INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS

The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow be...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Strategic impact 2022-07, Vol.82 (1), p.65-78
1. Verfasser: VLAICU, Mihai
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 78
container_issue 1
container_start_page 65
container_title Strategic impact
container_volume 82
creator VLAICU, Mihai
description The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.
doi_str_mv 10.53477/1842-9904-22-6
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2691103107</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2691103107</sourcerecordid><originalsourceid>FETCH-LOGICAL-c687-8ad640273c02968ae3a9bb7224f40079ce09a31759267a1eb2cabeaa8fefd2503</originalsourceid><addsrcrecordid>eNo9kE1OwzAQhS0EEhV0zdYSW0L9l9hehsSlkZI4agwSK8tJHYkKaEnogh1n4IichLRFzGa-mXl6Iz0ArjC6DSnjfIYFI4GUiAWEBNEJmPwvTg-Mg5ALdg6mw7BGYwmOGBUT4LJyrpdFbDJdQl2p5YFqmOgyfUiMSuHdE4yXxQijLlE1_Pn63l8TVZn6BhbKLHRaw7hMYaWNKk0W5zBVjyrXVTGO9SU469zL4Kd__QKYuTLJIsj1fZbEedBGggfCrSKGCKctIjISzlMnm4YTwjqGEJetR9JRzENJIu6wb0jrGu-c6Hy3IiGiF-D6aLvtN-87P3zY9WbXv40fLYkkxohixEfV7Khq-80w9L6z2_751fWfFiN7SNLug7P74CwhNqK_v_ldoA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2691103107</pqid></control><display><type>article</type><title>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>VLAICU, Mihai</creator><creatorcontrib>VLAICU, Mihai</creatorcontrib><description>The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.</description><identifier>ISSN: 1841-5784</identifier><identifier>EISSN: 1842-9904</identifier><identifier>DOI: 10.53477/1842-9904-22-6</identifier><language>eng</language><publisher>Bucharest: "Carol I" National Defence University</publisher><subject>Armed forces ; Computer networks ; Electronic devices ; Electronic warfare ; Information processing ; Information systems ; Information warfare ; Military engagements ; Military strategy ; National security ; R&amp;D ; Research &amp; development ; Security services ; Technological change ; Transistors ; Weapon systems</subject><ispartof>Strategic impact, 2022-07, Vol.82 (1), p.65-78</ispartof><rights>2022. This work is published under https://cssas.unap.ro/en/periodicals.htm (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>VLAICU, Mihai</creatorcontrib><title>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</title><title>Strategic impact</title><description>The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.</description><subject>Armed forces</subject><subject>Computer networks</subject><subject>Electronic devices</subject><subject>Electronic warfare</subject><subject>Information processing</subject><subject>Information systems</subject><subject>Information warfare</subject><subject>Military engagements</subject><subject>Military strategy</subject><subject>National security</subject><subject>R&amp;D</subject><subject>Research &amp; development</subject><subject>Security services</subject><subject>Technological change</subject><subject>Transistors</subject><subject>Weapon systems</subject><issn>1841-5784</issn><issn>1842-9904</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNo9kE1OwzAQhS0EEhV0zdYSW0L9l9hehsSlkZI4agwSK8tJHYkKaEnogh1n4IichLRFzGa-mXl6Iz0ArjC6DSnjfIYFI4GUiAWEBNEJmPwvTg-Mg5ALdg6mw7BGYwmOGBUT4LJyrpdFbDJdQl2p5YFqmOgyfUiMSuHdE4yXxQijLlE1_Pn63l8TVZn6BhbKLHRaw7hMYaWNKk0W5zBVjyrXVTGO9SU469zL4Kd__QKYuTLJIsj1fZbEedBGggfCrSKGCKctIjISzlMnm4YTwjqGEJetR9JRzENJIu6wb0jrGu-c6Hy3IiGiF-D6aLvtN-87P3zY9WbXv40fLYkkxohixEfV7Khq-80w9L6z2_751fWfFiN7SNLug7P74CwhNqK_v_ldoA</recordid><startdate>20220713</startdate><enddate>20220713</enddate><creator>VLAICU, Mihai</creator><general>"Carol I" National Defence University</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>88F</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BYOGL</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>M1Q</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20220713</creationdate><title>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</title><author>VLAICU, Mihai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c687-8ad640273c02968ae3a9bb7224f40079ce09a31759267a1eb2cabeaa8fefd2503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Armed forces</topic><topic>Computer networks</topic><topic>Electronic devices</topic><topic>Electronic warfare</topic><topic>Information processing</topic><topic>Information systems</topic><topic>Information warfare</topic><topic>Military engagements</topic><topic>Military strategy</topic><topic>National security</topic><topic>R&amp;D</topic><topic>Research &amp; development</topic><topic>Security services</topic><topic>Technological change</topic><topic>Transistors</topic><topic>Weapon systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>VLAICU, Mihai</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East Europe, Central Europe Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Military Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Strategic impact</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>VLAICU, Mihai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</atitle><jtitle>Strategic impact</jtitle><date>2022-07-13</date><risdate>2022</risdate><volume>82</volume><issue>1</issue><spage>65</spage><epage>78</epage><pages>65-78</pages><issn>1841-5784</issn><eissn>1842-9904</eissn><abstract>The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.</abstract><cop>Bucharest</cop><pub>"Carol I" National Defence University</pub><doi>10.53477/1842-9904-22-6</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1841-5784
ispartof Strategic impact, 2022-07, Vol.82 (1), p.65-78
issn 1841-5784
1842-9904
language eng
recordid cdi_proquest_journals_2691103107
source EZB-FREE-00999 freely available EZB journals
subjects Armed forces
Computer networks
Electronic devices
Electronic warfare
Information processing
Information systems
Information warfare
Military engagements
Military strategy
National security
R&D
Research & development
Security services
Technological change
Transistors
Weapon systems
title INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T20%3A53%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=INFORMATION%20OPERATIONS%20CONDUCTED%20BY%20ARMED%20FORCES%20%E2%80%92%20CONCEPTS,%20METHODS%20AND%20POTENTIAL%20DEVELOPMENTS&rft.jtitle=Strategic%20impact&rft.au=VLAICU,%20Mihai&rft.date=2022-07-13&rft.volume=82&rft.issue=1&rft.spage=65&rft.epage=78&rft.pages=65-78&rft.issn=1841-5784&rft.eissn=1842-9904&rft_id=info:doi/10.53477/1842-9904-22-6&rft_dat=%3Cproquest_cross%3E2691103107%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2691103107&rft_id=info:pmid/&rfr_iscdi=true