Relationships between Cyberspace Operations and Information Operations

Authors

  • Zsolt Haig National University of Public Service

DOI:

https://doi.org/10.3849/aimt.01466

Abstract

Today thanks to the wireless networking technologies and social networks, the inter-pretation of cyberspace has expanded. According to the three-layered structure of cyberspace, not only logical effects can be induced in this domain, e.g. by malwares, but physical and cognitive effects also appear in the physical and cyber-persona lay-ers, e.g. electronic jamming the wireless communications of network or influencing and manipulating users. This approach provides an opportunity to interpret cyberspace operations in a more complex way and to apply integrated technical and cognitive information capabilities that exploit each others effects. Accordingly, this study pre-sents an expanded interpretation of cyberspace, a novel and complex approach to cyberspace operations, as well as the information capabilities that can be used in these operations.

Author Biography

  • Zsolt Haig, National University of Public Service
    Department of Electronic Wafare, colonel, professor

References

Number of Internet of Things (IoT) Connected Devices Worldwide in 2018, 2025 and 2030 [online]. January 2021 [viewed 2021-01-27]. Available from: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/

FULLER, J.R. The 4 Stages of an IoT Architecture [online]. May 2016 [viewed 2021-01-29] Available from: https://techbeacon.com/4-stages-iot-architecture

Forecast Number of Mobile 5G Subscriptions Worldwide by Region from 2019 to 2026 [online]. January 2021 [viewed 2021-01-17]. Available from: https://www.statista.com/statistics/760275/5g-mobile-subscriptions-worldwide/

DARPA Wants to Militarise the IoT [online]. [viewed 2021-01-21]. Available from: https://internetofbusiness.com/darpa-wants-militarise-iot/

Military Applications of Internet of Things [online]. NATO Science and Technolo-gy Organization, 2016 [viewed 2021-01-21]. Available from: https://www.sto.nato.int/Lists/test1/activitydetails.aspx?ID=16536

RELIA, S. Cyber Warfare: Its Implications on National Security. New Delhi: Vij Books India, 2015. ISBN 978-93-84464-82-0.

Overview of Cybersecurity [online]. April 2008 [viewed 2020-12-06]. Available from: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.1205-200804-I!!PDF-E&type=items

DoD Dictionary of Military and Associated Terms [online]. June 2020 [viewed 2020-12-06]. Available from: http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf

KE X., Q. YI and Y. KUN. A Tutorial on Internet of Things: From A Heterogeneous Network Integration Perspective. IEEE Network, 2016, 30(2), pp. 102-108. DOI 10.1109/MNET.2016.7437031.

Cyberspace and Electronic Warfare Operations [online]. April 2017 [viewed 2020-12-06] Available from: https://fas.org/irp/doddir/army/fm3-12.pdf

Cyberspace Operations [online]. June 2018 [viewed 2020-12-06]. Available from: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf

PORCHE III, I.R., C. PAUL, C.C. SERENA, C.P. CLARKE, E.-E. JOHNSON and D. HERRICK. Tactical Cyber. Building a Strategy for Cyber Support to Corps and Below. Santa Monica: RAND, 2017. ISBN 978-0-8330-9608-1.

Cyber Primer [online]. 2nd ed. Swindon: Ministry of Defence, 2016 [viewed 2020-12-06]. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/549291/20160720-Cyber_Primer_ed_2_secured.pdf

Aspects and Pillars of Cyber Security [online]. [viewed 2020-12-06]. Available from: https://www.usna.edu/CyberDept/sy110/calendar.php?type=class&event=2

Terms & Definitions of Interest for DoD Counterintelligence Professionals [online]. May 2011 [viewed 2020-12-06]. Available from: https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf

Joint Doctrine Note 2/13 Information Superiority [online]. Swindon: Ministry of Defence, 2013. [viewed 2020-12-05]. Available from: https://assets.publishing.ser-vice.gov.uk/government/uploads/system/uploads/attachment_data/file/819814/archive_doctrine_uk_info_superiority_jdn_2_13.pdf

HAIG, Zs. Information Operations in the Cyberspace (in Hungarian). Budapest: Dialog Campus, 2018. ISBN 978-615-5945-04-5.

LIPOVSKY, R. and A. CHEREPANOV. Black Energy Trojan Strikes Again: At-tacks Ukrainian Electric Power Industry [online]. January 2016 [viewed 2020-12-06]. Available from: https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/

Downloads

Published

14-04-2021

Issue

Section

Technical Information

Categories

How to Cite

Relationships between Cyberspace Operations and Information Operations. (2021). Advances in Military Technology, 16(1), 91-105. https://doi.org/10.3849/aimt.01466