Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-cjp7w Total loading time: 0 Render date: 2024-06-15T05:13:57.900Z Has data issue: false hasContentIssue false

2 - Hostile Conquest as Information Warfare

Published online by Cambridge University Press:  05 June 2012

Martin C. Libicki
Affiliation:
RAND Corporation, California
Get access

Summary

Information systems, the basis of cyberspace, are powerful and hence valuable. But they are also complex and hence often incomprehensible. As tools they should be subject to our mastery. But do we really control them? Even our stand-alone systems may arrive corrupted or may become corrupted through something they ingest. Connect them to the world, whether by yesterday's floppy disks or today's networks, and our fears multiply – and not without justification. Will these systems be available to do our bidding when asked – or will they sicken with viruses or drown in spam? Will information we entrust to our systems stay put or follow some Pied Piper out of town? Can we even be sure that the information they present to us has not been tampered with?

This combination of growing dependence and ever-shaky confidence in our control over information systems has given rise, since the early 1990s, to a new type of threat, and conversely and consequently a new branch of the military art: information warfare. Information warfare is often epitomized by hostile operations in cyberspace although, as explained shortly, it can take place in other ways.

This, the first of four chapters on hostile operations in cyberspace, builds an archetype of information warfare and then works backward to its epitome – computer network attack. Embedding computer network attack within a broader context of information warfare provides a sense of where it stands within the whole military milieu.

Type
Chapter
Information
Conquest in Cyberspace
National Security and Information Warfare
, pp. 15 - 49
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×