INFORMATION WARFARE: The Invisible War

WHAT IS INFORMATION WARFARE?

As defined by Winn Schwartau, Information Warfare: Chaos on the Electronic Superhighway (1994):

"Information Warfare is an electronic conflict in which information is a strategic asset worthy of conquest or destruction. Computers and other communications and information systems become attractive first-strike targets."

WHAT IS INFORMATION WARFARE?

The author's definition:

"Information Warfare is a war in which the weapons of warfare are not guns and bombs and bullets that visibly destroy flesh, blood and bone, but electronic and electromagnetic weapons that could:

While these claims sound too far fetched to even comprehend, they are a real possibility because of the importance of the Global Information Superhighway (GIS) and the vast amount of computers communicating with each other via the GIS.

THE INFORMATION AGE HAS ARRIVED

The United States (US) has approximately 125 million computers communicating through complex land- and satellite-based communications systems and is leading the world into a globally networked society.

The business and financial sectors of the US rely heavily upon computers and telecommunications devices:

WE HAVE BECOME VULNERABLE TARGETS

With US and world economies so dependent upon acquiring, manipulating, transferring, and managing vast amounts of information and information systems, we have all become easy targets for today's Information Warriors (IWs).

We have become "digitally addicted" to our computers and networks thereby increasing our vulnerability even more to individuals who desire and plan to hurt us as individuals, businesses, governments, and nations.

The unique history of US economics has plummeted our country into greater risk of being sabotaged economically. After all, the likelihood of another country physically attacking the US is almost zero (0). However, the US economy has become an asset of national security; and, anyone wanting to destroy the US must first destroy its economic system.

To explain this further, it is necessary to understand how the US economic system has developed throughout the last fifty years.

WITH ONE STROKE OF THE PEN

After World War II (WWII) on July 22, 1944, the US signed the Bretton Woods Agreement. For a 30-year period (1944-1974), the world's major currencies were locked onto the American dollar which, in turn, was locked onto the price of gold residing in banks and other locations in the country. Although some scholars may disagree with the economic merits of a system like this, it did maintain some form of stability within the US and the entire world because the price of a physical commodity, gold, determined the value of the US dollar.

However, on August 15, 1971, President Richard M. Nixon signed a bill that in one swift, almost unnoticed stroke of the pen entirely obliterated the dollar- backed economic structure of the US by permitting the dollar to fluctuate along with the rest of the world's currencies.

COMPUTERS DO THE TRADING AND TRACKING

Additionally, as the Global computer networks grew by leaps and bounds, each country's fluctuating currency is monitored and tracked by the buying and selling of stock options and futures traded on a 24-hour period all around the world. The world's "wall streets" now rely on computers and telecommunications networks to transact millions of dollars worth of business per second.

Literally, the price of the American dollar and the currencies of the world reside within this realm we refer to as Cyberspace-in the midst of computer systems and network cables too vast to even picture in one's mind. Consequently, with such vast sums of money-real only within the realm of Cyberspace-the wealth and survival of nations could depend solely upon:

INFORMATION WARRIOR (IW) ATTACK STRATEGIES

As discussed earlier, the IW's strategies of attack upon the information and computer systems of the US and the world are:

One does not have to be an Albert Einstein to realize the damage that could be done to the US economy if any one or more of the above events occurred at an international level. But, perhaps there is one more strategy that has not been discussed yet and not listed above-ignorance. It is our ignorance of the weapons used by IWs to accomplish their means, and it is ignorance, coupled with denial that this warfare is serious business, that will be our greatest vulnerability.

THE WEAPONS OF INFORMATION WARFARE: Computer Viruses

Most of us are familiar with computer viruses and what that can do to a computer or network system. One can even purchase a book on how to create a computer virus ("The Little Black Book of Computer Viruses" by Mark Ludwig) and similar instructions reside for free on the Internet.

Just as a physical virus makes an individual ill creating a wide variety of symptoms within the human body, a computer virus can accomplish the same goals within a computer or computer system.

