INFORMATION WARFARE IN USA, RUSSIA, CHINA AND PAKISTAN
2
Author(s):
BRIG PREMJIT SINGH PANESAR , MAJ GEN (DR) GS LAMBA (RETD)
Vol - 6, Issue- 8 ,
Page(s) : 110 - 129
(2015 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Study of recorded history shows that Information Warfare (IW) has been employed by opposing nations in some form or the other. The use or inability to use IW has at times determined the success or failure in a particular operation. IW will emerge as the dominant factor in future conflicts. It can support overall government strategy, policy during peacetime, crisis, conflict and post conflict. This paper focuses on the IW concepts and capabilities of USA, Russia, China and Pakistan. This study is essential in order to carry out an appraisal of our own capability development in this field.
- Leigh Armstrong, Information Operations, Warfare and the hard reality of soft power, Potomac Books, Washington DC, 2004 accessed on the Internet at https://books.google.co.in/books?isbn=1597973556.
- National Security Council Organization accessed at http:www.whitehouse.gov/wh/eop/nsc.
- President, Presidential Decision Directive "Critical Infrastructure Protection" 63 (22 May 1998).
- Wilson, Clay, Information Operations, Electronic Warfare,and Cyberwar:Capabilities andRelated Policy Issues, (CSR Report for Congress, March 20, 2007), Internet site http://www.iw-usa. com/pdf.
- Clark A. Murdock et. al, Beyond Goldwater-Nichols: U.S. Government and Defense Reform for a New Strategic Era, Phase 2 Report, July 2005,Center for Strategic and International Studies, p.128, accessed at http ://www.ndu.edu/library/docs/ BeyondGoldwaterNicholsPhase2Report.pdf.
- John Lasker, U.S. Military’s Elite Hacker Crew, April 18, 2005, Wired News, accessed on the Internet at http://www.wired.com/news/privacy/0,67223-0.html?tw=wn_story_page_prev2.
|