Information war in the modern world. The concept of information war The essence of the form and types of information wars

Topic: Information wars: types, goals, methods



Introduction

1. And

2. P

Zconclusion

WITH



Introduction

The relevance of research in the field of information warfare (IW), the versatility of the forms and methods of this work in scientific and practical terms is determined by the fact that today any country in the world needs to create an effective system of state counteraction to information-psychological warfare (IW) operations. It is no secret that in our time many states consider information warfare as an effective tool for implementing foreign policy.

Information and psychological warfare makes it possible to exert an intensive influence on various processes at almost all levels of government and social structure in any country or region.

The set of problems in this area is explained by the discrepancy between the objective need to create such a system and the low degree of readiness of modern society to actively resist any attempts to manipulate public consciousness. The fact is that the mass consciousness of citizens has not yet fully formed an understanding of the threat that modern communication technologies can pose with their hidden information and psychological impact. Especially if you use them for political purposes.

Another unresolved contradiction of IPV is that information warfare uses the same latest communication technologies and basic elements and methods of communication as in other social processes. Thus, the targeted informational and psychological impact of NCT on a person is a type of social relationship, which, in our opinion, is particularly dangerous. IW is acquiring increasingly hidden forms.

There is also another issue motivating our research. We are talking about the discrepancy between the pace of development of special technologies of information-psychological aggression and technologies of psychological protection of consciousness, value systems and mental health of society.

The purpose of this work is to most fully disclose the significance of the latest communication technologies in confrontations and conflicts in modern society with an analysis of their use and use as weapons in modern information wars.

The object of the study is complex information flows, which represent the basis of such a phenomenon as modern information wars.

The subject of study is the latest communication technologies used as a means of waging information wars in modern society.

To achieve the goal set in the work, the following tasks are determined:

1. Define the essence of the concept of “information war”.

2. Identify ways to use CNT as a means of conducting information warfare.

3. Study the “front lines” of the information war.

In the first chapter "Information war: origins, types and goals information warfare“We solve the first problem: we define information wars, formulate their main goals, describe methods of warfare and types, and give examples of how information becomes a weapon.

The second chapter examines the consequences of information warfare.

The main theoretical basis is the books of S.P. Rastorguev. "Information War", Pocheptsova G.G. "Information Wars". We also consider foreign literary sources: books by E. Toffler “The Third Wave”, as well as the work of T. J. Czerwinski “The Third Wave: what the Tofflers never Told You”, which allowed us to better understand and correctly interpret the origins and prerequisites for the onset of the information era and , as a consequence - information confrontation.


1. And information warfare: origins, types and goals of information warfare

1.1 Information warfare: definition and scope of activity

Humanity has been faced with the problem of information wars at all levels since time immemorial, and bows, arrows, swords, guns and tanks, in the end, only completed the physical defeat of a community that had already been defeated in the information war.

The technological revolution led to the emergence of the term "information age" due to the fact that information systems became part of our lives and changed it radically. The information age has also changed the way warfare is conducted, providing commanders with an unprecedented quantity and quality of information. Now the commander can monitor the progress of combat operations, analyze events and communicate information.

It is necessary to distinguish between the war of the information era and the information war. Information Age warfare uses information technology as a means to successfully conduct combat operations. In contrast, information warfare views information as a distinct entity or potential weapon and as a profitable target. Information Age technologies have made possible the theoretical possibility of direct manipulation of enemy information.

Information appears based on events in the surrounding world. Events must be perceived in some way and interpreted in order to become information. Therefore, information is the result of two things - perceived events (data) and the commands required to interpret the data and associate meaning with it.

Note that this definition is absolutely not related to technology. However, what we can do with information and how quickly we can do it depends on technology. Therefore, we introduce the concept of an information function - this is any activity related to the receipt, transmission, storage and transformation of information.

The quality of information is an indicator of the difficulty of waging war. The better information the commander has, the greater his advantages over his enemy.

Thus, in the US Air Force, analysis of reconnaissance results and weather forecasts is the basis for developing a flight mission. Accurate navigation increases task efficiency. Together, they are types of military information functions that increase the effectiveness of combat operations.

Therefore, we will define military information functions - these are any information functions that ensure or improve the solution of military missions by troops.

At a conceptual level, we can say that states seek to acquire, use, and protect information that serves their purposes. These uses and protections can be in the economic, political and military spheres. Knowing the information held by the enemy is a means to enhance our power and reduce or counter the enemy's power, and to protect our assets, including our information.

Information weapons affect the information owned by the enemy and his information functions. At the same time, our information functions are protected, which allows us to reduce his will or ability to fight. Therefore, let us define information war - this is any action to use, destroy, distort enemy information and its functions; protecting our information against such actions; and the use of our own military information functions.

This definition is the basis for the following statements.

Information warfare is “the complex joint use of forces and means of information and armed warfare.

Information warfare is a communication technology to influence the enemy’s information and information systems in order to achieve information superiority in the interests of national strategy, while simultaneously protecting one’s own information and information systems.

Information warfare is only a means, not an end goal, just as bombing is a means, not an end. Information warfare can be used as a means to conduct a strategic attack or countermeasure.

The first to use the term “information warfare” was the American expert Thomas Rona in a report he prepared in 1976 for Boeing, entitled “Weapons Systems and Information Warfare.” T. Rona pointed out that information infrastructure is becoming a key component of the American economy. At the same time, it becomes a vulnerable target, both in war and peacetime. This report can be considered the first mention of the term “information war”.

The publication of T. Ron's report marked the beginning of an active media campaign. The very formulation of the problem was of great interest to the American military, which tends to deal with “secret materials.” The US Air Force began actively discussing this subject as early as 1980.

From a military point of view, the term “information war” in our time was used in the mid-80s of the 20th century. in connection with the new tasks of the US Armed Forces after the end of the Cold War. This was the result of the work of a group of American military theorists including G.E. Eccles, G.G. Summers and others. Subsequently, the term began to be actively used after Operation Desert Storm in 1991 in Iraq, where new information technologies were first used as a means of conducting combat operations. Officially, this term was first introduced in the directive of the US Secretary of Defense DODD 3600 dated December 21, 1992.

A few years later, in February 1996, the US Department of Defense introduced the "Doctrine of Combating Command and Control Systems." The publication defines counter-command and control as "the combined use of security techniques, military deception, psychological operations, electronic warfare, and physical destruction of command and control assets, supported by intelligence, to prevent the collection of information, influence, or destroy enemy command and control capabilities." over the battlefield, while protecting one's own and allied forces, and preventing the enemy from doing the same."

Most importantly, this publication defined the concept of command and control warfare. And this was the first time that the US Department of Defense defined IW capabilities and doctrine.

At the end of 1996, Robert Banker, a Pentagon expert, presented a report at one of the symposiums on the new military doctrine of the US armed forces of the 21st century (the “Force XXI” concept). It was based on the division of the entire theater of military operations into two components - traditional space and cyberspace, the latter being even more important. R. Banker proposed the doctrine of “cyber maneuver,” which should be a natural complement to traditional military concepts aimed at neutralizing or suppressing enemy armed forces.

Thus, the number of spheres of combat operations, in addition to land, sea, air and space, now includes the infosphere. As military experts emphasize, the main targets of defeat in new wars will be the enemy’s information infrastructure and psyche (even the term “human network” has appeared).

In October 1998, the US Department of Defense enacted the "Joint Information Operations Doctrine". This publication was originally called "Unified Doctrine of Information Warfare." It was later renamed the “Integrated Information Operations Doctrine.” The reason for the change was to clarify the relationship of the concepts of information operations and information warfare. They were defined as follows:

information operation: actions taken to complicate the collection, processing, transmission and storage of information by enemy information systems while protecting their own information and information systems;

information war: a complex impact (a set of information operations) on the system of state and military control of the opposing side, on its military-political leadership, which already in peacetime would lead to the adoption of decisions favorable for the party initiating the information impact, and during the conflict would completely paralyze would be the functioning of the enemy's control infrastructure.

Now there are quite a few different definitions of IW from a technical and technological point of view. In the corridors of the Pentagon, for example, there is such a humorous definition: “Information warfare is computer security plus money.”

But seriously, the military approaches IW as it was formulated in Memorandum N30 (1993) of the Deputy Secretary of Defense and the Committee of the Chiefs of Staff of the US Armed Forces.

Information warfare here refers to actions taken to achieve information superiority in support of a national military strategy by influencing enemy information and information systems while ensuring the security and protection of one's own information and information systems.

In the humanitarian sense, “information war” is understood as certain active methods of transforming the information space. In information wars of this type, we are talking about a certain system (concept) of imposing a model of the world, which is designed to ensure the desired types of behavior, about attacks on the structures of information generation, and reasoning processes.

The main forms of technical warfare are electronic warfare, warfare using electronic reconnaissance and guidance, remote targeted air strikes, psychotropic warfare, the fight against hackers, and cyber warfare.

Before seriously analyzing various definitions Information warfare from a technical point of view, we note an important property inherent in it:

waging an information war is never random or isolated, but implies coordinated activity to use information as a weapon for combat operations - be it on the real battlefield, or in the economic, political, social spheres.

Therefore, as the main and most general definition of IW, I will propose the following:

“Information warfare is a comprehensive, holistic strategy driven by the increasing importance and value of information in matters of command, control and policy.”

The field of action of information wars with this definition turns out to be quite wide and covers the following areas:

1) the infrastructure of the state’s life support systems - telecommunications, transport networks, power plants, banking systems, etc.;

2) industrial espionage - theft of proprietary information, distortion or destruction of particularly important data and services; collection of intelligence information about competitors, etc.;

3) hacking and use personal passwords VIP-persons, identification numbers, bank accounts, confidential plan data, production of disinformation;

4) electronic interference in the processes of command and control of military facilities and systems, “headquarters warfare”, disabling military communications networks;

5) the worldwide computer network Internet, in which, according to some estimates, there are 150,000 military computers, and 95% of military communication lines are open telephone lines.

Whatever the meaning of the concept of “information warfare,” it was born among the military and denotes, first of all, tough, decisive and dangerous activity comparable to real combat operations. Military experts who formulated the doctrine of information warfare clearly imagine its individual facets: these are headquarters warfare, electronic warfare, psychotronic warfare, information-psychological warfare, cyber warfare, etc.

So, information warfare is a form of conflict in which direct attacks occur on information systems to influence the knowledge or assumptions of the enemy.

