You are on page 1of 8

This article was downloaded by: [UQ Library]

On: 11 November 2014, At: 03:04


Publisher: Routledge
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer
House, 37-41 Mortimer Street, London W1T 3JH, UK

The Information Society: An International


Journal
Publication details, including instructions for authors and subscription
information:
http://www.tandfonline.com/loi/utis20

Information Warfare: Its Application in Military


and Civilian Contexts
Blaise Cronin, Holly Crawford
Published online: 29 Jul 2006.

To cite this article: Blaise Cronin, Holly Crawford (1999) Information Warfare: Its Application in Military and
Civilian Contexts, The Information Society: An International Journal, 15:4, 257-263, DOI: 10.1080/019722499128420

To link to this article: http://dx.doi.org/10.1080/019722499128420

PLEASE SCROLL DOWN FOR ARTICLE

Taylor & Francis makes every effort to ensure the accuracy of all the information (the Content)
contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors
make no representations or warranties whatsoever as to the accuracy, completeness, or suitability
for any purpose of the Content. Any opinions and views expressed in this publication are the opinions
and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of
the Content should not be relied upon and should be independently verified with primary sources
of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings,
demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising
directly or indirectly in connection with, in relation to or arising out of the use of the Content.

This article may be used for research, teaching, and private study purposes. Any substantial or
systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution
in any form to anyone is expressly forbidden. Terms & Conditions of access and use can be found at
http://www.tandfonline.com/page/terms-and-conditions
Information Warfare: Its Application in Military
and Civilian Contexts

Blaise Cronin and Holly Crawford


School of Library and Information Science, Indiana University, Bloomington, Indiana, USA

BELTWAY BUZZWORDS INFORMATION WARFARE


The lexicon of information warfare (IW), or cyberwar, to The term information warfare is still popularly associ-
use a common variant, has been around for more than two ated with high-technolog y weapons and broadcast images
Downloaded by [UQ Library] at 03:04 11 November 2014

decades (Adams, 1998), but for most of that time it has of Cruise missiles seeking out Iraqi or Serbian military tar-
remained the preserve of the defense community. Within gets with apparently unerring accuracy. Armchair viewing
the cloistered world of the Pentagon and its satellite com- of arms-length battles has created a simplistic and sani-
munities, a radically new concept of postindustria l warfare tized vision of information warfare in which, to paraphrase
has crystallized, one that is designed to ensure continued Tof er (1990), the mindless st is replaced by congealed
U.S. military dominance in the post-Cold War era. There mind. The medias early focus on smart bombs and intelli-
exists an extensive literature on information warfare theory gent battle systemsthe tangible paraphernalia of the dig-
and practice, much of which is in the public domain (De ital battle spacemasked the potentially deeper societal
Landa, 1991; Libicki, 1995; Schwartau, 1996; Denning, implications of virtual warfare strategies. That, however,
1999). Predictably, the prevailing language, images, and is beginning to change, as journalists and pundits fore-
metaphors are classically militaristic in character, blur- ground computer hacking and data corruption as pivotal
ring the fact that many of the underpinnin g principles and information warfare techniques. Simpli cations and con-
assumptions have application well beyond conventiona l fusions notwithstanding , an axial assumption of informa-
military contexts. This privileging of military thinking is tion age warfare is that brains matter more than brawn. In
myopic. Information warfare concepts deserve to be liber- tomorrows battle eld, be it military or civilian, informa-
ated from their military associations and introduced into tion technology will act as a force multiplie r. Traditional
other discourse communities concerned with understand- notions about the bases of superiority and power dynam-
ing the social consequences of pervasive computing. Al- ics existing between attacker and target may thus require
ready, the principles and practices of information warfare rede nition.
are being exhibited, more or less wittingly, in a variety Pandemic access to digital networks creates a down-
of civilian contexts (from computer-based fraud to cyber- ward adjustment of establishe d power differentials at all
stalking), and there are good grounds for assuming that levels of society. Traditional notions of combat assume
this trend will intensify, causing potentially serious social some parity in terms of payload and starting ratios: A pla-
problems and creating novel challenges for the criminal toon does not go head-to-head with a battalion, a small
justice system. To paraphrase a well-worn cliche, infor- business does not take on a Fortune 500 company, and
mation warfare is too important to be left to the military. a bantamweight does not challenge a sumo wrestler. Of
course, history is littered with exceptions to this rule of
thumbpartisan groups, guerrilla movements, aggressive
Received 11 February 1999; accepted 15 February 1999.
start-ups. In the electronic arena, however, axial assump-
We are grateful to Elisabeth Davenport, Rob Kling, and Debora tions about force parity do not necessarily hold. Military
Shaw for their comments. might is demassi ed, and a digital David can indeed chal-
Address correspondence to Blaise Cronin, School of Library and In- lenge a seemingly PGP-protected Goliath, almost with
formation Science, Indiana University, Bloomington, IN 47405-1901 , impunity. This is what Cusumano and Yof e (1998), in an-
USA. E-mail: bcronin@indiana.edu other context, call the judo strategy, that is to say, turning
The Information Society, 15:257263, 1999
Copyright c 1999 Taylor & Francis
0197-2243/99 $12.00 + .00 257
258 B. CRONIN AND H. CRAWFORD

