– The New Yorker – Peter Maas describes how the media inflated a minor moment in a long war.
Category Archives: InformationWarfare
Information Warfare – The Online Threat
– New Yorker – Should we be worried about a cyber war?
Information Warfare – War in the fifth domain
The Economist – War in the fifth domain
Are the mouse and keyboard the new weapons of conflict?
Information Warfare – The Enemy Within
The Atlantic – The Enemy Within
Mark Bowden writes that when the Conficker computer “worm” was unleashed on the world in November 2008, cyber-security experts didn’t know what to make of it. It infiltrated millions of computers around the globe. It constantly checks in with its unknown creators. It uses an encryption code so sophisticated that only a very few people could have deployed it. For the first time ever, the cyber-security elites of the world have joined forces in a high-tech game of cops and robbers, trying to find Conficker’s creators and defeat them. The cops are failing. And now the worm lies there, waiting …
Information Warfare – Cyber Warriors
The Atlantic – Cyber Warriors
When will China emerge as a military threat to the U.S.? In most respects the answer is: not anytime soon—China doesn’t even contemplate a time it might challenge America directly. But one significant threat already exists: cyberwar. Attacks—not just from China but from Russia and elsewhere—on America’s electronic networks cost millions of dollars and could in the extreme cause the collapse of financial life, the halt of most manufacturing systems, and the evaporation of all the data and knowledge stored on the Internet.
Information Warfare – In Digital Combat, U.S. Finds No Easy Deterrent
New York Times – In Digital Combat, U.S. Finds No Easy Deterrent
On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the nation’s power grids, its communications systems or its financial networks. The results were dispiriting. The enemy had all the advantages: stealth, anonymity and unpredictability. No one could pinpoint the country from which the attack came, so there was no effective way to deter further damage by threatening retaliation. What’s more, the military commanders noted that they even lacked the legal authority to respond — especially because it was never clear if the attack was an act of vandalism, an attempt at commercial theft or a state-sponsored effort to cripple the United States, perhaps as a prelude to a conventional war.
Information Warfare – Why I Love Al Jazeera
The Atlantic – Why I Love Al Jazeera
Robert D. Kaplan writes that the Arab TV channel is visually stunning, exudes hustle, and covers the globe like no one else. Just beware of its insidious despotism.
Information Warfare – Insurgents Hack U.S. Drones
Wall Street Journal – Insurgents Hack U.S. Drones
Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.
Wall Street Journal – Officers Warned of Flaw in U.S. Drones in 2004
Information Warfare – Click, click … counting down to Cyber 9/11
San Francisco Chronicle – Click, click … counting down to Cyber 9/11
John Arquilla writes that when it comes to national security, our leaders are overly focused on nuclear weapons of mass destruction; more thought should be given to the looming threat of cyber “mass disruption.”
Information Warfare – Halted ’03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk
New York Times – Halted ’03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk
It would have been the most far-reaching case of computer sabotage in history. In 2003, the Pentagon and American intelligence agencies made plans for a cyberattack to freeze billions of dollars in the bank accounts of Saddam Hussein and cripple his government’s financial system before the United States invaded Iraq. He would have no money for war supplies. No money to pay troops. “We knew we could pull it off – we had the tools,” said one senior official who worked at the Pentagon when the highly classified plan was developed. But the attack never got the green light. Bush administration officials worried that the effects would not be limited to Iraq but would instead create worldwide financial havoc, spreading across the Middle East to Europe and perhaps to the United States.
Information Warfare – The Navy Can Handle the Truth: Creative Friction without Conflict
US Naval Institute Proceedings – The Navy Can Handle the Truth: Creative Friction without Conflict
The hit PBS documentary Carrier gave Americans an up-close look at today’s Sailors. Navy-centric blogs offer another way to reach the public.
Information Warfare – Contractors Vie for Plum Work, Hacking for U.S.
New York Times – Contractors Vie for Plum Work, Hacking for U.S.
The government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of “hacker soldiers” within the Pentagon who can blend the new capabilities into the nation’s war planning.