Information warfare can be conducted as part of a larger and more complete set of military actions.

Thus, the threat of information warfare refers to the intention of certain forces to take advantage of the amazing capabilities hidden in computers in the vast cyber space in order to wage a “non-contact” war in which the number of casualties (in the literal sense of the word) is reduced to a minimum. “We are approaching a stage of development where no one is a soldier anymore, but everyone is a participant in hostilities,” said one of the Pentagon leaders. “The task now is not to destroy manpower, but to undermine the goals, views and worldview of the population, in destruction of society."

A civil information war can be unleashed by terrorists, drug cartels, and underground dealers in weapons of mass destruction.

The military has always tried to influence the information the enemy needs to effectively control its forces. This was usually done through maneuvers and distractions. Since these strategies affected the information received by the enemy indirectly through perception, they attacked the enemy's information indirectly. That is, for the trick to be effective, the enemy had to do three things:

act after deception in accordance with the goals of the deceiver.

However, modern means of performing information functions have made information vulnerable to direct access and manipulation. Modern technologies allow the enemy to change or create information without first obtaining the facts and interpreting them. Here is a short list of characteristics of modern information systems that lead to the emergence of such vulnerabilities: concentrated information storage, access speed, widespread information transfer, and the greater ability of information systems to perform their functions autonomously. Security mechanisms can reduce this vulnerability, but not to zero.

1.2 Components of information warfare

TO components information warfare include:

1) psychological operations - the use of information to influence the reasoning of enemy soldiers.

2) electronic warfare - does not allow the enemy to obtain accurate information

3) disinformation - provides the enemy with false information about our strengths and intentions

4) physical destruction - can be part of an information war if the goal is to influence elements of information systems.

5) security measures - we strive to avoid the enemy learning about our capabilities and intentions.

6) direct information attacks - direct distortion of information without visible change in the entity in which it is located.

As previously stated, there are two ways to influence the enemy's information functions - indirectly or directly. Let's illustrate the difference between them with an example.

Let our goal be to make the enemy think that the air regiment is located where it is not at all, and to act on the basis of this information in a way that is beneficial to us.

Indirect information attack: using engineering means, we can build mock-up aircraft and false airfield structures, and the enemy will observe the false airfield and consider it real. Only then will this information become what the enemy should have in our opinion.

Direct information attack: if we create information about a false air regiment in the enemy's information storage, the result will be exactly the same. But the means used to achieve this result will be very different.

Another example of a direct information attack could be changing information in the enemy database about existing communications during combat operations (introducing false information that bridges have been destroyed) to isolate individual enemy units. The same can be achieved by bombing bridges. In both cases, enemy analysts, making a decision based on the information they have, will make the same decision - to transfer troops through other communications.

The defensive side of information warfare is security measures aimed at protecting information - to prevent the enemy from carrying out a successful information attack on our information functions. Modern defense measures such as operational security and communications security are typical means of preventing and detecting indirect enemy actions aimed at our military information functions. On the contrary, protective measures such as computer security include actions to prevent, detect direct information actions of the enemy and organize counteractions.

1.3 Goals of information warfare

There are three goals of information warfare:

control information space, so that we can use it while protecting our military information functions from enemy actions (counterinformation).

use information control to conduct information attacks on the enemy

improve the overall effectiveness of the armed forces through the widespread use of military information functions.

Let us give a clear example of the use of an information attack when carrying out a strategic attack by the Air Force.

Suppose we want to limit the enemy's strategic ability to move troops by reducing fuel supplies. We must first identify the oil refineries that would be the most suitable targets for this attack. Then you need to determine which plants produce the most fuel. For each plant, we need to identify the location of the distillation tanks. We organize an attack and, with significant savings of forces, disable the factories by blowing up only their distillation tanks and leaving all other equipment intact. This is a classic example of a strategic attack.

Now let's see how to achieve the same goal in an information war. All modern oil refineries have large automated systems management. These information functions are potential targets in information warfare. Early in the conflict, we carried out an intelligence and information operation to infiltrate and analyze the control system of an oil refinery. During the analysis, we discovered several vulnerable information dependencies that give us the means to influence the operation of the oil refinery at the time we need. Later, during the conflict, during one of the operations to block an enemy group, we used one of the vulnerabilities. We simply stopped these factories. This is also a classic example of a strategic attack.

Information warfare must be distinguished from computer crime. Any computer crime is a violation of one or another law. It can be random, or it can be specially planned; may be isolated, or may be part of a larger attack plan. On the contrary, information warfare is never random or isolated (and may not even constitute a violation of the law), but involves a concerted effort to use information as a weapon for warfare - whether on the actual battlefield, or in the economic, political or social spheres . The theater of information warfare extends from the secret office to the home personal computer and is being waged on various fronts.

The electronic battlefield is represented by an ever-growing arsenal of electronic weapons, mostly classified. In military parlance, they are designed for combat operations in the field of command and control of troops, or "staff warfare." Recent conflicts have already demonstrated the power and destructive power of information warfare - the Gulf War and the invasion of Haiti. During the Gulf War, Allied forces on the information front carried out a range of operations ranging from the old-fashioned tactics of dropping propaganda leaflets to crippling Iraq's military communications network with a computer virus.

Infrastructure attacks target vital elements such as telecommunications or transportation systems. Similar actions may be taken by geopolitical or economic adversaries or terrorist groups. An example is the failure of AT&T's long-distance telephone exchange in 1990. These days, every bank, every power plant, every transport network and every television studio is a potential target for influence from cyberspace.

Industrial espionage and other types of intelligence threaten a great variety of covert operations carried out by corporations or states in relation to other corporations or states; for example, the collection of intelligence information about competitors, theft of proprietary information, and even acts of sabotage in the form of distortion or destruction of data. This threat is illustrated by the documented activities of French and Japanese agents throughout the eighties.

Intelligence gathering is also reaching new frontiers. Lincoln Laboratory at the Massachusetts Institute of Technology is developing an aerial reconnaissance device the size of a pack of cigarettes. Another lab is working on chemicals that can be injected into the provisions of enemy troops to allow sensors to track their movement through their breath or sweat. In addition, there are already satellite tracking systems with a resolution of several centimeters.

Privacy is increasingly vulnerable as it becomes possible to access ever-increasing amounts of information at an ever-growing number of subscriber locations. Important people can thus become the target of blackmail or malicious slander, and no one is guaranteed against fraudulent use of personal identification numbers.

Be that as it may, the term “information warfare” owes its origin to the military and denotes a brutal and dangerous activity associated with real, bloody and destructive military operations. Military experts who formulated the doctrine of information warfare clearly imagine its individual facets: headquarters warfare, electronic warfare, psychological operations, and so on.

The following definition came out of the office of the Director of Information Troops of the Ministry of Defense:

“Information warfare consists of actions taken to achieve information superiority in support of the nation's military strategy by influencing enemy information and information systems while strengthening and protecting our own information and information systems.” Information warfare is a comprehensive, holistic strategy designed to give credit to the importance and value of information in matters of command, control and execution of orders of the armed forces and the implementation of national policy. Information warfare is aimed at all the opportunities and vulnerabilities that inevitably arise with increasing dependence on information, as well as the use of information in all kinds of conflicts. The object of attention is information systems (including associated transmission lines, processing centers and the human factors of these systems), as well as the information technologies used in weapons systems. Information warfare has offensive and defensive components, but begins with the targeted design and development of its “Command, Control, Communications Architecture, computers and intelligence", providing decision-makers with tangible information superiority in all kinds of conflicts.

Many leading strategists believe that the confrontation between armies dying on the fields of general battles will very soon take its place in the dustbin of history next to spurs and crossbows. The highest form of victory now is to win without bloodshed. At the same time, it is quite difficult to imagine combat as a game on a video console without fear and pain.

Thus, the threat of information warfare refers to the intention of certain forces to take advantage of the amazing capabilities hidden in computers in the vast cyberspace in order to wage a “non-contact” war in which the number of casualties (in the literal sense of the word) is reduced to a minimum. “We are approaching a stage of development where no one is a soldier anymore, but everyone is a participant in hostilities,” said one of the Pentagon leaders. “The task now is not to destroy manpower, but to undermine the goals, views and worldview of the population, in destruction of society."

A civil information war can be unleashed by terrorists, drug cartels, and underground dealers in weapons of mass destruction. Large-scale information confrontation between public groups or states aims to change the balance of power in society.

Since such a war is related to issues of information and communications, then if you look at the root, it is a war for knowledge - for who knows the answers to the questions: what, when, where and why and how reliable does a particular society or army consider its knowledge about yourself and your opponents.

According to the definition of S.P. Rastorgueva, information war is “a purposeful, large-scale operation of subjects with meanings; creation, destruction, modification, imposition and blocking of carriers of meaning by information methods to achieve set goals." We are talking, in essence, about the work of creating one or another model of the world.

On the other hand, researchers have identified a characteristic feature of human perception, which is that a person better assimilates information that is similar to his existing ideas.

The main means of IoT are focused on this phenomenon. Any manipulations and propaganda campaigns are based on the “resonance effect,” when “implanted” information aimed at changing the behavior of a community is disguised as knowledge and stereotypes that already exist in a specific social community at which the propaganda campaign is aimed.

The purpose of the manipulation is to asynchronize the ideas of the recipient group using the “resonance effect” and transfer it to other models of behavior, oriented towards a completely different system of values.

The “resonance effect” is achieved when an artificially exaggerated meaning is given to a particular fact, problem or psychological attitude, which, as it moves into the cultural core, dissonates and destroys the existing value system in society. Dissonance is achieved by inflating one of the already existing moral norms, which, within certain limits, themselves help society.

Large-scale information confrontation between public groups or states aims to change the balance of power in society.

As American military experts point out, IW consists of actions taken to achieve information superiority in support of the national military strategy by influencing the enemy’s information and information systems while simultaneously strengthening and protecting one’s own information and information systems and infrastructure.

Information superiority is defined as the ability to collect, process and distribute a continuous flow of situational information while preventing an adversary from doing the same. It can also be defined as the ability to set and maintain a tempo of an operation that exceeds any possible tempo of the enemy, allowing one to dominate the entire time it is carried out, remaining unpredictable, and to act ahead of the enemy in his retaliatory actions.