TABLE 1 contest ownership and control of the IW agenda. The Pen-


Information warfare tagon is making signi cant investments in the development
of IW strategies (both offensive and defensive) and the as-
Target Actions sociated digital technologie s in an effort to augment the
Physical assets Damage or destroy targets
nations comparative military advantage. However, there
information and communication are still informed skeptics within the military ranks, who
systems using conventional dismiss IW theory as a wonkish vision of war . . . more
warfare techniques convincing to defense contractors than to Americas ene-
Soft assets In ltrate, degrade, subvert mies (Peters, 1998, p. 39).
information systems; use
Simply put, information warfare implies a range of
external actors and corrupted measures or actions intended to protect, exploit, corrupt,
insiders to crack rewalls and deny, or destroy information or information resources in
degrade targets information order to achieve a signi cant advantage, objective, or vic-
systems capability, using tory over an adversary (Alger, 1996, p. 12). A typical
malicious software goal of conventional warfare is to destroy or degrade the
Psychic assets Silent penetration of targets enemys physical resources, whereas the aim of IW is to
information and communications target information assets and infrastructure, such that the
systems to manage perceptions, resultant damage may not be immediately visible or de-
Downloaded by [UQ Library] at 03:04 11 November 2014

shape opinions, foster deception, tectable to the untrained eye: These strikes are called soft
and engage in epistemological kills. In practical terms, cyberwarfare means in ltrating,
warfare
degrading, or subverting the targets information systems
using logic bombs or computer viruses. But it also ex-
tends traditional notions of psychologica l warfare: An IW
the enemys sizein this instance computing muscleto goal may be silent penetration of the targets information
the attackers advantage. and communications system in order to shape commu-
The principles and practice of information warfare nity perceptions, foster deception, or seed uncertainty
(Table 1), though eagerly embraced by various branches what is known as epistemological , or neocortical, warfare
of the armed services (e.g., Molander et al., 1996) have (Szafranski, 1994).
potentially much wider implications for society at large in Propaganda and disinformatio n campaigns have long
a networked age, a point made in the fall 1995 issue of been staples of conventional warfare. In the battle for
the Rand Research Review, which was devoted to infor- hearts and minds, the control of broadcast technologies
mation war and cyberspace security (http://www.rand.org/ (television, radio) has been a prime objective. In one sense,
publications /RRR/RRR.fall95.cyber/). Here we consider nothing much has changed, but the picture has become
four spheres of activity in which information warfare more complicated with the emergence of the Internet and
may very soon become relatively commonplace: military, World Wide Web, which give voice to the most unlikely
corporate/economic, community/social, and personal. Cer- individual s and groups, their multidirectiona l communi-
tain IW concepts, strategies, and applications are common cation properties affording access to audiences that, un-
to all four settings, though there may be interpretative dif- der monopolisti c or oligopolisti c broadcasting conditions,
ferences, as well as differences in the perceived legality, would have remained permanently out of reach. In the in-
ethicality, and social desirability of the outcomes pursued formation age, the silent enemy can easily acquire a voice
by different actors under different conditions . Our inten- and quickly amplify its dissident message. Unidirectional
tion is to provide an analytic framework for understandin g channels are being displaced by rhizomic communication
key dimensions of information warfare and some of the patterns, which render the urge to control and censor al-
myriad social rami cations arising from the co-option of most futile.
internetworking technologies for the conduct of IW cam- Apart from the low cost of entry, the would-be at-
paigns, be they military or civil, collective or individual - tackers advantages (Table 2) include the ease, swiftness,
istic, systematic or aleatory in character. and stealth with which a determined assault can be moun-
ted, as well as the scope or reach afforded by global net-
works (Meinel, 1998). No longer need either distance or
THE MILITARY CONTEXT
the friction of the whole machine, to quote Carl von
The term information warfare is widely, though incon- Clasusewitz (1967), impair the would-be attacker. Geog-
sistently, used within the U.S. defense community, where raphy, terrain, and logistics drop out of the calculus; the
rhetorical gamesmanship and interservice rivalries are combat zone is, theoretically, anywhere on the network.
never far from the surface, as the various stakeholders Perhaps the most important element of information warfare
INFORMATION WARFARE 259

