Third-degree conflicts: information warfare
نویسنده
چکیده
European Journal of Information Systems (2010) 19, 1–4. doi:10.1057/ejis.2010.2 The concept of the Internet as a potential military battlefield is not particularly new. The Internet itself is rooted to the military notion of a bomb-proof defense network. Similarly, the feasibility of attacking information systems across this network was proven in the 1980s by the Morris Worm. This Internet worm brought an early lesson: The seemingly obvious defense of network disconnection was an extremely poor defensive maneuver (Spafford, 1989). The information security community was already developing communications-network-based defenses and controls before the Morris Worm (e.g., Baskerville, 1988). These defenses were extended against potential Internet-based attacks, together with newly designed controls like virus protection software. Information warfare, in the sense of limiting an adversary’s information capabilities while improving friendly capabilities, is indeed ancient (cf. the types of ‘spies’ in Sun Tzu, 1995). The ability to misguide an adversarial decision-maker can result in misdirected assets and efforts that can be highly favorable for the side that controls information. Even the notion of conducting battles that take place entirely within networks of information systems has been a popular scenario for science fiction writers (e.g., Gibson, 1984). However, the reality of battles in information networks is relatively recent. Information warfare certainly encompasses Internet-based espionage. Most Internet-based attacks, at least among those that are suspected of being sponsored by nation-states, have been directed toward espionage. Recent examples include the interception of drone videos and the compromise of defense plans through network hacking. Information warfare also encompasses disabling or disfiguring attacks on Internet-based resources. Such attacks can compromise network-based operations, for example, by hacking into servers or shutting servers down with denial-of-service attacks. Most of the known instances of this sort of network-based battle have been conducted by unruly groups of hackers from one country who engage in grass-roots, online gang fights with hackers from another country. These ‘hacker wars’ have tended to erupt in the shadow of more explicit conflicts between nation-states, such as military confrontations (Baskerville, 2005). Whether online attackers have the capability to seriously disrupt civil or military infrastructures beyond the network itself is debatable. Suspicions of online attacks eddy in the wake of almost every major power outage, such as the recent blackouts in Brazil (actually attributed to lightning Lyons, 2009). These recurring suspicions make it difficult to unseat the notions that information attacks could (or have) shut down control networks for utilities, interrupt financial transactions, or shut down telecommunications. While it is not clear that such attacks are immediate threats to national infrastructures, the prospects are rather severe. The agility that comes with Internet access is luring increasing connectivity. Electricity supervisory control and data acquisition systems ‘SCADA’ , once air-gapped (physically isolated) from the Internet, are gaining Internet connection European Journal of Information Systems (2010) 19, 1–4 & 2010 Operational Research Society Ltd. All rights reserved 0960-085X/10
منابع مشابه
Selfish third parties act as peacemakers by transforming conflicts and promoting cooperation.
The tremendous costs of conflict have made humans resourceful not only at warfare but also at peacemaking. Although third parties have acted as peacemakers since the dawn of history, little is known about voluntary, informal third-party intervention in conflict. Here we introduce the Peacemaker Game, a novel experimental paradigm, to model and study the interdependence between disputants and th...
متن کاملTrade and Thy Neighbor’s War
This Working Paper should not be reported as representing the views of the IMF. The views expressed in this Working Paper are those of the author(s) and do not necessarily represent those of the IMF or IMF policy. Working Papers describe research in progress by the author(s) and are published to elicit comments and to further debate. This paper examines the spatial dispersion effects of regiona...
متن کاملIntrafamily and intragenomic conflicts in human warfare
Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties...
متن کاملSub-Conventional Warfare Requirements, Impact and Way Ahead
Most conflicts in future will occur in the form of sub-conventional/ 1 unconventional / low intensity conflicts. This is being observed all around. Security forces personnel will continue to find themselves employed less in traditional roles and more in non-traditional roles characteristically found at the low end of the spectrum of conflict. Sub-conventional warfare differs qualitatively from ...
متن کاملThe Chemical Warfare Threat and the Military Healthcare Provider
INTRODUCTION THE CHEMICAL THREAT AND ENEMY CAPABILITY THE STATUS OF CHEMICAL PROLIFERATION Chemical Warfare Capabilities of Nations International Agreements and Verification Terrorism MILITARY CHEMICAL AGENTS TACTICAL AND STRATEGIC USE OF CHEMICAL WEAPONS Chemical Agent Delivery Systems Physical Properties of Chemical Agents Strategic Concerns in the Use of Toxins Choice of Agent and Delivery S...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EJIS
دوره 19 شماره
صفحات -
تاریخ انتشار 2010