Abstract
In the final phase of the Cold War the relevance of information technology for the military had gained momentum, resulting in the formulation of the concept and soon thereafter also the doctrine of Information Warfare in NATO, Warsaw Pact and Asian countries. In all pioneering countries, Information Warfare was meant to use any technological and appropriate non-technological means to disrupt the ability of an adversary to purposefully pursue its goals in times of crisis and war. Information Warfare tactics employ means to influence public opinion and the media just as well as to disrupt computer systems, or physically destroy communication lines or military headquarters. Information War is waged by organisations in the fluid continuum between intelligence agencies and military intelligence units, thus complementing the tasks they have been executing continuously since the end of World War II. Today we see how these concepts of Information Warfare have evolved into an element of everyday life.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Recommended Reading
Altmann, J., Bernhardt, U., Nixdorf, K., Ruhmann, I. & Wöhrle, D. (2017). Naturwissenschaft – Rüstung - Frieden. Basiswissen für die Friedensforschung. Wiesbaden.
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, vol. 12, iss. 2, pp. 141–165. Retrieved from https://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf.
Ruhmann, Ingo, & Bernhardt, Ute. (2014). Information Warfare und Informationsgesellschaft. Zivile und sicherheitspolitische Kosten des Informationskriegs. Wissenschaft & Frieden, vol. 1. Retrieved from http://wissenschaft-und-frieden.de/seite.php?dossierID=078.
Schmitt, M. (Ed.) (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge, Cambridge University Press, 2013.
Bibliography
A Borderless Dispute. (1995, February 20). Newsweek.
Army, Secretary of the. (1996). Field Manual 100-6 “Information Operations.” Washington D.C. Retrieved from https://www.hsdl.org/?view&did=437397.
Army, Secretary of the. (2004). Field Manual 1-02 “Operational Terms and Graphics.” Washington D.C.
Army, Secretary of the. (2011). Field Manual 3-0 “Operations.” Washington D.C.
Army, Secretary of the. (2012). Field Manual 3-13, Inform and influence activities. Washington D.C.
Arquilla, John, & Ronfeldt, David. (1993). Cyberwar is coming! Comparative Strategy, vol. 12, iss. 2, pp. 141–165. Retrieved from https://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf .
Barry, John (1991). The Nuklear Option: Thinking the Unthinkable; Newsweek, 14.1.1991, pp. 12-13.
Bernhardt, Ute, & Ruhmann, Ingo. (1997). Der digitale Feldherrnhügel, Military Systems: Informationstechnik für Führung und Kontrolle. Dossier Nr. 24. Retrieved from http://www.wissenschaftund-frieden.de/seite.php?dossierID=050.
Biermann, Kai. (2016, February 12). NSA-Software: Wozu braucht der Verfassungsschutz XKeyscore? | ZEIT ONLINE. Die Zeit. Retrieved from https://www.zeit.de/digital/datenschutz/2016-02/verfassungsschutz-bfv-nsa-xkeyscore.
Bundesministerium des Innern, für Bau und Heimat (2018): Zusammenarbeit mit China durch erfolgreich durchgeführten ersten deutsch-chinesischen Cyberkonsultationsmechanismus untermauert, Pressemitteilung, 18th May, 2018, https://www.bmi.bund.de/SharedDocs/pressemitteilungen/DE/2018/05/deutsch-chinesischer-cyberkonsultationsmechanismus.pdf?__blob=publication-File&v=2.
Bundeswehr. (n.d.). Die Cyber- und IT-Fähigkeiten der Streitkräfte. Retrieved May 18, 2018, from https://www.bundeswehrkarriere.de/it/cyber-und-it-faehigkeiten-der-streitkraefte.
Calabresi, Massimo, & Rebala, Pratheek. (2016, December 14). Here’s the Evidence Russia Hacked the Democrats. Time. Retrieved from http://time.com/4600177/election-hack-russia-hillary-clinton-donald-trump/.
Cartwright, James E. Joint Terminology for Cyberspace Operations, DoD Vice Chairman of the Joint Chiefs of Staff 16 (2010). Retrieved from http://www.nsci-va.org/CyberReferenceLib/2010-11-Joint Terminology for Cyberspace Operations.pdf.
