§+++++++++++++++++++++++++++++++++++++++++++++++§ ]|[ [-=- SOLDIERX.COM Presents -=-] ]|[ +++++++++++++++§+++_________________________________________+++§+++++++++++++++ \\//////////////// INFORMATION WARFARE \\\\\\\\\\\\\\\\// \\\\\\\\\\\\\\\\\_________________________________________///////////////// \\::::::::::::::::::::::::::::::::::by:::::::::::::::::::::::::::::::::// \\xxxxxxxxxxxxxxxxxxxxxxxx§-=-][-Blade-][-=-§xxxxxxxxxxxxxxxxxxxxxxxx// \\:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::// \\=====------------------NEOPHYTE HIDEAWAY------------------=====// \\ SOLDIERX.COM // \\ NOBODY CAN STOP INFORMATION INSEMINATION // §=+++++++++++++++++++++++++++++++++++++++++++++++++++++++++=§ ************************************************************* * This document was submitted by a non-soldierx crew member.* * Therefor we do not guarantee that everything in this * * document is safe or accurate. Use with precaution. * * Writer's E-mail: info@theblackops.com * * Writer's Web-site: http://www.theblackops.com * ************************************************************* FOREWORD Everyday the world becomes more and more dependent on computers and machinery, for the better or for the worst computers are the future and for this reason, the owners of the New World, will be those who can control the computers along with the information that they carry. Military and civilians alike use the net to pass information across great distances at great speeds but few people realise how this is done, and because of this, future wars may use very few troops rather a handful of well trained soldiers that can operate on the battlefield, may it be in reality or in cyber space and therefore he who controls information controls all, therefore I have put together summary of information warfare, this does not contain everything on the subject as it would take up 100ďs of mega bytes but it does contain good outline of the subject, I will publish more at a later date. HOW IS INFORMATION WARFARE DIFFERENT FROM CONVENTION WARFARE A part from the fact that one is in cyber space and the other is in real life, the main difference is the battle fields as in information warfare the battle field is anything in cyber space, there are no clearly defined boundaries, or trenches, in theory it is like guerrilla warfare (Vietnam). Information can be more effective in many ways as well, some examples of this could be that by killing the enemy you will weaken the country, but you will also get the other army angry for this and they will fight back more lives will be lost and this will be a chain reaction, where as on cyber space you can inflict a greater victory as Sun Tzu said "the greatest victory achieved is that where no blood is spilt". The way in which you can do this is to attack the enemy by taking important secrets away from them and using them against them or cripple the country economical, that would probably be the most effective. Another key point would be that unless you shut of power to the country or delete all bank accounts of that country the general public will have very little or no idea of what is going on and therefore public opinion will not matter. (Note public opinion helped the USA lose the Vietnam War.) I would also like to add that there are two ways of information warfare, the 1st is indirect, which is using military deception, and the second is direct which is basically the same and should have the same outcome the only difference is that, less time, less resources but there is a greater uncertainty that it will not work. WHAT IS INFORMATION WARFARE In short but at a high level information warfare is a way of acquiring, exploiting and protecting information in order to achieve a particular set of objectives and enhance our own capacities while degrade our enemies, this can be done by exploiting information (data and Instructions) and information function (any activity involving the acquisition, transmission, storage, or transformation of information) of government, political, civilian or military computer database. Information warfare can get complex as not only for example is destroying the switching facilities software an act of information warfare but bombing a telephone switching facility is also information warfare so there are a number of faces that information warfare can take on. Information Warfare is not a particularly new idea, armies have always tried to find out secret plans of the enemy but now it is becoming a more important part of warfare, although at this point or probably not even in the distant future (at least in any wars that go on for longer than a day) will information warfare be completely dominant over conventional warfare, but it will just be used more to conduct strategic attacks on enemy communications, or power stations or cheeks in there defensive structure. Information Warfare is also sometimes called a two edged sword as