TABLE 2 or to what extent, ones systems have been penetrated


Aspects of information warfare and compromisedin military parlance, confusion as to
weapons effect, the actual damage cause by a particular
Low-intensity operations weapon or attack strategy. It can also be a challenge for the
Targeting of soft assets target to distinguis h national-scale attacks from intrusions
Asymmetrical payloads and starting ratios that are of essentially local import.
Zero warning/latency In theory, a small team of hackers (even a lone oper-
Use of logic bombs and computer viruses ator) can wreak havoc, whether the target is military or
IT sophistication correlates with pregnability civilian, as Stoll (1984) has compellingly documented.
Offensive and defensive IW Today, the U.S. Department of Defense computer sys-
Critical infrastructure vulnerability tems are subjected to hundreds of thousands of attacks
Attacker dictates rules of engagement each year (Boulanger, 1998). Fear of an electronic Pearl
Ambiguous weapons effects Harbor has stimulated public debate on the vulnerabilit y
Intelligence blind spots of the nations econotechnical information infrastructure
Premium on strategic intelligence (Schwartau, 1996) to cyber-attacks and led to the estab-
Note: IT, information technology.
lishment in 1996 of the Commission on Critical Infras-
tructure Protection (http://www.pccip.gov/). In informa-
tion technology-base d warfare, the attacker is much more
Downloaded by [UQ Library] at 03:04 11 November 2014

is the near unknowability of the attacker coupled with nag- likely to achieve strategic surprise than in conventiona l
ging uncertainty as to his driving motivations . An infor- forms of military engagement (Handel, 1995).
mation warrior, like the F16 ghter pilot who releases his
laser-guided missiles out of sight and range of the target
CORPORATE/ECONOMIC INFORMATION
(stand-off, in military terminology), can enjoy a sense of
WARFARE
impersonality and anonymity in his engagement with the
enemy (Table 3). The language of business is no less revealing. Within the
Of course, IW constitutes a double-edged sword for North American MBA (masters degree in business admin-
information-intensiv e nations like the United States. The istration) culture, for instance, competition is the dominant
greater the militarys reliance on complex networks and metaphor, and management textbooks are replete with mil-
smart weaponry, the greater is its potential vulnerabil- itary terminology and warfare analogies anking strate-
ity to stealth attack by materially much weaker enemies gies, guerrilla marketing, price wars, competitor intelli-
blessed with networking savvy, be they foreign agents or gence, killer applications , rst-strike advantage. And not
corrupted insiders. And it is this aspect of IWresource without reason: The similaritie s between the military and
asymmetricalitythat has attracted so much attention business world grow each day. Both involve competi-
among both military planners and media analysts and shif- tion between adversaries with various assets, motives, and
ted much of the discussion from offensive to defensive in- goals. Enemy surveillanc e and competitive intelligenc e are
formation warfare strategy. In addition, there is the absence de rigueur in both elds (German et al., 1991, p. 78). With
of early warning and the dif culty of knowing whether, the progressive globalizatio n of trade and international -
ization of business, the parallels will intensify (Cronin
& Crawford, 1999). Business would thus seem to be an
TABLE 3 obvious site to appropriate the discourse of information
Attacker advantages warfare, as McCrohan (1998) clearly suggests. Given the
Attacker typically invisible to target
growing dependence of companies on sophisticate d infor-

