Information warfare has been described as "the use of information to achieve our national objectives." According to
NATO, "Information war is an operation conducted in order to gain an information advantage over the opponent." The term has existed at least since 1970, when Dale Minor, a reporter, published
The Information War a book about propaganda and news manipulation during the Vietnam War era., although its current usage as a military capability dates from 1976, when
Thomas P. Rona, than a Boeing Company engineer, referred to "information war" in a company monograph prepared for the
Office of Net Assessment. Information warfare can take many forms: •
Television,
internet and
radio transmission(s) can be
jammed to disrupt communications, or
hijacked for a
disinformation campaign. •
Logistics networks can be disabled. • Enemy
communications networks can be disabled or spoofed, especially online social communities in modern days. •
Stock exchange transactions can be
sabotaged, either with electronic intervention, by leaking sensitive information or by placing disinformation. • The use of
drones and other surveillance robots or webcams. •
Communication management •
Synthetic media • The organized use of social media and other online content-generation platforms can be used to influence public perceptions. The
United States Air Force has had Information Warfare Squadrons since the 1980s. In fact, the official mission of the U.S. Air Force is now "To fly, fight and win... in air, space and cyberspace", with the latter referring to its information warfare role. As the U.S. Air Force often risks aircraft and aircrews to attack strategic enemy communications targets, remotely disabling such targets using software and other means can provide a safer alternative. In addition, disabling such networks electronically (instead of explosively) also allows them to be quickly re-enabled after the enemy territory is occupied. Similarly, counter-information warfare units are employed to deny such capability to the enemy. The first application of these techniques was used against Iraqi communications networks in the
Gulf War. Also during the Gulf War, Dutch
hackers allegedly stole information about U.S. troop movements from
U.S. Defense Department computers and tried to sell it to the Iraqis, who thought it was a hoax and turned it down. In January 1999, U.S. Air Intelligence computers were hit by a coordinated attack (
Moonlight Maze), part of which came from a Russian mainframe. This could not be confirmed as a Russian cyber attack due to non-attribution – the principle that online identity may not serve as proof of real-world identity. Some militaries are now employing the use of
iPhones to upload data and information gathered by drones in the same area. ==Notable examples==