for example the USAF depends heavily upon military information functions, making them vulnerable to information warfare as the enemy will know this an can offer false information (e.g. D-day of WW2: false information was handed over to German Forces allowing D-day to surprise them and making it a victory for the allied countries.), but there are other ways in which the enemy could strike back, but this as I have said is a basic outline of information warfare. WHAT INFORMATION WAREFARE COMPRISES OF Below is the main diagram that basicaly says everything you need to know about this section of information warfare. Diagram on what information warfare comprises of: ********************** * INFORMATION WARFARE* ********************** ******************* *************** * ATTACK & DEFEND * * EXPLOIT * * INFORMATION * * INFORMATION * ******************* *************** ********************************************* **************** * PSYCHOLOGICAL * MILITARY * SERCURITY * * INFORMATION * * OPERATIONS * DECEPTION * MEASURES * * OPERATIONS * ********************************************* **************** * PHYSICAL * INFORMATION * ELECTRONIC * * DESTRUCTION * ATTACK * WARFARE * ********************************************* Basically information warfare consists of activities that deny, exploit, corrupt, destroy, or protect information. Traditional this was done using the steps illustrated in the diagram above, most of them are pretty straightforward but some more complex ones will be defined now. Psychological operations: use information to affect the enemies reasoning. Electronic warfare: denies accurate information to the enemy. Military deception: misleads the enemy about our capabilities or intentions. Physical destruction: information warfare by affecting information systems elements thought the conversion of stored energy to destructive power. The means of physical attack range from conventional bombs to electromagnetic pulse weapons. Security measures: seek to keep the adversary from learning about military capabilities and intentions. Information attack: directly corrupting information without visibly changing the physical entity within which it resides. THE AUTONOMOUS MOBLIE CYBER WEAPON (AMCW) This is an example of the U.S. response to information warfare, basically the AMCW is a sort of mobile worm-virus that can defend its self and base computers, and collect intelligence by the means of surveillance and can attack the enemies computer much like a virus but it can be controlled, and directed to do more specific tasks and it will have a greater mobility (perhaps the future of covert ops), this was only an example of a cyber weapon so I will not go into great detail, but you can get more information at http://www.theblackops.com (not running yet. The date this was built was 28/06/00 but it should be up soon, or you can email me and I will send it to you my email can be found later on.) CONCLUSION Ok, I didn’t talk about its uses for the military or anything but like I said this is only an introduction to Information Warfare, hopefully I will be publishing more information in the near future, but while we are still on the topic I would like to point out that, information warfare will not only affect the military it will affect everyone, think about the electronic devices you use each day and think about what would happen if they were attacked. Lastly I would also like to say that the military use the same planes as use, same internet, same communications, and power from power station, they are just more protected and this is how enemies and can make use of information warfare but like I said information warfare is a 2 edged sword and we (by that I mean our governments) can also make use of information warfare. Sun Tzu came up with the 6 laws of warfare: 1) Strategic consideration 2) Posture of army 3) Extraordinary and normal forces 4) Void and actuality 5) Initiative and flexibility in employing troops 6) Use of spies Now we can add one more 7)-information warfare, but as you can see even 2,500 years ago spies were used. WAYS OF CONTACTING ME info@theblackops.com And I am sometimes on the irc at soldierx.com (irc.axenet.org:6667 #soldierx) IMPORTANT NOTE YOU MAY PUT THESE TEXTS ON YOUR WEBSITE IF YOU WANT, BUT YOU MAY NOT CHANGE IT IN ANY WAY (THAT INCLUDES THE NAME OF THE AUTHOR.... ME!)Also I take no responsbliblity for what you do with the information in this text, I am not implying anything by this text I am only stating some information about information warfare. FINAL NOTE I hope you found this useful, if not delete it. Peace, Blade =:-> _____________________________________________________________________ §=------------------------------]-§-[------------------------------=§ \\ THIS FILE WAS A SOLDIERX PRODUCTION // \\ http://www.soldierx.com // \\ NOBODY CAN STOP INFORMATION INSEMINATION // §=+++++++++++++++++++++++++++++++++++++++++++++++++++++++++=§