The IT Law Wiki

Information operations attack

32,062pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

An Information operations attack (IO attack)

may take many forms, for example: (1) to slow adversary computers, the software may be disrupted by transmitting a virus or other malicious code; (2) to disable sophisticated adversary weapons, the computer circuitry may be overheated with directed high energy pulses; and (3) to misdirect enemy sensors, powerful signals may be broadcast to create false images. Other methods for IO attack may include psychological operations such as initiating TV and radio broadcasts to influence the opinions and actions of a target audience, or seizing control of network communications to disrupt an adversary's unity of command.[1]

References Edit

  1. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues, at CRS-2.

Also on Fandom

Random Wiki