Pratheek. (2016, December 14). Here’s the Evidence Russia Hacked the Democrats. Time. Retrieved from http://time.com/4600177/election-hack-russia-hillary-clinton-donald-trump/.
  13. Cartwright, James E. Joint Terminology for Cyberspace Operations, DoD Vice Chairman of the Joint Chiefs of Staff 16 (2010). Retrieved from http://www.nsci-va.org/CyberReferenceLib/2010-11-Joint Terminology for Cyberspace Operations.pdf.
  14. Council, National Security. (2013). Declassified documents concerning PDD-68, International Public Information. Retrieved May 14, 2018, from https://clinton.presidentiallibraries.us/items/show/47977.
  15. Cullen, Dr. Patrick J., & Reichborn-Kjennerud, Erik. (2017). Understanding Hybrid Warfare: A Multinational Capability Development Campaign project. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/647776/dar_mcdc_hybrid_warfare.pdf.
  16. Daryl, G. (2001). The Myth of Air Power in the Persian Gulf War and the Future of Warfare. International Security, vol. 26, iss. 2, pp. 5–44.Google Scholar
  17. Department of Defense. DoD Directive No. 6: The National Security Agency and the Central Security Service, DoD Directive 11 (1971). United States of America. Retrieved from https://www.nsa.gov/news-features/declassified-documents/nsa-60th-timeline/assets/files/1970s/19711223_1970_Doc_3983926_DODDir5100.pdf.
  18. Department of Defense. (2005). The National Defense Strategy of the United States of America. Washington D.C. Retrieved from http://www.au.af.mil/au/awc/awcgate/nds/nds2005.pdf.
  19. Department of Defense. DOD Directive 5100.20, January 26, 2010, DoD Directive 24 (2010). United States of America. Retrieved from https://fas.org/irp/doddir/dod/d5100_20.pdf.
  20. DPA. (2013, August 3). XKeyscore: BND nutzt NSA-Spähsoftware für Auslandsaufklärung | ZEIT ONLINE. Die Zeit. Retrieved from https://www.zeit.de/politik/deutschland/2013-08/bndxkeyscore-nsa.
  21. EUEA, European Union External Action. (2017). Questions and Answers about the East StratCom Task Force.Google Scholar
  22. European Commission. (2016). Joint Framework on countering hybrid threats. Brussels. Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52016JC0018&from=EN.
  23. European Parliament. EU strategic communication to counteract anti-EU propaganda by third parties -P8_TA(2016)0441, European Parliament (2016). Retrieved from http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P8-TA-2016-0441+0+DOC+XML+V0//EN.
  24. GAO, United States General Accounting Office. (1997). Government Accounting Office: Operation Desert Storm Air Campaign. Washington D.C.Google Scholar
  25. Gerasimov, Valery. (2013, February 26). The value of science in anticipation. New challenges require rethinking the forms and methods of conducting military operations. VPK-News. Retrieved from https://www.vpk-news.ru/articles/14632.
  26. Gorman, Siobhan. (2007, February 11). Turbulence NSA | Costly NSA initiative has a shaky takeoff. The Baltimore Sun. Washington. Retrieved from http://articles.baltimoresun.com/2007-02-11/news/0702110034_1_turbulence-cyberspace-nsa.
  27. King, Tom. (2000). Intelligence and Security Committee Annual Report 1999-2000. London. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/263533/4897.pdf.
  28. Kochetkov, Gennady, Averchev, Vladimir, & Sergeev, Viktor. (1987). Artificial Intelligence and Disarmament. In Allan Din: Arms and Artificial Intelligence: Weapons and Arms Control Applications of Advanced Computing (pp. 153–160). Oxford.Google Scholar
  29. Kvachkov, V. (2004). Cпeцнaз Poccии (Russia’s Special Purpose Forces). Voyennaya Literatura. Retrieved from http://militera.lib.ru/science/kvachkov_vv/index.html.
