information warfare an information management perspective js vorster & r p van heerden research...
TRANSCRIPT
Information Warfarean Information Management Perspective
JS Vorster & R P van Heerden
Research Funding: DST, CSIR DPSS
© CSIR 2007 www.csir.co.zaSlide 2
Scope
• Information management – You can only manage what you have control over. IM as tool for JIW.
• What do we cant to achieve – Joint IW, info integration• Problem statement• Form the definitions• Analytic process – ontological analysis• Conclusion – IW structure for Joint IW.
© CSIR 2007 www.csir.co.zaSlide 3
Problem statement
• What is the core of IW based on the underlying information model
• This leads to a type of definition for IW that will enable better information integration and joint IW capability development.
© CSIR 2007 www.csir.co.zaSlide 4
IW – Some definitions
• Information warfare is actions taken to achieve information superiority in support of national military strategy by affecting adversary information and information systems while leveraging and protecting our information and information systems. Defense Information Systems Agency (DISA)
• How about PsyOps? • National mil strat vs info systems? Level disparity?
© CSIR 2007 www.csir.co.zaSlide 5
• Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance that one’s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information collection opportunities to opposing forces. Wikipedia
• All info, then sudden propaganda stuff…
© CSIR 2007 www.csir.co.zaSlide 6
Libicki
• Command and Control Warfare – targeting the command systems and their communications links;
• Intelligence Based Warfare – the use of precision munitions enabled by sensor technology and communications that are linked for near-real time targeting information;
• Psychological warfare – changing the “hearts and minds” of by using media campaigns (television, radio, leaflets, and other methods);
• Network Warfare – exploitation of computer networks (often called hacker warfare, computer network operations, etc.);
• Economic Information Warfare – the use of computer technology to disrupt the electronic flow of economic transactions; and
• Cyberwarfare – closely related to Hacker warfare but more focused on future IW technology.
• Electronic Warfare - ?
© CSIR 2007 www.csir.co.zaSlide 7
Scoping Problems
• What is defined as Information?• This leads to the universality problem (the commander, her computer,
network, infrastructure, financial institution, economic system, ideological views, … what is actually outside IW?)
• Synaptic Network – Bandwidth controlled by dopamine, network speed controlled by myelin sheath … also within the IW framework
• PsyOps – What is the Information involved?
• Talk of Jointness – main aim of current thinking and analysis
© CSIR 2007 www.csir.co.zaSlide 8
Medusa.. In or Out?
• MEDUSA (Mob Excess Deterrent Using Silent Audio)• NewScientist (2008/07) - Microwave ray gun controls crowds with
noise• exploits the microwave audio effect, in which short microwave pulses
rapidly heat tissue, causing a shockwave inside the skull that can be detected by the ears. A series of pulses can be transmitted to produce recognisable sounds.
© CSIR 2007 www.csir.co.zaSlide 9
Problem statement
• What is the core of IW based on the underlying information model
• This leads to a type of definition for IW that will enable better information integration and joint IW capability development.
© CSIR 2007 www.csir.co.zaSlide 10
Analytic Process
Information ProcessOntology
CategoryOntology
Process-based definitions of I
information warfare
Libicki’s category based
definition of information
warfare
Find ontology connectivity
structure
Find ontology connectivity
structure
Towards a new definition and
categorization of information
warfare
Integration of ontological models
based on similarities and
differences
© CSIR 2007 www.csir.co.zaSlide 11
What is an Ontology?
• Individuals: instances, objects• Classes: Sets, collections, concepts, types of objects• Attributes: properties, features, object parameterisation• Relations: objects and class relationships• Function terms: complex structures form from
relationships• Restrictions: limitations on validity of objective world• Rules: statements in antecedent-consequent form• Axioms: assertions – overall theory• Events: changes in relationships or attributes
© CSIR 2007 www.csir.co.zaSlide 12
Analytic Process
Definition of IW base on Ontological Analysis
Identify Interface Classes and Actions
Clusters of Classes into Concepts
-IP-MAC-HD-ID-...
Networked Computer
-Method of hiding-Trigger method-Originator-Domain spcification
Malware
-GreaterPackage-Communications Channel
Trojan-Propagation method-Signiture-Cure
Virus
-Anti-anti Hacking--IP-MAC-HD-ID-...
Hacker Team
-OS-Stealth-IP-MAC-HD-ID-...
Hacker toolset
«bind»
«bind»
-Body-Idiological Reference-Aim-Focus-Intended audiance
PsyOps Message
-Numer of messages-Applications-Method of delivery
Delivery Mechanism
-Recipient-source address
-Channel-Advertisement-...
TV
-method of delivery
Radio
-Idiological background-Status-Political view-Reason for Target
Message Recipient
-IP-MAC-HD-ID-...
Networked Computer
-Method of hiding-Trigger method-Originator-Domain spcification
Malware
-GreaterPackage-Communications Channel
Trojan-Propagation method-Signiture-Cure
Virus
-Anti-anti Hacking--IP-MAC-HD-ID-...
Hacker Team
-OS-Stealth-IP-MAC-HD-ID-...
Hacker toolset
«bind»
«bind»
-Body-Idiological Reference-Aim-Focus-Intended audiance
PsyOps Message
-Numer of messages-Applications-Method of delivery
Delivery Mechanism
-Recipient-source address
-Channel-Advertisement-...