Swift strike advantage
mation systems, and, more particularly, the rapid growth

Fluidity of attack mode
of Web-based electronic commerce, it is reasonable to con-
Ability to vary frequency and intensity of attack
clude that information warfare theory will soon establish
Multiple effects available to attacker
a curricular foothold in leading business schools.
Scalability easily achieved
From the perspective of a foreign enemy, ethnoterrorist ,

Ease with which allies can be mobilized
or internal dissident, an attack on high-visibilit y corporate

Target placed in reactive mode
assets could generate as much symbolic resonance as a
Target has to contain collateral damage
full-frontal assault on a conventiona l military or civil tar-
Targets behaviors forcibly changed
get. Consider the immediate consequences and ripple
Ethical and legal ambiguities
effects of a successful cyber-attack on MasterCards

main computer system, a Trojan Horse virus inserted into
260 B. CRONIN AND H. CRAWFORD

American Airlines computerized customer reservation COMMUNITY/SOCIAL INFORMATION WARFARE


system, or systematic contamination of patient records
held in the Mayo Clinic. If such can be achieved remotely The rise of the networked society has resulted in an in-
by dedicated hackers without risk to life or limb, and with- tensi cation of debate on a vast array of social issues.
out committing tangible military resources, it is not hard to Nowhere is this online war of words more evident than
see the attraction of offensive IW strategies in the context in the United States (Cronin, 1998). Early studies show
of global economic warfare. that highly active online users are strongly libertarian in
A corollary of such presumed pregnability is heightened character and passionately convinced of the ability of busi-
corporate awareness of the need for systems integrity in ness and individuals not governmentto solve the prob-
order to prevent sabotaging of mission-critica l or propri- lems of the day (Katz, 1997). It is easy to see how group
etary information by competitor companies or foreign gov- identity can be swiftly engineered, empowered, and rein-
ernments (Fialka, 1997). Corporations have little choice forced using distributed computing: Lone voices quickly
but to commit resources to defensive information warfare nd their echo, and a sense of incipient control can soon
strategies in an effort to protect themselves against theft, crystallizethe force multiplie r effect. The step from be-
disruption , distortion , denial of service, or destruction of nign lobbying and belligerently challenging the status quo
sensitive information assets. This does not simply mean to digital anarchy is a short one.
building stronger rewalls, enhancing existing encryption What makes distribute d computing, or more speci -
procedures, or installing software that launches counter- cally the Internet, so attractive to individuals or groups
Downloaded by [UQ Library] at 03:04 11 November 2014

