ABSTRACT

One of the most comprehensive books on information warfare was authored by Dorothy E. Denning, and her exceptional analysis presented a comprehensive account of both offensive and defensive information warfare targets, methods, technologies, and policies. Denning’s interest was in operations that exploit or target information sources to gain advantage over an adversary. Her study assessed computer intrusions, intelligence operations, telecommunication eavesdropping, and electronic warfare, all with the purpose

4.1 Introduction 155 4.2 Information Warfare Theory and Application 156

4.2.1 Cyberspace 157 4.2.2 Cyber Battle Space 159 4.2.3 Offensive Operations 159 4.2.4 Defensive Operations 160

4.3 Cyber Intelligence and Counter Intelligence 163 4.3.1 Cyberspace and Cyber Intelligence 164 4.3.2 New Drone Wars 166 4.3.3 Intelligence Paradox 167 4.3.4 TOR, the Silk Road, and the Dark Net 169

4.4 DoD-The U.S. Cyber Command 171 4.4.1 Rules of Engagement and Cyber Weapons 173

4.5 Nation-State Cyber Conflicts 176 4.5.1 Cyber War I-2007 Estonia Cyber Attacks 177 4.5.2 China-PLA Colonel’s Transformational Report 178 4.5.3 America-The NSA 183

4.6 Cyber Warfare and the Tallinn Manual on International Law 192 Notes and References 195 Bibliography 196

of describing information warfare technologies and their limitations, as well as the limitations of defensive technologies.1