SlideShare a Scribd company logo
1 of 10
Download to read offline
FBI fingers China
Strategic diplomacy & information
warfare
Strategic diplomatic implications
The role of international
organizations
Pavithra M,
Avinashilingam University.
FBI fingers China
Many unnamed countries are developing technologies to
complicate what the U.S. military refers to as “Power projection”
and to undermine morale at home.
The interagency, FBI-led National Infrastructure Protection Center,
uses a slide depicting China’s Great Wall in its standard
presentation on cyber threats, along with a quote from Sun Zi,
author of a treatise on war in about 350 B.C.
According to the Department of Defense, is the “art and science of
developing and using political, economic, psychological, and
military forces as necessary during peace and war, to afford the
maximum support to policies, in order to increase the probabilities
and favorable consequences of victory and to lessen the chances
of defeat.”
Strategic Diplomacy and Information Warfare
New tools and technologies for communication have created the
potential for a new form of psychological warfare to a degree imagined
only in science fiction.
This new form of warfare has become known as Information warfare
(IW).
In other words, the US armed forces need to develop a systematic,
capstone concept of military knowledge and diplomatic strategy.
Such a strategy would include clear doctrine and a policy for how the
armed forces will acquire process, distribute, and project knowledge.
Fictive or fictional operational environments, then, whether mass-
targeted or niche-targeted, can be generated, transmitted, distributed,
or broadcast by governments or all sorts of other players through
increasingly diversified networks.
The niche-manipulation potential available to states or private
interests with access to the universe of internetted
communications, such as the networks over which business,
commercial, and banking information are transmitted could easily
provoke financial confusions.
The target state would not know what had happened until too late.
Direct satellite broadcast to selected cable systems, analogous to
central control of pay-per-view programs, again offers the potential
for people in one province or region of a targeted state to discover
that the highest level of their leadership has decided to purge their
clansmen from the army.
To put it in the jargon of the info warriors, info-niche attack in an
increasingly multisource fictive universe offers unlimited potential
for societal-level net war.
The Strategic Diplomatic
Implications
The tools, techniques, and strategy of cyber war will be
developed and, during wartime, should be employed.
In many ways, cyber war is more demanding than net
war, but the resources, organization, and training
needed for cyber war will be provided once it’s war-
winning, and casualty-reducing, potential is grasped by
the national political leadership.
Such a development would certainly be prudent.
On the other hand, many of the tools and techniques of
battlefield cyber war can be applied to net war or
strategic-level IW.
This application may not be prudent; however, as there
are serious reasons to doubt the ability of the US to
prosecute information war successfully.
Info sphere dominance (controlling the world of
information exchange) may be as complex and elusive as
escalation dominance appeared to be in nuclear strategy.
It will certainly be expensive: the U.S. business
community and the U.S. armed forces are required to
devote ever more resources and attention to computer,
communications, and database security.
The resources and skills required for battlefield cyber war
are not insignificant, but the resources and skills required
to wage an information war at the national strategic level
would be massive.
Information on countries with offensive IW initiatives is less
authoritatively documented, but studies and foreign press
reporting help point to international organizations that probably
have such an initiative under way.
A 1996 U.S. General Accounting Office (GAO) report on the
threat to Defense D systems (otherwise known as Defense
DARPA [Defense Advanced Research Projects Agency]
systems) stated that the Department of Energy and the National
Security Agency estimated that 120 countries had established
computer Information on countries with attack capabilities.
At the low end, in June 1998, the director of central intelligence
stated that several countries are sponsoring IW programs and
that nations developing these programs recognize the value of
attaching their country’s computer systems—both on the
battlefield and in the civilian arena.
The Role of International Organizations
All of these countries publicly acknowledge to pursuing
defensive IW initiatives to protect their military information
capabilities or national information infrastructure:
India established a National Information Infrastructure-
Defensive group several years ago, apparently in
response to China’s growing interest in IW.
As recently as January 2001, the Israel Defense Forces
(IDF) acknowledged the existence of an IW defense unit
whose mission is to protect military systems, but noted
that the electric utility had organized its own defense.
Taiwan also recently announced the creation of a task
force to study ways to protect their information
infrastructure from the growing IW threat from China.
Creation of a national defensive
information infrastructure program is
a good (and probably necessary)
indicator of an international
offensive IW initiative.
Defensive measures (deterrence,
protection, and restoration) are
difficult to implement without also
developing an understanding of
potential adversaries, investing in
computer and software
development, and creating a major
operational capability— all steps
directly applicable to creating an
offensive IW capability.
Thank you