attacks (Yasin, 1998), but investing resources in creating interested in having their opinions heard or waging word
more effective intelligence and counterintelligenc e capa- warfare with others is the lack of restraints. Gatekeeping,
bility in an effort to anticipate likely attacks and their particularly in the public sphere, is not a new concept. The
sources (Bar-Joseph & Sheaffer, 1998). To quote Tof er colonialist s subsidized newspapers so that government in-
and Tof er (1993), knowledge warfare involves shaping formation could reach a wider audience. Printers routinely
enemy action by manipulating the ow of intelligenc e and printed what the government wanted for fear of libel and
information. In an age of economic and corporate infor- the negative economic consequences of losing their largest
mation warfare, proactive intelligenc e management sys- customer (Boorstein, 1958). The Federal Communications
tems become essential requirements for high-performing Commission (FCC) regulates the content of radio and tele-
companies, as evidenced, for example, by the growing role vision broadcasts to such a degree that some see little evi-
played by the National Counterintelligenc e Center in pro- dence of free speech, a constitutiona l guarantee and right.
viding U.S. private-sector rms with guidance and advice Government control of the Internet, however, has not fol-
on how to cope with foreign intelligence threats to their lowed that of newspapers, radio, and television. Although
business operations (http://www.nacic.gov/). there have been (and continue to be) legislative attempts to
Sometimes the enemy will be bona de consumers control Internet content (e.g., Communications Decency
with legitimate grounds for complaint. The ease with which Acts I and II), these have been thwarted by advocates of
a disgruntled customer, or group of customers, can vent free speech and intellectual freedom, notably the American
their spleen and mobilize support on the Web to chal- Civil Liberties Union (ACLU) and the American Library
lenge the reputation of a rm presents new problems for Association (ALA). Consequently, the Internet remains a
corporate public relations, marketing, and advertising de- communications arena where discourse, positive and neg-
partments. In electronic markets, shoddy goods, broken ative, rational and irrational, ourishes freely.
promises, falsity in advertising, or price gouging may be The halcyon days of networked computing saw the pro-
enough to trigger an orchestrated retaliation campaign, liferation of electronic bulletin boards like The Well. These
or class action suit, from disaffected customers versed in digital granges (town meetings) allowed individual s and
the art of Web-based information warfare. In Web wars, diverse or marginalized groups of people to exchange ideas
the vulnerabilit y of reputations (personal, product, insti- on everything from gardening tips to AIDS-related health
tutional) will be a critical variable. The Pentagon does not issues. Militant activist groups such as PETA (People for
want to be embarrassed by high-pro le hacking of its na- the Ethical Treatment of Animals) and Act Up, a gay and
tional security systems, the large tobacco companies do lesbian organization determined to attain equal rights for
not want their internal memoranda and potentially incrim- its constituents , used bulletin boards as one of their ear-
inating research papers to be posted on public Web sites liest assault weapons for inexpensive and widespread ex-
by antismoking campaigners, and university scholars do pression of their opinions. Strategy and tactics as such
do want to be victims of smear campaigns that question did not come into play; blanket disseminatio n was the
the integrity of their research and publication record or the goal. One could liken this to the Allies using B-29s to
quality of their classroom instruction . litter the German countryside with propaganda lea ets
INFORMATION WARFARE 261

during World War II. In similar vein, Microsoft employ- weaken, resulting in a plethora of competing microagen-
ees are, allegedly, encouraged to post to Z-Net articles das and localized value systems. Ten years ago, researchers
using ctional names (while pretending to be students) in with the Of ce of Technology Assessment (OTA) pre-
order to promote their companys actions and credibility dicted this possibility : Not only will new groups be es-
http: //www.zdnet.com/talkback/22 26562 108781.html. tablished outside of traditional political channels; within
Once upon a time this would have been labeled propa- existing groups, there is likely to be a shift in the chain of
ganda; today it is more likely to viewed as a defensive command . . . to the extent that electronic bulletin boards
information warfare tactic by a seemingly beleaguered are employed to target speci c people, they could lead to
corporation. the fragmentation of the body politic (OTA, 1990, p. 169).
While bulletin boards and their progeny, IRC, MUDs, For a pluralistic nation like the United States, loss of social
and MOOs, have allowed for the free exchange of ideas, cohesion and a common sense of identity could thus be the
they have also opened up the digital environment to groups ironic price of digital democracy in extremis.
keen on waging their own brand of cyberwarfare. On tra- How has this situation arisen? It is clear that delayering
ditional battle elds, soldiers use amethrowers to repel and disintermediation the loss of intervening controls,
attackers; in cyberspace, one ames enemies, real or such as editors, fact checkers, reputable publishers, so-
imagined, with ASCII text. Many Russian military songs cial lters, verifying agencies, peer reviewers, and quality
lament the raping of women and the pillaging of villages controllershave created a climate conducive to infor-
by warring Slavic tribes hundreds of years ago. Today mation warfare and cyber-terrorism. In short, it is the im-
Downloaded by [UQ Library] at 03:04 11 November 2014