Information superiority allows you to have a real understanding of the combat situation and provides an interactive and highly accurate picture of the actions of the enemy and friendly troops in real time. Information superiority is a tool that allows the command in decisive operations to use widely dispersed formations of heterogeneous forces, to ensure the protection of troops and the introduction into battle of groups whose composition corresponds to the tasks to the maximum extent, as well as to carry out flexible and targeted logistics support.

Information warfare is carried out by carrying out activities aimed against control and decision-making systems (Command & Control Warfare, C2W), as well as against computer and information networks and systems (Computer Network Attack, CNA).

The destructive impact on management and decision-making systems is achieved through psychological operations (Psychological Operations, PSYOP) directed against personnel and decision makers and influencing their moral stability, emotions and decision-making motives; carrying out measures for operational and strategic camouflage (OPSEC), disinformation and physical destruction of infrastructure.

In general, according to some experts, attempts to fully understand all the facets of the concept of information warfare are reminiscent of the efforts of blind people trying to understand the nature of an elephant: the one who feels its leg calls it a tree; the one who feels the tail calls it a rope, and so on. Is it possible to get a more accurate idea this way? Perhaps there is no elephant, but only trees and ropes. Some are ready to put too much under this concept, others interpret one aspect of information warfare as a concept as a whole.

However, the problem of finding an appropriate definition of this phenomenon is very serious and requires, in our opinion, the most detailed and serious study. Otherwise, you can completely share the unenviable fate of the turtle from S.P.’s fable. Rastorgueva, who “did not know and will never know that information warfare is purposefully teaching the enemy how to remove the shell from himself.”


2. P consequences of the information war

The explosion of several grenades cannot be called war, no matter who throws them. The explosion of several hydrogen bombs is already a war begun and completed.

The information propaganda of the 50s and 60s, which was carried out by the USSR and the USA, can be compared with several grenades. Therefore, no one calls the past confrontation an information war; at best, it deserves the term “cold war.”

Today, with its telecommunication computing systems and psychotechnologies, has radically changed the surrounding space. Individual streams of information turned into a continuous stream. If previously it was possible to “dam” specific information channels, today the entire surrounding space has informationally collapsed. The time for information interaction between the most distant points has approached zero. As a result, the problem of information protection, which was previously more relevant than ever, turned over like a coin, which brought to life its opposite - protection from information.

Why is it necessary to protect an information system from information? Because any information entering the system input inevitably changes the system. Targeted, deliberate information influence can lead the system to irreversible changes and self-destruction.

Therefore, an information war is nothing more than the overt and hidden targeted information impacts of systems on each other in order to obtain a certain gain in the material sphere.

Based on the above definition of information warfare, the use of information weapons means submitting to the input of an information self-learning system such a sequence of input data that activates certain algorithms in the system, and in their absence, algorithms for generating algorithms.

Creating a universal protective algorithm that allows the victim system to identify the fact of the start of an information war is an algorithmically insoluble problem. The same insoluble problems include identifying the fact of the end of the information war. However, despite the intractability of the problems of the beginning and end of an information war, the fact of defeat in it is characterized by a number of signs inherent in defeat in a conventional war. These include:

1) inclusion of part of the structure of the affected system into the structure of the winner’s system (emigration from the defeated country and, first of all, the export of the most valuable human material, high-tech production, minerals);

2) complete destruction of that part of the structure that is responsible for the security of the system from external threats (destruction of the army of the defeated country);

3) complete destruction of that part of the structure that is responsible for restoring the elements and structures of the security subsystem / destruction of production, first of all, knowledge-intensive production, as well as research centers and the entire education system; cessation and prohibition of the development and production of the most promising types of weapons);

4) destruction and destruction of that part of the structure that cannot be used by the winner for his own purposes;

5) reduction functionality defeated system by reducing its information capacity (in the case of a country: separation of part of the territory, destruction of part of the population).

Summarizing the listed characteristics, we can introduce the concept of “degree of destruction by information weapons,” assessing it through the information capacity of that part of the structure of the affected system that either died or works for purposes alien to its own system.

Information weapons will give maximum effect only when they are used against the most vulnerable parts of the ISS. The greatest information vulnerability is possessed by those subsystems that are most sensitive to input information - these are decision-making and management systems. Based on the above, we can introduce the concept of an information target. An information target is a set of elements of an information system that belong or can belong to the sphere of management and have potential resources for reprogramming to achieve goals alien to this system.

Based on the definition of the information target, the main directions of work are outlined, both to ensure its security and to increase its vulnerability. For example, in order to increase the enemy’s vulnerability, his information target should be expanded as much as possible, i.e. push it to include in the target as many equal elements as possible, and it is desirable to open access to the sphere of control to such elements that can easily be reprogrammed and externally controlled.

You can force the enemy to change his behavior with the help of obvious and hidden, external and internal information threats.

The causes of external threats in the case of targeted information influence (in the case of information war) are hidden in the struggle of competing information systems for common resources that provide the system with an acceptable mode of existence.

The causes of internal threats are the appearance within the system of many elements and substructures for which the usual mode of functioning has become unacceptable due to a number of circumstances.

A hidden threat is input data that is not recognized by the system in real time and that threatens its security.

In information warfare, the highest priority is given to hidden threats, since they are the ones that allow internal threats to be nurtured and the system to be purposefully controlled from the outside. We will call an information self-learning system totally controllable, and its behavior completely predictable over the time interval , if an algorithm of information influence (for example, a teaching method) is known that allows the system to be brought to the required result (action) x at any time t є.

Is it possible and with what accuracy to predict the behavior of an artificial intelligence system in conditions of unpredictability of its input data? The answer to this question represents in each particular case the specific result of information modeling of the behavior of a particular system. The power and quality of such models evaluate the “information muscles” of any information system. The main initial data for solving the problem of predicting the behavior of artificial intelligence systems in conditions of information external control it is knowledge about its knowledge and goals. In conclusion, I would like to emphasize once again that the information war is a war of algorithms and technologies; This is a war in which the structures of systems, as carriers of knowledge, collide. This means that an information war is a war of basic knowledge and it is waged by the bearers of this very basic knowledge. At the present stage, when the basic knowledge of mankind has been accumulated within the framework of various modern civilizations, the information war personifies the war of civilizations for a place in the sun in the face of ever-decreasing resources. It is necessary to speak openly about the techniques and methods of information warfare today because, firstly, understanding a particular technique of information warfare allows us to transfer it from the category of hidden threats to obvious ones that can already be fought, and secondly, the fact of the existence of a theory of information warfare must warn the potential victim against an idealistically naive perception of both the external and his own inner world.


Z conclusion

Public relations plays an important role in society. Initially created to inform the public about key events in the life of the country and power structures, they gradually began to perform another equally important function - influencing the consciousness of their audience in order to form a certain attitude towards the reported facts and phenomena of reality. This influence was carried out using propaganda and agitation methods developed over thousands of years.

Soon, public relations took an important place in the life of states, and with the development of technology and technology, they began to be actively used at the international level in order to acquire any advantages for the state controlled by it. Nowadays, special attention should be paid to the role of public relations in international conflicts, including those of a geopolitical nature, since last years Along with classical types of weapons, information and propaganda weapons are increasingly being used, based on working with various media.

Thus, in the course of the work done, we received answers to all the assigned tasks.

1. The advent of the information era has led to the fact that the information impact, which has existed from time immemorial in relationships between people, is now increasingly taking on the character of military operations.

2. Currently, significant experience has been accumulated in scientific research in the field of information warfare and information-psychological warfare. Whatever the meaning of the concept of “information warfare,” it was born among the military and denotes, first of all, tough, decisive and dangerous activity comparable to real combat operations. Military experts who formulated the IW doctrine clearly imagine its individual facets and types. The civilian population is not yet ready, due to social and psychological reasons, to fully feel the danger of the uncontrolled use of the CNT in the information war.

3. Information has truly become a real weapon. The February Chinese attack on Internet root servers was more than just the fun of a few hackers. This incident could become the “first salvo” in the global information war.

The information war is already in its third generation. Sergey Grinyaev, doctor technical sciences gives the following classification:

The 1st generation of information warfare is electronic warfare (electronic warfare). Wired, frequency, cellular, eavesdropping, jamming, blocking, interference, etc.;

The 2nd generation of information warfare is electronic warfare plus partisan and counter-partisan propaganda. This was the case in Chechnya in the 90s. Separatist militants had their own propaganda sites on the Internet, they distributed newspapers and combat leaflets, and organized interviews for Western journalists who sympathized with them. Counter-propaganda was carried out by means available to the federal center both in the conflict territory and adjacent territories, and to the wider public.

The 3rd generation of information warfare is a global information war; experts also call it a “war of effects.” The information war surrounding the events in South Ossetia is precisely a third generation war.

The formation of a “sanitary belt” around Russia from neighboring countries is happening through political means - carrying out color revolutions, forming government bodies and a parliamentary majority from pro-American forces, and economic means - buying up national stock exchanges, increasing American capital in key state-owned industries and companies. But in the era of the information society, the media, Internet channels and control over information flows have acquired key importance. From the presented material it is obvious that Russia in this regard lags significantly behind the United States. To form a new multipolar world order, Russia needs to take decisive action to achieve a breakthrough in the information sphere.


WITH list of used literature

1. Afanasyev V. Social information and management of society. - M.: Knowledge, 2005, - 119 p.

2. Black S. Public relations. What it is? M.: Nauka, 2007, - 256 p.

3. Vershinin M.S. Political communication in information society. M.: Jaguar, 2006, - 256 p.

4. Zverintsev A.B. Communication management: PR manager's workbook: 2nd ed., rev. - St. Petersburg: Soyuz, 2007, - 288 p.

5. Kalandarov K.Kh. Management of public consciousness. The role of communication processes. M.: Nauka, 2006, - 154 p.

6. Krutskikh A., Fedorov A. On international information security. M.: Slovo, 2008, - 234 p.

7. Malkova T.V. Masses. Elite. Leader. M.: Yauar, 2006, - 232 p.

8. Mass information in the Soviet industrial city: Experience of complex sociological research / Under the general editorship of B.A. Grushina, L.A. Okonnikova. - M.: 2006, - 347 p.

