Page:United States Army Field Manual 3-13 Information Operations.djvu/13

From Wikisource
Jump to navigation Jump to search
This page needs to be proofread.

essential to ensure that the activities and messages of all forces and agencies are synchronized to achieve national objectives. Methods of Attack


1-20. Adversaries may use several methods to attack friendly C2 systems and INFOSYS, or shape the information environment in their favor. The nature of the information environment makes such attacks hard to detect. Some attacks, such as corrupting databases or controlling programs, can be designed with delayed effects. Others may employ immediate actions to degrade or destroy information nodes. Possible attacks are called incidents. An incident is an assessed event of attempted entry, unauthorized entry, or an information attack on an automated information system. It includes unauthorized probing and browsing; disruption or denial of service; altered or destroyed input, processing, storage, or output of information; or changes to information system hardware, firmware, or software characteristics with or without the users knowledge, instruction, or intent (JP 3-13). 1-21. Unauthorized Access. Unauthorized access is designed to gain information from, insert data into, modify data stored within, or delete data from C2 systems. Individuals can log on to military networks, such as local area networks, from the Internet. Firewalls (software that provides network security) exist to prevent this. However, if a firewall is penetrated, the C2 system is penetrated. Unauthorized access need not originate from the Internet and proceed through a firewall breach. A person with physical access to a terminal connected to a C2 system (an insider) can gain unauthorized access. 1-22. Malicious Software. Inserting malicious software causes a computer to operate in a manner other than that intended by its users. Malicious software includes computer viruses, logic bombs, and programs designed to bypass protective programs. Files downloaded from the Internet may contain viruses that disrupt software or corrupt databases. 1-23. Electromagnetic Deception. Electromagnetic deception is the deliberate radiation, reradiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy or to enemy electromagneticdependent weapons, thereby, degrading or neutralizing the enemy’s combat capability. Among the types of electromagnetic deception are manipulative electromagnetic deception, simulative electromagnetic deception, and imitative electromagnetic deception (JP 3-51).


• Manipulative electromagnetic deception comprises actions to eliminate revealing, or convey misleading, electromagnetic telltale indicators that may be used by hostile forces (JP 3-51). If not properly identified, manipulative electromagnetic deception may result in false information .signals, radiation, or data.being passed through the intelligence analysts, to the commander. Adversaries may pass inaccurate or


Text Box: Methods of Attack · Unauthorized access · Malicious software · Electromagnetic deception · Electronic attack · Physical destruction · Perception management