INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS

Authors

  • Mihai VLAICU

DOI:

https://doi.org/10.53477/1842-9904-22-6

Abstract

The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.

References

AFP. 2021. Iran-linked hackers attack Israeli targets: company. 12 16. Accessed 04 11, 2022. https://www.france24.com/en/live-news/20211216-iran-linked-hackers-attack-israeli-targets-company.

Ahronheim, Anna. 2018. Report: Hezbollah is helping Hamas build rocket factories, training camps. Report: Hezbollah is helping Hamas build rocket factories, training camps.

Al Jazeera. 2008. Hezbollah, Hamas chiefs meet to discuss Israel-Arab ties. https://www.aljazeera.com/news/2020/9/6/hezbollah-hamas-chiefs-meet-to-discuss-israel-arab-ties.

BBC News. 2017. Charting China's 'great purge' under Xi. Accessed 10 18, 2020. https://www.bbc.com/news/world-asia-china-41670162.

—. 2003. Fact file: Blackout bombs. http://news.bbc.co.uk/2/hi/americas/2865323.stm.

C.M. Melliar-Smith, M.G. Borrus, D.E. Haggan, T.Lowrey, A.S.G. Vincentelli, W.W. Troutman. 1998. "The transistor: an investitor becomes big business." Proceedings of the IEEE,Vol.86, Nr.1. IEEE. 86-110.

Crypto Museum. n.d. Colossus Birth of the digital computer. https://www.cryptomuseum.com/crypto/colossus/index.htm.

Defense Information Systems Agency. n.d. Our work, DISA 101. https://disa.mil/About/Our-Work.

Deutsche Welle. 2022. Apparent cyberattack on Israel disables government websites. 03 14. Accessed 04 11, 2022. https://p.dw.com/p/48TT7.

Dobriceanu, Mircea. 2012. Sisteme cu Microprocesoare. Craiova: Editura Universitaria.

Ellsbury, Graham. 1998. The Enigma Machine Its Construction, Operation and Complexity. http://www.ellsbury.com/enigma2.htm.

Groll, Elias. 2019. The Future Is Here, and It Features Hackers Getting Bombed. https://foreignpolicy.com/2019/05/06/the-future-is-here-and-it-features-hackers-getting-bombed/.

Hanna, Andrew. 2019. The Invisible U.S.-Iran Cyber War. https://iranprimer.usip.org/blog/2019/oct/25/invisible-us-iran-cyber-war.

Headquarters, Department of the Army. 2014. "ATP 3-36 (FM 3-36) Electronic warfare techniques." Headquarters, Department of the Army. http://www.bits.de/NRANEU/others/amd-us-archive/atp3_36%2814%29.pdf.

—. 2014. "Field Manual 3-38 Cyber electromagnetic activities." Federation of American Scientists. https://fas.org/irp/doddir/army/fm3-38.pdf.

—. 2017. "FM 3-12 Cyberspace and electronic warfare operations." Berlin Information-center for Transatlantic Security. http://www.bits.de/NRANEU/others/amd-us-archive/FM3-12%2817%29.pdf.

Israel Defence Forces. n.d. C4I and Cyber Defense Directorate. https://www.idf.il/en/minisites/c4i-and-cyber-defense-directorate/.

Joint Chiefs of Staff. 2006. "Joint Publication 3-13 Information Operations." HSDL. https://www.hsdl.org/?view&did=461648.

—. 2018. "JP 3-12 Cyberspace Operations." Berlin Information-center for Transatlantic Security. http://www.bits.de/NRANEU/others/jp-doctrine/jp3_12%282018%29.pdf.

—. 2006. "JP 3-13 Information Operations." HSDL. https://www.hsdl.org/?view&did=461648.

—. 2006. "JP 3-13 Information Operations." Joint Chiefs of Staff. http://www.bits.de/NRANEU/others/jp-doctrine/JP3_13.1%2812%29.pdf.

Keyser, Zachary. 2018. The under-reported use of Hezbollah's Internet recruitment tactics. https://www.jpost.com/middle-east/the-under-reported-use-of-hezbollahs-internet-recruitment-tactics-606682.

Kozloski, Robert. 2009. "The Information Domain as an Element of National Power." https://www.hsdl.org/?view&did=232244.

Krekel, Bryan, George Bakos, and Christopher Barnet. 2009. "Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation." National Security Archive. Accessed 10 18, 2020. https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-030.pdf.

Liang, Qiao, and Wang Xianqsui. n.d. Unrestricted Warfare. 1999: PLA Literature and Arts Publishing House.

Mann, Edward. 1994. "Desert Storm: The First Information War?" Aerospace Power Journal, Volume 8, Nr.1, 9-15. https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Volume-08_Issue-1-Se/1994_Vol8_No4.pdf.

Marsh, Allison. 2019. The Hidden Figures Behind Bletchley Park’s Code-Breaking Colossus. Accessed 10 18, 2020. https://spectrum.ieee.org/the-hidden-figures-behind-bletchley-parks-codebreaking-colossus.

