OVERVIEW OF MILITARY TACTICS

 < Day Day Up > 



The planning, security, and intelligence considerations of military information warfare tactics (MIWT) must be present in all aspects of the military information operations (MIO) development process, as previously discussed in Chapter 12, “Fighting against Macro Threats—Defensive Strategies for Governments and Industry Groups.” These issues are fundamental to the success of MIWT.

Planning

MIWT operations, like most operations, can only be effective when adequate attention is given to the overall objective to which they are being applied. Developing an MIWT strategy requires careful adherence to planning philosophies, starting with the development of an achievable aim. The main objective of planning is to ensure that information operations within the MIWT environment are focussed on the wider military strategies and, therefore, the security objectives of the nation. This requires the development of formalized planning procedures.

Security

Military operations are most effective when they surprise an enemy. Surprise can only be achieved when security procedures deny enemy access to friendly intentions, strategies, and capabilities. This applies to the MIWT environment as much as it does to any other discipline of warfare. Security is, therefore, an issue that must be considered throughout an MIWT program. The integrity of friendly software, hardware, communications, procedures, people, and strategies is an essential part of the MIWT environment. Developing a detailed strategy for information operations is pointless if the enemy forces know the plan.

Security measures for ITS must not be reliant on one particular aspect of that system. For instance, many new systems are being created with built-in software security systems. These systems will alert users if infiltration into the system is suspected. Although these systems might be useful in highlighting the amateur infiltrator, skilful warriors may either attack the warning software before attacking the main software, or, conversely, they may attack the system via an alternative element, such as the hardware. Therefore, information security must address each of the elements of the ITS, including the people. Getting routine procedures right, and addressing the cultural issues associated with security, will often reap greater benefits than using the most elaborate software or hardware-protection devices. Information security is a significant activity in the MIWT process. Unless this activity is successfully accomplished, the rest of the MIWT effort may well be doomed to failure.

Intelligence

Intelligence provides IW practitioners with assessments of an enemy’s ITS and their likely reactions, both human- and machine-directed, following the commencement of an information attack. ITS are dynamic in nature and their configuration can be changed with minimal effort. Planning attacks against such systems requires refinement in response to such changes, often at the last minute and occasionally during an attack. Accordingly, employment of successful MIWT strategies demands comprehensive and real-time intelligence support.



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net