Soft War (3): Battle in the Age of Information

Friday, August 5, 2011

Author: Ali Abdollah-Khani

Publisher: Tehran International Studies & Research Institute (TISRI)
Date: March 2008
ISBN: 978-964-526-078-9
Language: Persian
Pages: 298

Tehran International Studies & Research Institute is publishing a collection on soft war to provide scientific insight into various aspects of and trends in cyber and media threats as well as psychological operations. The first volume of this collection focused on cyberwar and the second volume has been dedicated to media threats. The third volume is all about information threats.

Soft War 3 is special to battle in the age of information and aims to introduce readers to role and influence of information as both the means and content of future wars.

The author believes that given all dimensions and angles of information war and since information has turned into an extraordinary phenomenon in terms of content, better understanding of this phenomenon will be quite useful.

This book focuses on security aspects of the war involving information. Therefore, it has taken advantage of scientific and reliable papers written all over the world.

The Battle in the Age of Information consists of eight chapters. The first chapter discusses influence of information technology on national security and focuses on role and impact of information on changes in security concept and management. Governance, management of conflicts as well as organizing and directing war in the age of information are major topics discussed in this chapter.

The second chapter focuses on meanings, components and major elements of information war. Here, differentiation is made between battle as content and battle as means of disseminating information and this concept has been discussed both in mental and physical terms. Functions, specifications and sources of strategic information war are other issues considered in this chapter.

Chapter three is entitled “Strategies and Tactics in Information War.” This is an important part of the book which expounds overall milieu of the battle before dividing information war in four groups the most original of which is a nonlethal war. This chapter discusses strategies and tactics in an information war as well as changes in the present quality of conflict, as well as nature of vulnerabilities and threats. It also reviews various methods of thinking about information war and discusses underlying logic and technical precursors of various information attacks.

The fourth chapter is about various forms and means of information war. C4I, (Command, Control, Communications, Computers, and Intelligence) intelligence war, electronic war, conceptual war and cyberwar have been mentioned as the most important forms of information war. HERF (High-energy radio frequency weapons) weapons and transmitters of electromagnetic pulse have been mentioned as the most important weapons in information war.

The fifth chapter focuses on protective technologies in information war and also discusses methods used to protect information, authentication methods, security of information and information guarantee as well as various encoding methods.
Information protection technologies have been discussed in detail here as is the case with encoding, anonymity, sanitation, waste disposal, shield building as well as protective locks and passwords.

The sixth chapter discusses another important aspect of information war, which is electronic warfare. The main goal is to introduce readers to various aspects, dimensions, and important functions of electronic war.

Biometric technologies are the main subject of the seventh chapter. Here, various kinds of biometric technologies involving iris, appearance of hands, face recognition, voice recognition and DNA typing have been assessed from a practical viewpoint. “Identification with card” and “security and safety testing of hazardous information” have been expounded before pointing to political and legal consequences of this technology which has been in wide use to assure security of the world following 9/11 terror attacks.

Chapter eight looks into protection of vital information infrastructures. Here, the concept and various kinds of global infrastructures are first explained before discussing various models of protection of vital information infrastructures in different countries.

About the Author

Ali Abdollah-Khani received his Ph.D. from National Defense University (Tehran) in Political Science. He teaches political science in different Iranian universities and is the Chairman of Tehran International Studies & Research Institute (TISRI). He wrote numerous books and articles on national security, international affairs and middle east affairs.

طراحی و توسعه آگاه‌سیستم