Thursday, September 19, 2019
Development of Information Warfare Introduction In his final foreign policy speech, President Bill Clinton listed among the United StatesÃ¢â¬â¢ top five military and security concerns the development of information warfare (Lacey). Given the importance of information technologies to the American economy and the U.S. militaryÃ¢â¬â¢s dependence on this system, any attacks on the information infrastructure could have severe consequences for the economy and for national security. For the U.S.Ã¢â¬â¢s best interests, taking the initiative in defining the limits of information warfare would be beneficial. The current U.S. trend toward concerning itself publicly more with computer network defense than computer network attack has prevented an adequate public dialog on the legalities involved with information warfare. The United States must address this issue before development of information warfare technologies goes much further. Resolving this issue at an international level can protect the United States from future informatio n warfare attacks and present opportunities to retaliate against attackers. Definition of Terms Before exploring the implications of information warfare, a working definition of the term must be established. Due either to imprecision regarding information warfareÃ¢â¬â¢s specific operations or just that this form of warfare is very young, many definitions are available. The Air ForceÃ¢â¬â¢s official definition of information warfare, articulated in the Ã¢â¬Å"Cornerstones of Information WarfareÃ¢â¬ report, is Ã¢â¬Å"any action to deny, exploit, corrupt or destroy the enemy's information and its functions; protecting ourselves against those actions; and exploiting our own military information functionsÃ¢â¬ (Fogleman and Widnall). This def... ...iversity. McCoubrey, Hilaire, and Nigel D. White. International Law and Armed Conflict. Dartmouth: Brookfield, VT, 1992. Molander, Roger C., and Sanyin Siang. Ã¢â¬Å"The Legitimization of Strategic Information Warfare: Ethical Considerations.Ã¢â¬ Professional Ethics Report, Vol. XI, No.4, Fall 1998. < http://www.aaas.org/spp/dspp/sfrl/per/per15.htm > Roberts, Adam, and Richard Guelff, eds. Documents on the Laws of War. Clarendon Press: Oxford, 1982. Schwartau, Winn. Information Warfare. ThunderÃ¢â¬â¢s Mouth Press: New York, 1994. United States Space Command. Ã¢â¬Å"U.S. Space Command Takes Charge of Computer Network Attack.Ã¢â¬ 29 September 2000. < http://www.spacecom.af.mil/usspace/rel15-00.htm > Waltz, Edward. Information Warfare Principles and Operations. Artech House: Boston, 1998.