SlideShare a Scribd company logo
1 of 26
The Information Warfare
   - how it can affect us -

            Luis Borges Gouveia
         lmbg@ufp.edu.pt (UFP)
one initial remark…
Ideas & concepts are great but…
One of the main topics in
           warfare in the 21st Century
• NETWORK-CENTRIC AND INFORMATION WARFARE,
  OPERATIONS, AND RELATED TECHNOLOGY
    – Networks (focus on computers and telecommunications)
    – Memory and storage & information analysis – intelligence
      (focus on digital information)
    – Electronic based tech to influence, alter, reduce and
      change information (focus on how humans process
      information)

• Gibish, E. (2003). WARFARE IN THE 21ST CENTURY - A Selected
  Bibliography. U.S. Army War College Library. Carlisle Barracks, PA. EUA
  http://www.carlisle.army.mil/library/bibs/warfar03.htm
Information warfare is a everyone
        concern – worldwide…
• Explore the Pakistan’s site Terminal X on
  Defence, intelligence and geopolitics
  – http://www.terminalx.org/2011/03/overview-modern-
    communication.html
One (big) example…
• On June 23 2009, the United States Secretary of Defense Robert Gates
  issued notifications for the establishment of the world's first dedicated
  CYBERCOM (Cyber Command), the USCYBERCOM based on growing
  concerns of Chinese military penetration into Pentagon defense systems.
  He outlined the objective in the following statement:

   "My own view is that the only way to counteract both criminal and
   espionage activity online is to be proactive. If the U.S. is taking a formal
   approach to this, then that has to be a good thing. The Chinese are
   viewed as the source of a great many attacks on Western infrastructure
   and just recently, the U.S. electrical grid. If that is determined to be an
   organized attack, I would want to go and take down the source of those
   attacks. The only problem is that the Internet, by its very nature, has no
   borders and if the U.S. takes on the mantle of the world's police; that
   might not go down so well."
Another one…
•   On January 15 2011, the NY Times reported:
    Over the past two years, according to intelligence and military experts familiar
    with its operations, Dimona has taken on a new, equally secret role — as a critical
    testing ground in a joint American and Israeli effort to undermine Iran’s efforts to
    make a bomb of its own.
    Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges
    virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to
    enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer
    worm, a destructive program that appears to have wiped out roughly a fifth of
    Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to
    make its first nuclear arms.

•   Conflicting reports just recently now suggest that it was the US which was behind
    the design, trial and injection of the Stuxnet worm. There can be a strong
    possibility that both Israel and the US cyber commands worked in tandem against
    Irani cyber command which was setup to "prevent espionage and sabotage in
    Information Technology (IT) tools" according to General Syed Kamal Hadianfar,
    Head of the Information Production and Exchange Department of the Law
    Enforcement Police in Iran.
Cyberwar non human nature…
Working Definition
Information warfare is comprised of operations
  directed against information in any form,
  transmitted over any media, including
  operations against information content, its
  supporting systems and software, the physical
  hardware device that stores the data or
  instructions, and also human practices and
  perceptions
Information Operations (IO)
• Military Information Warfare
• IO is conducted during time of crisis or
  conflict to affect adversary information and
  information systems while defending one's
  own information and systems
peace as an ultimate goal
". . . attaining one hundred victories in one
   hundred battles is not the pinnacle of
   excellence. Subjugating the enemy's army
   without fighting is the true pinnacle of
   excellence."

                   Sun Tzu, The Art of War
Better than brute force
"There are but two powers in the world, the
sword and the mind. In the long run the
sword is always beaten by the mind."

                  Napoleon Bonaparte
Core Capabilities
•   Psychological Operations (PSYOPS)
•   Military Deception (MILDEC)
•   Operations Security (OPSEC)
•   Computer Network Operations (CNO)
•   Electronic Warfare (EW)
Environment Shaping
Political Power                                                 Overt Peacetime
Economic Power                    Shaping the
                                                                          PSYOP
Public Affairs                 Information Space                      Deception
Public Diplomacy                                                  Covert Action
                                                                       Deterrent
                                                                    Capabilities
                             Information Operations

                                                             Public Diplomacy
 International Power              Shaping the
                                                                  Public Affairs
 Force Disposition               Conflict Space
                                                             Network Security
 Psychological Operations
                                                           Operational Security
 Covert Action & Deception
                                    Information
                                      Warfare

