1 / 15

Infowar: The U.S. Concept

Explore the evolving landscape of information warfare, including U.S. concepts and practices, cyberwar risks, and the IT-insecurity cycle. Understand the need for cyber arms control and European research policy implications. Discover options for action and the importance of collaboration between security policy studies and computer science for a secure cyber-society.

cjacobs
Download Presentation

Infowar: The U.S. Concept

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information WarfareTrends, Dangers, and the Impact for European Research PolicyDipl. Pol. Ralf Bendrath, BerlinFoG:IS ReG:ISForschungsgruppe Research GroupInformationsgesellschaft und Information Society and Sicherheitspolitik Security PolicyLecture at theGreen/EFA Research ForumEuropean Parliament, Brussels, 6 June 2001

  2. Infowar: The U.S. Concept • Goal: „information dominance“ • Targets: not adversaries´ forces, but his information flows • Means: more than just kinetic weapons • Operations Security (OPSEC) • Psychological Operations (PSYOPS) • Deception of enemy´s sensors or soldiers • Electronic Warfare • physical Attack/Destruction • „Public Affairs Activities“ (Spin Doctoring) • Civil Affairs • Computer Network Attacks (Cyberwarfare)

  3. Cyberwar: The U.S. Efforts • Goal: denying or disturbing adversary´s computer systems • Targets: military and civilian computer networks, banks, infrastructures,... • Means: digital break-ins and more: • Hacker-tools • Computer viruses & worms • Denial-of-service attacks • Insiders • Back doors • Electronic surveillance • Global network mapping

  4. Cyberwar: The U.S. practice • have done it • computer intrusions since 1980s • cyberwar waged 1991 & 1999 • part of military strategy • Joint Doctrine for Info-Operations, JP 3-13 • Field Manual 100-6 (Info Operations) • specialised military units • infowar units (since 1994, expanding) • part of combat commands (2001)

  5. Dangers of U.S. Cyberwar Plans • IT - insecurity cycle • threat to privacy • acts of war in times of peace • breaks laws of armed conflict • covert operations, hard to control • use against domestic actors? • chilling effect on digital economy • cyber-arms race • Cyberspace less safe

  6. The IT - Insecurity Cycle IT vulnerability usage of IT-security holes cyber warfare military and intelligence services

  7. Cyber Arms Control needed • to prevent cyber arms race • to secure emerging cyber-society politically possible • already proposed by other nations • computer industry would love it urgent • dynamic still slow - how long?

  8. Options for Action • political oversight • no first use • international convention on peaceful use of cyberspace • collaboration of security policy studies and computer science

  9. European Research Policy I Guiding principles • good: • observation of international conventions • ethical norms: data protection & privacy • missing: • peaceful purpose for research and development • dangers rising from new technologies • not so good: • technology is the answer - what was the question?

  10. European Research Policy II Information and communication technologies • good: • security technologies • cryptography • missing: • open source software • decentralized and diverse systems • not so good: • securing civilian infrastructures: self-healing networks or surveillance?

  11. European Research Policy III Citizens and governance in the knowledge-based society • good: • diversity of ways to the knowledge-based society • security and conflict resolution • missing: • role of new media for conflict resolution • democratic control of intelligence services & the military • not so good: • JRC-Europol cooperation in developing tools to fight cybercrime

  12. European Research Policy IV Strengthening the foundations of a European research area • good: • science & technology indicators - but not only quantitative! • missing: • technology assessment before development • indicators for preventive arms control • assessment of social and political impacts of research projects • not so good: • too bureaucratic for small groups

  13. Beyond Research Policy • continue work against ECHELON and global surveillance • establish electronic privacy as a basic human right in Europe • stop European efforts to establish own intelligence services • stop ENFOPOL / ILETS • support efforts for cyber arms control • don´t believe the „cyber terrorism“-hype

  14. It could be just junk mail, Colonel, or the beginning of a major enemy attack...

  15. See you again in Berlin? • International Conference Arms Control in CyberspacePerspectives for Peace Policy in the Age of Computer Network AttacksBerlin, 29 - 30 June 2001 www.boell.de/cyberpeace

More Related