TV
-method of delivery
Radio
-Idiological background-Status-Political view-Reason for Target
Message Recipient
-Source-Destination-fund originator-fund destination-amount
Financial Information on Network
-Source-Destination-fund originator-fund destination-amount
Financial Information on Network
-Protocol-Bandwidth-Encryption
Network Communications
-Protocol-Bandwidth-Encryption
Network Communications
-Protocol-Bandwidth-Encryption
Network Communications
-medium-target-connections-method of detection-type
Sensor
-Weapons type-range-damage level-typical target
Efector
-seed of decisions-expertise in field
Decision maker
-type
Decision suppor software
Radar integration Air-picture
Interface2
«bind»
End1
End2
End3End4
Ontological AnalysisBased on IW definitions
-Protocol-Bandwidth-Encryption
Network Communications
-medium-target-connections-method of detection-type
Sensor
-Weapons type-range-damage level-typical target
Efector
-seed of decisions-expertise in field
Decision maker
-type
Decision suppor software
Radar integration Air-picture
Interface2
«bind»
End1
End2
End3
End4
-IP-MAC-HD-ID-...
Networked Computer
-Method of hiding-Trigger method-Originator-Domain spcification
Malware
-GreaterPackage-Communications Channel
Trojan-Propagation method-Signiture-Cure
Virus
-Anti-anti Hacking--IP-MAC-HD-ID-...
Hacker Team
-OS-Stealth-IP-MAC-HD-ID-...
Hacker toolset
«bind»
«bind»
-Source-Destination-fund originator-fund destination-amount
Financial Information on Network
-Source-Destination-fund originator-fund destination-amount
Financial Information on Network
-Protocol-Bandwidth-Encryption
Network Communications
-Protocol-Bandwidth-Encryption
Network Communications
-Protocol-Bandwidth-Encryption
Network Communications
-medium-target-connections-method of detection-type
Sensor
-Weapons type-range-damage level-typical target
Efector
-seed of decisions-expertise in field
Decision maker
-type
Decision suppor software
Radar integration Air-picture
Interface2
«bind»
End1
End2
End3End4
• Ontological Analysis
• Concept Clustering
• Interface classes
• Definitions of IW (conclusions)
© CSIR 2007 www.csir.co.zaSlide 13
Conclusions
• …
© CSIR 2007 www.csir.co.zaSlide 14
Conclusions
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Psychological Operations /
WarfareElectromagnetic Warfare (as a subsection of
Electronic Warfare)
Intelligence Based Warfare (Platform
optimization)
Economic Warfare
© CSIR 2007 www.csir.co.zaSlide 15
• Network Warfare – focusing on methods for attacking the computer system of an adversary using hacking capabilities; and defending such computer systems against similar attack.
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Psychological Operations /
WarfareElectromagnetic Warfare (as a subsection of
Electronic Warfare)
Intelligence Based Warfare (Platform
optimization)
Economic Warfare
© CSIR 2007 www.csir.co.zaSlide 16
• Command and Control Warfare – focus on the attack of adversary command systems (including database and logistic systems, critical info infrastructure) via the use of network warfare, electromagnetic warfare or physical attack (airborne, missile, special forces) and the protection of own command systems. It also includes the improvements in decision cycles within the C2W framework.
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Psychological Operations /
WarfareElectromagnetic Warfare (as a subsection of
Electronic Warfare)
Intelligence Based Warfare (Platform
optimization)
Economic Warfare
© CSIR 2007 www.csir.co.zaSlide 17
• Electromagnetic Warfare – focus on methods for attacking the electromagnetic communications mechanisms used for information transfer by using traditionally electronic warfare techniques; and the prevention of such attacks against own electromagnetic communications.
• Not the entire EW
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Psychological Operations /
WarfareElectromagnetic Warfare (as a subsection of
Electronic Warfare)
Intelligence Based Warfare (Platform
optimization)
Economic Warfare
© CSIR 2007 www.csir.co.zaSlide 18
• Intelligence Based Warfare – platform and systems optimization through improvements in sensor integration, and sensor-to-shooter loops.
• Closed system optimization• Multi-sensor information integration• Decision support – Doctrine development• Attack of closed systems – disruption, affecting, etc.
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Psychological Operations /
WarfareElectromagnetic Warfare (as a subsection of
Electronic Warfare)
Intelligence Based Warfare (Platform
optimization)
Economic Warfare
© CSIR 2007 www.csir.co.zaSlide 19
• Psychological operations – this focus on improving the relationship with neutrals, informing the enemy of facts about the current situation and supporting the longer term strategic campaign objectives.
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Psychological Operations /
WarfareElectromagnetic Warfare (as a subsection of
Electronic Warfare)
Intelligence Based Warfare (Platform
optimization)
Economic Warfare
© CSIR 2007 www.csir.co.zaSlide 20
Joint Information Warfare
Network Warfare (Cyber Warfare, Hacker Warfare)
Command and Control Warfare
Electromagnetic Warfare (as a subsection of
Electronic Warfare)
• Jointness – Joint information management
• Only joint if information is somehow overlapping
• Only directly possible with these three areas
• Others may still use info, etc but no jointness.
© CSIR 2007 www.csir.co.zaSlide 21
End