information warfare an information management perspective n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Information Warfare an Information Management Perspective PowerPoint Presentation
Download Presentation
Information Warfare an Information Management Perspective

Loading in 2 Seconds...

play fullscreen
1 / 21

Information Warfare an Information Management Perspective - PowerPoint PPT Presentation


  • 154 Views
  • Uploaded on

Information Warfare an Information Management Perspective. JS Vorster & R P van Heerden. Research Funding: DST, CSIR DPSS. Scope. Information management – You can only manage what you have control over. IM as tool for JIW. What do we cant to achieve – Joint IW, info integration

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Information Warfare an Information Management Perspective' - calixte


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
information warfare an information management perspective

Information Warfarean Information Management Perspective

JS Vorster & R P van Heerden

Research Funding: DST, CSIR DPSS

scope
Scope
  • Information management – You can only manage what you have control over. IM as tool for JIW.
  • What do we cant to achieve – Joint IW, info integration
  • Problem statement
  • Form the definitions
  • Analytic process – ontological analysis
  • Conclusion – IW structure for Joint IW.

© CSIR 2007 www.csir.co.za

problem statement
Problem statement
  • What is the core of IW based on the underlying information model
  • This leads to a type of definition for IW that will enable better information integration and joint IW capability development.

© CSIR 2007 www.csir.co.za

iw some definitions
IW – Some definitions
  • Information warfare is actions taken to achieve information superiority in support of national military strategy by affecting adversary information and information systems while leveraging and protecting our information and information systems. Defense Information Systems Agency (DISA)
  • How about PsyOps?
  • National mil strat vs info systems? Level disparity?

© CSIR 2007 www.csir.co.za

slide5
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance that one’s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information collection opportunities to opposing forces. Wikipedia
  • All info, then sudden propaganda stuff…

© CSIR 2007 www.csir.co.za

libicki
Libicki
  • Command and Control Warfare – targeting the command systems and their communications links;
  • Intelligence Based Warfare – the use of precision munitions enabled by sensor technology and communications that are linked for near-real time targeting information;
  • Psychological warfare – changing the “hearts and minds” of by using media campaigns (television, radio, leaflets, and other methods);
  • Network Warfare – exploitation of computer networks (often called hacker warfare, computer network operations, etc.);
  • Economic Information Warfare – the use of computer technology to disrupt the electronic flow of economic transactions; and
  • Cyberwarfare – closely related to Hacker warfare but more focused on future IW technology.
  • Electronic Warfare - ?

© CSIR 2007 www.csir.co.za

scoping problems
Scoping Problems
  • What is defined as Information?
    • This leads to the universality problem (the commander, her computer, network, infrastructure, financial institution, economic system, ideological views, … what is actually outside IW?)
    • Synaptic Network – Bandwidth controlled by dopamine, network speed controlled by myelin sheath … also within the IW framework
    • PsyOps – What is the Information involved?
  • Talk of Jointness – main aim of current thinking and analysis

© CSIR 2007 www.csir.co.za

medusa in or out
Medusa.. In or Out?
  • MEDUSA (Mob Excess Deterrent Using Silent Audio)
    • NewScientist (2008/07) - Microwave ray gun controls crowds with noise
    • exploits the microwave audio effect, in which short microwave pulses rapidly heat tissue, causing a shockwave inside the skull that can be detected by the ears. A series of pulses can be transmitted to produce recognisable sounds.

© CSIR 2007 www.csir.co.za

problem statement1
Problem statement
  • What is the core of IW based on the underlying information model
  • This leads to a type of definition for IW that will enable better information integration and joint IW capability development.

© CSIR 2007 www.csir.co.za

analytic process
Analytic Process

© CSIR 2007 www.csir.co.za

what is an ontology
What is an Ontology?
  • Individuals: instances, objects
  • Classes: Sets, collections, concepts, types of objects
  • Attributes: properties, features, object parameterisation
  • Relations: objects and class relationships
  • Function terms: complex structures form from relationships
  • Restrictions: limitations on validity of objective world
  • Rules: statements in antecedent-consequent form
  • Axioms: assertions – overall theory
  • Events: changes in relationships or attributes

© CSIR 2007 www.csir.co.za

analytic process1
Analytic Process
  • Ontological Analysis
  • Concept Clustering
  • Interface classes
  • Definitions of IW (conclusions)

© CSIR 2007 www.csir.co.za

conclusions
Conclusions

© CSIR 2007 www.csir.co.za

conclusions1
Conclusions

© CSIR 2007 www.csir.co.za

slide15
Network Warfare – focusing on methods for attacking the computer system of an adversary using hacking capabilities; and defending such computer systems against similar attack.

© CSIR 2007 www.csir.co.za

slide16
Command and Control Warfare – focus on the attack of adversary command systems (including database and logistic systems, critical info infrastructure) via the use of network warfare, electromagnetic warfare or physical attack (airborne, missile, special forces) and the protection of own command systems. It also includes the improvements in decision cycles within the C2W framework.

© CSIR 2007 www.csir.co.za

slide17
Electromagnetic Warfare – focus on methods for attacking the electromagnetic communications mechanisms used for information transfer by using traditionally electronic warfare techniques; and the prevention of such attacks against own electromagnetic communications.
  • Not the entire EW

© CSIR 2007 www.csir.co.za

slide18
Intelligence Based Warfare – platform and systems optimization through improvements in sensor integration, and sensor-to-shooter loops.
  • Closed system optimization
  • Multi-sensor information integration
  • Decision support – Doctrine development
  • Attack of closed systems – disruption, affecting, etc.

© CSIR 2007 www.csir.co.za

slide19
Psychological operations – this focus on improving the relationship with neutrals, informing the enemy of facts about the current situation and supporting the longer term strategic campaign objectives.

© CSIR 2007 www.csir.co.za

slide20

Jointness – Joint information management

  • Only joint if information is somehow overlapping
  • Only directly possible with these three areas
  • Others may still use info, etc but no jointness.

© CSIR 2007 www.csir.co.za

slide21
End

© CSIR 2007 www.csir.co.za