     Force Disposition                                              Deception
                                  Shaping the
     Fire Power                                           Operational Security
                                  Battle-Space
     Electronic Warfare                               Psychological Operations
Evolution of Terminology
•   Propaganda & Political Warfare
•   Psychological Warfare
•   Psychological Operations
•   Information Warfare
•   Information Operations
•   Influence Attitudes / Strategic Influence /
    Perception Management
IO & IW formal definitions
• Information Operations Doctrine (OTAN)
   - Information Warfare:
   “ Information operations conducted during time of crisis
      or conflict to achieve or promote specific objectives
      over a specific adversary or adversaries.”
   - Information Operations:
     “Actions taken to affect adversary information and
      information systems while defending one’s own
      information and information system’s.”
Information Age Conflict

INFORMATION         INFORMATION
IN WARFARE          WARFARE

Intelligence        Influence Attitudes
Surveillance
                     Deny/Protect
Reconnaissance
                     Deceive
Weather
Geographic          Exploit/Attack
Other
Potential vulnerability due to
        information war in our society
• the vulnerability of democracies to false, misleading, or carefully
  crafted attacks orchestrated through the news media;
• attacks by creative individuals skilled and determined enough to
  exploit communications systems and computer networks for illegal
  gain or to disrupt society;
• criminal organizations (terrorists, drug smugglers, illegal arms
  merchants, international poachers, and rogue banking groups) that
  sit across any one country's boundaries represent a poorly-met
  challenge;
• coalition warfare in which military cooperation and interoperability
  are essential, but political goals are not fully compatible and
  intelligence sources and methods must be protected; and
• psychological warfare waged against a general population in order
  to undermine confidence in leaders or the wisdom of their
  actions, often exploiting ethnic, social or moral cleavages in the
  target society.

 http://www.iwar.org.uk/iwar/resources/deterrence/iwdAppb.htm
Final
remarks
Cyberpower targets
                      Intra cyberspace              Extra cyberspace
Digital info tools    Hard: denial of service       Hard: atacks to SCADA
                      attacks                       systems
                      Soft: creaty standards and    Soft: public opinion
                      procedures                    campain and diplomacy to
                                                    influence

Physical info tools   Hard: campanies               Hard: routing and cabling
                      governmental control          destruction
                      Soft: software to support     Soft: protests to identify
                      human rights & others         and embaressement
                      activists                     suppliers


 Nye, J. (2010) The Future of Power. PublicAffairs.
 See also: http://www.amacad.org/publications/bulletin/spring2011/power.pdf
Three cyberpower tactics
           (familiar with these?)
• A tell B what to do
     - if not the case, B will not do that
• A do not allow choice to B
     - including barriers to B apply its own
     strategies
• A shapes the B preferences
     - this way, B never consider some of the
        available strategies
Major players in information war
• leading governments (most powerful Nations)
  – Vulnerabilities: depend on complex systems, also
    fragile, political instability, possible loss of reputation
• Multinational organizations and high structured
  networks
  – Vulnerabilities: Legal action, intellectual property
    theft, system failure, public censorship
• Individuals and less structured networks
  – Vulnerabilities: legal and ilegal stress by governments
    and big organizations, when caught
One more (general) conclusion…
• Defensive information warfare, unlike warfare
  of other sorts, cannot be left solely to the
  government.
  It must be seen as the business of every
  organization likely to be a target

• MacNulty, C. (1996). Changing Social Values and their
  Implications for Information Warfare. INFOWARCON 5.
  Washington DC. September.
  http://www.exploit-the-future.com/paper1/paper1.htm

More Related Content

What's hot

Information Warfare
Information WarfareInformation Warfare
Information Warfaredibyendupaul
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Importance of National security policy
Importance of National security policyImportance of National security policy
Importance of National security policyEntleMorupisi
 
War and Technology
War and Technology War and Technology
War and Technology Asjad Ali
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfareLex Pit
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share104016032
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 

What's hot (20)

Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Espionage
EspionageEspionage
Espionage
 
Importance of National security policy
Importance of National security policyImportance of National security policy
Importance of National security policy
 
War and Technology
War and Technology War and Technology
War and Technology
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Modern War lecture
Modern War lectureModern War lecture
Modern War lecture
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Terrorism
TerrorismTerrorism
Terrorism
 

Similar to The Information Warfare: how it can affect us

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllJarno Limnéll
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 

Similar to The Information Warfare: how it can affect us (20)

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 

More from Luis Borges Gouveia

A Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémicoA Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémicoLuis Borges Gouveia
 
Sharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learningSharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learningLuis Borges Gouveia
 
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...Luis Borges Gouveia
 
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...Luis Borges Gouveia
 
Inteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militarInteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militarLuis Borges Gouveia
 
Curadoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a DistânciaCuradoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a DistânciaLuis Borges Gouveia
 
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...Luis Borges Gouveia
 
Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020Luis Borges Gouveia
 
O Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafiosO Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafiosLuis Borges Gouveia
 
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...Luis Borges Gouveia
 
A oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superiorA oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superiorLuis Borges Gouveia
 