one can read the story of the rst cyber-rape, which took mediacy of audience access afforded by the Internet and
place in LambdaMOO, a virtual village built out of C code Web that contributes so signi cantly to the attractiveness
(Dibbell, 1993). of do-it-yoursel f information warfare and terrorism.
With the advent of the World Wide Web and graphi-
cal user interfaces or browsers such as Netscape, social
PERSONAL INFORMATION WARFARE
and political activists have an even richer agora in which
to debate, ponti cate, or castigate (Brophy et al., 1998). Information warfare need not be restricted to group con-
Religiously or ideologically motivated groups now have texts, a fact that is little acknowledged in much of the rele-
at their disposal the means of waging electronic jihad. vant literature. Ordinary citizens are vulnerable to various
Recent use of the Web by pro-life groups in the United kinds of overt and covert attack by cyber-terrorists acting
States can be analyzed in terms of First Amendment is- alone or in concert, whether the motivation is ostensibly lu-
sues and ethicsor it can be viewed as a harbinger of dic or demonstrably criminal (Kirsner, 1998; Foote, 1999).
the imminent militarization of social and ideologica l ac- Hacker culture may dismiss electronic break-ins and im-
tivism. But the phenomenon is by no means restricted to personation as punkishly acceptable behaviors (Hafner &
the United States. In January 1999, the Indonesian govern- Markoff, 1995), but the victim will probably view matters
ment was blamed for a systematic attack on computers in differently. The sense of violation and loss of sanctuary can
the Republic of Ireland that brought down the East Timor have long-lastin g psychologica l effects. Some may even
virtual country domain. According to the target, Connect- question their belief in the First Amendment. To quote
Ireland, there were 18 simultaneous attacks on the com- Dibbell (1993, p. 41): The more seriously I took the no-
panys server by robots trying to breach the companys de- tion of virtual rape, the less seriously I was able to take the
fenses (http://news.bbc.co.uk/hi/english/sci/tech/newsid notion of freedom of speech, with its tidy division of the
263000/263169.stm) . In Indonesia, web sites have been world into the symbolic and the real. Digital media afford
attacked by campaigners protesting the treatment of that ones enemies a much richer and more powerful set of tools
countrys ethnic Chinese population (http://news.bbc.co. with which to engage in psychologica l warfare, whether
uk/hi/english/sci/tech/newsid 154000/154079.stm). at the local or global level. With estimates of e-mail traf-
Of course, the use of the Web by political or social c for the year 2000 put at 7 trillion (McHugh, 1998),
activists need not necessarily result in undesirable out- cyber-smearing or digital defamation campaigns have the
comes. There is evidence that digital communication tech- potential to reach unprecedentedly large audiences with
nologies are accelerating the emergence of a third, or great speed, in the process creating considerable frustra-
social, sector alongside the establishe d public and pri- tion and collateral damage for the victim (Table 4). The
vate sectors (Arquila & Ronfeldt, 1996). In theory, cyber- reconstitutio n of trust and salvaging of reputations in the
lobbying/activism is just as capable of producing bene - wake of virtual vili cation campaigns will likely pose ma-
cial results as it is of having a corrosive and dissipative jor challenges for targeted individual s and collectivities .
effect on society. However, given that the Web allows for As with military or business resources, an individual s
the promulgation of multiple viewpoints, there is a risk information assets and online identity are potentially highly
that the social glue that holds nation-states together may degradable by a determined hackerwhich isnt to say that
262 B. CRONIN AND H. CRAWFORD

