{ "id": "R45142", "type": "CRS Report", "typeId": "REPORTS", "number": "R45142", "active": true, "source": "EveryCRSReport.com", "versions": [ { "source": "EveryCRSReport.com", "id": 580626, "date": "2018-03-05", "retrieved": "2018-05-10T11:12:27.835114", "title": "Information Warfare: Issues for Congress", "summary": "Information warfare is hardly a new endeavor. In the Battle of Thermopylae in 480 BC, Persian ruler Xerxes used intimidation tactics to break the will of Greek city-states. Alexander the Great used cultural assimilation to subdue dissent and maintain conquered lands. Military scholars trace the modern use of information as a tool in guerilla warfare to fifth-century BC Chinese military strategist Sun Tzu\u2019s book The Art of War and its emphasis on accurate intelligence for decision superiority over a mightier foe. These ancient strategists helped to lay the foundation for information warfare strategy in modern times. \nTaking place below the level of armed conflict, information warfare (IW) is the range of military and government operations to protect and exploit the information environment. Although information is recognized as an element of national power, IW is a relatively poorly understood concept in the United States, with several other terms being used to describe the same or similar sets of activity. IW is a strategy for using information to pursue a competitive advantage, including offensive and defensive efforts. A form of political warfare, IW is a means through which nations achieve strategic objectives and advance foreign policy goals. Defensive efforts include information assurance/information security, while offensive efforts include information operations. Similar terms sometimes used to characterize information warfare include active measures, hybrid warfare, and gray zone warfare. \nIW is sometimes referred to as a \u201cdisinformation campaign,\u201d yet disinformation is only one of the tactics used in information operations (IO). The types of information used in IO include propaganda, misinformation, and disinformation. \nAs cyberspace presents an easy, cost-effective method to communicate a message to large swaths of populations, much of present day information warfare takes place on the internet, leading some to conflate \u201ccyberwarfare\u201d with information warfare. While IO in the United States tends to be seen as a purely military activity, other countries and terrorist organizations have robust information warfare strategies and use a whole-of-government or whole-of-society approach to information operations. \nIn terms of U.S. government bureaucracy, there are debates in the United States about where the IW center of gravity should be. During the Cold War, the epicenter in the U.S. government was the Department of State and the U.S. Information Agency. Since 9/11, much of the current doctrine and capability resides with the military, leading some to posit that the epicenter should be the Pentagon. But others worry that the military should not be involved in the production of propaganda.\nThis report offers Congress a conceptual framework for understanding IW as a strategy, discusses past and present IW-related organizations within the U.S. government, and uses several case studies as examples of IW strategy in practice. Countries discussed include Russia, China, North Korea, and Iran. The Islamic State is also discussed.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R45142", "sha1": "9def98bb88a9e61b98d21a768b5faed85b911ecb", "filename": "files/20180305_R45142_9def98bb88a9e61b98d21a768b5faed85b911ecb.html", "images": {} }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R45142", "sha1": "c92c6be5763f84c05aee8a79ebe1727814d8da8d", "filename": "files/20180305_R45142_c92c6be5763f84c05aee8a79ebe1727814d8da8d.pdf", "images": {} } ], "topics": [ { "source": "IBCList", "id": 4809, "name": "National & Military Intelligence" }, { "source": "IBCList", "id": 4820, "name": "Cybersecurity" }, { "source": "IBCList", "id": 4884, "name": "Critical Infrastructure" } ] } ], "topics": [ "Foreign Affairs", "Intelligence and National Security", "National Defense" ] }