Information Warfare – Pentagon Plans New Arm to Wage Cyberspace Wars
New York Times – Pentagon Plans New Arm to Wage Cyberspace Wars
The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare.
Information Warfare – Blinders
Defense and the National Interest – Blinders
William Lind describes the importance of open source intelligence asks why is the Pentagon censoring the US military’s access to it?
Information Warfare – U.S. Steps Up Effort on Digital Defenses
New York Times – U.S. Steps Up Effort on Digital Defenses
Computers, indispensable in peace, are becoming ever more important in political conflicts and open warfare. This is the first article in a series on the growing use of computing power as a weapon.
Information Warfare – Electricity Grid in U.S. Penetrated By Spies
Wall Street Journal – Electricity Grid in U.S. Penetrated By Spies
Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven’t sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.
Information Warfare – Marching off to cyberwar
The Economist – Marching off to cyberwar
Attacks launched over the internet on Estonia and Georgia highlight the difficulty of defining and dealing with “cyberwar”
Information Warfare – Internet Traffic Begins to Bypass the U.S.
New York Times – The era of the American Internet is ending.
Invented by American computer scientists during the 1970s, the Internet has been embraced around the globe. During the networkís first three decades, most Internet traffic flowed through the United States. In many cases, data sent between two locations within a given country also passed through the United States.
Engineers who help run the Internet said that it would have been impossible for the United States to maintain its hegemony over the long run because of the very nature of the Internet; it has no central point of control.
And now, the balance of power is shifting. Data is increasingly flowing around the United States, which may have intelligence ó and conceivably military ó consequences.
Information Warfare – Cyberspace Barrage Preceded Russian Invasion of Georgia
New York Times – Weeks before physical bombs started falling on Georgia, a security researcher in suburban Massachusetts was watching an attack against the country in cyberspace.
Information Warfare – Playing for keeps
Armed Forces Journal – War game designer extraordinaire Mark Herman writes that computers have permeated everyday life, making even the smallest task quicker and more efficient. The problem is that the efficiencies created by computers are costing us our resilience to rebound from technological disturbances. To counter this, the U.S. military needs to lead more war-game cyber security exercises, not only across the services, but also together with the federal civilian government, critical infrastructure industry sectors and allies.
Information Warfare – Behind Analysts, the Pentagon's Hidden Hand
New York Times – The Pentagon has cultivated “military analysts” in a campaign to generate favorable news coverage of the Bush administrationís wartime performance.
Information Warfare – The Dogs of Web War
Air Force – US armed forces face “peer” adversaries in only one area – military cyberspace.
Information Warfare – Why Syria's Air Defenses Failed to Detect Israelis
Aviation Week – The big mystery of the recent Israeli strike on Syria is how did the non-stealthy F-15s and F-16s get through the Syrian air defense radars without being detected? Some U.S. officials say they have the answer.
Information Warfare – Web War I: How Europe's Most Wired Country Beat the Botnets
Wired – An excellent indepth look at the cyberwar waged against Estonia this spring.
Information Warfare – Arab Media and the Battle for Ideas
First Monday – David Ronfeldt and John Arquilla, authors of Netwar, write:
As the information age deepens, a globe-circling realm of the mind is being created – the ìnoosphereî that Pierre Teilhard de Chardin identified 80 years ago. This will increasingly affect the nature of grand strategy and diplomacy. Traditional realpolitik, which ultimately relies on hard (principally military) power, will give way to the rise of noˆpolitik (or noˆspolitik), which relies on soft (principally ideational) power. This paper reiterates the authorsí views as initially stated in 1999, then adds an update for inclusion in a forthcoming handbook on public diplomacy. One key finding is that non-state actors – unfortunately, especially Al Qaeda and its affiliates – are using the Internet and other new media to practice noˆpolitik more effectively than are state actors, such as the U.S. government. Whose story wins – the essence of noˆpolitik – is at stake in the worldwide war of ideas
You must be logged in to post a comment.