9. Pocheptsov G.G. Information wars. M.: ITs Garant, 2008, - 453 p.

10. Rastorguev S.P. Information war. M.: Nauka, 2008, - 235 p.

11. Rütinger R. Culture of Entrepreneurship. - M.: Leader, 2006, 672 p.

12. Toffler E. The Third Wave. M.: Paleya, 2007, - 458 p.

13. Tanscott D. Electronic digital society. Pros and cons of network intelligence. M.: Progress, 2006, - 673 p.

14. Techniques of disinformation and deception. - M.: Slovo, 2008, - 139 p.

15. Firsov B. Television through the eyes of a sociologist. - M. Slovo, 2008, - 418 p.

16. Hubbard L.R. Work problems. - St. Petersburg: Knowledge, 2008, - 342 p.

17. Heine P. Economic way of thinking. - M.: Slovo, 2006, - 457 p.


Tutoring

Need help studying a topic?

Our specialists will advise or provide tutoring services on topics that interest you.
Submit your application indicating the topic right now to find out about the possibility of obtaining a consultation.

UDK 07 BBK 76.0

S. A. Ivanov

Information war: essence and main forms of manifestation*

Information Warfare: Its Contents and Forms

The concept of information warfare, its essence, spheres and methods of warfare are revealed, and the approaches of various authors to its understanding are analyzed. The main directions of information wars are shown. Examining the existing points of view on the issue of the essence of information warfare, the author groups them into two approaches - the inclusion of information wars in the sphere of military clashes, on the one hand, and their assessment as a form of geopolitical confrontation, on the other. It is especially noted that the development of the Internet led to the emergence of information wars in cyberspace and made significant adjustments to the conduct of geopolitical struggle. When comparing the concepts of “information war” and “information warfare”, it is shown that some researchers equate them, while others believe that information warfare is waged more actively and using sabotage and terrorist methods. According to the author's position, information warfare is a complex of information and psychological influences, the main goal of which is to form the necessary public opinion and behavioral attitudes of the population as a whole and its individual representatives.

Keywords: information, information wars,

information warfare, geopolitics, media.

DOI 10.14258/izvasu(2013)4.2-54

The concept of information warfare, its contents, spheres and ways it is conducted and the approaches of various authors to its analysis are shown in this article. Having analyzed the trends in the study of information warfare, the author divides them into two groups: information wars considered as an essential element of military collisions, on the one hand, and information wars considered as forms of geopolitical confrontation, on the other hand. Moreover, it is especially noted that the development of the Internet led to the emergence of information wars in cyberspace and changed the methods of geopolitical struggle. When comparing the concepts of “information war” and “information antagonism”, the author shows that some researchers have considered them interchangeable, while others have disagreed to that saying information war is waged more actively using the subversive operations and terrorist methods. According to the author's opinion, information warfare is a complex of information and psychological techniques primarily aimed at creating the desired public opinion as well as individual and group behavioral patterns.

Key words: information, information warfare, geopolitical struggle, mass media.

In the first half of the twentieth century. Even science fiction writers could not imagine that after a few decades, scientific and technological progress would give humanity new means of communication that would gradually connect almost the entire world with their invisible threads. Unfortunately, this world cannot do without information wars.

“Information war” is a term that is undoubtedly important and relevant at the present stage of development of society, without a clear understanding of which it is impossible to understand the processes occurring in modern political life and geopolitics.

In the report of the UN Secretary-General (A/56/164MS.1 dated October 3, 2001), information wars were classified as the main threats to individuals, society and the state in the information space, along with such threats as the development and use of means of unauthorized interference in the information sphere another state; unlawful use of other people's information resources and causing damage to them; targeted information impact on the population of a foreign state; attempts to dominate the information space; encouragement of terrorism.

* The article was prepared with the financial support of the Ministry of Education and Science within the framework of the federal state assignment (project No. 6.3042.2011 “Comprehensive study of the development of the political and religious landscape in Southern Siberia in the context of Russian state policy”).

Researchers note that the information impact on the enemy began a long time ago. Y. S. Shatilo and V. N. Cherkasov consider myths to be the first “information attacks”. In their opinion, the troops of the next conqueror of the whole world followed the stories about their incredible cruelty, which quite seriously undermined the morale of the enemy.

The term “information warfare” was first used by T. Rona in the report “Weapons Systems and Information Warfare,” prepared by him in 1976. He emphasized that the information infrastructure is a key aspect of the American economy, but at the same time it becomes a vulnerable target in both war and peace.

According to I. N. Panarin, the starting point should be taken not in 1976, but in 1967, when A. Dulles (the main organizer of the information war against the Soviet Union) published a book called “Secret Surrender,” dedicated to secret separate negotiations between The USA and Great Britain, on the one hand, and the Reichsführer SS Himmler, on the other. It was the first to introduce the term “information warfare,” which represents personal, reconnaissance, and sabotage actions to undermine the enemy’s rear. Later, this term began to be actively mentioned in the press, especially after Operation Desert Storm in 1991.

Currently, the concept of “information warfare” is defined in different ways. This is due to the polysemy of the term “information warfare”, which has given rise to many discrepancies in its translations. It can be interpreted as “information war”, “information warfare”, “information-psychological warfare”. In particular, information warfare is characterized as information activity undertaken by a political entity (for example, a state) to weaken or destroy another political entity; as an information struggle between competing competitors; informational military conflict between two massive enemies, for example armies, etc.

When identifying the essence of information warfare, first of all, interpretations are distinguished in which this term refers to the sphere of military confrontation. In October 1998, the United States introduced the United Doctrine of Information Operations, in which information warfare is understood as a complex impact (a set of information operations) on the system of state and military control of the opposing side, its military-political leadership, which already in peacetime led would lead to the adoption of decisions favorable for the party initiating the information impact, but during the conflict it would completely paralyze

functioning of the enemy's control infrastructure. Simultaneously with the offensive impact, information warfare involves ensuring reliable protection of the US national information infrastructure.

As American military experts note, information warfare consists of actions taken to achieve information superiority in the interests of national strategy and carried out by influencing the enemy’s information and information systems while simultaneously protecting one’s own information and one’s information systems. Information superiority is defined as the ability to collect, process and distribute a continuous flow of information about the situation, preventing the enemy from doing the same.

A similar point of view is shared by S. A. Komov. In wartime, information warfare includes “a complex of information support, information countermeasures, and information defense measures taken in accordance with a single plan and aimed at achieving and maintaining information superiority over the enemy during combat operations.” In his opinion, for the armed forces the concept of information warfare has the following aspects: defining measures to obtain information about the enemy and battle conditions (for example, weather, engineering equipment, etc.), to collect information about friendly and interacting troops; determining measures to block the enemy’s process of collecting information about troops, planning measures for disinformation at all stages of combat operations; implementation of measures to organize interaction with other military contingents participating in the conflict, etc.

Within the framework of this approach, it is necessary to mention the point of view of S.P. Rastorguev, who focuses on the fact that information warfare is open and hidden targeted information impacts of information systems on each other in order to obtain a certain gain in the material sphere.

This aspect was also emphasized by specialists from the Russian Ministry of Foreign Affairs, who noted that information warfare is “a confrontation between states in the information space with the aim of causing damage to information systems, processes and resources, critical structures, undermining political, economic and social systems, as well as massive psychological processing the population in order to destabilize society and the state."

The second group of definitions interprets information warfare as a form of geopolitical counter-

struggle. Thus, L. G. Ivashov defines information confrontation as a set of relations of information protection and information rivalry between opposing geopolitical subjects.

Analyzing the current stage of development, authors, for example V. Dergachev, state that the global Internet system is turning into a factor of political and economic reality, into a means of geopolitical communication, where the mobility of information becomes a strategic resource that does not have a territorial state organization. The author notes the emergence of such a new “battlefield” of information wars as cyberspace. The information technology component, in his opinion, has made significant adjustments to geopolitics. In this regard, the modern geopolitical power of a state is determined not by material resources, but by strength of spirit. The newest geopolitics operates with “large” spaces of multidimensional connectivity, including the virtual space of the World Wide Web (cyberspace) and is armed with information and communication technologies for manipulating consciousness, allowing them to effectively wage network wars.

In a broad sense, information warfare is considered by I. Vasilenko, who defines it “as a systematic information impact on the entire infocommunication system of the enemy and neutral states with the aim of creating a favorable global information environment for conducting any political and geopolitical operations that ensure maximum control over space.”

In addition, information warfare can be understood as a new form of struggle between two or more parties. According to V.S. Pirumov, it consists of the targeted use of special means and methods of influencing the enemy’s information resources, as well as protecting one’s own information resource to achieve designated goals. The author notes that in peacetime, information warfare is predominantly covert in nature, and its main content is the conduct of reconnaissance and political-psychological actions against the enemy, and the implementation of measures for one’s own information security.

Analyzing the literature, in my opinion, it is necessary to focus on one important question: is it possible to equate information warfare with information warfare? Thus, it was noted above that an information war can be interpreted as a confrontation. However, not all authors agree with this. In particular, I. N. Panarin insists that “information warfare is a form of struggle between the parties,

which consists in influencing the information environment of the opposing party and protecting one’s own from negative information influences. The only difference between these two concepts is that information warfare is carried out more actively using sabotage and terrorist methods.”

A different point of view is held

A. V. Manoilo. In his opinion, “information war” and “information confrontation” are essentially the same thing. The term “information and psychological warfare” on Russian soil was transferred from the dictionary of US military circles and literally means “information and psychological warfare” and therefore can sound like “information warfare” or “information psychological warfare” depending on the context. At the same time, they are offered a definition of information warfare, which is consonant with the opinion of I. N. Panarin - this is the most socially dangerous form of information warfare, carried out by violent means and methods of influencing the information and psychological sphere of the enemy in order to solve strategic problems.

In this regard, there are a number of interpretations in which information warfare can be considered as information-psychological. In particular,

V. Lisichkin and L. Shelepin understand information-psychological warfare as a war of a new type, “which uses a channel of direct influence on public consciousness, on the souls of people. The task is to force the masses to act in the right direction, even against their own interests, and in the enemy’s camp to split people, to force them to stand against each other.”

S. A. Zelinsky also focuses on the fact that psychological warfare, unlike wars in which military equipment is involved, occurs in an informational way, which as a result turns out to be much more effective in reaching the audience and not causing destruction of material assets. Therefore, these concepts should not be separated, since information is the main driving mechanism for waging psychological warfare.