Council, National Security. (2013). Declassified documents concerning PDD-68, International Public Information. Retrieved May 14, 2018, from https://clinton.presidentiallibraries.us/items/show/47977.
Cullen, Dr. Patrick J., & Reichborn-Kjennerud, Erik. (2017). Understanding Hybrid Warfare: A Multinational Capability Development Campaign project. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/647776/dar_mcdc_hybrid_warfare.pdf.
Daryl, G. (2001). The Myth of Air Power in the Persian Gulf War and the Future of Warfare. International Security, vol. 26, iss. 2, pp. 5–44.
Department of Defense. DoD Directive No. 6: The National Security Agency and the Central Security Service, DoD Directive 11 (1971). United States of America. Retrieved from https://www.nsa.gov/news-features/declassified-documents/nsa-60th-timeline/assets/files/1970s/19711223_1970_Doc_3983926_DODDir5100.pdf.
Department of Defense. (2005). The National Defense Strategy of the United States of America. Washington D.C. Retrieved from http://www.au.af.mil/au/awc/awcgate/nds/nds2005.pdf.
Department of Defense. DOD Directive 5100.20, January 26, 2010, DoD Directive 24 (2010). United States of America. Retrieved from https://fas.org/irp/doddir/dod/d5100_20.pdf.
DPA. (2013, August 3). XKeyscore: BND nutzt NSA-Spähsoftware für Auslandsaufklärung | ZEIT ONLINE. Die Zeit. Retrieved from https://www.zeit.de/politik/deutschland/2013-08/bndxkeyscore-nsa.
EUEA, European Union External Action. (2017). Questions and Answers about the East StratCom Task Force.
European Commission. (2016). Joint Framework on countering hybrid threats. Brussels. Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52016JC0018&from=EN.
European Parliament. EU strategic communication to counteract anti-EU propaganda by third parties -P8_TA(2016)0441, European Parliament (2016). Retrieved from http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P8-TA-2016-0441+0+DOC+XML+V0//EN.
GAO, United States General Accounting Office. (1997). Government Accounting Office: Operation Desert Storm Air Campaign. Washington D.C.
Gerasimov, Valery. (2013, February 26). The value of science in anticipation. New challenges require rethinking the forms and methods of conducting military operations. VPK-News. Retrieved from https://www.vpk-news.ru/articles/14632.
Gorman, Siobhan. (2007, February 11). Turbulence NSA | Costly NSA initiative has a shaky takeoff. The Baltimore Sun. Washington. Retrieved from http://articles.baltimoresun.com/2007-02-11/news/0702110034_1_turbulence-cyberspace-nsa.
King, Tom. (2000). Intelligence and Security Committee Annual Report 1999-2000. London. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/263533/4897.pdf.
Kochetkov, Gennady, Averchev, Vladimir, & Sergeev, Viktor. (1987). Artificial Intelligence and Disarmament. In Allan Din: Arms and Artificial Intelligence: Weapons and Arms Control Applications of Advanced Computing (pp. 153–160). Oxford.
Kommando strategische Aufklärung, der Bundeswehr. (n.d.). Cyber- und Informationsraum: Über uns. Retrieved May 18, 2018, from http://cir.bundeswehr.de/portal/a/cir/start/dienststellen/ksa/ksa/ueberuns/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8zizSxNPN2Ngg183c2MDAwc_fwDQoNNAo0Mgs31wwkpiAJKG-AAjgb6wSmppFAM8xxmmFkqB-sH6UflZVYllihV5BfVJKTWqKXmAxyoX5kRmJeSk5qQH6yI0SgIDei3KDcUREAaxft4g!.
Kvachkov, V. (2004). Cпeцнaз Poccии (Russia’s Special Purpose Forces). Voyennaya Literatura. Retrieved from http://militera.lib.ru/science/kvachkov_vv/index.html.