More Related Content

What's hot

(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
Jun Hao Lim
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02
Steph Cliche
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
MarioEliseo3
 

What's hot (19)

Cyber war
Cyber warCyber war
Cyber war
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
114-116
114-116114-116
114-116
 
Drones in Discourse
Drones in DiscourseDrones in Discourse
Drones in Discourse
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)
 
It technology used by terrorist
It technology used by terroristIt technology used by terrorist
It technology used by terrorist
 
Congo werd de facto bestuurd door CIA in de jaren '60
Congo werd de facto bestuurd door CIA in de jaren '60Congo werd de facto bestuurd door CIA in de jaren '60
Congo werd de facto bestuurd door CIA in de jaren '60
 

Similar to Doomsday software (2)

Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Jose Gonzalez
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Mark Raduenzel
 
War by other means. building complete and balanced capabilities for counterin...
War by other means. building complete and balanced capabilities for counterin...War by other means. building complete and balanced capabilities for counterin...
War by other means. building complete and balanced capabilities for counterin...
mmangusta
 
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
ruthannemcmullen
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
Lillian Ekwosi-Egbulem
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
philipnelson29183
 
Towards building trusted multinational civil
Towards building trusted multinational civilTowards building trusted multinational civil
Towards building trusted multinational civil
Bruce Forrester
 
For many years, Kartesia and the United States have been political a.docx
For many years, Kartesia and the United States have been political a.docxFor many years, Kartesia and the United States have been political a.docx
For many years, Kartesia and the United States have been political a.docx
zollyjenkins
 
Resourcing the US 2030 Cyber Strategy
Resourcing the US 2030 Cyber StrategyResourcing the US 2030 Cyber Strategy
Resourcing the US 2030 Cyber Strategy
Scott Dickson
 

Similar to Doomsday software (2) (20)

Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
Haaretz
HaaretzHaaretz
Haaretz
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Osint data mining
Osint data miningOsint data mining
Osint data mining
 
Essay About Background
Essay About BackgroundEssay About Background
Essay About Background
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 
War by other means. building complete and balanced capabilities for counterin...
War by other means. building complete and balanced capabilities for counterin...War by other means. building complete and balanced capabilities for counterin...
War by other means. building complete and balanced capabilities for counterin...
 
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
Why Great Powers Launch Destructive Cyber Operations and What to Do About It ...
 
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
Towards building trusted multinational civil
Towards building trusted multinational civilTowards building trusted multinational civil
Towards building trusted multinational civil
 
For many years, Kartesia and the United States have been political a.docx
For many years, Kartesia and the United States have been political a.docxFor many years, Kartesia and the United States have been political a.docx
For many years, Kartesia and the United States have been political a.docx
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 
Resourcing the US 2030 Cyber Strategy
Resourcing the US 2030 Cyber StrategyResourcing the US 2030 Cyber Strategy
Resourcing the US 2030 Cyber Strategy
 

Recently uploaded

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 

Recently uploaded (20)

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 

Doomsday software (2)