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...Luis Borges Gouveia
 
Transformação digital e gestão da informação
Transformação digital e gestão da informaçãoTransformação digital e gestão da informação
Transformação digital e gestão da informaçãoLuis Borges Gouveia
 
O momento da Transformação digital
O momento da Transformação digitalO momento da Transformação digital
O momento da Transformação digitalLuis Borges Gouveia
 
Emerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystemEmerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystemLuis Borges Gouveia
 
O lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digitalO lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digitalLuis Borges Gouveia
 
Responder a um contexto digital nas IES
Responder a um contexto digital nas IESResponder a um contexto digital nas IES
Responder a um contexto digital nas IES Luis Borges Gouveia
 

More from Luis Borges Gouveia (20)

A Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémicoA Sala de Aula como um espaço de oportunidade num tempo pós pandémico
A Sala de Aula como um espaço de oportunidade num tempo pós pandémico
 
Sharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learningSharing ongoing research from *TRS group on ICT for teaching and learning
Sharing ongoing research from *TRS group on ICT for teaching and learning
 
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
Casos de Estudo e Estudos de Caso. Práticas e Operacionalização: como resolve...
 
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
Contribuições para o uso da MVR - Matriz de Valor e Relevância - Indicadores ...
 
Inteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militarInteligência Artificial e o seu uso em contexto militar
Inteligência Artificial e o seu uso em contexto militar
 
Eventos PhD CI SiTEGI UFP
Eventos PhD CI SiTEGI UFPEventos PhD CI SiTEGI UFP
Eventos PhD CI SiTEGI UFP
 
Information Science PhD event
Information Science PhD eventInformation Science PhD event
Information Science PhD event
 
Curadoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a DistânciaCuradoria Digital de Conteúdo para Educação a Distância
Curadoria Digital de Conteúdo para Educação a Distância
 
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
Proposta de um Modelo de Matriz de Correlação e Relevância – ODS e indicadore...
 
Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020Livro de Resumos do Seminário PhD CI - SiTEGI 2020
Livro de Resumos do Seminário PhD CI - SiTEGI 2020
 
O Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafiosO Digital e um espaço de oportunidades num oceano de desafios
O Digital e um espaço de oportunidades num oceano de desafios
 
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
Uma análise prévia do ensino de emergência em tempos de pandemia e o impacto ...
 
A oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superiorA oportunidade de um novo normal no ensino superior
A oportunidade de um novo normal no ensino superior
 
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
CULTURA DIGITAL DEFINIÇÃO E DIMENSÕES CONSTITUTIVAS: uma proposta para mapear...
 
Transformação digital e gestão da informação
Transformação digital e gestão da informaçãoTransformação digital e gestão da informação
Transformação digital e gestão da informação
 
O momento da Transformação digital
O momento da Transformação digitalO momento da Transformação digital
O momento da Transformação digital
 
Emerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystemEmerging alternatives to leadership and governance in a digital ecosystem
Emerging alternatives to leadership and governance in a digital ecosystem
 
Sobre Cultura Digital
Sobre Cultura DigitalSobre Cultura Digital
Sobre Cultura Digital
 
O lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digitalO lugar da leitura como espaço de convergência entre o real e o digital
O lugar da leitura como espaço de convergência entre o real e o digital
 
Responder a um contexto digital nas IES
Responder a um contexto digital nas IESResponder a um contexto digital nas IES
Responder a um contexto digital nas IES
 