TABLE 4 have little in common with a fundamentalist groups at-


Digital defamation and virtual tempt to bring down a commercial jumbo jet by corrupt-
vili cation ing its on-board computer system, but both actions may
be driven by, and exhibit, a common appreciation (con-
Ease, swiftness, and stealth of attack scious or otherwise) of the strategic advantages afforded by
Overt and covert options information-base d modes of attack and retaliation against
Target placed on defensive footing those whose lifestyles are dependent upon the use of com-
Extended psychological warfare plex information and communication systems. Informa-
Vulnerability and suggestibility of target tion warfare not only challenges certain conventiona l as-
Cyber-stalking and cyber-smearing sumptions about the nature of con ict and the potential
Ontological warfare possibilities bases of comparative advantage, but also illustrate s some
Jurisdictional confusion of the hidden properties and paradoxical potentialitie s (so-
cial fusion and ssion) of internetworking technologies . It
also raises a host of issues about the ethicality of offensive
anything other than a minority of individual s will ever be
information warfare and the adequacy of existing multi-
targeted in systematic fashion by information warriors/
lateral codes and conventions to accommodate these new
terrorists. Think, however, of a university researcher who
modalities.
maintains a large personal Web site containing his or her
Decoupled from their military roots, the language and
full curriculum vitae, biographical information, working
Downloaded by [UQ Library] at 03:04 11 November 2014

principles of information warfare have enormously wide


papers, and survey data sets, as well as personal details. A
applicability. The various facets of information warfare
competent hacker with a grievance against this individual
adumbrated here apply with more or less equal plausibil-
has a number of options to pursue: He or she could sys-
ity to all four vectorsmilitary, business, social, and per-
tematically corrupt the researchers data, launch a smear
sonal. Internetworking technologies and the emergence of
campaign by posting uncorroborated, though super cially
complex computational communities provide the condi-
plausible, criticisms of the individual s work on a range
tions to support multidimensiona l information warfare and
of listservs, or e-mail members of the relevant academic
net terrorism, yet much of the analytic discussion and in-
community with misinformation about the researcher.
formed punditry on the social effects of pervasive comput-
The ease with which a black public relations cam-
ing fails to give due acknowledgment to these potentially
paign can be mounted on the Internet/Web creates appre-
dystopia n effects. Research into the social effects of com-
ciable asymmetries in favor of the attacker. The target is
puting would be greatly enriched by admitting the lexicon
thrown on the defensive and left in a state of uncertainty
of information warfare and information terrorism and by
as to the attackers identity, motives, location, goals, and
exploring systematically the likely long-term implications
whether or not the attack is being mounted by an indi-
of the trends sketched in this article.
vidual or an alliance. Further, the hacker might choose to
assume the targets online persona, appropriate his or her
personal cyber-identity. Ontological warfare is thus a novel REFERENCES
option within the digital battle space, one that makes some
Adams, J. 1998. The next world war: Computers are the weapons and
postmodernis t discussion of rape and identity crises in the the front line is everywhere. New York: Simon & Schuster.
context of MUDs and other virtual fora seem tendentious Alger, J. I. 1996. Introduction. In Information warfare. Cyberterror-
by comparison (Turkle, 1995; Van Gelder, 1995). ism: Protecting your personal security in the electronic age, ed. W.
Schwartau, 2nd ed., pp. 814. New York: Thunders Mouth Press.
Arquila, J., and Ronfeldt, D. 1996. The advent of netwar. Washington,
CONCLUSIONS DC: RAND.
We have tried to show that IW thinking need not be boun- Bar-Joseph, U., and Sheaffer, Z. 1998. Surprise and its causes in busi-
ded by the discourse of the military community. The prin- ness administration and strategic studies. International Journal of
ciples of information warfare and net terrorism are be- Intelligence and Counterintelligence 11(3):331349.
Boorstein, D. J. 1958. The colonial experience. New York: Vintage
ing instantiate d in a diverse set of social contexts, though
Press.
the range of motivations and practices varies greatly. No Boulanger, A. 1998. Catapults and grappling hooks: The tools and tech-
longer are cyber-warriors using hit-and-run or scatter-gun niques of information warfare. IBM Systems Journal 37(1):106114.
assault methods. Instead, they are utilizing well-thought- Brophy, P., Craven, J., and Fisher, S. 1998. Extremism and the Inter-
out tactics and strategies to pinpoint their targets and net. Draft nal report of the EMAIN project RIC/G/421. CERLIM,
achieve their objectives in military-like fashion. Playful Manchester Metropolitan University, Manchester. Available from
hacking by a disgruntled graduate student may seem to the authors.
INFORMATION WARFARE 263

