COMMANDO SOLO AND THE USE OF THE INTEGRATED INFORMATION OPERATIONS IN THE ARMED CONFLICTS: PSYCHOLOGICAL OPERATIONS, ELECTRONIC WARFARE, COMPUTER NETW Cover Image

COMMANDO SOLO ȘI UTILIZAREA OPERAȚIILOR NFORMAȚIONALE ÎN CONFLICTELE ARMATE: OPERAȚII PSIHOLOGICE, RĂZBOI ELECTRONIC, OPERAȚII ÎN REȚELELE DE CALC
COMMANDO SOLO AND THE USE OF THE INTEGRATED INFORMATION OPERATIONS IN THE ARMED CONFLICTS: PSYCHOLOGICAL OPERATIONS, ELECTRONIC WARFARE, COMPUTER NETW

Author(s): Marius-Aurelian Topolniski
Subject(s): Politics / Political Sciences, Media studies, International relations/trade, Security and defense
Published by: Carol I National Defence University Publishing House
Keywords: information terrorism; influence; disinformation; cyber attacks

Summary/Abstract: Before considering that a piece of information is credible, think about the quality of the providers, who are of many kinds. And also think that behind any information there always is a third party. Such a third party is the influence specialist, who garnishes the information with objectivity but also with intent. However, the most dangerous type is the one who also uses propaganda and disinformation, namely communication pathologies. Add to all that cyber attacks or electronic attacks and an impressive budget and the result will be a real machine of the information warfare. Based on the tools hereby described, we can observe that it serves petty interests, based on perfidy, lies and terror. It is high time we focused on the antithetical term of information warfare, namely information terrorism. The West must adopt a united front against this plague and must draft the most effective tools and policies to fight it.

  • Issue Year: 2015
  • Issue No: 04
  • Page Range: 64-70
  • Page Count: 7
  • Language: Romanian