Osama bin Laden, from his sanctuary in Southwestern Asia, sends out streams of malicious code via his PC that collapse the Internet and force America into an electronic Stone Age. Is this a probable scenario for information warfare? While not impossible, I do not think such an attack likely to destroy American society.
As the latest buzzword to succeed Y2K on the media’s “terror throne,” information warfare (IW), as a useful term, begs for realistic definition. No doubt, bin Laden can attack us. Graduate students at Cal Tech, MIT, or UCLA and tenth-graders at your local high school can also launch “volleys” against corporate America. How effective such invasions would be is the critical issue. In the Gulf War, Iraqi anti-aircraft batteries expended vast rounds against allied planes, and it was almost totally ineffective. Sheer bulk doesn’t always equate to victory.
Our digital infrastructure is not monolithic. Composed of individual networks, each with a different character, we have more robust diversity than the media recognizes. True, Denial of Service (DoS) attacks have brought our systems down, but they have not destroyed them. Even the infamous Internet Worm, released as a graduate student’s experiment, did not bring America to its knees. The Pentagon deals with a hundred hacker attacks a day and survives.
A real information warfare offensive, an electronic Pearl Harbor, would have to be both broad and specific. First, it would have to offer good propagating characteristics: being able to infect systems widely and quickly. But, even more important, the attack wave must be mutable enough to exploit the idiosyncrasies of individual systems and network configurations. Otherwise, such a code-based attack may not be able to get beyond the level of establishing beachheads. The “inner digital country” may remain unconquered.
To launch a code-based invasion, supercomputers and good infrastructure are essential. Such an investment, while not as expensive as conventional warfare, still requires backing by a government. Who are the possible players then in IW? China, Russia, India, and perhaps Iran, all come to mind. Though they have the talent and resources, keep in focus that they would not readily share such technology with terrorists. Terrorists become wild dogs with just slight changes in the ideological winds. Even rogue states hesitate to place that power (on par with nuclear weapons) in the arsenals of freelancers.
And, with governments as the main players, also we have to consider the vulnerability to electromagnetic attacks. Computer systems and networks are highly vulnerable to high-energy bursts of electromagnetic radiation. Electromagnetic Pulse (EMP) technologies exist and are becoming highly portable. They can fry computers.
The twin demons of malicious code and EMPs have entered the arsenals of foreign powers. But, the United States also has these capabilities. Will then an IW balance of power (or terror) likely develop? I think the answer is a guarded “Yes.” As always, it depends on economic and political developments. A country in severe economic distress may resort to IW to cripple rival nations’ financial and industrial clout.
Information security professionals should have their minds open to developments in the IW arena, but keep their fingers off any panic buttons. Private companies, however, in industries such as electric power generation and distribution, gas production and distribution, petroleum refining, railroads, and water and wastewater utilities need to pay closer attention. The same goes for businesses such as pharmaceutical manufacturing and food processing. The danger lies not only in massive failures, which would be catastrophic, but also in strategic misdirection. Placing trains carrying explosive cargo on collision courses around the country may not be noticed until too late. Mislabeled medications could kill.
A reasonable role for government should be helping critical industries prepare for IW. Some of that preparedness know-how will then filter into the less critical sectors. We want to avoid, however, overly burdensome requirements for every operator of a network or Web server in the U.S. This dialogue about IW between private industry and the U.S. government will heat up over the next few years. Yet, unnecessary and excessive preparedness will not guarantee protection. And, such measures will only drain already limited security budgets.
Pundits can practice doomsaying about anything. Only time establishes the truth of their predictions. In 1996 “Hack Attack” in Forbes ASAP forecasted an “all-out war” against American corporations by hackers was “coming soon.”
Fortunately, in the last four years, we’ve avoided the onslaught. As Mark Twain observed, “In my life I have known many troubles, but few have come to past.” As professionals, let’s be cognizant of IW’s threats but rational and realistic in our response.
For a mega-resource on Information Warfare, try this Web link:
Institute for the Advanced Study of Information Warfare (IASIW)
This site has everything, including the kitchen sink, about IW, computer security, Trojan Horses, electronic spying, and so on.
Ronald L. Mendell is a Certified Internet Security Specialist. Employed at Netpliance, Inc. in Austin, Texas, he also works as a writer and researcher specializing in security and investigative issues. Charles C. Thomas published his most recent book, Investigating Computer Crime: A Primer for Security Managers, in 1998. (http://www.ccthomas.com)
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.