Information terrorism: networked influence

نویسنده

  • W. Hutchinson
چکیده

The advent of digital information technology heralded the concept of information warfare. This ‘preliminary’ stage in the 1990s really consisted of technology warfare where the networks, upon which combat relied, were seen as weapons to gain ‘information superiority’. This was the inception of the technological aspect of Information Warfare. The realisation of the effectiveness of electronic networks to optimize organisational communication was taken up by industry, the military and terrorist groups alike. As society quickly became more reliant on digital networks to run its critical functions, it became apparent that this infrastructure was vulnerable and needed protection (as well as being a target for offensive operations).The next stage was the emphasis not on the technology but the information which it stored and processed. This was the ‘information’ stage of Information Warfare (now renamed Information Operations to reflect its expanded scope). This stage developed further and gradually started to include elements such as public relations, and strategic communications This paper examines the development of these elements and their use by terrorist groups. It concentrates on the contemporary manifestations of Influence Wars.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Networking of Terror in the Information Age

Editors’ abstract. Middle East Arab terrorists are on the cutting edge of organizational networking and stand to gain significantly from the information revolution. They can harness information technology to enable less hierarchical, more networked designs—enhancing their flexibility, responsiveness, and resilience. In turn, information technology can enhance their offensive operational capabil...

متن کامل

Defending Cyber Terrorism - A Game Theoretic Modeling Approach

In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...

متن کامل

Terrorism Early Warning and Co-Production of Counterterrorism Intelligence

Contemporary terrorism is a complex phenomenon involving a range of non-state actors linked in networked organizations. These organizations, exemplified by the global jihadi movement known as al-Qaeda, are complex non-state actors operating as transnational networks within a galaxy of like-minded networks. These entities pose security threats to nation states and the collective global security....

متن کامل

World informatization in conditions of international globalization: Factors of influence

The level of information today is decisive in the socio-economic development of the country. The purpose of the article is to identify the most influential factors in the process of developing informatization in the context of international globalization. The assessment of factors influencing world information is based on the following stages: forming incoming information about the state of wor...

متن کامل

Strategic intelligence and networked business

The chances of firms achieving, or being subjected to, strategic surprise have escalated with the growth of internetworking technologies and the opportunities these afford for various forms of information warfare (IW) and net terrorism. The more a business depends on sophisticated information systems, the greater its vulnerability to stealth attack. Defensive IW will soon become a necessary cos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007