Information Warfare – From Doctrine to Permanent Conflict



In the final phase of the Cold War the relevance of information technology for the military had gained momentum, resulting in the formulation of the concept and soon thereafter also the doctrine of Information Warfare in NATO, Warsaw Pact and Asian countries. In all pioneering countries, Information Warfare was meant to use any technological and appropriate non-technological means to disrupt the ability of an adversary to purposefully pursue its goals in times of crisis and war. Information Warfare tactics employ means to influence public opinion and the media just as well as to disrupt computer systems, or physically destroy communication lines or military headquarters. Information War is waged by organisations in the fluid continuum between intelligence agencies and military intelligence units, thus complementing the tasks they have been executing continuously since the end of World War II. Today we see how these concepts of Information Warfare have evolved into an element of everyday life.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


Recommended Reading

  1. Altmann, J., Bernhardt, U., Nixdorf, K., Ruhmann, I. & Wöhrle, D. (2017). Naturwissenschaft – Rüstung - Frieden. Basiswissen für die Friedensforschung. Wiesbaden.Google Scholar
  2. Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, vol. 12, iss. 2, pp. 141–165. Retrieved from
  3. Ruhmann, Ingo, & Bernhardt, Ute. (2014). Information Warfare und Informationsgesellschaft. Zivile und sicherheitspolitische Kosten des Informationskriegs. Wissenschaft & Frieden, vol. 1. Retrieved from
  4. Schmitt, M. (Ed.) (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge, Cambridge University Press, 2013.Google Scholar


