{ "id": "RL31787", "type": "CRS Report", "typeId": "REPORTS", "number": "RL31787", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 346727, "date": "2009-03-17", "retrieved": "2016-04-07T02:39:41.766892", "title": "Information Operations, Cyberwarfare, and Cybersecurity: Capabilities and Related Policy Issues", "summary": "This report describes the emerging areas of information operations, cybersecurity, and cyberwar in the context of U.S. national security. It also notes related policy issues of potential interest to Congress.\nFor military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance. The use of technology to both control and disrupt the flow of information has been generally referred to by several names: information warfare, electronic warfare, cyberwar, netwar, and Information Operations (IO). Currently, IO activities are grouped by the Department of Defense (DOD) into five core capabilities: (1) Psychological Operations, (2) Military Deception, (3) Operational Security, (4) Computer Network Operations, and (5) Electronic Warfare.\nCurrent U.S. military doctrine for IO now places increased emphasis on Psychological Operations, Computer Network Operations, and Electronic Warfare, which includes use of non-kinetic electromagnetic pulse (EMP) weapons, and non-lethal weapons for crowd control. However, as high technology is increasingly incorporated into military functions, the boundaries between all five IO core capabilities are becoming blurred. DOD also acknowledges the existence of a cyber domain, which is similar to air, land, and sea. This new domain is the realm where military functions occur that involve manipulation of the electromagnetic spectrum. Control of the spectrum is essential to military success across all other domains. Definitions and examples of the overlapping categories of IO activity are contained in the appendixes.\nThis report will be updated to accommodate significant changes.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/RL31787", "sha1": "7fabb3b165543e26083725fc545f474e16a098ab", "filename": "files/20090317_RL31787_7fabb3b165543e26083725fc545f474e16a098ab.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL31787", "sha1": "291375f13deb5a3f48da06b5c443d1ed18686524", "filename": "files/20090317_RL31787_291375f13deb5a3f48da06b5c443d1ed18686524.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc812953/", "id": "RL31787_2007Jun05", "date": "2007-06-05", "retrieved": "2016-03-19T13:57:26", "title": "Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20070605_RL31787_e1c6377bd63ba03da8acfe24a9847c2977c253f6.pdf" }, { "format": "HTML", "filename": "files/20070605_RL31787_e1c6377bd63ba03da8acfe24a9847c2977c253f6.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc809026/", "id": "RL31787_2007Mar20", "date": "2007-03-20", "retrieved": "2016-03-19T13:57:26", "title": "Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20070320_RL31787_5334f1f80edb1fba74a64586fe64949014c2e7d8.pdf" }, { "format": "HTML", "filename": "files/20070320_RL31787_5334f1f80edb1fba74a64586fe64949014c2e7d8.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs10447/", "id": "RL31787_2006Sep14", "date": "2006-09-14", "retrieved": "2008-12-11T20:26:18", "title": "Information Operations and Cyberwar: Capabilities and Related Policy Issues", "summary": "This report describes the emerging areas of information operations in the context of U.S. national security. It assesses known U.S. capabilities and plans, and suggests related policy issues of potential interest to Congress.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20060914_RL31787_87c9a5c91e373e2d519de3818a409d8c079a2e1d.pdf" }, { "format": "HTML", "filename": "files/20060914_RL31787_87c9a5c91e373e2d519de3818a409d8c079a2e1d.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer security", "name": "Computer security" }, { "source": "LIV", "id": "Information warfare", "name": "Information warfare" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs6058/", "id": "RL31787 2004-07-19", "date": "2004-07-19", "retrieved": "2005-06-12T09:00:45", "title": "Information Warfare and Cyberwar: Capabilities and Related Policy Issues", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20040719_RL31787_090d941785f54ea72fb7bb558e67fb814405e36f.pdf" }, { "format": "HTML", "filename": "files/20040719_RL31787_090d941785f54ea72fb7bb558e67fb814405e36f.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Information warfare", "name": "Information warfare" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] } ], "topics": [ "Crime Policy", "Education Policy", "Foreign Affairs", "Intelligence and National Security", "National Defense" ] }