In this regard, the point of view of A.V. Manoilo deserves attention, defining information-psychological warfare as combat actions planned in accordance with a PR scenario, the goal of which is not the destruction of enemy manpower and equipment, but the achievement of a certain PR effect. The product of a modern information-psychological warfare operation is a summary of media news in the format of a journalistic report, due to which the necessary public opinion is formed. As a result, you can change a person’s life

ka, and if necessary, a way of existence, including the social structure of the population, the social system.

This is largely due to the fact that the decision-making processes of the mass consciousness are based on streams of entertainment information (from films to the humorous program “ProjectorParisHilton”). Therefore, information warfare is considered as a way of influencing the information space of the opposing side in order to achieve strategic goals, and it is based on propaganda.

In general, summarizing various points of view, we can formulate a definition of information warfare. Moreover, it is impossible to deduce any one de-

finition, which would fully reflect its specificity, since it is a multifaceted complex phenomenon. From my point of view, information warfare can be considered, firstly, as a military confrontation or actions taken to damage information systems, resources, and the like in order to gain information superiority. Secondly, as an information-psychological war, which involves influencing public consciousness in such a way as to force people to act against their interests. Although I believe that these two aspects are quite conditional for the reason that in both the first and second cases in an information war, the most important thing is the impact on people’s consciousness.

Bibliography

1. Krutskikh A. On the political and legal foundations of global information security [Electronic resource]. URL: http://www.intertrends.ru/thirteen/003.htm.

2. Shatilo Ya. S., Cherkasov V. N. Information wars // Information security of regions. - 2009. - No. 2 (5).

3. Grinyaev S. The concept of waging information warfare in some countries of the world [Electronic resource]. - URL: http://www.soldiering.ru/psychology/conception_psywar.php.

4. Panarin I. N. Information war: a strong shield and a sharp sword [Electronic resource]. - URL: http://www. panarin.com/comment/16111/?sphrase_id=9391.

5. Manoilo A.V. State information policy in special conditions. - M., 2003.

6. Zhukov V. Views of the US military leadership on the conduct of information warfare [Electronic resource]. - URL: http://pentagonus.ru/publ/22-1-0-175.

7. Panarin I. N. Media, propaganda and information wars [Electronic resource]. - URL: http://lib.rus. ec/b/358612/read#t32.

8. Manoilo A.V. State information policy in the conditions of information-psychological war [Electronic resource]. - URL: http://psyfactor.org/lib/psywar25.htm.

9. Krynina O. Yu. Definitions of the concept of “information war”: analysis of Russian and foreign experience

[Electronic resource]. - URL: http://lib.mkgtu.ru/images/stories/journal-nt/2009-03/015.pdf

10. Rogashova E.A. Information war of the beginning of the 21st century: new or absolutely not forgotten old? // Simbirsk Scientific Bulletin. - 2011. -No. 1 (3).

11. Dergachev V. Geopolitics of the new cyber war [Electronic resource]. - URL: http://www.dergachev.ru/analit/010411.html.

12. Vasilenko I. Information war as a factor in world politics // State Service. - 2009. - No. 3.

13. Manoilo A. V. On the issue of the content of the concept “Information War” [Electronic resource]. - URL: http://ashpi.asu.ru/ic/?p=1552.

14. Lisichkin V., Shelepin L. Third World Information-Psychological War [Electronic resource]. - URL: http://conrad2001.narod.ru/russian/library/books/wwni/ww_1.htm.

15. Zelinsky S. A. Information and psychological impact on mass consciousness. The media of mass communication, information and propaganda - as a conductor of manipulative techniques of influencing the subconscious and modeling the actions of the individual and the masses. - St. Petersburg, 2008.

16. Pocheptsov G. G. Information policy and security of modern states [Electronic resource]. - URL: http://psyfactor.org/psyops/infowar6.htm.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

ABSTRACT

INFORMATION WARS

Introduction

Conclusion

Introduction

The relevance of research in the field of information warfare (IW), the versatility of the forms and methods of this work in scientific and practical terms is determined by the fact that today any country in the world needs to create an effective system of state counteraction to information-psychological warfare (IW) operations. It is no secret that in our time many states consider information warfare as an effective tool for implementing foreign policy.

Information and psychological warfare makes it possible to exert an intensive influence on various processes at almost all levels of government and social structure in any country or region. information psychological confrontation technology

The set of problems in this area is explained by the discrepancy between the objective need to create such a system and the low degree of readiness of modern society to actively resist any attempts to manipulate public consciousness. The fact is that the mass consciousness of citizens has not yet fully formed an understanding of the threat that modern communication technologies can pose with their hidden information and psychological impact. Especially if you use them for political purposes.

There is also another issue motivating our research. We are talking about the discrepancy between the pace of development of special technologies of information-psychological aggression and technologies of psychological protection of consciousness, value systems and mental health of society.

The purpose of this work is to most fully disclose the significance of the latest communication technologies in confrontations and conflicts in modern society with an analysis of their use and use as weapons in modern information wars.

The object of the study is complex information flows, which represent the basis of such a phenomenon as modern information wars.

The subject of study is the latest communication technologies used as a means of waging information wars in modern society.

To achieve the goal set in the work, the following tasks are determined:

1. Define the essence of the concept of “information war”.

2. Identify ways to use CNT as a means of conducting information warfare.

3. Study the “front lines” of the information war.

1. The essence of information-psychological confrontation

The history of wars and the art of war clearly demonstrates that the outcome of armed events ultimately depends on two factors: material and moral. Even in ancient times, the most talented commanders clearly understood that it was necessary to fight the enemy not only with armed means, but also through targeted influence on the consciousness, will, feelings and moods of people and tried to use means of psychological influence to weaken the morale and combat power of the enemy. This took into account the simple fact that no one has ever managed to achieve the active and selfless participation of absolutely all military personnel in carrying out the combat missions assigned to them. A number of studies show that only 15-25% of them conduct targeted fire at the enemy, move across the battlefield, and carry out orders from commanders. A significant part of them, being in the grip of the instinct of self-preservation and negative experiences, often strive to avoid participating in hostilities. For this, methods such as feigning illness, self-harm, disabling military equipment, leaving the battlefield without permission under various pretexts (including for evacuating wounded colleagues to the rear), desertion, etc. are widely used. Some warriors use up the ammunition they have within the first minutes of the battle, others complete participation in the battle without using a single cartridge.

The efforts of commanders, staffs, and special bodies that have the necessary means and are proficient in methods of conducting information and psychological warfare are currently being directed to artificially induce enemy personnel to take such actions. Such confrontation in the armies of many countries is considered an independent type (method) of combat operations, allowing one to achieve military goals without the use of lethal means.

In this regard, one cannot help but note the emergence of a new phenomenon in the content of war: the blurring of the lines between military and non-military means of struggle, when the high efficiency of “information warfare” means, combined with the use of high-precision weapons and “non-military means of influence,” makes it possible to disorganize the system of government and defeat strategically important objects and troop groups, influence the psyche, suppress the morale of the population. That is, the effect of using these means is comparable to the damage caused by weapons of mass destruction.”

Recent combat events convincingly indicate that the technology of warfare aimed at achieving victory must, along with the means of destruction and physical destruction of the enemy, necessarily include special means of misinformation, reducing moral and psychological stability, paralyzing the will to resist, creating a favorable socio-political situation in the combat zone.

In this regard, the readiness of commanders, staffs, educational bodies to skillfully organize counteraction and protection of troops from the enemy’s psychological operations and information and psychological impact on the personnel of his units and formations is a necessary condition for the successful solution by units and formations of the combat missions assigned to them in modern combat .

Revolutionary changes in the field of sciences about the patterns of functioning of the human psyche, mass information processes, the widespread use of mass communication systems (satellite and cable television networks, fiber-optic communication lines and computer networks, VHF and CB radio stations), technological breakthroughs in printing technology, and advances in the field of “non-lethal” weapons are causing a sharp increase in the interest of military leaders of many armies of the world to information and psychological confrontation as an integral part of the armed struggle.

However, despite the high relevance of this problem, its theoretical justification leaves much to be desired. Currently, in literary sources, scientific works and guidance documents in our country and abroad, terms such as “psychological warfare”, “information warfare”, “psychological operations”, “psychological warfare”, “information-psychological confrontation” are widely used. "", "information-psychological counteraction and protection of troops from the enemy's psychological operations", "psychological cover of troops", "psychological protection", information-psychological support of combat operations" etc. For example, in the USA, FM field regulations are currently in force 100-6 “Information operations”, FM 33-1 “Psychological operations”, FM 31-20 “Operational technology of special warfare”, at the same time specialists are being trained in the field of information warfare. All this does not contribute to progress in understanding an objectively existing phenomenon - confrontation in the information-psychological sphere between conflicting forces.

This paper attempts to overcome conceptual contradictions and propose a consistent classification of the above-mentioned phenomena. In this case, the main attention is paid to the consideration and analysis of their psychological aspects.

The broadest of the listed concepts, in our opinion, is “information-psychological confrontation”, reflecting different levels of opposition of the conflicting parties, carried out by information and psychological means to achieve political and military goals. Such a broad interpretation of the phenomenon under consideration allows us to cover information and psychological actions. In the system of information-psychological warfare carried out for military purposes, one can distinguish phenomena classified as “information warfare” and “psychological warfare.”

An information war can be understood as the struggle of the parties to achieve superiority over the enemy in timeliness, reliability, completeness of obtaining information, speed and quality of its processing and delivery to the performers. Such a war includes the following areas of activity: obtaining the necessary information; processing of received information; protection of information channels from enemy penetration; timely and high-quality delivery of information to consumers; enemy misinformation; disabling or disrupting the functioning of enemy information acquisition, processing and dissemination systems; destruction, distortion, theft of information from the enemy; development of more effective means of working with information than the enemy’s.

Means of information warfare can be:

A) computer viruses, characterized by a high ability to penetrate programs through various channels, consolidate and reproduce in them, suppress and disable them;

b) “logical bombs”, “werewolf programs”, “information killer programs” that are introduced in advance into the information and control centers of military and civilian infrastructure, and upon a signal or at a set time, distort, destroy information or disorganize the work of software and hardware;

c) programs for unauthorized access to enemy information resources for the purpose of stealing intelligence information;

d) means of suppressing enemy information systems, entering them for the purpose of substituting information or open propaganda interference;

e) biotechnological means created on the basis of cellular engineering that disable computer boards;

f) means of introducing viruses, logic bombs, werewolf programs, information killer programs, programs to influence personnel (“zombification”), etc. into information systems (virus cannons, bookmarks in microprocessors, international computer networks, etc.).