  1. A Borderless Dispute. (1995, February 20). Newsweek.Google Scholar
  2. Army, Secretary of the. (1996). Field Manual 100-6 “Information Operations.” Washington D.C. Retrieved from
  3. Army, Secretary of the. (2004). Field Manual 1-02 “Operational Terms and Graphics.” Washington D.C.Google Scholar
  4. Army, Secretary of the. (2011). Field Manual 3-0 “Operations.” Washington D.C.Google Scholar
  5. Army, Secretary of the. (2012). Field Manual 3-13, Inform and influence activities. Washington D.C.Google Scholar
  6. Arquilla, John, & Ronfeldt, David. (1993). Cyberwar is coming! Comparative Strategy, vol. 12, iss. 2, pp. 141–165. Retrieved from .
  7. Barry, John (1991). The Nuklear Option: Thinking the Unthinkable; Newsweek, 14.1.1991, pp. 12-13.Google Scholar
  8. Bernhardt, Ute, & Ruhmann, Ingo. (1997). Der digitale Feldherrnhügel, Military Systems: Informationstechnik für Führung und Kontrolle. Dossier Nr. 24. Retrieved from
  9. Biermann, Kai. (2016, February 12). NSA-Software: Wozu braucht der Verfassungsschutz XKeyscore? | ZEIT ONLINE. Die Zeit. Retrieved from
  10. Bundesministerium des Innern, für Bau und Heimat (2018): Zusammenarbeit mit China durch erfolgreich durchgeführten ersten deutsch-chinesischen Cyberkonsultationsmechanismus untermauert, Pressemitteilung, 18th May, 2018,
  11. Bundeswehr. (n.d.). Die Cyber- und IT-Fähigkeiten der Streitkräfte. Retrieved May 18, 2018, from
  12. Calabresi, Massimo, & Rebala, Pratheek. (2016, December 14). Here’s the Evidence Russia Hacked the Democrats. Time. Retrieved from
  13. Cartwright, James E. Joint Terminology for Cyberspace Operations, DoD Vice Chairman of the Joint Chiefs of Staff 16 (2010). Retrieved from Terminology for Cyberspace Operations.pdf.
  14. Council, National Security. (2013). Declassified documents concerning PDD-68, International Public Information. Retrieved May 14, 2018, from
  15. Cullen, Dr. Patrick J., & Reichborn-Kjennerud, Erik. (2017). Understanding Hybrid Warfare: A Multinational Capability Development Campaign project. Retrieved from
  16. Daryl, G. (2001). The Myth of Air Power in the Persian Gulf War and the Future of Warfare. International Security, vol. 26, iss. 2, pp. 5–44.Google Scholar
  17. Department of Defense. DoD Directive No. 6: The National Security Agency and the Central Security Service, DoD Directive 11 (1971). United States of America. Retrieved from
  18. Department of Defense. (2005). The National Defense Strategy of the United States of America. Washington D.C. Retrieved from
  19. Department of Defense. DOD Directive 5100.20, January 26, 2010, DoD Directive 24 (2010). United States of America. Retrieved from
  20. DPA. (2013, August 3). XKeyscore: BND nutzt NSA-Spähsoftware für Auslandsaufklärung | ZEIT ONLINE. Die Zeit. Retrieved from
  21. EUEA, European Union External Action. (2017). Questions and Answers about the East StratCom Task Force.Google Scholar
  22. European Commission. (2016). Joint Framework on countering hybrid threats. Brussels. Retrieved from
  23. European Parliament. EU strategic communication to counteract anti-EU propaganda by third parties -P8_TA(2016)0441, European Parliament (2016). Retrieved from
  24. GAO, United States General Accounting Office. (1997). Government Accounting Office: Operation Desert Storm Air Campaign. Washington D.C.Google Scholar
  25. Gerasimov, Valery. (2013, February 26). The value of science in anticipation. New challenges require rethinking the forms and methods of conducting military operations. VPK-News. Retrieved from
  26. Gorman, Siobhan. (2007, February 11). Turbulence NSA | Costly NSA initiative has a shaky takeoff. The Baltimore Sun. Washington. Retrieved from
  27. King, Tom. (2000). Intelligence and Security Committee Annual Report 1999-2000. London. Retrieved from
  28. Kochetkov, Gennady, Averchev, Vladimir, & Sergeev, Viktor. (1987). Artificial Intelligence and Disarmament. In Allan Din: Arms and Artificial Intelligence: Weapons and Arms Control Applications of Advanced Computing (pp. 153–160). Oxford.Google Scholar
  29. Kvachkov, V. (2004). Cпeцнaз Poccии (Russia’s Special Purpose Forces). Voyennaya Literatura. Retrieved from
  30. Lieutenant-Colonel Selhorst, A. J. C. (2016, April). Russia’s Perception Warfare. Militaire Spectator. Retrieved from
  31. Lischka, Konrad, & Stöcker, Christian. (2013, July 31). XKeyscore: Wie die NSA-Überwachung funktioniert - SPIEGEL ONLINE. Spiegel Online. Hamburg. Retrieved from
  32. Mortimer, Caroline. (2016, October 15). Obama administration asks CIA to prepare revenge cyber-attack against Russia. The Independent.Google Scholar