Lieutenant-Colonel Selhorst, A. J. C. (2016, April). Russia’s Perception Warfare. Militaire Spectator. Retrieved from http://www.militairespectator.nl/thema/strategie-operaties/artikel/russias-perception-warfare.
Lischka, Konrad, & Stöcker, Christian. (2013, July 31). XKeyscore: Wie die NSA-Überwachung funktioniert - SPIEGEL ONLINE. Spiegel Online. Hamburg. Retrieved from http://www.spiegel.de/netzwelt/netzpolitik/xkeyscore-wie-die-nsa-ueberwachung-funktioniert-a-914187.html.
Mortimer, Caroline. (2016, October 15). Obama administration asks CIA to prepare revenge cyber-attack against Russia. The Independent.
Nakashima, Ellen, & Warrick, Joby. (2012, June 2). Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post. Washington D.C. Retrieved from https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officialssay/2012/06/01/gJQAlnEy6U_story.html?noredirect=on&utm_term=.da2881ef0a15.
Nolte, Susanne. (2009). Zum 20. Todestag von Karl Koch | iX. Retrieved May 14, 2018, from https://www.heise.de/ix/artikel/Suendenfall-794636.html.
Office of the Press Secretary. (2013). FACT SHEET: U.S.-Russian Cooperation on Information and Communications Technology Security. Retrieved May 18, 2018, from https://obamawhitehouse.archives.gov/the-press-office/2013/06/17/fact-sheet-us-russian-cooperation-information-and-communications-technol.
Office of the Press Secretary. (2015). Remarks by President Obama and President Xi of the People’s Republic of China in Joint Press Conference September 25, 2015. Retrieved May 18, 2018, from https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/remarks-president-obama-andpresident-xi-peoples-republic-china-joint.
Office of the Secretary of Defense. (2017). Annual report to Congress: Military and Security Developments Involving the People’s Republic of China. Washington D.C.
Panarin, Igor Nicolaevich. (1998). InfoWar and Authority. Retrieved from http://archive.aec.at/media/archive/1998/183589/File_03450_AEC_FE_1998.pdf.
Patalong, Frank, & Stöcker, Christian. (2008, August 11). Cyber-Krieg: Hacker fegen georgische Regierungsseiten aus dem Netz. SPIEGEL ONLINE. Retrieved from http://www.spiegel.de/netzwelt/web/cyber-krieg-hacker-fegen-georgische-regierungsseiten-aus-dem-netz-a-571317.html.
Peterzell, Jay. (1989). Spying and Sabotage by Computer. Time.
Pufeng, Wang. (1995). Xinxi zhanzheng yu junshi geming (Information Warfare and the Revolution in Military Affairs). Beijing.
Razumovskaya, Olga. (2015, May 8). Russia and China Pledge Not to Hack Each Other. Wall Street Journal. Retrieved from https://blogs.wsj.com/digits/2015/05/08/russia-china-pledge-to-not-hackeach-other/.
Resolution, U. N. General Assembly. No Title (1999). Retrieved from http://undocs.org/A/RES/53/70.
Rötzer, Florian. (2000a). Israelische Hacker wollen Websites vor pro-palästinensischen Angriffen schützen. Retrieved May 18, 2018, from https://www.heise.de/tp/features/Israelische-Hacker-wollen-Websites-vor-pro-palaestinensischen-Angriffen-schuetzen-3442459.html.
Rötzer, Florian. (2000b). Taiwans Militär probt Angriffe mit Computerviren. Retrieved May 18, 2018, from https://www.heise.de/tp/features/Taiwans-Militaer-probt-Angriffe-mit-Computerviren-3447492.html.
Ruhmann, Ingo. (2003). Sicherheitspolitische Folgerungen aus dem Golfkrieg. Wissenschaft & Frieden, vol. 3, pp. 27–31. Retrieved from http://www.wissenschaft-und-frieden.de/seite.php?artikelID=0254.
Ruhmann, Ingo. (2014). NSA, IT-Sicherheit und die Folgen. Eine Schadensanalyse. Datenschutz Und Datensicherheit - DuD, vol. 38, iss. 1, pp. 40–46. Retrieved from https://link.springer.com/article/10.1007/s11623-014-0010-3.