Thus, information-psychological confrontation is a struggle between states and their armed forces to achieve superiority in the field of obtaining, processing, storing and bringing to users the necessary military, political, technical and other information, as well as in the field of moral and psychological capabilities of the nation, its army and navy in the interests of achieving political and military goals.

2. Basics of information warfare

The speed with which modern information and telecommunication technologies have burst into our lives has made it possible to talk about the “digital revolution”, which is already transforming social and economic life. The communications and information industry is undergoing fundamental changes. It took radio 38 years and television 13 years to reach 50 million people. In just 4 years, the same number of people began using the Internet.

In 1993, there were only 50 pages on the World Wide Web; today there are more than 1 billion. In 1998, only 143 million people were connected to the Internet; by 2001, the number of users reached 700 million, and currently there are about 2 billion. The Internet is already being used in a much wider area than any previously used means of communication.

Such impressive, and most importantly, lightning-fast changes have led to the fact that the desire to maintain global leadership is forcing the leadership of the world's leading countries to reconsider their approach to foreign and domestic policy.

2.1 Essence and features of information warfare

The term "information warfare" came into focus in connection with the Gulf War in 1991. This then meant disinformation and physical actions aimed at destroying Iraqi information systems - both military (radio and computer communications) and civilian (propaganda media). To this we can add Western television companies broadcasting from Iraq. Moreover, these broadcasts were not directed at the enemy, but, on the contrary, at citizens of Western countries.

After the Gulf War, theorists of “information warfare” appeared.

In August 1995, the US National Defense Institute published a classic work in the field by Martin Libicki. In it, the author identified 7 forms of information warfare:

1. Command and control in the modern sense is aimed at communication channels between command and performers and aims to deprive control.

2. Intelligence warfare - collecting militarily important information (like an attack) and protecting one's own.

3. Electronic warfare - directed against means of electronic communications - radio communications, radar stations, computer networks.

4. Psychological warfare - propaganda, brainwashing, information processing of the population. Libicki divided it into 4 components - undermining the civic spirit, demoralization of the Armed Forces, disorientation of the command and a war of cultures.

5. Hacker warfare involves sabotage actions against enemy civilian targets and protection from them (actions against the military are regarded as electronic warfare). The actions of hackers can lead to total paralysis of networks, communication interruptions, the introduction of random errors in data transfer, storage of information and services (unauthorized connections to networks), secret monitoring of networks, unauthorized access to private data for the purpose of blackmail. Hackers' weapons, according to Libicki, are computer viruses. Libicki considers hackers a serious threat to the United States, since America is the most “networked” country.

6. Economic information war. Libicki sees two of its forms - information blockade (directed against the United States) and information imperialism (the method of the United States itself). The blockade means, first of all, the blocking of commerce channels (by analogy with the ban on “physical” trade). Hacking banking networks is not included in this category (this is a category of hacker warfare). Information imperialism is part of the general policy of economic imperialism.

7. Cyber ​​warfare is different from “regular” hacking. This is the capture of computer data that allows you to track down the target (or blackmail him).

Libicki singled out semantic attacks as a special area. He sees the difference between a semantic attack and hacking in the fact that a hacker, roughly speaking, makes the system work incorrectly. In a semantic attack, the computer system works absolutely correctly, but the solutions it produces are incorrect. A semantic attack is aimed at the “sense organs” of a computer system that controls a process using sensors. To deceive these sensors or other means of input means to disable the system without breaking anything in it.

Based on the theater of operations, information warfare can be waged in various areas.

The electronic battlefield is represented by an ever-growing arsenal of electronic weapons, mostly classified. They are designed for combat operations in the field of command and control of troops, or "staff warfare."

Infrastructure attacks target vital elements such as telecommunications or transport systems. Similar actions may be taken by geopolitical or economic adversaries or terrorist groups.

Industrial espionage and other types of intelligence are carried out by corporations or states in relation to other corporations or states; for example, the collection of intelligence information about competitors, theft of proprietary information, and even acts of sabotage in the form of distortion or destruction of data or services.

Confidentiality is becoming increasingly vulnerable as ever-increasing amounts of information become available at an increasing number of locations. Important people can thus be subject to blackmail or malicious slander, and no one is guaranteed against fraudulent use of personal identification numbers.

2.2 Methods and techniques of information warfare

Information-psychological warfare has significant differences from conventional warfare aimed at physically suppressing the enemy. Its essence is influencing public consciousness in such a way as to control people and force them to act against their interests. This can be considered as a certain analogue of a viral disease. Thus, a virus that has entered a cell is integrated into the control processes of the DNA molecule. The cell externally remains the same as it was, and even the processes in it are of the same type, but the virus controls it. The disease goes through three phases: invasion, release of toxins and cell death. In psychological warfare, without introducing an analogue of a virus into the enemy’s system, no significant results can be expected. In such conditions, propaganda, espionage, and sabotage can only have an auxiliary value.

The role of the virus is played by an externally controlled “fifth column” within the country. It must penetrate into the management of public consciousness, into the ideological sphere and, like a virus in DNA, be indistinguishable from the environment.

A viral disease has a latent period, but after its end an acute stage begins - the body enters an excited, unstable state. In the same way, when organizing changes to the existing system, it is necessary to bring society to instability.

The traditional direct method of influencing consciousness is based on convincing people, appealing to their minds using rational arguments and logic. A necessary component of carrying out such an explanatory policy, addressed to the minds of people, is taking into account the real situation. At the same time, it is important to understand the balance of power, people’s interests, and conduct scientific analysis. In 1945, the great German philosopher Ernst Cassirer wrote: “To defeat the enemy, we must know him. This is one of the principles of correct strategy.” At the same time, it is necessary to take into account the state of public consciousness, i.e. give clear, catchy, understandable slogans; fight for people, for their consciousness every day.

Along with rational methods of influencing consciousness, there are methods that can be called irrational. They can be destructive, suppress rationality, and force people to serve their own ends. Here, at one time, Goebbels’ department made great achievements.

One of the effective methods - the big lie method - was successfully applied and justified by Hitler. The essence of this method is that people are more willing to believe a big lie than a small one, since it does not occur to them that they are being deceived so shamelessly. In case of failure, you should immediately look for enemies. The understanding of the masses is insignificant, but forgetfulness is excessively great. A big lie gives you time, and then no one will remember about it.

Another method used by Hitler's propaganda is based on the limited perception of people. A person does not have time to process data; he perceives excess information as noise. Therefore, simple formulations, repetition, and consolidation of a certain set of provisions play a really important role. Only the one who repeats ordinary concepts a thousand times will society want to remember.

Periodic, successive (even empty) campaigns that occupy people’s attention are quite effective. The ineffectiveness of the old ones was forgotten, and everything started all over again. The sequence of campaigns left no time for reflection and evaluation.

The third method used by Hitler is based on the fact that in the human subconscious there is a certain “herd” feeling of belonging to a certain social group that regulates the actions of individuals, which stimulates fashion, synchronization of actions, and submission to leaders. On its basis, one can successfully promote racial and religious exclusivity, the advantages of a “way of life,” and the selection of “intellectuals” over the “gray masses.”

The actions of Hitler's propaganda related to non-stationary conditions, rapidly changing events. This is when lies and rapidly changing campaigns are effective.

In all cases of influence on people's consciousness, the factor of repetition is invisibly present. The system of big (and little) lies has an effect only on a certain limited time. There is doubt in the human subconscious, the need to verify and reinforce information. Therefore, with information influence in static conditions, sending deliberately false information is unprofitable.

The method is effective when the inevitable negative aspects of a phenomenon are identified. For example, with a good professional composition of TV report frames, you can create for an audience of millions the impression of an event that is essentially the opposite of reality, focusing attention on the corresponding negative and even very rare frames.

For any information impact, the presence of truth and its certain dosage are necessary. Against this background, the necessary portions of false data may also arrive. But the most effective method is to dismember the phenomenon, highlight true, but isolated facts and identify them with the phenomenon itself, i.e. creation of a false information structure based on true facts. Complex formations of this kind are called political myths.

The introduction of political myths into consciousness makes it possible to replace a holistic worldview with a fragmented one that distorts the real picture.

Effective management of people, manipulating them with the help of information influence becomes possible only if there is feedback. The entire system of information influence can work in vain if we do not take into account the dynamics of shifts in the consciousness of the population, as well as the possibilities of surprise and unpredictability.

In developed countries, there is a continuous sounding of public opinion. There is a whole system of surveys, there is great activity in communication between deputies at various levels and voters, and much attention is paid to finding out the mindset of specific groups of the population. This makes it possible to make adjustments to propaganda and eliminate emerging discrepancies between official ideology and public consciousness.

It is noted that in parallel with the media channels acting on the “leader’s opinions”, interpersonal informal channels of information function.

In addition to the direct (or informational) methods of influencing consciousness described above, there are also indirect ones associated with influences on the functioning conditions of the brain. This is how chemical regulation in the brain can be disrupted by drugs and alcohol. Human consciousness can also be significantly influenced by electromagnetic and acoustic fields, especially in the infrared frequency range. By directing them to people concentrated in a relatively small space, their behavior can be significantly changed. The action of such fields can also be global in nature due to solar activity initiating them. Taking this into account, it is possible to program the concentration of information-psychological warfare actions.

Today, the information-cultural and information-ideological expansion of the most developed states is taking place, which leads to the transformation of culture, traditions and spiritual values ​​in the rest of the world. The issue of protecting national information resources and maintaining the confidentiality of information exchange on open world information networks. Many control systems in various areas of human activity have already become information-dependent. Disruptions to the normal functioning of computers and telecommunications can cause significant damage in the energy, financial and military sectors. Experts believe that the real national problem is not random failures, but the danger of targeted influence on information resources from the outside. That's why Information Security, information warfare and information weapons should be the focus

3. Information warfare in the modern era

Currently, according to American specialists, information warfare (IC) is not just a type of supporting the operations of the armed forces by disrupting the processes of control and command and control of troops, electronic suppression, moral and psychological impact, etc., but goes far beyond the listed problems. This is evidenced by the main results of research conducted by specialists from the American Rand Corporation in the late 90s.

