ABSTRACT

What Is Iwar and Why Is It Important?...................................................... 244 Network-Centric Warfare............................................................................. 244 Objectives ...................................................................................................... 244 Mismatches.................................................................................................... 245 The Spectrum of Conflict ............................................................................ 245

Certainty and Intelligence................................................................... 246 Tempo and Time ..................................................................... 246

Targeting............................................................................................... 247 Interdependencies and Brittleness...................................................... 248 Economic War ..................................................................................... 249 Intensity Levels of Information War.................................................. 249

The Spectrum................................................................................................ 250 Waveforms ........................................................................................... 251 EMP Weapons...................................................................................... 252 Taking Out Swaths of the Earth ......................................................... 253 Tempest ................................................................................................ 254 Countering Tempest............................................................................ 255 Deceptions ........................................................................................... 257 Sounds and Silence.............................................................................. 257 Covert Channels .................................................................................. 258

Information Attack Tactics........................................................................... 260 Approaches and Attack Graphs.......................................................... 261 Direct Attack on Computers over Networks..................................... 263

Information Warfare Defenses..................................................................... 264 Technical Defenses............................................................................... 265 Technical Structural Defenses............................................................. 266 Technical Perception Defenses............................................................ 267 Technical Content Defenses................................................................ 269 Technical Behavioral Defenses............................................................ 270

Concluding Remarks .................................................................................... 272 References ...................................................................................................... 273

Information warfare (iwar) has been studied in various forms for a very long time, and yet the definitions of it are still varied across a wide spectrum. Let us start with a definition that has some merit.