information warfare an information management perspective js vorster & r p van heerden research...

21
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

Upload: madeleine-lee

Post on 18-Dec-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

Information Warfarean Information Management Perspective

JS Vorster & R P van Heerden

Research Funding: DST, CSIR DPSS

Page 2: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 2

Scope

• Information management – You can only manage what you have control over. IM as tool for JIW.

• What do we cant to achieve – Joint IW, info integration• Problem statement• Form the definitions• Analytic process – ontological analysis• Conclusion – IW structure for Joint IW.

Page 3: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 3

Problem statement

• What is the core of IW based on the underlying information model

• This leads to a type of definition for IW that will enable better information integration and joint IW capability development.

Page 4: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 4

IW – Some definitions

• Information warfare is actions taken to achieve information superiority in support of national military strategy by affecting adversary information and information systems while leveraging and protecting our information and information systems. Defense Information Systems Agency (DISA)

• How about PsyOps? • National mil strat vs info systems? Level disparity?

Page 5: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 5

• Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance that one’s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information collection opportunities to opposing forces. Wikipedia

• All info, then sudden propaganda stuff…

Page 6: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 6

Libicki

• Command and Control Warfare – targeting the command systems and their communications links;

• Intelligence Based Warfare – the use of precision munitions enabled by sensor technology and communications that are linked for near-real time targeting information;

• Psychological warfare – changing the “hearts and minds” of by using media campaigns (television, radio, leaflets, and other methods);

• Network Warfare – exploitation of computer networks (often called hacker warfare, computer network operations, etc.);

• Economic Information Warfare – the use of computer technology to disrupt the electronic flow of economic transactions; and

• Cyberwarfare – closely related to Hacker warfare but more focused on future IW technology.

• Electronic Warfare - ?

Page 7: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 7

Scoping Problems

• What is defined as Information?• This leads to the universality problem (the commander, her computer,

network, infrastructure, financial institution, economic system, ideological views, … what is actually outside IW?)

• Synaptic Network – Bandwidth controlled by dopamine, network speed controlled by myelin sheath … also within the IW framework

• PsyOps – What is the Information involved?

• Talk of Jointness – main aim of current thinking and analysis

Page 8: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 8

Medusa.. In or Out?

• MEDUSA (Mob Excess Deterrent Using Silent Audio)• NewScientist (2008/07) - Microwave ray gun controls crowds with

noise• exploits the microwave audio effect, in which short microwave pulses

rapidly heat tissue, causing a shockwave inside the skull that can be detected by the ears. A series of pulses can be transmitted to produce recognisable sounds.

Page 9: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 9

Problem statement

• What is the core of IW based on the underlying information model

• This leads to a type of definition for IW that will enable better information integration and joint IW capability development.

Page 10: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 10

Analytic Process

Information ProcessOntology

CategoryOntology

Process-based definitions of I

information warfare

Libicki’s category based

definition of information

warfare

Find ontology connectivity

structure

Find ontology connectivity

structure

Towards a new definition and

categorization of information

warfare

Integration of ontological models

based on similarities and

differences

Page 11: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 11

What is an Ontology?

• Individuals: instances, objects• Classes: Sets, collections, concepts, types of objects• Attributes: properties, features, object parameterisation• Relations: objects and class relationships• Function terms: complex structures form from

relationships• Restrictions: limitations on validity of objective world• Rules: statements in antecedent-consequent form• Axioms: assertions – overall theory• Events: changes in relationships or attributes

Page 12: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 12

Analytic Process

Definition of IW base on Ontological Analysis

Identify Interface Classes and Actions

Clusters of Classes into Concepts

-IP-MAC-HD-ID-...

Networked Computer

-Method of hiding-Trigger method-Originator-Domain spcification

Malware

-GreaterPackage-Communications Channel

Trojan-Propagation method-Signiture-Cure

Virus

-Anti-anti Hacking--IP-MAC-HD-ID-...

Hacker Team

-OS-Stealth-IP-MAC-HD-ID-...

Hacker toolset

«bind»

«bind»

-Body-Idiological Reference-Aim-Focus-Intended audiance

PsyOps Message

-Numer of messages-Applications-Method of delivery

Delivery Mechanism

-Recipient-source address

eMail

-Channel-Advertisement-...

TV

-method of delivery

Radio

-Idiological background-Status-Political view-Reason for Target

Message Recipient

-IP-MAC-HD-ID-...

Networked Computer

-Method of hiding-Trigger method-Originator-Domain spcification

Malware

-GreaterPackage-Communications Channel

Trojan-Propagation method-Signiture-Cure

Virus

-Anti-anti Hacking--IP-MAC-HD-ID-...

Hacker Team

-OS-Stealth-IP-MAC-HD-ID-...

Hacker toolset

«bind»

«bind»

-Body-Idiological Reference-Aim-Focus-Intended audiance

PsyOps Message

-Numer of messages-Applications-Method of delivery

Delivery Mechanism

-Recipient-source address

eMail

-Channel-Advertisement-...

