information warfare

Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Wikipedia.

information warfare

Also called "cyberterrorism" and "cyberwarfare," it refers to creating havoc by disrupting the computers that manage stock exchanges, power grids, air traffic control, telecommunications and defense systems. The traditional viruses, Trojans and denial of service attacks are part of the arsenal, all aimed at disrupting a government rather than a company. See virus, Trojan and denial of service attack.

Information warfare is increasingly the first offensive move before the start of a physical attack. The military in many countries have full-time cyberwarriors on the payroll, because the more successful a cyberattack on an early warning defense system, the greater the success of the real attack. For example, according to the book "Cyber War," North Korea may have as many as a thousand hackers stationed in China, working on knocking out systems in South Korea and other countries.

The first book to deal with the subject was "Information Warfare: Chaos on the Electronic Superhighway," written by Winn Schwartau in 1994. Cited above, "Cyber War," by Richard A. Clarke and Robert K. Knake is an eye-opening treatise on the subject, released in 2010.
References in periodicals archive ?
Information Warfare Training Command Virginia Beach provides a continuum of training to Navy and joint service personnel that prepares them to conduct information warfare across the full spectrum of military operations.
He also points out that assumptions about strategic information warfare are built on the belief that the target of such attacks would be passive and lack the ingenuity to adapt and counter these assaults.
The objective of defensive information warfare ranges from ensuring authorized use of computer resources to providing complete, uninterrupted operation of computer systems throughout all of the phases of an information attack.
In a week which has seen US military forces launch offensive missiles from fleets costing billions, a look at some thinktank output on the development of Information Warfare might be appropriate.
Information superiority can be analyzed in terms of three elements: command and control, intelligence, and information warfare.
This scenario suggests what can happen in the strange world of strategic information warfare.
In September, the National Computer Security Association's Fifth International information Warfare Conference unites public- and private-sector paranoia under the Eisenhower-prophesied heading "The Convergence of the Commercial and the Military Sectors: Vulnerabilities, Capabilities, and Solutions.
Heretick and Dixon spoke to Eric Green of InfowarCon, the international conference on information warfare and operations scheduled this year from September 19-21 in Bethesda, MD.
These talking points demonstrate the importance of SMi's Maritime Information Warfare agenda.
Space and Naval Warfare Systems Command (SPAWAR), alongside the Office of the Deputy Chief of Naval Operations for Information Dominance (N2N6), hosted the Information Warfare (IW) pavilion on the exposition floor for the second year in a row.
CACI International has been signed on to assist the TROJAN NexGEN family of intelligence systems for the US Army's Intelligence and Information Warfare Directorate.

Full browser ?