INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS
The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow be...
Gespeichert in:
Veröffentlicht in: | Strategic impact 2022-07, Vol.82 (1), p.65-78 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 78 |
---|---|
container_issue | 1 |
container_start_page | 65 |
container_title | Strategic impact |
container_volume | 82 |
creator | VLAICU, Mihai |
description | The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations. |
doi_str_mv | 10.53477/1842-9904-22-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2691103107</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2691103107</sourcerecordid><originalsourceid>FETCH-LOGICAL-c687-8ad640273c02968ae3a9bb7224f40079ce09a31759267a1eb2cabeaa8fefd2503</originalsourceid><addsrcrecordid>eNo9kE1OwzAQhS0EEhV0zdYSW0L9l9hehsSlkZI4agwSK8tJHYkKaEnogh1n4IichLRFzGa-mXl6Iz0ArjC6DSnjfIYFI4GUiAWEBNEJmPwvTg-Mg5ALdg6mw7BGYwmOGBUT4LJyrpdFbDJdQl2p5YFqmOgyfUiMSuHdE4yXxQijLlE1_Pn63l8TVZn6BhbKLHRaw7hMYaWNKk0W5zBVjyrXVTGO9SU469zL4Kd__QKYuTLJIsj1fZbEedBGggfCrSKGCKctIjISzlMnm4YTwjqGEJetR9JRzENJIu6wb0jrGu-c6Hy3IiGiF-D6aLvtN-87P3zY9WbXv40fLYkkxohixEfV7Khq-80w9L6z2_751fWfFiN7SNLug7P74CwhNqK_v_ldoA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2691103107</pqid></control><display><type>article</type><title>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>VLAICU, Mihai</creator><creatorcontrib>VLAICU, Mihai</creatorcontrib><description>The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.</description><identifier>ISSN: 1841-5784</identifier><identifier>EISSN: 1842-9904</identifier><identifier>DOI: 10.53477/1842-9904-22-6</identifier><language>eng</language><publisher>Bucharest: "Carol I" National Defence University</publisher><subject>Armed forces ; Computer networks ; Electronic devices ; Electronic warfare ; Information processing ; Information systems ; Information warfare ; Military engagements ; Military strategy ; National security ; R&D ; Research & development ; Security services ; Technological change ; Transistors ; Weapon systems</subject><ispartof>Strategic impact, 2022-07, Vol.82 (1), p.65-78</ispartof><rights>2022. This work is published under https://cssas.unap.ro/en/periodicals.htm (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>VLAICU, Mihai</creatorcontrib><title>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</title><title>Strategic impact</title><description>The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.</description><subject>Armed forces</subject><subject>Computer networks</subject><subject>Electronic devices</subject><subject>Electronic warfare</subject><subject>Information processing</subject><subject>Information systems</subject><subject>Information warfare</subject><subject>Military engagements</subject><subject>Military strategy</subject><subject>National security</subject><subject>R&D</subject><subject>Research & development</subject><subject>Security services</subject><subject>Technological change</subject><subject>Transistors</subject><subject>Weapon systems</subject><issn>1841-5784</issn><issn>1842-9904</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNo9kE1OwzAQhS0EEhV0zdYSW0L9l9hehsSlkZI4agwSK8tJHYkKaEnogh1n4IichLRFzGa-mXl6Iz0ArjC6DSnjfIYFI4GUiAWEBNEJmPwvTg-Mg5ALdg6mw7BGYwmOGBUT4LJyrpdFbDJdQl2p5YFqmOgyfUiMSuHdE4yXxQijLlE1_Pn63l8TVZn6BhbKLHRaw7hMYaWNKk0W5zBVjyrXVTGO9SU469zL4Kd__QKYuTLJIsj1fZbEedBGggfCrSKGCKctIjISzlMnm4YTwjqGEJetR9JRzENJIu6wb0jrGu-c6Hy3IiGiF-D6aLvtN-87P3zY9WbXv40fLYkkxohixEfV7Khq-80w9L6z2_751fWfFiN7SNLug7P74CwhNqK_v_ldoA</recordid><startdate>20220713</startdate><enddate>20220713</enddate><creator>VLAICU, Mihai</creator><general>"Carol I" National Defence University</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>88F</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BYOGL</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>M1Q</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20220713</creationdate><title>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</title><author>VLAICU, Mihai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c687-8ad640273c02968ae3a9bb7224f40079ce09a31759267a1eb2cabeaa8fefd2503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Armed forces</topic><topic>Computer networks</topic><topic>Electronic devices</topic><topic>Electronic warfare</topic><topic>Information processing</topic><topic>Information systems</topic><topic>Information warfare</topic><topic>Military engagements</topic><topic>Military strategy</topic><topic>National security</topic><topic>R&D</topic><topic>Research & development</topic><topic>Security services</topic><topic>Technological change</topic><topic>Transistors</topic><topic>Weapon systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>VLAICU, Mihai</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East Europe, Central Europe Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Military Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Strategic impact</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>VLAICU, Mihai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS</atitle><jtitle>Strategic impact</jtitle><date>2022-07-13</date><risdate>2022</risdate><volume>82</volume><issue>1</issue><spage>65</spage><epage>78</epage><pages>65-78</pages><issn>1841-5784</issn><eissn>1842-9904</eissn><abstract>The increased level of integration of electrical and electronic-based devices and systems in the military field has led to the development of better methods of using information in real time, but at the same time has introduced new vulnerabilities to exploit, degrade and deny the information flow between military units and/or different types of weapon systems. The purpose of this paper is to identify key concepts and methods of using information warfare, specifically, CEMA (Cyber Electromagnetic Activities) operations by the armed forces of various nations (the United States of America, People’s Republic of China and Israel) and to formulate several potential developments with regards to the future of information operations.</abstract><cop>Bucharest</cop><pub>"Carol I" National Defence University</pub><doi>10.53477/1842-9904-22-6</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1841-5784 |
ispartof | Strategic impact, 2022-07, Vol.82 (1), p.65-78 |
issn | 1841-5784 1842-9904 |
language | eng |
recordid | cdi_proquest_journals_2691103107 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Armed forces Computer networks Electronic devices Electronic warfare Information processing Information systems Information warfare Military engagements Military strategy National security R&D Research & development Security services Technological change Transistors Weapon systems |
title | INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES ‒ CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T20%3A53%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=INFORMATION%20OPERATIONS%20CONDUCTED%20BY%20ARMED%20FORCES%20%E2%80%92%20CONCEPTS,%20METHODS%20AND%20POTENTIAL%20DEVELOPMENTS&rft.jtitle=Strategic%20impact&rft.au=VLAICU,%20Mihai&rft.date=2022-07-13&rft.volume=82&rft.issue=1&rft.spage=65&rft.epage=78&rft.pages=65-78&rft.issn=1841-5784&rft.eissn=1842-9904&rft_id=info:doi/10.53477/1842-9904-22-6&rft_dat=%3Cproquest_cross%3E2691103107%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2691103107&rft_id=info:pmid/&rfr_iscdi=true |