Answer or explain ONE of the following:
- Read one of the items in the supplemental reading and discuss how the information was being used, manipulated, and interpreted. What were the results?
- In your opinion can a leader (business / government / military) succeed without using information to gain an edge over their opponents, provide an example? Why or why not?
- In the Elkus supplemental reading the author states, “ One caution, however. Information warfare has never been decisive in and of itself–it’s always increased the strategic effectiveness of one’s own forces and decreased the effectiveness of the enemy.” Do you believe this is true? Explain your position.
- In his book, A History of Warfare, John Keegan talks about Mao Tse Tung. According to Keegan, Mao Tse Tung defined guerrilla warfare as protracted warfare. He said given enough time and prolonged effort a very small group could defeat a much large, much more powerful enemy. Take the position that hackers/crackers of the 20th and 21st centuries have been waging a guerrilla war against their enemies. In your initial post, correlate the two ideas. How have they done this and how successful have they been?
- How has the role of information in warfare changed over time? Or has it always been used / handled the same? One aspect to consider is the use of encryption in warfare to protect sensitive information.
- Hutchinson, W. Information Warfare and Deception. http://www.inform.nu/Articles/Vol9/v9p213-223Hutchinson64.pdf
- Lbicki and the Convergence of Information Warfare. http://www.airuniversity.af.mil/Portals/10/SSQ/documents/Volume-11_Issue-1/Libicki.pdf
Supplemental Reading and Websites
- Johnson, L. Scott. CIA Libary. Toward a Functional Model of Information Warfare: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol40no5/pdf/v40i5a07p.pdf
- U.S. Navy. Navajo Code Talkers: https://www.history.navy.mil/research/library/online-reading-room/title-list-alphabetically/n/code-talkers.html
- Elkus, A. Information Warfare: A Historical Approach. https://ctovision.com/information-warfare-a-historical-approach/
- SANS, The Secret History of Cyber War. https://www.youtube.com/watch?v=XKjB1lrLct4
- Joint IO Center, History and Evolution of IO, http://www.iwar.org.uk/iwar/resources/io-history/History-and-Evolution-of-IO.ppt
- John Keegan, A History of Warfare (optional book requires purchase)