Information Operations - Computer Network Operations

Computer Network Operations

There are many examples of CNA and are generally done in support of other operations. Terrorists have integrated cyber attacks into their thinking, strategies, and operations as an extremely cost effective way to harm the US and other adversaries.

The same can be said for CNE, which is about penetrating computer networks before actually attacking them. Gaining access to specific networks is seen to be as part of the CNA process for terrorists (they do not distinguish between the two).

As for CND, terrorists are aware of keeping data secure and websites running because they use the internet. Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them. The methods they use include access controls, encryption, authentication, firewalls, intrusion detection, anti-viral tools, audits, security management, and security awareness and training.

  • "The Taliban have in recent months waged an intensifying information war with NATO forces in the country, distributing anti-government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014. A day rarely passes without a Taliban spokesman using Twitter to claim the destruction of numerous NATO armoured vehicles and the deaths of scores of Western or Afghan security forces, with NATO quickly countering in its own Twitter feeds. The Taliban also employ a sophisticated network of spokesmen to distribute messages and even have their own mobile radio broadcast service, which frequently moves location to avoid the threat of retaliatory airstrikes by NATO warplanes.
    • The Taliban HAVE to rely on CNO and integrate it into their IO campaign as it is the most cost effective method of disrupting Western forces. This is a prime example of how CNO is used in conjunction with PSYOP to achieve their objectives.

Read more about this topic:  Information Operations

Famous quotes containing the words computer, network and/or operations:

    The computer takes up where psychoanalysis left off. It takes the ideas of a decentered self and makes it more concrete by modeling mind as a multiprocessing machine.
    Sherry Turkle (b. 1948)

    Parents need all the help they can get. The strongest as well as the most fragile family requires a vital network of social supports.
    Bernice Weissbourd (20th century)

    You can’t have operations without screams. Pain and the knife—they’re inseparable.
    —Jean Scott Rogers. Robert Day. Mr. Blount (Frank Pettingell)