Martinez, Hector. 2019. Hashtaggers For Hezbollah? How Social Media Fundraising Can Skirt The Rules. https://www.bellingcat.com/news/2019/08/27/hashtaggers-for-hezbollah-how-social-media-fundraising-can-skirt-the-rules/.

National Security Agency Central Security Service. n.d. Mission & Values. https://www.nsa.gov/about/mission-values/#:~:text=The%20National%20Security%20Agency%2FCentral,order%20to%20gain%20a%20decision.

—. n.d. "Mission & Values." National Security Agency Central Security Service. https://www.nsa.gov/about/mission-values/#:~:text=The%20National%20Security%20Agency%2FCentral,order%20to%20gain%20a%20decision.

Ni, Adam, and Bates Gill. 2019. "The People's Liberation Army Strategic Support Force: Update 2019." China Brief, Volume 19, Nr.10.

Nick-Brunetti-Lihach. 2018. Information Warfare Past, Present and Future. https://www.realcleardefense.com/articles/2018/11/14/information_warfare_past_present_and_future_113955.html.

Norman, Jeremy. n.d. ARPANET Splits into ARPANET and MILNET. https://www.historyofinformation.com/detail.php?id=976.

Perper, Rosie. 2018. Hamas reportedly created a fake dating app to lure Israeli soldiers and steal security information. https://www.businessinsider.com/hamas-fake-dating-app-scam-israeli-soldiers-honeypot-glancelove-2018-7.

Phillips, Tom. 2017. Xi Jinping becomes most powerful leader since Mao with China's change to constitution. Accessed 10 18, 2020. https://www.theguardian.com/world/2017/oct/24/xi-jinping-mao-thought-on-socialism-china-constitution.

Pomerleau, Mark. 2020. "US Army to upgrade bigger units with new electronic warfare gear." C4ISRNET. https://www.c4isrnet.com/electronic-warfare/2020/10/01/us-army-to-upgrade-bigger-units-with-new-electronic-warfare-gear/.

Pufeng, Wang. 1995. "The Challenge of Information Warfare." China Military Science. https://irp.fas.org/world/china/docs/iw_mg_wang.htm.

Reuters. 2015. After the 'Three Represents', China pushes 'Four Comprehensives'. 2020 10. Accessed 18. https://www.reuters.com/article/us-china-doctrine-idUSKBN0LU0A620150226.

Shamah, David. 2015. Official: Iran, Hamas conduct cyber-attacks against Israel. https://www.timesofisrael.com/official-iran-hamas-conduct-cyber-attacks-against-israel/.

spacewatch.global. 2017. ISRAEL'S CYBER WARFARE OUTFIT-UNIT 8200 GETS NEW COMMANDER. https://spacewatch.global/2017/04/israels-cyber-warfare-outfit-unit-8200-gets-new-commander/.

Stavridis, Virginia. 2019. Six Cybersecurity Questions Answered by the 8200 Unit. https://www.cybintsolutions.com/six-cybersecurity-questions-answered-by-the-8200-unit/.

Thales Group. n.d. Sensor to Shooter. Accessed 10 18, 2020. https://www.thalesgroup.com/en/sensor-shooter.

The Times Of Israel. 2016. Hezbollah: We hacked into Israeli security cameras. https://www.timesofisrael.com/hezbollah-we-hacked-into-israeli-security-cameras/.

The Times of Israel. 2020. Israel's alleged Natanz strike 'as complex as Stuxnet', a major blow to Iran. https://www.timesofisrael.com/israels-alleged-natanz-strike-as-complex-as-stuxnet-a-major-blow-to-iran/.

United States Cyber Command. 2018. "Achieve and Maintain Cyberspace Superiority." United States Cyber Command. https://assets.documentcloud.org/documents/4419681/Command-Vision-for-USCYBERCOM-23-Mar-18.pdf.

—. n.d. "Components." United States Cyber Command. https://www.cybercom.mil/Components.aspx#:~:text=Components&text=United%20States%20Army%20Cyber%20Command,the%20same%20to%20our%20adversaries.

—. n.d. Components. https://www.cybercom.mil/Components.aspx#:~:text=Components&text=United%20States%20Army%20Cyber%20Command,the%20same%20to%20our%20adversaries.

United States Department of Defense. 2020. "United States Department of Defense Electromagnetic Spectrum Superiority Strategy 2020." United States Department of Defense. https://media.defense.gov/2020/Oct/29/2002525927/-1/-1/0/ELECTROMAGNETIC_SPECTRUM_SUPERIORITY_STRATEGY.PDF.

United States Department of Defense-Joint Chiefs of Staff. 2021. "DOD Dictionary of Military and Associated Terms." Joint Chiefs of Staff. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf.

United States Strategic Command. 2018. JP 3-12 Cyberspace Operations. https://nsarchive.gwu.edu/dc.html?doc=2692108-Document-6.

Downloads

Published

2022-07-13

How to Cite

VLAICU, M. . (2022). INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS. Strategic Impact, 82(1), 65–78. https://doi.org/10.53477/1842-9904-22-6

Issue

Section

INFORMATION SOCIETY