Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-gvvz8 Total loading time: 0 Render date: 2024-12-26T20:30:16.705Z Has data issue: false hasContentIssue false

2 - Informational Warfare: A Theoretical Approach

Published online by Cambridge University Press:  29 June 2023

Iulian Chifu
Affiliation:
National Defence University, Bucharest
Greg Simons
Affiliation:
Uppsala Universitet, Sweden
Get access

Summary

The chapter seeks to lay out the conceptual and practical foundations of information warfare in the twenty-first century. Different concepts are identified and defined, together with how they affect and influence the information and cognitive realms of global audiences. The evolution and development of information warfare is identified and analysed. In addition to establishing why the problem of information warfare exists, and at this point in time, some proposals are explored as to how to set about addressing the problem.

Type
Chapter
Information
Rethinking Warfare in the 21st Century
The Influence and Effects of the Politics, Information and Communication Mix
, pp. 20 - 57
Publisher: Cambridge University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aro, J. (2016), The Cyberspace War: Propaganda and Trolling as Warfare Tools, European View, 15(1), pp. 121132.Google Scholar
Bârgăoanu, A. (2018), Fakenews. Noua Cursă a înarmării, Bucharest: Evrika Publishing.Google Scholar
Bērziņš, J., Jaeski, A., Laity, M., Maliukevicius, N., Navys, A., Osborne, G., Pszczel, R. & Tatham, S. (2014), Analysis of Russia’s Information Campaign against Ukraine, Riga: NATO StratCom Centre of Excellence.Google Scholar
Borden, A., Colonel USAF (Ret.) (1999), What Is Information Warfare?, Aerospace Power Chronicles, 1999(11), 1–1, at www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/borden.pdf.Google Scholar
Campen, A. D., Colonel USAF (Ret.) (July 1995), Rush to Information-Based Warfare Gambles with National Security, Signal Magazine (Signal is the official publication of the Armed Forces Communications and Electronics Association (AFCEA)).Google Scholar
Canadian Security Intelligence Service (February 2018), Who Said What? The Security Challenges of Modern Disinformation, Academic Outreach, World Watch: Expert Notes series publication No. 2016-12-05, Canada, www.canada.ca/content/dam/csis-scrs/documents/publications/disinformation_post-report_eng.pdf).Google Scholar
Chifu, I. & Nantoi, O. (2016), Information Warfare: The Pattern of Aggression, Bucharest: The Publishing House of the Institute of Political Sciences and International Relations “Ion I. C. Brătianu” of the Romanian Academy.Google Scholar
Chifu, I. & Țuțuianu, S. (2017), Torn between East and West: Europe’s Border States, London and New York: Routledge.Google Scholar
Čižik, Tomáš (Ed.) (May 2017), Information Warfare – New Security Challenge for Europe, NATO PDD, Marketing and Business Group, s. r. o., www.researchgate.net/publication/322695565_Information_Warfare_-_New_Security_Challenge_for_Europe.Google Scholar
Conley, H. A., Mina, J., Stefanov, R. & Vladimirov, M. (2016), The Kremlin Playbook. Understanding Russian Influence in Central and Eastern Europe, Washington: CSIS.Google Scholar
Department of Defense (2012), Report of the Defense Science Board Task Force on Information Warfare, Defense (IW - D) Paperback – October 25.Google Scholar
Dungaciu, D. (2017), Triada Gândirii Războiului informational in Dumitrescu, L. (Ed.), Războiul informational sub lupă. Concepte, metodologie, analize, Bucharest: The Publishing House of the Institute of Political Sciences and International Relations “Ion I. C. Brătianu”.Google Scholar
Eloff, J. & Granova, A. (2009), Information Warfare in Vacca, J. R. (Ed.), Computer and Information Security Handbook, pp. 677690. Burlington: Elsevier.Google Scholar
EU Commission Communication, Tackling Online Disinformation: A European Approach, 26 April 2018, Communication of the Commission, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52018DC0236.Google Scholar
EU Open Data Portal, Flash Eurobarometer 455, 2018: 2, https://data.europa.eu/euodp/en/data/dataset/S2163_455_ENG.Google Scholar
EU Open Data Portal, Flash Eurobarometer 464, 2018, https://data.europa.eu/euodp/en/data/dataset/S2183_464_ENG.Google Scholar
