Handbook of Information Security Management:Policy, Standards, and Organization

Previous Table of Contents Next


In the next century, an increased use of technology will be used to fight wars. Stealth, surveillance, distance, and precision strike will be key concepts. As information age nations rely more and more on technology and information, these systems will obviously become the targets during information warfare.

The information warfare techniques are necessary due, in part, to economics. Every economics student learns about the “guns or butter” theory. It is believed that society cannot afford to adequately fund those programs that support society, while at the same time provide for a strong military structure. As the world continues to increase competitively the resources, for example, funding for expensive weapons systems, are competing with the resources needed to support society and the economic competition, which can also be considered as a type of warfare. Thus, commercial off-the-shelf (COTS), cheap, and secure weapons are being demanded.

Another important factor forcing the use of information warfare as a type of warfare is that the majority of civilized nations, because of world communications systems, can witness the death and destruction associated with warfare. They demand an end to such death and destruction. Casualties are not politically acceptable. Furthermore, as in the case of the U.S., why should a country continue to be destroyed and, then after peace is restored, spend billions of dollars to rebuild what had been destroyed? In information warfare, the death and destruction will be minimized, with information and information systems primarily being the target for destruction.

This new environment will cause these changes:

  Large armies will convert to smaller armies.
  More firepower will be employed from greater distances.
  Ground forces will only be used to identify targets and assess damages.
  A blurring of air, sea, and land warfare will occur.
  E-mail and other long-range smart information systems weapons will be available.
  Smaller and stealthier ships will be deployed.
  Pilotless drones will replace piloted aircraft.
  Less logistical support will be required.
  More targeting intelligence will be available.
  Information will be relayed direct from sensor to shooter.
  Satellite transmissions will be direct to soldier, pilot, or weapon.
  Military middle-management staff will be eliminated.
  Field commanders will access information directly from drones, satellites, or headquarters on the other side of the world.
  Friend or foe will be immediately recognized.

Technology, Menu-Driven Warfare

Technology is available that can build a menu-driven system, with data bases to allow the IW commanders and warriors to “point and click” to attack the enemy. For example, an information weapons system could provide these menu-driven computerized responses:

  Select a nation.
  Identify objectives.
  Identify technology targets.
  Identify communications systems.
  Identify weapons.
  Implement.

The weapons can be categorized as attack, protect, exploit, and support systems. For example:

  IW-Network Analyses (Exploit). Defined as the ability to covertly analyze networks of the adversaries to prepare for their penetration to steal their information and shut them down.
  Crypto (Exploit and Protect). Defined as the encrypting of U.S. and allies’ information so that it is not readable by those who do not have a need to know; the decrypting of the information of adversaries is to be exploited for the prosecution of information warfare.
  Sensor Signal Parasite (Attack). Defined as the ability to attach malicious code (e.g., virus, worms) and transmit that signal to the adversary to damage, destroy, exploit, or deceive the adversary.
  Internet-Based Hunter Killers (Attack). Defined as a software product that will search the Internet, identify adversaries’ nodes, deny them the use of those nodes, inject disinformation, worms, viruses, or other malicious codes.
  IW Support Services (Services). Defined as those services to support the preceding or to provide for any other applicable services, including consultations with customers to support their information warfare needs. These services may include modeling, simulations, training, testing, and evaluations.

Some techniques that can be considered in prosecuting information warfare include:

  Initiate virus attacks on enemy systems.
  Intercept telecommunications transmissions and implant code to dump enemy data bases.
  Attach a worm to enemies’ radar signal to destroy the computer network.
  Intercept television and radio signals and modify their content.
  Misdirect radar and content.
  Provide disinformation, such as bushes that look like tanks and trees that look like soldiers.
  Information overload enemy computers.
  Penetrate enemies’ GII nodes to steal or manipulate information.
  Modify maintenance systems information.
  Modify logistics systems information.

ECONOMIC ESPIONAGE: A FORM OF INFORMATION WARFARE

In looking at rapid technology-oriented growth, there are nations of haves and have-nots. There are also corporations that conduct business internationally and those that want to. The international economic competition and trade wars are increasing. Corporations are finding increased competition and looking for the competitive edge or advantage.

One way to gain the advantage or edge is through industrial and economic espionage. Both forms of espionage have been around since there has been competition. However, in this information age the competitiveness is more time-dependent, more crucial to success, and has increased dramatically, largely due to technology. Thus, there is an increased use of technology to steal that competitive advantage and, ironically, these same technology tools are also what is being stolen. In addition, more sensitive information is consolidated in large data bases on internationally networked systems whose security is questionable.


Previous Table of Contents Next



The CISSP Open Study Guide Web Site

We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.