In January 1995, this influential company was tasked, as part of activities carried out by the US Department of Defense, to carry out a number of research work in this area. Their goal was to determine the key characteristics and features of the use of information weapons; understanding its possible impact on national security; identifying the main areas of activity in the field of IP; strengthening national security and enhancing technological superiority in the field of creating information weapons; coordination of the activities of scientific and industrial organizations in determining the main directions for improving the strategy for ensuring the security of national information systems. The results of this work were to serve as the basis for identifying the role and place of information warfare in the US national military strategy, and a year later they were presented in the report MR-661-OSD (Strategic Information Warfare. A new face of War).

In this document, for the first time, due to the awareness of the capabilities of information weapons, the term Strategic Information Warfare - “strategic information warfare” - appeared. Such a confrontation, according to the statements of the report’s authors, represents “the use by states of the global information space and infrastructure to conduct strategic military operations and reduce the impact on their own information resource.” The emergence of such terminology differs significantly from the official interpretation of information warfare enshrined in the US Department of Defense directive DOD S 3600.1 (December 1992), which considered IP in a rather narrow sense, in the form of a semblance of electronic warfare.

The report states that changes in the socio-political life of a number of states, caused by the rapid pace of informatization and computerization of society, lead to a revision of the geopolitical views of the leadership, to the emergence of new strategic interests (including in the information sphere), which results in a change policies pursued by these countries. The authors emphasize that, taking into account the definition of war given by Clausewitz (“war is the continuation of politics by other means”), global contradictions require new means and methods for resolving them - strategic information warfare.

The conducted research made it possible to identify the following key features of this type of confrontation: the relatively low cost of creating IP means; the collapse of the status of traditional state borders during the preparation and conduct of information operations; strengthening the role of managing the perception of a situation by manipulating information according to its description; changing priorities in strategic intelligence activities, which are shifting to the area of ​​gaining and maintaining information superiority; complication of problems of detecting the beginning of an information operation; the difficulty of creating a coalition against an aggressor who has unleashed an information war (IW); presence of a potential threat to US territory.

The authors especially noted the fact that the main provisions of the US national military strategy are not adequate to the threats that arise during strategic IP. In this regard, they expressed the need to implement the following recommendations: to locate a coordination center for countering threats in the information sphere in close proximity to the president, since only in this case can the required level of coordination of the activities of all ministries and departments be ensured; assess the vulnerability of key elements of the national information infrastructure; ensure the leading role of the state in coordinating efforts to counter threats in the information sphere; make adjustments to the national security strategy and national military strategy in accordance with the specifics of conducting strategic IP. The final part of the report MR-661-OSD analyzes the expected course of the information confrontation using the example of a possible conflict between the United States and Iran in the Persian Gulf using the methodology for forecasting the development of situations previously developed at the Rand Corporation and known as “The Day After... - The next day..."

A key concept introduced in Report MR-964-OSD is the classification of strategic warfare into first and second generation. At the same time, the first generation strategic IP is considered along with traditional means of warfare (nuclear, chemical, biological and others). It is emphasized that it is more focused on disorganizing the activities of management systems and is carried out rather as ensuring the actions of traditional forces and means. The authors note that such a perception of information warfare is characteristic of the initial stage of understanding the problem. The report defines first-generation strategic IP as "...one of several components of future strategic warfare, used in conjunction with other tools to achieve a goal." Thus, the concept of “strategic information warfare of the first generation” actually incorporates the main methods of information warfare that the United States is currently implementing at the state and military levels and which it does not intend to abandon in the foreseeable future.

Further study of the problem led to the introduction of the concept of “strategic information warfare of the second generation” (2nd Generation Strategic Information Warfare). The report defines this concept as “a fundamentally new type of strategic confrontation, brought to life by the information revolution, introducing the information space and a number of other areas (primarily the economy) into the circle of possible areas of confrontation and lasting for a long time: weeks, months and years.” It is noted that the development and improvement of approaches to the conduct of second-generation strategic IP in the future may lead to a complete abandonment of the use of military force, since coordinated information campaigns may make it possible to do without this last resort. The authors emphasize that if the consequences of the first generation of strategic IP can still be predicted using existing methods, then the second generation of confrontation is currently very difficult to formalize, and existing forecasting methods can be applied to the analysis of consequences very conditionally.

As an appendix to the report, two scenarios of possible events obtained using the same “The Day After...” methodology are given. The first is based on the results of an assessment of first-generation strategic IP in the conflict between China and Taiwan in the period up to 2010. The second examines the conduct of strategic IP between Russia and the United States in the period up to 2010. This scenario is based on the fact that Russia is launching a complex operation to manipulate the economic situation in the energy market (oil and gas), designed for several years and aimed at achieving superiority over the United States by imposing its economic policy on the energy market. The operation, in addition to means of special programmatic and mathematical influence on the information systems of the credit and financial sphere of the West, manipulation of information in the media, also involves diplomatic measures of influence on other energy suppliers, as well as manipulations with the currency systems of states (euro and dollar). It is quite obvious that, despite its novelty, the concept of “second-generation information warfare” formally outlined the goals of conducting IW at the state level, which the US intelligence agencies set for themselves back during the Cold War.

However, in the context of a certain transformation of views on the problem of running an individual entrepreneur, the tasks that need to be solved to achieve the goal also change. So, for the first generation information warfare it is:

fire suppression (in wartime) of elements of the infrastructure of state and military control;

conducting electronic warfare;

obtaining intelligence information by intercepting and decoding information flows transmitted via communication channels, as well as by side emissions;

unauthorized access to information resources with their subsequent distortion or theft;

formation and mass distribution across information channels enemy or global networks disinformation to influence the assessments and intentions of decision makers;

obtaining information of interest by intercepting open sources of information.

Second generation information warfare provides a slightly different approach:

creating an atmosphere of lack of spirituality and immorality, a negative attitude towards the cultural heritage of the enemy;

manipulation of public consciousness and political orientation of social groups of the country's population in order to create political tension and chaos;

destabilization of political relations between parties, associations and movements with the aim of provoking conflicts, inciting mistrust, suspicion, aggravating political struggle, provoking repression against the opposition and even civil war;

decrease in level information support authorities and management, inspiration of erroneous management decisions;

misinformation of the population about the work of government bodies, undermining their authority, discrediting government bodies;

provoking social, political, national and religious clashes;

initiating strikes, riots and other actions of economic protest;

difficulty in making important decisions by management bodies;

causing damage to the vital interests of the state in the political, economic, defense and other spheres.

In general, it should be noted that since the late 90s, the main trend in the development of understanding of the role and place of information warfare among Rand Corporation specialists has been the awareness of the fact that strategic IP is an independent, fundamentally new type of strategic confrontation, capable of resolving conflicts without the use of armed force .

Conclusion

The world is now turning to a highly charged battleground of ideas. This is no longer the world in which the material base was the subject of fierce rivalry. In this emerging world, the key to success will be skillful management information capabilities and resources, i.e. strategic planning and management.

Based on all of the above, I am inclined to believe that the concept of “war” is not entirely suitable at the present time, since war is a complex socio-political phenomenon. It represents a confrontation between social systems, classes, nations, and states using armed violence to achieve political goals. It seems that we should not yet expect a definition of a single and clear concept of “information war.” “Information warfare” or “information warfare” are completely legal and express the struggle of the parties for superiority in the quantity, quality and speed of obtaining, analyzing and using information.

Due to the fact that the movement towards wars of a new generation is now clearly indicated, the role of information warfare is sharply increasing in the following directions: in the fight against control systems; in imposing one’s own rules of conduct of military operations on the enemy; in a stake on military-technical superiority. The pinnacle of information warfare, apparently, will be the creation of a global combat information and strike system of the country and armed forces, capable of monitoring the state and functioning of the enemy’s armed forces and groups and reducing the effectiveness of their use. Now information warfare has already become the most important content of war, but due to the forces and means used in it, as well as specific goals and objectives, it acquires both significant independence and is an element of all other forms of struggle.

Thus, information warfare should be understood as a new form of struggle between the parties, in which special methods and means are used that influence the enemy’s information environment and protect their own in the interests of achieving strategic goals.

List of used literature

1. Cohen M. N. The Food Crisis in Prehistory: Overpopulation and the Origins of Agriculture. New Haven, CT: Yale University Press, 1977. ISBN 0-300-02351-0,

2. Joint Pub 3-13 “Information Operations”, DOD US, December 1998.

3. Thomas P. Rona, “Weapon Systems and Information War”; Joint Pub 3-13.1 “Command and Control Warfare”, DOD US, February 1996;

4. Grinin L. E. Productive forces and historical process. 3rd ed. M.: KomKniga, 2006,

5. Ponomarev L. On the other side of the quantum - Moscow: Young Guard, 1971 - p. 304,

6. Petrov R.V. Conversations about new immunology - Moscow: Young Guard, 1978 - p.224,

7. Yarygin N., Biology, (in two volumes, M., 2006),

8. URL: www.Historic.Ru, World History section.

Posted on Allbest.ru

...

Similar documents

    Theoretical and scientific foundations of information warfare. Features, methods, techniques of information-psychological warfare. Information warfare in the modern era. Determining the winner in the information battle in Ossetia. Results of information wars.

    abstract, added 07/26/2009

    Concept and properties of information. Manipulation of consciousness in the system of public political relations: operations, methods, means, technologies. Causes, main signs and social danger of information-psychological warfare. The role of black PR in politics.

    course work, added 02/19/2014

    The essence and features of information warfare, methods of waging it. Types and methods of conducting information attacks. Some methods of conducting information wars proposed by M. Grigoriev in the article. Reasons for the hyperbolization of images of Russia and China in Western media.

    course work, added 09/14/2015

    Theories of information wars. The use of information weapons, means of information warfare. The role of the media in conducting information and psychological campaigns. Information struggle affecting relations between Russia and Ukraine.

    test, added 01/13/2017

    Information-psychological warfare and its properties, types and basic concepts. Goals and technologies of information-psychological warfare. Manipulation of mass consciousness through the media. The importance of information in matters of command.

    course work, added 10/08/2014

    Information-psychological warfare: types and goals of information warfare. The importance of communication technologies in social conflicts. Definition and scope of information warfare. Components, consequences of information war.

    course work, added 01/28/2010

    General theoretical problems of information wars; psychological warfare and propaganda confrontation. The phenomenon of information warfare as media influence in political life. Analysis of media materials dedicated to events in Georgia and Iraq.

    thesis, added 12/08/2009

    Concept, functions of information warfare, methods used. Methods and tools of public relations. Methods of influencing people by the media. A study of the role and importance of the media in one of the information wars at the present stage.

    course work, added 10/26/2010

    History of the emergence of news agencies. National news agencies, their role in filling the information flows of a particular state. Non-state federal news agency "REGNUM". Official website of the agency "Sportcom".

    course work, added 10/23/2014

    The main means of waging “psychological warfare” is the activity of “electronic” media (radio, television), which is due to the possibility of using techniques of the effect of presence at the epicenter of the event and the reality of what is happening.

