أخبار عاجلة
ارتفاع الأسهم الأوروبية مع تباطؤ إصابات كورونا -
المصرى يبحث عن ظهير أيمن تحسبا لرحيل العراقى -
حارس منتخب اليد يكشف برنامجه اليومى خلال الحظر -

Political concepts Information warfare, by Howaida Awad Ahmed

Political concepts Information warfare, by Howaida Awad Ahmed
Political concepts Information warfare, by  Howaida Awad Ahmed

 

 

 Information warfare is a new form of conflict or conflict whose development is due to the great prosperity and growth in the information infrastructure at the global level.
 The roots of this conflict lie in a mysterious area of the human mind.  And with humankind entering the information age, this war has gained a strong new impetus, 'it is the most direct perception of these wars, it represents a free-standing field that has its origins and rules governing these capabilities that were not available to humans in any era before.
 In contemporary wars, information has become equal to the value of good training, and the importance of relying on specialized elements to collect information has increased, as information has become an essential source of achieving a comparative advantage in the field of battle, in the theater of operations, and in war in general.
 And after humanity entered the era of information technology ... the era of post-industrial ... information became a world in its own right and no one imagined when inventing the first electronic computer .. a computer .. in the second half of the forties that the information world will control all aspects of life  And its development to the extent that makes us believe that there is a new type of war patterns in the name of ... information warfare
 The information war developed and became the war of leadership and control, and it is the fifth dimension of any war, on the basis that it is an invisible dimension, not specific to any relations, and turns into digital information easily.
 It includes two parts
 The first part is concerned with all activities and works related to obtaining information
 The second section is concerned with preventing the opponent from obtaining whatever information he wants
 This means depriving the enemy of obtaining information and spoiling its plans aimed at any organization of its data-gathering activities, and that is protection of the activities carried out by our forces and the exploitation of information results at any time.
 The main weapon in the information war is the information itself. Hence, the information war appears to be very different from the conventional war weapons. The most prominent of these weapons is known as computer virus. These viruses are divided into two parts.
 The first is for viruses that infect the ends of a data base or ... hard disk ... that contain the data needed for the system to start working
 The second .. is the section on viruses of executables in the information warfare system.
 The number of viruses in the first sector domain does not exceed 550 strains, and these only represent 10 / per cent 7500 mm of known viruses so far.
 The cosmic network of computers in the United States forms the infrastructure for the information war
 The danger of viruses as an information war weapon was that its number doubled by one hundred percent in a few months.
 The meaning of that
 The cosmic computer network will need a computer network to protect from viruses ....
 Despite the existence of an international protocol prohibiting signatory states from participating in any activities aimed at developing new types of viruses .. However, this protocol will have no value if we see a conventional war or even an information war.
 A virus of an unknown type may, if successful, enter the network of computers and affect it for five minutes, causing material losses equal to the losses caused by the use of a standard atomic bomb
 Mention for example
 In 1993, a virus program known as satan managed to infiltrate the network of computers of the Secret Service in the United States. This virus is the most dangerous type of computer virus, not only because of its ability to exploit operating software codes nor its extensive capabilities to enter the Internet.
 If these networks fail at critical moments, the fate of the entire information war depends on them
 The second weapon of information is what is known as electronic burglary or electronic piracy, and since information circulated by computers is mostly transmitted by satellite, the capture of these signals after knowing the technical secrets of the wavelengths used and the capture angles, and so on will provide an opportunity for those who have the capabilities to intercept data  Circulating in favor of the computer network and benefiting from it or disrupting its work
 The phenomenon of information warfare is not confined to the complex technical aspects of modern communications and computer systems used in the conduct of military operations, but rather
 This transcends that to include the nature of the war itself, with the advent of the age of information and the economic and social transformations that it produced.
 The growing interest in the information war within the American Pentagon has been accompanied by a growing awareness in the circles of intellectuals and businessmen about the depth of the transformations taking place in the fields of politics, economics, and patterns of social interaction.
 Which represents their common feature in increasing dependence on gathering and analyzing a vast amount of information to deal with the degree of complexity that the human and technological environment reached at the end of the twentieth century, which will undoubtedly be the dominant feature that will characterize the coming years
 We come to it
 It is imperative that decision makers in our Arab countries develop sophisticated cadres in dealing with modernity, information, collection, and how to use minds to innovate and serve in steps for the West
 So as not to be an easy catch