European Commission (2018), Code of Practice on Disinformation, https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.Google Scholar
European Commission (26 April 2018), Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, 2018: 3, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0236&from=EN.Google Scholar
European Commission (2020), EU and Fake News, Tackling Online Disinformation, https://ec.europa.eu/digital-single-market/en/tackling-online-disinformation.Google Scholar
European Commission (2020), The European Digital Media Observatory, 2020: 2, https://ec.europa.eu/digital-single-market/en/european-digital-media-observatory.Google Scholar
European Commission (2018), Roadmaps to Implement the Code of Practice on Disinformation, 2018: 2, https://ec.europa.eu/digital-single-market/en/news/roadmaps-implement-code-practice-disinformation.Google Scholar
Farwell, J. & Arakelian, D. (December 2013), What To Do Next About Syria, www.huffingtonpost.com/james-p-farwell/what-to-do-next-aboutsyria_b_4494532.html.Google Scholar
Gardner, D. (2009), Risk. The Science and Politics of Fear, New York: Random House Group.Google Scholar
Ghosh, D. & Scott, B. (January 2018), #DigitalDeceit. The Technologies behind Precision Propaganda on the Internet, Public Interest Technology, New America, www.newamerica.org/pit/policy-papers/digitaldeceit/; https://d1y8sb8igg2f8e.cloudfront.net/documents/digital-deceit-final-v3.pdf.Google Scholar
Harari, Y. N. (2018), 21 de lecții pentru secolul XXI, Iași: Editura Polirom.Google Scholar
Huntington, S. P. (2002), Ciocnirea civilizațiilor și refacerea ordinii mondiale, Bucharest: Editura Antet, București.Google Scholar
Hutcherson, N. B. (1994), Command and Control Warfare: Putting Another Tool in the War-Fighter’s Data Base, Maxwell AFB: Air University Press.Google Scholar
Joint Staff, (1996), Joint Doctrine for Command and Control Warfare, Joint Publication, 3–13(1), 7 February.Google Scholar
Lewis, B. C. (1997), Information Warfare, Federation of American Scientists, https://fas.org/irp/eprint/snyder/infowarfare.htm.Google Scholar
Longsdale, D. J. (1999), Information Power: Strategy, Geopolitics and the Fifth Dimension, Journal of Strategic Studies, 22(2–3), pp. 137157.Google Scholar
Lucas, E. & Pomeranzev, P. (2016), Winning the Information War. Techniques and Counter-Strategies to Russian Propaganda in Central and Eastern Europe, Washington DC: CEPA’s Information Warfare Project in Partnership with Legatum Institute.Google Scholar
Lucas, E., & Nimmo, B. (November 2015), Information Warfare: What Is It and How to Win It?, CEPA Infowar Paper No 1, at chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://cepa.ecms.pl/files/?id_plik=1896.Google Scholar
Macdonald, S. (2006), Propaganda and Information Warfare in the Twenty-First Century: Altered Images and Deception Operations, London & New York: Routledge.Google Scholar
Marlatt, G. E. (2008), Information Warfare and Information Operations (IW/IO): A Bibliography, Dudley Knox Library, Naval Postgraduate School, Revised and updated January 2008, Homeland Security Digital Library, www.hsdl.org/?abstract&did=443229.Google Scholar
MEDIA – (DIS)INFORMATION – SECURITY, Defence Education Enhancement Programme (DEEP) NATO, www.nato.int/nato_static_fl2014/assets/pdf/2020/5/pdf/2005-deepportal4-information-warfare.pdf.Google Scholar
Moisi, D. (2010), The Geopolitics of Emotion, New York: Anchor Books.Google Scholar
Molander, R. C., Riddile, A. & Wilson, P. A. (1996), Strategic Information Warfare: A New Face of War. Santa Monica: RAND Corporation, www.rand.org/pubs/monograph_reports/MR661.html. (Also available in print form.)Google Scholar
Naef, W. E. (2003), Psychological Operations Interview with Larry Dietz, London: Infocon Magazine Issue One, 29 April 2003.Google Scholar
NATO (2020), NATO’s Approach to Countering Disinformation: A Focus on COVID-19, www.nato.int/cps/en/natohq/177273.htm.Google Scholar
NATO Stratcom CoE (2018), Fake News. A Roadmap, Riga, www.stratcomcoe.org/fake-news-roadmap.Google Scholar
Nichiporuk, B. (1999), US Military Opportunities: Information Warfare Concepts of Operation, Chapter 7, in Khalilzad, Z. & White, J. (Eds.), Strategic Appraisal: The Changing Role of Information in Warfare, Santa Monica, US: Rand, www.rand.org/pubs/monograph_reports/MR1016.html.Google Scholar