Cronin, B. 1998. Digibabble. International Journal of Information McHugh, J. 1998. The old thing behind the next big thing. Forbes 30
Management 18(1):7374. November:6874.
Cronin, B., and Crawford, H. 1999. Raising the intelligence stakes: Meinel, C. P. 1998. How hackers break in . . . and how they are caught.
Corporate information warfare and strategic surprise. Competitive Scienti c American October:98105.
Intelligence Review 10(3):5866. Molander, R. C., Riddile, A. S., and Wilson, P. A. 1996. Strategic
Cusumano, M. A., and Yof e, D. B. 1998. Competing on Internet time: information warfare: A new face of war. Santa Monica, CA: RAND.
Lessons from Netscape and its battle with Microsoft. New York: Free Of ce of Technology Assessment. 1990. Critical connections: Com-
Press. munication for the future. Washington, DC: U.S. Government Print-
De Landa, M. 1991. War in the age of intelligent machines. New York: ing Of ce.
Swerve Press. Peters, R. 1998. How Saddam won this round. Newsweek 30 Novem-
Denning, D. E. 1999. Information warfare and security. Reading, MS: ber:39.
Addison-Wesley. Schwartau, W. 1996. Information warfare. Cyberterrorism: Protecting
Dibbell, J. 1993. A rape in cyberspace or how an evil clown, a Haitian your personal security in the electronic age, 2nd ed., pp. 2742. New
trickster spirit, two wizards, and a cast of dozens turned a database York: Thunders Mouth Press.
into a society. The Village Voice 21 December:3642. Stoll, C. 1984. The cuckoos egg: Tracking a spy through the maze of
Fialka, J. F. 1997. War by other means: Economic espionage in Amer- computer espionage. New York: Doubleday.
ica. New York: Norton. Szafranski, R. 1994. Neo-cortical warfare: The acme of skill? Military
Foote, D. 1999. You could get raped: The inside story of one young Review November:4155.
womans terrifying ordeal at the hands of a cyberstalker. Newsweek Szafranski, R. 1996. An information warfare SIIOP. In Information
8 February:6465. warfare. Cyberterrorism: Protecting your personal security in the
Downloaded by [UQ Library] at 03:04 11 November 2014

German, M., Donahue, D. A., and Schnaars, S. P. 1991. A chink electronic age, ed. W. Schwartau, 2nd ed., pp. 115125. New York:
in marketings armor: Strategy above tactics. Business Horizons Thunders Mouth Press.
March/April:7478. Tof er, A. 1990. Powershift, knowledge, wealth and violence at the
Haffner, K., and Markoff, J. 1995. Cyberpunk: Outlaws and hackers edge of the 21st century. London: Bantam.
on the computer frontier. New York: Touchstone. Tof er, A., and Tof er, H. 1993. War and anti-war: Survival at the
Handel, M. I. 1995. Intelligence and the problem of strategic surprise. dawn of the 21st century. New York: Little, Brown.
In Strategic intelligence: Theory and application, 2nd ed., eds. D. H. Turkle, S. 1995. Life on the screen: Identity in the age of the Internet.
Dearth and R. T. Godden, pp. 213261. Washington, DC: US Army New York: Simon & Schuster.
War College/Defense Intelligence Agency. Van Gelder, L. 1995. The strange case of the electronic lover. In Com-
Katz, J. 1997. The digital citizen. Wired 5(12):6882, 274275. puterization and controversy: Value con icts and social choices, ed.,
Kirsner, S. 1998. Murder by Internet. Wired 6(12):210216, 266271. R. Kling, 2nd ed., pp. 533546. New York: Academic Press.
Libicki, M. C. 1995. What is information warfare? Washington, DC: von Clausewitz, C. 1967. On war, eds. M. Howard and P. Paret. Prince-
National Defense University, Institute for National Strategic Studies. ton, NJ: Princeton University Press.
McCrohan, K. F. 1998. Competitive intelligence: Preparing for the Yasin, R. 1998. The enterprise strikes back. Internet Week 7 Decem-
information war. Long Range Planning 31(4):586593. ber:1, 78.

You might also like