Strategy is key in any type of warfare that a country can engage in. So what are some strategies for information warfare? Some strategies include low entry cost, blurred traditional boundaries, expanded role for perception management, a new strategic intelligence challenge, formidable tactical warning and attack assessment problems, difficult of building and sustaining coalitions, and vulnerability of the U.S. homeland. Although those are just some of the strategies as the use of information infrastructures evolves rapidly and many other strategies come into play, I would like to elaborate on two of the strategies above that I found very compelling as I learn about information warfare. The low entry cost and the vulnerability of the U.S homeland strategies of information warfare really made me think so I will go into those particular strategies.
Firstly, the low entry cost of information warfare is quite frightening if you think about it. Since it is such a low cost to acquire access to the internet and any information associated with the internet, anybody or individual can gain access to it. That means that there must be systems in place to prevent malicious use of information. The low cost means that even the poorest of adversaries can get into the mix of information warfare. Many terrorist organizations may utilize information warfare because of the cost efficiency. When terrorists have a resource, the United States will surely combat any utility necessary to prevent terrorism from spreading. Having the ability to secure networks and internet resources from the terrorists is probably a high priority in the United States.
Another strategy is the vulnerability of the U.S. homeland, although I have my doubts to this one I should write about it. Because the internet is accessible to everyone and is such a low cost that means that anywhere on earth is a potential battleground dealing with information warfare. If that is the case than that means that, the United States is vulnerable. The United States relies on a complex network for aviation, energy, etc. There must be a quick evolving security system in place in case even our weakest adversaries try to manipulate those networks and disrupt our resources. In the future, I am sure that America will still have the most powerful information infrastructure because of insight like this into the strategies of information warfare.
Author: John Rowan
I am a Senior Android Engineer and I love everything to do with computers. My specialty is Android programming but I actually love to code in any language specifically learning new things.