{"id":443,"date":"2015-02-24T06:25:00","date_gmt":"2015-02-24T06:25:00","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=443"},"modified":"2015-03-04T18:01:54","modified_gmt":"2015-03-04T18:01:54","slug":"information-warfare","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/information-warfare\/","title":{"rendered":"Information Warfare"},"content":{"rendered":"<p>Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one&#8217;s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.<\/p>\n<h3>Declassified Documents<\/h3>\n<p><strong>Relevant Documents<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a name=\"infowarsurvey\"><\/a><strong><a href=\"https:\/\/documents.theblackvault.com\/documents\/defenseissues\/09-F-1579.pdf\">Information Warfare Technologies: Survey of Selected Civil Sector Activities, February 1996<\/a><\/strong> [164\u00a0 Pages, 5.51mb] &#8211; This document has been prepared to set forth the results of a technology survey requested by the Joint Staff pursuant to tasking from the Joint Warfare Capability Assessment (JWCA) Information Warfare Technology Subgroup.\u00a0 The approach chosen to highlight the technologies is a collection of &#8220;Technology Overview&#8221; survey forms using a format specified by the Joint Staff. The Institute for Defense Analyses (IDA) selected 56 technologies that are briefly described with regard to their potential long-term usefulness to Information Warfare applications. A more complete evaluation of a subset of the most promising technologies is provided in parallel IDA Paper P-3157, Infomzation Warfare: Selected Long-Range Technology Applications.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<strong><a href=\"https:\/\/documents.theblackvault.com\/documents\/defenseissues\/14-F-0564_DOC_01_RUSSIAN_VIEWS_ON_ELECTRONIC_AND_INFORMATION_WARFARE_vol_1.pdf\">Russian Views on Electronic and Information Warfare. Volume 1, December 1996<\/a><\/strong>\u00a0[82 \u00a0Pages, 1.82MB] &#8211;\u00a0In the early 1980s, the Soviet military was perhaps the first to argue that a new\u00a0&#8220;revolution&#8221; was occurring in military affairs. Today the Russian military argues that\u00a0precision-guided, non-nuclear, deep-strike weapons and the systems used to integrate\u00a0them are revolutionizing all aspects of military art and force structure and elevating\u00a0combat capabilities.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<strong><a href=\"https:\/\/documents.theblackvault.com\/documents\/defenseissues\/14-F-0564_DOC_02_RUSSIAN_VIEWS_ON_ELECTRONIC_AND_INFORMATION_WARFARE_vol_2.pdf\">Russian Views on Electronic and Information Warfare. Volume 2, December 1996<\/a><\/strong>\u00a0[365 \u00a0Pages,\u00a012.67MB]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents.theblackvault.com\/documents\/defenseissues\/09-F-1483.pdf\"><strong>Themes in Chinese Writings on Information Warfare<\/strong> <\/a>[106 Pages, 6.5mb]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one&#8217;s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of<\/p>\n","protected":false},"author":1,"featured_media":444,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[14,5],"tags":[233],"class_list":{"0":"post-443","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-defense-issues","8":"category-military-defense","9":"tag-information-warfare"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/Interior_of_an_EC-130J_Commando_Solo_Mar_2003.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=443"}],"version-history":[{"count":0,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/444"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}