It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

War's Internet Operations

page: 1
0

log in

join
share:

posted on Mar, 27 2003 @ 07:32 PM
link   
Although information operations have been tools of warfare for centuries, the Internet and other technologies are boosting their capabilities - and the stakes. The Pentagon has already sent unsolicited e-mails to Iraqi generals, encouraging them to defect. "Warfare is less and less about pushing men and machines around the battlefield and more and more about pushing electrons and photons", said Loren Thompson, a defense analyst with the Lexington Institute in Arlington. The Pentagon has been mostly mum about what it can do and what it plans. Military analysts would not reveal specifics, fearful that Iraqis could develop countermeasures.

"One thing I can tell you for sure: People who really know about these programs can't tell you about these programs," said Bruce Berkowitz, a senior analyst with Rand Corp. But Berkowitz did spell out the goals: shape perceptions and get ahead of the enemy's decision-making intelligence through spying, jamming and deception.

Chris Prosise, a security researcher at Foundstone Inc. who formerly was assigned to the Air Force's Information Warfare Center, said the U.S. military has the same tools available to computer hackers. A virus, for instance, can create back-door openings for later break-ins.

President Bush already has signed a secret order to develop guidelines on launching cyberattacks. Once bombs start dropping, Bamford said, the military and intelligence communities will likely get all the authority they want. "They'll use this whole thing as a big training ground,'' Bamford said. "They'll experiment with everything they've been thinking about for a long time.''


Story Link



new topics
 
0

log in

join