  30. Lieutenant-Colonel Selhorst, A. J. C. (2016, April). Russia’s Perception Warfare. Militaire Spectator. Retrieved from http://www.militairespectator.nl/thema/strategie-operaties/artikel/russias-perception-warfare.
  31. Lischka, Konrad, & Stöcker, Christian. (2013, July 31). XKeyscore: Wie die NSA-Überwachung funktioniert - SPIEGEL ONLINE. Spiegel Online. Hamburg. Retrieved from http://www.spiegel.de/netzwelt/netzpolitik/xkeyscore-wie-die-nsa-ueberwachung-funktioniert-a-914187.html.
  32. Mortimer, Caroline. (2016, October 15). Obama administration asks CIA to prepare revenge cyber-attack against Russia. The Independent.Google Scholar
  33. Nakashima, Ellen, & Warrick, Joby. (2012, June 2). Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post. Washington D.C. Retrieved from https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officialssay/2012/06/01/gJQAlnEy6U_story.html?noredirect=on&utm_term=.da2881ef0a15.
  34. Nolte, Susanne. (2009). Zum 20. Todestag von Karl Koch | iX. Retrieved May 14, 2018, from https://www.heise.de/ix/artikel/Suendenfall-794636.html.
  35. Office of the Press Secretary. (2013). FACT SHEET: U.S.-Russian Cooperation on Information and Communications Technology Security. Retrieved May 18, 2018, from https://obamawhitehouse.archives.gov/the-press-office/2013/06/17/fact-sheet-us-russian-cooperation-information-and-communications-technol.
  36. Office of the Press Secretary. (2015). Remarks by President Obama and President Xi of the People’s Republic of China in Joint Press Conference September 25, 2015. Retrieved May 18, 2018, from https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/remarks-president-obama-andpresident-xi-peoples-republic-china-joint.
  37. Office of the Secretary of Defense. (2017). Annual report to Congress: Military and Security Developments Involving the People’s Republic of China. Washington D.C.Google Scholar
  38. Panarin, Igor Nicolaevich. (1998). InfoWar and Authority. Retrieved from http://archive.aec.at/media/archive/1998/183589/File_03450_AEC_FE_1998.pdf.
  39. Patalong, Frank, & Stöcker, Christian. (2008, August 11). Cyber-Krieg: Hacker fegen georgische Regierungsseiten aus dem Netz. SPIEGEL ONLINE. Retrieved from http://www.spiegel.de/netzwelt/web/cyber-krieg-hacker-fegen-georgische-regierungsseiten-aus-dem-netz-a-571317.html.
  40. Peterzell, Jay. (1989). Spying and Sabotage by Computer. Time.Google Scholar
  41. Pufeng, Wang. (1995). Xinxi zhanzheng yu junshi geming (Information Warfare and the Revolution in Military Affairs). Beijing.Google Scholar
  42. Razumovskaya, Olga. (2015, May 8). Russia and China Pledge Not to Hack Each Other. Wall Street Journal. Retrieved from https://blogs.wsj.com/digits/2015/05/08/russia-china-pledge-to-not-hackeach-other/.
  43. Resolution, U. N. General Assembly. No Title (1999). Retrieved from http://undocs.org/A/RES/53/70.
  44. Rötzer, Florian. (2000a). Israelische Hacker wollen Websites vor pro-palästinensischen Angriffen schützen. Retrieved May 18, 2018, from https://www.heise.de/tp/features/Israelische-Hacker-wollen-Websites-vor-pro-palaestinensischen-Angriffen-schuetzen-3442459.html.
  45. Rötzer, Florian. (2000b). Taiwans Militär probt Angriffe mit Computerviren. Retrieved May 18, 2018, from https://www.heise.de/tp/features/Taiwans-Militaer-probt-Angriffe-mit-Computerviren-3447492.html.
  46. Ruhmann, Ingo. (2003). Sicherheitspolitische Folgerungen aus dem Golfkrieg. Wissenschaft & Frieden, vol. 3, pp. 27–31. Retrieved from http://www.wissenschaft-und-frieden.de/seite.php?artikelID=0254.