Computer viruses may:

THE WEAPONS OF INFORMATION WARFARE: Sniffers

There are two ways of "sniffing" out information on a communications system:

  1. By using a Network Analyzer, a piece of test equipment (hardware) developed to analyze and diagnose problems within a network. It can also divulge secret passwords and access codes to the IW.

  2. By purchasing Commercially available Software programs that accomplish the same objective. These sniffer programs an be used on desktop PCs or laptop computers.

    IPX Permissive is available to IWs and reads and deciphers Novell network packets.

THE WEAPONS OF INFORMATION WARFARE: Passive Sniffers

By using a magnetic inductor (or also called a current probe or transducer) instead of a hardwire connection, this passive sniffing device accomplishes two goals:

  1. There is no disruption of network activities, and

  2. There is no simple way to detect the sniffer because the device is not electrically connected to the network.

Since these devices can be mounted upon public switched telephone equipment (given the right circumstances), the IW now has a vast amount of knowledge and information at his fingertips which he may use as he pleases.

THE WEAPONS OF INFORMATION WARFARE: Van Eck Detection

A computer broadcasts information into the electromagnetic spectrum that encompasses the physical air and surroundings where it is physically located. Miniature receivers placed near the computer can electromagnetically eavesdrop on television and radio signals, and voice or data communications.

Electromagnetic Eavesdropping is sometimes called Van Eck detection or radiation named after the Dutch scientist, Professor Wim van Eck, who in 1985 published an unclassified paper stating:

"...it seems justified to estimate the maximum reception distance using only a normal TV receiver at around 1km..."

Even Tempested computers were not safe from this form of electromagnetic eavesdropping.

THE WEAPONS OF INFORMATION WARFARE: Cryptography

According to the US Department of Defense (DoD), cryptography and nuclear technology are two of the most sensitive areas of scientific research because they both represent military strength.

If the IW can crack the cryptographic codes used by the Government in its daily communications business or in the banking industry for electronic transfer of funds, he can access information and money without anyone being the wiser. He could sell the information or transfer monetary funds into his own bank account within another country.

The US Government has adopted the Data Encryption Standard (DES) as the national standard for data protection. The National Security Agency (NSA) had DES classified as a "weapons system" thereby making it illegal to export DES outside the US without the approval of NSA, the Department of State and the Department of Commerce.

On the surface, it appears the US has taken strong measures to keep DES out of the hands of the wrong individuals. But, Winn Schwartau tells how DES has been exploited (1984):

"Since DES was a national standard, it was entered into the public domain and the DES algorithms were openly published for anyone to see. For the price of a stamp, any American or even a foreign national could, and can, write to NIST (National Institute of Standards and Technology) and receive a copy of the DES standard. Despite the fact that DES was controlled as a weapon, we published--and gave away free--the instruction manual and parts lists, enabling anyone and any country to build their own. That's like sending a Patriot Missile kit to Libya or Iran with a note saying, "Please don't build this."

We have just handed the IWs of the world a free course in cracking anyone's communications if they use DES. The IW would say, "Who says the best things in life aren't free?"

THE WEAPONS OF INFORMATION WARFARE: Chipping

The most important part of a computer is its Central Processing Unit (CPU), and the most important part of the CPU is the microprocessor.

THE WEAPONS OF INFORMATION WARFARE: HERF Guns and EMP/T Bombs

HERF (High Energy Radio Frequency) Guns are magnetic guns that target the electronic circuits within a computer system rather than a human being. With enough energy, an electronic weapon like this could literally "fry" a computer's hardware parts actually sending them up in smoke.

The ElectroMagnetic Pulse Transformer, or EMP/T Bomb, is identical to the HERF Gun except that it's a thousand times more powerful.

These types of weapons are nonlethal to human beings, yet they can destroy the human's ability to conduct and execute military activities rendering him helpless. They can be used to destroy aircraft by targeting the electronics. When the airplane crashes, not a trace of foulplay can be found.

CONCLUSION

The preceding information only touches upon the surface of what has become information warfare in Cyberspace. As long as human beings live and work on planet Earth, there will always be those individuals who:

We cannot stop the moving freight train transporting new technologies to our door; but, we can arm outselves with "knowledge" and "determination."