Recently uploaded

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 

Recently uploaded (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 

The Information Warfare: how it can affect us

  • 1. The Information Warfare - how it can affect us - Luis Borges Gouveia lmbg@ufp.edu.pt (UFP)
  • 3. Ideas & concepts are great but…
  • 4. One of the main topics in warfare in the 21st Century • NETWORK-CENTRIC AND INFORMATION WARFARE, OPERATIONS, AND RELATED TECHNOLOGY – Networks (focus on computers and telecommunications) – Memory and storage & information analysis – intelligence (focus on digital information) – Electronic based tech to influence, alter, reduce and change information (focus on how humans process information) • Gibish, E. (2003). WARFARE IN THE 21ST CENTURY - A Selected Bibliography. U.S. Army War College Library. Carlisle Barracks, PA. EUA http://www.carlisle.army.mil/library/bibs/warfar03.htm
  • 5. Information warfare is a everyone concern – worldwide… • Explore the Pakistan’s site Terminal X on Defence, intelligence and geopolitics – http://www.terminalx.org/2011/03/overview-modern- communication.html
  • 6. One (big) example… • On June 23 2009, the United States Secretary of Defense Robert Gates issued notifications for the establishment of the world's first dedicated CYBERCOM (Cyber Command), the USCYBERCOM based on growing concerns of Chinese military penetration into Pentagon defense systems. He outlined the objective in the following statement: "My own view is that the only way to counteract both criminal and espionage activity online is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on Western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well."
  • 7. Another one… • On January 15 2011, the NY Times reported: Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own. Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms. • Conflicting reports just recently now suggest that it was the US which was behind the design, trial and injection of the Stuxnet worm. There can be a strong possibility that both Israel and the US cyber commands worked in tandem against Irani cyber command which was setup to "prevent espionage and sabotage in Information Technology (IT) tools" according to General Syed Kamal Hadianfar, Head of the Information Production and Exchange Department of the Law Enforcement Police in Iran.
  • 8.
  • 9. Cyberwar non human nature…
  • 10. Working Definition Information warfare is comprised of operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions
  • 11. Information Operations (IO) • Military Information Warfare • IO is conducted during time of crisis or conflict to affect adversary information and information systems while defending one's own information and systems
  • 12. peace as an ultimate goal ". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence." Sun Tzu, The Art of War
  • 13. Better than brute force "There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind." Napoleon Bonaparte
  • 14. Core Capabilities • Psychological Operations (PSYOPS) • Military Deception (MILDEC) • Operations Security (OPSEC) • Computer Network Operations (CNO) • Electronic Warfare (EW)
  • 15. Environment Shaping Political Power Overt Peacetime Economic Power Shaping the PSYOP Public Affairs Information Space Deception Public Diplomacy Covert Action Deterrent Capabilities Information Operations Public Diplomacy International Power Shaping the Public Affairs Force Disposition Conflict Space Network Security Psychological Operations Operational Security Covert Action & Deception Information Warfare Force Disposition Deception Shaping the Fire Power Operational Security Battle-Space Electronic Warfare Psychological Operations
  • 16. Evolution of Terminology • Propaganda & Political Warfare • Psychological Warfare • Psychological Operations • Information Warfare • Information Operations • Influence Attitudes / Strategic Influence / Perception Management
  • 17. IO & IW formal definitions • Information Operations Doctrine (OTAN) - Information Warfare: “ Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.” - Information Operations: “Actions taken to affect adversary information and information systems while defending one’s own information and information system’s.”
  • 18. Information Age Conflict INFORMATION INFORMATION IN WARFARE WARFARE Intelligence  Influence Attitudes Surveillance  Deny/Protect Reconnaissance  Deceive Weather Geographic  Exploit/Attack Other
  • 19.
  • 20. Potential vulnerability due to information war in our society • the vulnerability of democracies to false, misleading, or carefully crafted attacks orchestrated through the news media; • attacks by creative individuals skilled and determined enough to exploit communications systems and computer networks for illegal gain or to disrupt society; • criminal organizations (terrorists, drug smugglers, illegal arms merchants, international poachers, and rogue banking groups) that sit across any one country's boundaries represent a poorly-met challenge; • coalition warfare in which military cooperation and interoperability are essential, but political goals are not fully compatible and intelligence sources and methods must be protected; and • psychological warfare waged against a general population in order to undermine confidence in leaders or the wisdom of their actions, often exploiting ethnic, social or moral cleavages in the target society. http://www.iwar.org.uk/iwar/resources/deterrence/iwdAppb.htm
  • 21.
  • 23. Cyberpower targets Intra cyberspace Extra cyberspace Digital info tools Hard: denial of service Hard: atacks to SCADA attacks systems Soft: creaty standards and Soft: public opinion procedures campain and diplomacy to influence Physical info tools Hard: campanies Hard: routing and cabling governmental control destruction Soft: software to support Soft: protests to identify human rights & others and embaressement activists suppliers Nye, J. (2010) The Future of Power. PublicAffairs. See also: http://www.amacad.org/publications/bulletin/spring2011/power.pdf
  • 24. Three cyberpower tactics (familiar with these?) • A tell B what to do - if not the case, B will not do that • A do not allow choice to B - including barriers to B apply its own strategies • A shapes the B preferences - this way, B never consider some of the available strategies
  • 25. Major players in information war • leading governments (most powerful Nations) – Vulnerabilities: depend on complex systems, also fragile, political instability, possible loss of reputation • Multinational organizations and high structured networks – Vulnerabilities: Legal action, intellectual property theft, system failure, public censorship • Individuals and less structured networks – Vulnerabilities: legal and ilegal stress by governments and big organizations, when caught
  • 26. One more (general) conclusion… • Defensive information warfare, unlike warfare of other sorts, cannot be left solely to the government. It must be seen as the business of every organization likely to be a target • MacNulty, C. (1996). Changing Social Values and their Implications for Information Warfare. INFOWARCON 5. Washington DC. September. http://www.exploit-the-future.com/paper1/paper1.htm