Nissen, T. E. (2015), #TheWeaponizationOfSocialMedia:@Characteristics_of_Contemporary_Conflicts, Royal Danish Defence College.Google Scholar
O’Shaughnessy, N. (2012), The Death and Life of Propaganda, Journal of Public Affairs, 12(1), 2938.Google Scholar
Ohlin, J. D., Govern, K. & Finkelstein, C. O. (Eds.) (2015), Cyberwar: Law and Ethics for Virtual Conflicts, Oxford: Oxford University Press.Google Scholar
Pacepa, I. M. & Rychlak, R. J. (2013), Disinformation, Chicago: WND Books.Google Scholar
Panarin, I. & Panarina, L. (2003), Information War and Peace [Информационная война и мир] Moscow: ОЛМА-ПРЕСС.Google Scholar
Payne, K. (2005), The Media as an Instrument of War, Parameters, 35(1), Spring, pp. 8193.Google Scholar
Polyakova, A., Laruelle, M., Meister, S. & Barnett, N. (2016), The Kremlin’s Trojan Horses, Washington DC: Atlantic Council.Google Scholar
Rice, C. & Zegart, A. (2018), Political Risk. Facing the Threat of Global Insecurity in the Twenty-First Century, London: Weidenfeld & Nicolson.Google Scholar
SANS Institute (2004), Global Information Assurance Certification Paper, GIAC Certifications, Information Warfare: Cyber Warfare is the Future Warfare, www.giac.org/paper/gsec/3873/information-warfare-cyber-warfare-future-warfare/106165Google Scholar
Scheidt, M. (2019), The European Union Versus External Disinformation Campaigns in the Midst of Information Warfare: Ready for the Battle?, College of Europe, EU Diplomacy Papers, 1/2019.Google Scholar
Shannon, C. E. (1948), A Mathematical Theory of Communications, Bell Syst. Tech. J., 27, 379423.Google Scholar
Simons, G. (2010), Mass Media and Modern Warfare: Reporting on the Russian War on Terrorism, Farnham: Ashgate.Google Scholar
Simons, G. & Chifu, I. (2017), The Changing Face of Warfare in the 21st Century, London and New York: Routledge.Google Scholar
Stern, E. (1999), Crisis Decision Making. A Cognitive Institutional Approach, Stockholm: Dept. of Political Science, University of Stockholm.Google Scholar
Stupples, D. (December 2015), What Is Information Warfare?, World Economic Forum, www.weforum.org/agenda/2015/12/what-is-information-warfare/.Google Scholar
Tandoc, E. & Wei, L. & Ling, R. (2018), Defining “Fake News”: A Typology of Scholarly Definitions, Digital Journalism, 6(2): “Trust, Credibility, Fake News”.Google Scholar
Tenet, G. J. (24 June 1998), “Testimony by Director of Central Intelligence” before the Senate Committee on Government Affairs,www.cia.gov/.Google Scholar
The Military Doctrine of The Russian Federation (2014), www.rusemb.org.uk/press/2029.Google Scholar
Thomas, T. (2014), Russia’s Information Warfare Strategy: Can the Nation Cope in Future Conflicts?, The Journal of Slavic Military Studies, 27(1), pp. 101130. DOI: 10.1080/13518046.2014.874845.Google Scholar
Thornton, R. (2015), The Changing Nature of Modern Warfare. Responding to Russian Information Warfare, The RUSI Journal, 160(4), pp. 4048. DOI: 10.1080/03071847.2015.1079047CrossRefGoogle Scholar
UNESCO (2018), Journalism, “Fake News” and Disinformation: A Handbook for Journalism Education and Training, UNESCO, https://en.unesco.org/sites/default/files/journalism_fake_news_disinformation_print_friendly_0_0.pdf.Google Scholar
Wardle, C. & Derakhshan, H. (2017), Information Disorder: Toward an Interdisciplinary Framework for Research and Policy Making, Strasbourg: Council of Europe, https://rm.coe.int/information-disorder-toward-an-interdisciplinary-framework-for-researc/168076277c.Google Scholar
Widnall, S. E. & Fogelman, R. R. (1997), Cornerstones of Information Warfare, US Air Force.Google Scholar
Williams, H. J. & Blum, I. (2018), Defining Second Generation Open Source Intelligence (OSINT) for the Defence Enterprise, Santa Monica: RAND, www.rand.org/pubs/research_reports/RR1964.html.Google Scholar
Winston, W. B. (1997), Bits, Bytes and Diplomacy, Foreign Affairs, 76(5), pp. 172182.Google Scholar
Zhukov, M. Y. & Baum, M. A. (2016), Reporting Bias and Information Warfare, International Studies Association Annual Convention Atlanta, GA.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×