  • 1. FBI fingers China Strategic diplomacy & information warfare Strategic diplomatic implications The role of international organizations Pavithra M, Avinashilingam University.
  • 2. FBI fingers China Many unnamed countries are developing technologies to complicate what the U.S. military refers to as “Power projection” and to undermine morale at home. The interagency, FBI-led National Infrastructure Protection Center, uses a slide depicting China’s Great Wall in its standard presentation on cyber threats, along with a quote from Sun Zi, author of a treatise on war in about 350 B.C. According to the Department of Defense, is the “art and science of developing and using political, economic, psychological, and military forces as necessary during peace and war, to afford the maximum support to policies, in order to increase the probabilities and favorable consequences of victory and to lessen the chances of defeat.” Strategic Diplomacy and Information Warfare
  • 3. New tools and technologies for communication have created the potential for a new form of psychological warfare to a degree imagined only in science fiction. This new form of warfare has become known as Information warfare (IW). In other words, the US armed forces need to develop a systematic, capstone concept of military knowledge and diplomatic strategy. Such a strategy would include clear doctrine and a policy for how the armed forces will acquire process, distribute, and project knowledge. Fictive or fictional operational environments, then, whether mass- targeted or niche-targeted, can be generated, transmitted, distributed, or broadcast by governments or all sorts of other players through increasingly diversified networks.
  • 4. The niche-manipulation potential available to states or private interests with access to the universe of internetted communications, such as the networks over which business, commercial, and banking information are transmitted could easily provoke financial confusions. The target state would not know what had happened until too late. Direct satellite broadcast to selected cable systems, analogous to central control of pay-per-view programs, again offers the potential for people in one province or region of a targeted state to discover that the highest level of their leadership has decided to purge their clansmen from the army. To put it in the jargon of the info warriors, info-niche attack in an increasingly multisource fictive universe offers unlimited potential for societal-level net war.
  • 5. The Strategic Diplomatic Implications The tools, techniques, and strategy of cyber war will be developed and, during wartime, should be employed. In many ways, cyber war is more demanding than net war, but the resources, organization, and training needed for cyber war will be provided once it’s war- winning, and casualty-reducing, potential is grasped by the national political leadership. Such a development would certainly be prudent. On the other hand, many of the tools and techniques of battlefield cyber war can be applied to net war or strategic-level IW.
  • 6. This application may not be prudent; however, as there are serious reasons to doubt the ability of the US to prosecute information war successfully. Info sphere dominance (controlling the world of information exchange) may be as complex and elusive as escalation dominance appeared to be in nuclear strategy. It will certainly be expensive: the U.S. business community and the U.S. armed forces are required to devote ever more resources and attention to computer, communications, and database security. The resources and skills required for battlefield cyber war are not insignificant, but the resources and skills required to wage an information war at the national strategic level would be massive.
  • 7. Information on countries with offensive IW initiatives is less authoritatively documented, but studies and foreign press reporting help point to international organizations that probably have such an initiative under way. A 1996 U.S. General Accounting Office (GAO) report on the threat to Defense D systems (otherwise known as Defense DARPA [Defense Advanced Research Projects Agency] systems) stated that the Department of Energy and the National Security Agency estimated that 120 countries had established computer Information on countries with attack capabilities. At the low end, in June 1998, the director of central intelligence stated that several countries are sponsoring IW programs and that nations developing these programs recognize the value of attaching their country’s computer systems—both on the battlefield and in the civilian arena. The Role of International Organizations
  • 8. All of these countries publicly acknowledge to pursuing defensive IW initiatives to protect their military information capabilities or national information infrastructure: India established a National Information Infrastructure- Defensive group several years ago, apparently in response to China’s growing interest in IW. As recently as January 2001, the Israel Defense Forces (IDF) acknowledged the existence of an IW defense unit whose mission is to protect military systems, but noted that the electric utility had organized its own defense. Taiwan also recently announced the creation of a task force to study ways to protect their information infrastructure from the growing IW threat from China.
  • 9. Creation of a national defensive information infrastructure program is a good (and probably necessary) indicator of an international offensive IW initiative. Defensive measures (deterrence, protection, and restoration) are difficult to implement without also developing an understanding of potential adversaries, investing in computer and software development, and creating a major operational capability— all steps directly applicable to creating an offensive IW capability.