Ruhmann, Ingo. (2018). Cyber-Rüstung und zivile IT-Sicherheit: Wachsende Ungleichgewichte. Dossier No. 86, Wissenschaft & Frieden. vol. 2, Retrieved from https://wissenschaft-und-frieden.de/seite.php?dossierID=090.
Ruhmann, Ingo, & Bernhardt, Ute. (2014). Information Warfare und Informationsgesellschaft. Zivile und sicherheitspolitische Kosten des Informationskriegs. Wissenschaft & Frieden, vol. 1. Retrieved from http://wissenschaft-und-frieden.de/seite.php?dossierID=078.
Salzen, Claudia. (2007, May 29). „In Estland wurde der Cyber-Krieg getestet“. Tagesspiegel. Retrieved from https://www.tagesspiegel.de/politik/in-estland-wurde-der-cyber-krieg-getestet/858532.html.
Sanger, David E. (2012, June 1). Obama Ordered Wave of Cyberattacks Against Iran. New York Times. New York. Retrieved from https://www.nytimes.com/2012/06/01/world/middleeast/obama-orderedwave-of-cyberattacks-against-iran.html?_r=1&hp&pagewanted=all.
Sanger, David E. (2015, September 19). U.S. and China Seek Arms Deal for Cyberspace. New York Times. New York.
Scheuch, Laszlo, & Möhle, Holger. (2018, January 28). Das eigene System vor Feinden schützen. General-Anzeiger. Bonn. Retrieved from http://www.general-anzeiger-bonn.de/news/politik/deutschland/Cyber-Zentrum-mit-Kommando-in-Bonn-soll-ausgebaut-werden-article3759619.html.
Schneider, William P. (1982). Small Computes in the Army: An Apple a Day to Keep the Soviets Away. Signal, pp. 39–43.
Settle, Michael. (2018, April 16). Spy chiefs prepare for Russian revenge cyber-attacks. The Herald.
Shaker, Steven M., & Finkelstein, Robert. (1987). The Bionic Soldier. National Defense, pp. 27–32.
Shorrock, Tim. (2008). Spies for hire: the secret world of intelligence outsourcing (1st ed.). New York, London, Toronto, Sydney: Simon & Schuster.
Stephenson, Laura. (n.d.). Did Donald Trump Just Ask Russia To Hack Hillary Clinton’s Emails? Fox47News. Stiftung Wissenschaft und Politik. (n.d.). Ukraine. Retrieved May 18, 2018, from https://www.swp-berlin.org/swp-themendossiers/krise-um-die-ukraine/ukraine/.
Szandar, Alexander. (2008). Strategische Aufklärung: Bundeswehr belauscht die Welt. Retrieved May 18, 2018, from http://www.spiegel.de/politik/deutschland/strategische-aufklaerung-bundeswehrbelauscht-die-welt-a-575417.html.
Thomas, Evan, & Brant, Martha. (2003). The Secret War. Newsweek, pp. 22–29.
U.S., Senate. (1986). Report of the Select Committee on Intelligence.
UNIDIR, United Nations Institute for Disarmament Research. (2013). The Cyber Index International Security Trends and Realities. United Nations, iss. 3, pp. 153. Retrieved from http://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf.
Weaver, Nicolas. (2014). A Close Look at the NSA’s Most Powerful Internet Attack Tool. Retrieved May 18, 2018, from https://www.wired.com/2014/03/quantum/.
Weigang, Shen. (1998). Der Informationskrieg – eine Herausforderung. In G. Stocker & C. Schöpf (Eds.), Information. Macht. Krieg. Ars Electronica. Retrieved from http://archive.aec.at/media/assets/d3a8b7e791870f66db86d84de72c7dad.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Ruhmann, I., Bernhardt, U. (2019). Information Warfare – From Doctrine to Permanent Conflict. In: Reuter, C. (eds) Information Technology for Peace and Security. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-25652-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-658-25652-4_4
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-25651-7
Online ISBN: 978-3-658-25652-4
eBook Packages: Computer Science and Engineering (German Language)