  47. Ruhmann, Ingo. (2014). NSA, IT-Sicherheit und die Folgen. Eine Schadensanalyse. Datenschutz Und Datensicherheit - DuD, vol. 38, iss. 1, pp. 40–46. Retrieved from https://link.springer.com/article/10.1007/s11623-014-0010-3.
  48. Ruhmann, Ingo. (2018). Cyber-Rüstung und zivile IT-Sicherheit: Wachsende Ungleichgewichte. Dossier No. 86, Wissenschaft & Frieden. vol. 2, Retrieved from https://wissenschaft-und-frieden.de/seite.php?dossierID=090.
  49. Ruhmann, Ingo, & Bernhardt, Ute. (2014). Information Warfare und Informationsgesellschaft. Zivile und sicherheitspolitische Kosten des Informationskriegs. Wissenschaft & Frieden, vol. 1. Retrieved from http://wissenschaft-und-frieden.de/seite.php?dossierID=078.
  50. Salzen, Claudia. (2007, May 29). „In Estland wurde der Cyber-Krieg getestet“. Tagesspiegel. Retrieved from https://www.tagesspiegel.de/politik/in-estland-wurde-der-cyber-krieg-getestet/858532.html.
  51. Sanger, David E. (2012, June 1). Obama Ordered Wave of Cyberattacks Against Iran. New York Times. New York. Retrieved from https://www.nytimes.com/2012/06/01/world/middleeast/obama-orderedwave-of-cyberattacks-against-iran.html?_r=1&hp&pagewanted=all.
  52. Sanger, David E. (2015, September 19). U.S. and China Seek Arms Deal for Cyberspace. New York Times. New York.Google Scholar
  53. Scheuch, Laszlo, & Möhle, Holger. (2018, January 28). Das eigene System vor Feinden schützen. General-Anzeiger. Bonn. Retrieved from http://www.general-anzeiger-bonn.de/news/politik/deutschland/Cyber-Zentrum-mit-Kommando-in-Bonn-soll-ausgebaut-werden-article3759619.html.
  54. Schneider, William P. (1982). Small Computes in the Army: An Apple a Day to Keep the Soviets Away. Signal, pp. 39–43.Google Scholar
  55. Settle, Michael. (2018, April 16). Spy chiefs prepare for Russian revenge cyber-attacks. The Herald.Google Scholar
  56. Shaker, Steven M., & Finkelstein, Robert. (1987). The Bionic Soldier. National Defense, pp. 27–32.Google Scholar
  57. Shorrock, Tim. (2008). Spies for hire: the secret world of intelligence outsourcing (1st ed.). New York, London, Toronto, Sydney: Simon & Schuster.Google Scholar
  58. Stephenson, Laura. (n.d.). Did Donald Trump Just Ask Russia To Hack Hillary Clinton’s Emails? Fox47News. Stiftung Wissenschaft und Politik. (n.d.). Ukraine. Retrieved May 18, 2018, from https://www.swp-berlin.org/swp-themendossiers/krise-um-die-ukraine/ukraine/.
  59. Szandar, Alexander. (2008). Strategische Aufklärung: Bundeswehr belauscht die Welt. Retrieved May 18, 2018, from http://www.spiegel.de/politik/deutschland/strategische-aufklaerung-bundeswehrbelauscht-die-welt-a-575417.html.
  60. Thomas, Evan, & Brant, Martha. (2003). The Secret War. Newsweek, pp. 22–29.Google Scholar
  61. U.S., Senate. (1986). Report of the Select Committee on Intelligence.Google Scholar
  62. UNIDIR, United Nations Institute for Disarmament Research. (2013). The Cyber Index International Security Trends and Realities. United Nations, iss. 3, pp. 153. Retrieved from http://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf.
  63. Weaver, Nicolas. (2014). A Close Look at the NSA’s Most Powerful Internet Attack Tool. Retrieved May 18, 2018, from https://www.wired.com/2014/03/quantum/.
  64. Weigang, Shen. (1998). Der Informationskrieg – eine Herausforderung. In G. Stocker & C. Schöpf (Eds.), Information. Macht. Krieg. Ars Electronica. Retrieved from http://archive.aec.at/media/assets/d3a8b7e791870f66db86d84de72c7dad.pdf.

Copyright information

© Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2019

Authors and Affiliations

  1. 1.TH BrandenburgBerlinGermany
  2. 2.FIFf e.V.BerlinGermany

Personalised recommendations