Sunday, June 2, 2019

Development of Information Warfare Essay -- Defense Military War

Development of Information WarfareIntroductionIn his final foreign policy speech, President note Clinton listed among the United States top five military and security concerns the development of information warfare (Lacey). Given the importance of information technologies to the American economy and the U.S. militarys dependence on this system, any attacks on the information infrastructure could have severe consequences for the economy and for national security. For the U.S.s best interests, taking the initiative in defining the limits of information warfare would be beneficial. The current U.S. trend toward concerning itself publicly more with computer network defense than computer network attack has prevented an adapted public dialog on the legalities involved with information warfare. The United States must address this issue before development of information warfare technologies goes much further. settle this issue at an international level can protect the United States f rom future information warfare attacks and present opportunities to retaliate against attackers.Definition of Termsin the beginning exploring the implications of information warfare, a working definition of the term must be established. Due either to imprecision regarding information warfares specific operations or just that this form of warfare is very young, many definitions are available. The Air Forces official definition of information warfare, articulated in the Cornerstones of Information Warfare report, is any action to deny, exploit, corrupt or destroy the enemys information and its functions protecting ourselves against those actions and exploiting our own military information functions (Fogleman and Widnall). This def... ...iversity. McCoubrey, Hilaire, and Nigel D. White. International Law and build up Conflict. Dartmouth Brookfield, VT, 1992.Molander, Roger C., and Sanyin Siang. The Legitimization of Strategic Information Warfare Ethical Considerations. Prof essional Ethics Report, Vol. XI, No.4, Fall 1998. http//www.aaas.org/spp/dspp/sfrl/per/per15.htm Roberts, Adam, and Richard Guelff, eds. Documents on the Laws of War. Clarendon Press Oxford, 1982.Schwartau, Winn. Information Warfare. Thunders Mouth Press unused York, 1994.United States Space Command. U.S. Space Command Takes Charge of Computer Network Attack. 29 September 2000. http//www.spacecom.af.mil/usspace/rel15-00.htm Waltz, Edward. Information Warfare Principles and Operations. Artech House Boston, 1998.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.