In our time of free access to a huge amount of information, the struggle for human minds has begun to be waged in this area. By providing the society with the necessary materials and news, it is possible to control the social moods and aspirations of the majority of the population.

What is information warfare?

The term "information warfare" was originally used in American military circles. Information warfare is psychological pressure on all or part of society. Skillful presentation of the necessary information helps create certain moods and provoke a reaction. The first information about this type of war dates back to the 50s of the 19th century and concerns the Crimean War.

Information warfare can be waged both within a state and between different countries and is part of a complex process of confrontation. The presence of information pressure on society is an indicator of behind-the-scenes political actions or preparation for any changes. It does not require large financial investments and efforts. The effectiveness of information warfare depends on well-designed propaganda based on the feelings and desires of members of society.

Signs of an information war

The essence of information warfare is to influence society through information. Signs of an information war include:

  • restricting access to certain information: closing web resources, television programs, printed publications;
  • the emergence of different information sources with the same information;
  • creating a negative psychological background on specific issues;
  • the emergence of emotional tension in society;
  • penetration of implanted information into various spheres of society: politics, culture, business, education.

Information war - myth or reality

Information wars between countries have become commonplace. Although the use of information propaganda in military conflicts has been known since the 19th century, this type of warfare acquired particular power at the end of the 20th century. This is due to the increase in the number of information resources: newspapers, magazines, television shows, and web resources. The more information a society has freely available, the easier it is to carry out information propaganda.

To wage an information war, there is no need to convince people or impose your point of view on them. You just need to make sure that the suggested information comes across as often as possible and does not cause rejection. At the same time, a person may not even suspect that he has become a participant in information influence. To conduct information warfare, they hire specialists with deep knowledge of marketing, social psychology, politics and history.

Information warfare goals

Conducting an information war is one of the components of the policies of many states. The battle for human minds is not an end in itself, but refers to a set of measures to maintain the security of one’s state or to influence the citizens of another state. Based on this, information warfare has the following goals:

  • ensuring the security of your state;
  • maintaining patriotic sentiments;
  • influence on citizens of another state for the purpose of misinformation and achieving certain goals.

Types of information warfare

Information warfare can be used among the military and among civilians. For this purpose, one of the types of information warfare or a set of measures can be used. Types of information confrontation include:

  1. Information warfare on the Internet - different and often contradictory information is offered, used to confuse the enemy.
  2. Psychological operations are the selection and presentation of information that sounds like a counter-argument to the mood existing in society.
  3. Disinformation is the promotion of false information with the aim of sending the enemy side down the wrong trail.
  4. Destruction - physical destruction or blocking electronic systems, important for the enemy.
  5. Security measures - strengthening the protection of your resources in order to preserve plans and intentions.
  6. Direct information attacks are a mixture of false and true information.

Methods of information warfare

Information war is called cold because it achieves the desired results without the use of weapons. There are such methods of information warfare among civilians:

  1. Involvement of influencers. The essence of this method is to support necessary actions or slogans by famous authoritative people.
  2. Accurate statements. The desired slogans are presented as one hundred percent true and do not require proof.
  3. The winning side. Society is asked to choose a solution that is presented as the best and is winning.
  4. Compulsion. This method is often used in slogans and sounds like a precise instruction to action.
  5. Substitution of information source. When it is not possible to stop the penetration of unwanted information, its author is called a source that does not enjoy public trust.

Information warfare and propaganda

Information warfare is effectively used in the political sphere. With its help, candidates for office fight for votes. Given the fact that most voters do not have access to true information, psychological influence techniques are used to influence them. Information warfare in the media is a popular way of influencing society. In addition, political propaganda can use the method of substituting information, distorting reality, coercion, and the participation of authorities.

How to protect yourself from information warfare?

Information warfare is used in various fields, but its goal always remains constant: to influence public opinion. Countering information warfare can be difficult, because manipulation and propaganda are developed by experienced specialists. To avoid becoming a victim of information influence, you should consider the opinions of different people on the issue of interest and use diverse sources of information. When understanding a difficult situation, it is worth answering the following questions:

  1. What is the other side of this coin?
  2. Who can benefit from this information?
  3. To what extent is the issue under consideration covered from different angles?
  4. Is there a logical chain and evidence on this matter, or is there direct suggestion, coercion and influence on emotions?

Information wars in the modern world

Thanks to modern technology, the information wars of our time can be waged all over the world. At the same time, it became possible to create a reality that does not correspond to reality. Modern world information wars are waged both between states and within states, between politicians, companies, organizations, and religious denominations. The main weapon in the information war is the media. Full control over them allows us to provide society with only the information that will form the necessary view of the problem.

All military operations in the modern world are covered in the media in such a way as to show the need to wage war and create negativity among the warring parties. Recent military conflicts in Syria and Ukraine are clear examples of this. Information warfare and terrorism are also directly related. It is not possible for an ordinary person to understand what is actually happening between the warring parties.

Information wars in politics

Political struggle takes place between political parties, organizations and other political institutions. The information war in this area occurs constantly, but intensifies before government elections. Influencing society with the help of information is carried out in such a way that members of society do not notice it and believe that they are making a choice on their own.

Modern information wars in politics aim to discredit the opponent in the eyes of the public and form the necessary opinion among members of society. To solve these problems, they hire specialists in information sabotage - ivors, who carry out an attack on the opponent using various information sources. The main methods of information attacks are: editing, rumors, myths, threats, bluffs, twisting information.


Information warfare in business

Information warfare in the business system is used to weaken the position of any corporation or enterprise. To conduct a confrontation in this area, the enemy tries to collect as much information as possible on the work of the company with which he competes. Particular attention is paid weaknesses enemy. They are made public in an exaggerated form, showing the failure of the company's work.

Information war - consequences

The consequences of information wars can make themselves felt at the very beginning of the struggle. It is impossible to protect yourself from information influence, since it penetrates into all spheres of human life. The essence of information warfare lies in pressure on society, as a result of which members of society receive a distorted view of reality and are not able to draw the right conclusions and make the right decisions.

The speed with which modern information and telecommunication technologies have burst into our lives has made it possible to talk about the “digital revolution”, which is already transforming social and economic life. The communications and information industry is undergoing fundamental changes. It took radio 38 years and television 13 years to reach 50 million people. In just 4 years, the same number of people began using the Internet.

In 1993, there were only 50 pages on the World Wide Web; today there are more than 1 billion. In 1998, only 143 million people were connected to the Internet; by 2001, the number of users reached 700 million, and currently there are about 2 billion. The Internet is already being used in a much wider area than any previously used means of communication.

Such impressive, and most importantly, lightning-fast changes have led to the fact that the desire to maintain global leadership is forcing the leadership of the world's leading countries to reconsider their approach to foreign and domestic policy.

The essence and features of information warfare

The term "information warfare" came into focus in connection with the Gulf War in 1991. This then meant disinformation and physical actions aimed at destroying Iraqi information systems - both military (radio and computer communications) and civilian (propaganda media). To this we can add Western television companies broadcasting from Iraq. Moreover, these broadcasts were not directed at the enemy, but, on the contrary, at citizens of Western countries.

After the Gulf War, theorists of “information warfare” appeared.

In August 1995, the US National Defense Institute published a classic work in the field by Martin Libicki. In it, the author identified 7 forms of information warfare:

  • 1. Command and control in the modern sense is aimed at communication channels between command and performers and aims to deprive control.
  • 2. Intelligence warfare - collecting militarily important information (like an attack) and protecting one's own.
  • 3. Electronic warfare - directed against means of electronic communications - radio communications, radar stations, computer networks.
  • 4. Psychological warfare - propaganda, brainwashing, information processing of the population. Libicki divided it into 4 components - undermining the civic spirit, demoralization of the Armed Forces, disorientation of the command and a war of cultures.
  • 5. Hacker warfare involves sabotage actions against enemy civilian targets and protection from them (actions against the military are regarded as electronic warfare). The actions of hackers can lead to total paralysis of networks, communication interruptions, the introduction of random errors in data transfer, storage of information and services (unauthorized connections to networks), secret monitoring of networks, unauthorized access to private data for the purpose of blackmail. Hackers' weapons, according to Libicki, are computer viruses. Libicki considers hackers a serious threat to the United States, since America is the most “networked” country.
  • 6. Economic information war. Libicki sees two of its forms - information blockade (directed against the United States) and information imperialism (the method of the United States itself). The blockade means, first of all, the blocking of commerce channels (by analogy with the ban on “physical” trade). Hacking banking networks is not included in this category (this is a category of hacker warfare). Information imperialism is part of the general policy of economic imperialism.
  • 7. Cyber ​​warfare is different from “regular” hacking. This is the capture of computer data that allows you to track down the target (or blackmail him).

Libicki singled out semantic attacks as a special area. He sees the difference between a semantic attack and hacking in the fact that a hacker, roughly speaking, makes the system work incorrectly. In a semantic attack, the computer system works absolutely correctly, but the solutions it produces are incorrect. A semantic attack is aimed at the “sense organs” of a computer system that controls a process using sensors. To deceive these sensors or other means of input means to disable the system without breaking anything in it.

Based on the theater of operations, information warfare can be waged in various areas.

The electronic battlefield is represented by an ever-growing arsenal of electronic weapons, mostly classified. They are designed for combat operations in the field of command and control of troops, or "staff warfare."

Infrastructure attacks target vital elements such as telecommunications or transport systems. Similar actions may be taken by geopolitical or economic adversaries or terrorist groups.

Industrial espionage and other types of intelligence are carried out by corporations or states in relation to other corporations or states; for example, the collection of intelligence information about competitors, theft of proprietary information, and even acts of sabotage in the form of distortion or destruction of data or services.

Confidentiality is becoming increasingly vulnerable as ever-increasing amounts of information become available at an increasing number of locations. Important people can thus be subject to blackmail or malicious slander, and no one is guaranteed against fraudulent use of personal identification numbers.