information warfare

Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.

information warfare

(1) The distribution of a cultural, political or religious point of view that is aimed at discrediting and scandalizing opposing thought. See disinformation and social media.

(2) Also called "cyberterrorism" and "cyberwarfare," information warfare refers to cyberattacks that create havoc on a large scale. Some examples are disrupting the computers that manage stock exchanges, power grids, air traffic control, telecommunications and defense systems. Viruses, Trojans and denial-of-service attacks are part of the information warfare arsenal, and they get more sophisticated every year.

The first book to deal with the subject was "Information Warfare: Chaos on the Electronic Superhighway," by Winn Schwartau, written in 1994 just as the Internet was being commercialized. Published in 2012, "Cyber War: The Next Threat to National Security" by Richard A. Clarke and Robert K. Knake is an eye-opening book on the subject.

Before a Shooting War
Information warfare is increasingly considered as the first offensive before the start of a physical attack. The military in many countries have full-time cyberwarriors on the payroll, because the more successful a cyberattack on an early warning defense system is, the greater the success of the real attack. According to "Cyber War," North Korea may have as many as a thousand hackers stationed in China, working on knocking out systems in South Korea and other countries. See virus, Trojan, cyberattack and denial-of-service attack.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Overall, this book is a great read for those interested in information warfare. But as the concept of hybrid warfare continues to emerge across military, academic, and professional settings in the West and Russia, this book importantly distinguishes the various perspectives.
As future conflicts come into existence in the technological and cyber domain, "He who controls the trend will control the narrative- and ultimately, the narrative controls the will of the people." (22) This form of information warfare capability is often oversimplified and underestimated and therefore leads the target audience to exploitation through already existing vulnerabilities.
Ironically, rather than pocketing the Trump bonus, Russia's information warfare has handicapped the US president by greatly reducing Russia's soft power in America.
Big data concepts used in business could be advantageous and used in information warfare. It is possible that data-mining and subsequently an information advantage could achieve objectives purely through IW alone.
Information warfare tactics are used to soften up populations prior to unleashing nastier forms of aggression, and so should not be dismissed as"just a lot of talk." Whether Russia could achieve another success such as that in Crimea is debatable, but the West should not be caught unaware by further Russian subterfuge.
It should be noted that currently organizational structure units designated to conduct information warfare are developed in the PLA.
Further, "Information warfare is about operations that target or exploit information resources."(2) Nevertheless, several secondary and tertiary sources term her description "Denning's Definition." (3) Other researchers assert that "Information warfare is combat operations in a high-tech battlefield environment in which both sides use information technology means, equipment, or systems in a rivalry over the power to obtain, control, and use information." (4)
The treats of bio-chemical, suicide or psychological warfare, and information warfare are on the rise in today's societies as more political argument and groups emerge.
It is information warfare by another name, and information warriors will, as they always have, mold cyberspace to achieve combat ends in the true fighting domains of air, land, sea, and space.
The entries are written by 150 contributors from 19 different countries, and cover topics such as computer crime, information warfare, privacy, surveillance, intellectual property, cyber terrorism, censorship, artificial intelligence, and education.
It covers topics such as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Full browser ?