TV

-method of delivery

Radio

-Idiological background-Status-Political view-Reason for Target

Message Recipient

-Source-Destination-fund originator-fund destination-amount

Financial Information on Network

-Source-Destination-fund originator-fund destination-amount

Financial Information on Network

-Protocol-Bandwidth-Encryption

Network Communications

-Protocol-Bandwidth-Encryption

Network Communications

-Protocol-Bandwidth-Encryption

Network Communications

-medium-target-connections-method of detection-type

Sensor

-Weapons type-range-damage level-typical target

Efector

-seed of decisions-expertise in field

Decision maker

-type

Decision suppor software

Radar integration Air-picture

Interface2

«bind»

End1

End2

End3End4

Ontological AnalysisBased on IW definitions

-Protocol-Bandwidth-Encryption

Network Communications

-medium-target-connections-method of detection-type

Sensor

-Weapons type-range-damage level-typical target

Efector

-seed of decisions-expertise in field

Decision maker

-type

Decision suppor software

Radar integration Air-picture

Interface2

«bind»

End1

End2

End3

End4

-IP-MAC-HD-ID-...

Networked Computer

-Method of hiding-Trigger method-Originator-Domain spcification

Malware

-GreaterPackage-Communications Channel

Trojan-Propagation method-Signiture-Cure

Virus

-Anti-anti Hacking--IP-MAC-HD-ID-...

Hacker Team

-OS-Stealth-IP-MAC-HD-ID-...

Hacker toolset

«bind»

«bind»

-Source-Destination-fund originator-fund destination-amount

Financial Information on Network

-Source-Destination-fund originator-fund destination-amount

Financial Information on Network

-Protocol-Bandwidth-Encryption

Network Communications

-Protocol-Bandwidth-Encryption

Network Communications

-Protocol-Bandwidth-Encryption

Network Communications

-medium-target-connections-method of detection-type

Sensor

-Weapons type-range-damage level-typical target

Efector

-seed of decisions-expertise in field

Decision maker

-type

Decision suppor software

Radar integration Air-picture

Interface2

«bind»

End1

End2

End3End4

• Ontological Analysis

• Concept Clustering

• Interface classes

• Definitions of IW (conclusions)

Page 13: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 13

Conclusions

• …

Page 14: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 14

Conclusions

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Psychological Operations /

WarfareElectromagnetic Warfare (as a subsection of

Electronic Warfare)

Intelligence Based Warfare (Platform

optimization)

Economic Warfare

Page 15: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 15

• Network Warfare – focusing on methods for attacking the computer system of an adversary using hacking capabilities; and defending such computer systems against similar attack.

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Psychological Operations /

WarfareElectromagnetic Warfare (as a subsection of

Electronic Warfare)

Intelligence Based Warfare (Platform

optimization)

Economic Warfare

Page 16: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 16

• Command and Control Warfare – focus on the attack of adversary command systems (including database and logistic systems, critical info infrastructure) via the use of network warfare, electromagnetic warfare or physical attack (airborne, missile, special forces) and the protection of own command systems. It also includes the improvements in decision cycles within the C2W framework.

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Psychological Operations /

WarfareElectromagnetic Warfare (as a subsection of

Electronic Warfare)

Intelligence Based Warfare (Platform

optimization)

Economic Warfare

Page 17: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 17

• Electromagnetic Warfare – focus on methods for attacking the electromagnetic communications mechanisms used for information transfer by using traditionally electronic warfare techniques; and the prevention of such attacks against own electromagnetic communications.

• Not the entire EW

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Psychological Operations /

WarfareElectromagnetic Warfare (as a subsection of

Electronic Warfare)

Intelligence Based Warfare (Platform

optimization)

Economic Warfare

Page 18: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 18

• Intelligence Based Warfare – platform and systems optimization through improvements in sensor integration, and sensor-to-shooter loops.

• Closed system optimization• Multi-sensor information integration• Decision support – Doctrine development• Attack of closed systems – disruption, affecting, etc.

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Psychological Operations /

WarfareElectromagnetic Warfare (as a subsection of

Electronic Warfare)

Intelligence Based Warfare (Platform

optimization)

Economic Warfare

Page 19: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 19

• Psychological operations – this focus on improving the relationship with neutrals, informing the enemy of facts about the current situation and supporting the longer term strategic campaign objectives.

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Psychological Operations /

WarfareElectromagnetic Warfare (as a subsection of

Electronic Warfare)

Intelligence Based Warfare (Platform

optimization)

Economic Warfare

Page 20: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 20

Joint Information Warfare

Network Warfare (Cyber Warfare, Hacker Warfare)

Command and Control Warfare

Electromagnetic Warfare (as a subsection of

Electronic Warfare)

• Jointness – Joint information management

• Only joint if information is somehow overlapping

• Only directly possible with these three areas

• Others may still use info, etc but no jointness.

Page 21: Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR 2007 www.csir.co.zaSlide 21

End