Class III Information Warfare
Info-Terrorism and Denial of Service attacks. The intentional destruction of another
party's computer or network, or denial of service via other means is usually described
The offending party may be a mal
Propaganda Targeting Western Democracies
Attacker must wrap deceptive message in an envelope of material which is attractive
to global media organisations.
Deceptive message must provide content which is dramatic, violent, intensely
controversial, or an
The is a one to one mapping between the fundamental models used in classical
deception technique, and the highly structured fabrication and distribution of
deceptive propaganda targeted at a victim population by the example regimes or
Deception by Spin
Deception by spin is a form of subversion attack, and is often used in a
compound strategy supported by deception by omission.
A spin attack is based on the idea of presenting an unpalatable fact, but
encouraging the victim to assess t
Deception in Practice
Deception techniques used in the social domain can be readily divided into Classical
Deception Techniques, Perception Management, Propaganda, and Advertising.
Classical Deception Techniques typically comprise military and intellige
Remapping the Classical into the Canonical
We remap the classical deception techniques into canonical form as simple or
compound strategies, each comprising canonical primitives.
NB the four canonical strategies of information warfare are effectively mu
The Piece of Bad Luck
The Piece of Bad Luck, is a form of the Unintentional Mistake and thus a canonical or
compound strategy using corruption and degradation.
The implied cause of the 'unintended' disclosure is different.
Frequently this play will inc
E-bombs Low Frequency
The best strategy is to follow a systematic approach.
The first step is always the gathering of data to provide as complete a picture of the
situation as is possible.
The second step is to id
The Class Model of Information Conflict
Class I IW - Compromising Personal or Corporate Privacy is the lowest grade of IW,
and occurs when for instance your personal account is compromised and confidential
Class II IW - Industrial
This category of attack is typically in the soft kill category, although some such
attacks may require days to recover from.
Viruses can be used to damage operating system installations and user files.
Worms can be used to cr
Electrical Denial of Service Attacks
The dependency of computer and digital communications equipment upon electrical
power feeds and electrical data cables makes it vulnerable to electrical denial of
Such attacks aim to inject high volt