  33. Nakashima, Ellen, & Warrick, Joby. (2012, June 2). Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post. Washington D.C. Retrieved from
  34. Nolte, Susanne. (2009). Zum 20. Todestag von Karl Koch | iX. Retrieved May 14, 2018, from
  35. Office of the Press Secretary. (2013). FACT SHEET: U.S.-Russian Cooperation on Information and Communications Technology Security. Retrieved May 18, 2018, from
  36. Office of the Press Secretary. (2015). Remarks by President Obama and President Xi of the People’s Republic of China in Joint Press Conference September 25, 2015. Retrieved May 18, 2018, from
  37. Office of the Secretary of Defense. (2017). Annual report to Congress: Military and Security Developments Involving the People’s Republic of China. Washington D.C.Google Scholar
  38. Panarin, Igor Nicolaevich. (1998). InfoWar and Authority. Retrieved from
  39. Patalong, Frank, & Stöcker, Christian. (2008, August 11). Cyber-Krieg: Hacker fegen georgische Regierungsseiten aus dem Netz. SPIEGEL ONLINE. Retrieved from
  40. Peterzell, Jay. (1989). Spying and Sabotage by Computer. Time.Google Scholar
  41. Pufeng, Wang. (1995). Xinxi zhanzheng yu junshi geming (Information Warfare and the Revolution in Military Affairs). Beijing.Google Scholar
  42. Razumovskaya, Olga. (2015, May 8). Russia and China Pledge Not to Hack Each Other. Wall Street Journal. Retrieved from
  43. Resolution, U. N. General Assembly. No Title (1999). Retrieved from
  44. Rötzer, Florian. (2000a). Israelische Hacker wollen Websites vor pro-palästinensischen Angriffen schützen. Retrieved May 18, 2018, from
  45. Rötzer, Florian. (2000b). Taiwans Militär probt Angriffe mit Computerviren. Retrieved May 18, 2018, from
  46. Ruhmann, Ingo. (2003). Sicherheitspolitische Folgerungen aus dem Golfkrieg. Wissenschaft & Frieden, vol. 3, pp. 27–31. Retrieved from
  47. Ruhmann, Ingo. (2014). NSA, IT-Sicherheit und die Folgen. Eine Schadensanalyse. Datenschutz Und Datensicherheit - DuD, vol. 38, iss. 1, pp. 40–46. Retrieved from
  48. Ruhmann, Ingo. (2018). Cyber-Rüstung und zivile IT-Sicherheit: Wachsende Ungleichgewichte. Dossier No. 86, Wissenschaft & Frieden. vol. 2, Retrieved from
  49. Ruhmann, Ingo, & Bernhardt, Ute. (2014). Information Warfare und Informationsgesellschaft. Zivile und sicherheitspolitische Kosten des Informationskriegs. Wissenschaft & Frieden, vol. 1. Retrieved from
  50. Salzen, Claudia. (2007, May 29). „In Estland wurde der Cyber-Krieg getestet“. Tagesspiegel. Retrieved from
  51. Sanger, David E. (2012, June 1). Obama Ordered Wave of Cyberattacks Against Iran. New York Times. New York. Retrieved from
  52. Sanger, David E. (2015, September 19). U.S. and China Seek Arms Deal for Cyberspace. New York Times. New York.Google Scholar
  53. Scheuch, Laszlo, & Möhle, Holger. (2018, January 28). Das eigene System vor Feinden schützen. General-Anzeiger. Bonn. Retrieved from
  54. Schneider, William P. (1982). Small Computes in the Army: An Apple a Day to Keep the Soviets Away. Signal, pp. 39–43.Google Scholar
  55. Settle, Michael. (2018, April 16). Spy chiefs prepare for Russian revenge cyber-attacks. The Herald.Google Scholar
  56. Shaker, Steven M., & Finkelstein, Robert. (1987). The Bionic Soldier. National Defense, pp. 27–32.Google Scholar
  57. Shorrock, Tim. (2008). Spies for hire: the secret world of intelligence outsourcing (1st ed.). New York, London, Toronto, Sydney: Simon & Schuster.Google Scholar
  58. Stephenson, Laura. (n.d.). Did Donald Trump Just Ask Russia To Hack Hillary Clinton’s Emails? Fox47News. Stiftung Wissenschaft und Politik. (n.d.). Ukraine. Retrieved May 18, 2018, from
  59. Szandar, Alexander. (2008). Strategische Aufklärung: Bundeswehr belauscht die Welt. Retrieved May 18, 2018, from
  60. Thomas, Evan, & Brant, Martha. (2003). The Secret War. Newsweek, pp. 22–29.Google Scholar
  61. U.S., Senate. (1986). Report of the Select Committee on Intelligence.Google Scholar
  62. UNIDIR, United Nations Institute for Disarmament Research. (2013). The Cyber Index International Security Trends and Realities. United Nations, iss. 3, pp. 153. Retrieved from
  63. Weaver, Nicolas. (2014). A Close Look at the NSA’s Most Powerful Internet Attack Tool. Retrieved May 18, 2018, from
  64. Weigang, Shen. (1998). Der Informationskrieg – eine Herausforderung. In G. Stocker & C. Schöpf (Eds.), Information. Macht. Krieg. Ars Electronica. Retrieved from

Copyright information

© Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2019

Authors and Affiliations

  1. 1.TH BrandenburgBerlinGermany
  2. 2.FIFf e.V.BerlinGermany

Personalised recommendations