REAL

Information Warfare Tactics and Techniques

Groš, Stjepan (2024) Information Warfare Tactics and Techniques. In: Shielding Europe with the Common Security and Defence Policy: The EU Legal Framework for the Development of an Innovative European Defence Industry in Times of a Changing Global Security Environment. Studies of the Central European Professors’ Network . Central European Academic Publishing, Miskolc - Budapest, pp. 701-754. ISBN 978-615-6474-63-6 (printed version), 978-615-6474-64-3 (pdf), 978-615-6474-65-0 (epub)

[img]
Preview
Text
699-754.pdf - Published Version

Download (534kB) | Preview

Abstract

Information warfare, disinformation, fake news, and similar terms are frequently used in public discourse. It is clear from real-world examples that these concepts represent a substantial danger for democratic countries, polarise societies as regards public health, and generally prevent rational and informed discussion. Yet, combating disinformation proves very difficult. Something must be done, but the question is what. The premise of this chapter is that we cannot counter disinformation if we do not agree on what we are fighting against; that is, we cannot do something if we do not know what the adversaries are using against us. In cybersecurity, databases of tactics and techniques of adversaries’ behaviour have proved very useful for defence. Knowing about different types of attackers, their motives, and capabilities has also proved beneficial. Therefore, we are set to replicate this success in the case of information warfare and information operations. To achieve these goals, we review the terminology and define information warfare in a narrow sense and then discuss information operations, their relation to military domains and information space, and the domains in which information operations are run. In doing so, we determine that information operations are intertwined with and appear in all military domains. The core part of this chapter lists the tactics and techniques adversaries use for information operations. We then review the logistics support adversaries might use for information operations; moreover, we define threat sources and threat actors and classify them based on their motivations and capabilities. Finally, we map the operations run during Operation Denver to the tactics and techniques presented in this chapter to illustrate their use.

Item Type: Book Section
Uncontrolled Keywords: warfare, information warfare, information operations, cyber warfare, tactics, technics, procedures, mitre att&ck, operation Denver
Subjects: K Law / jog > K Law (General) / jogtudomány általában
Depositing User: Dr. Bernadett Solymosi-Szekeres
Date Deposited: 03 Dec 2024 11:24
Last Modified: 03 Dec 2024 11:24
URI: https://real.mtak.hu/id/eprint/210743

Actions (login required)

Edit Item Edit Item