Information Warfare?

While information warfare (IW) has been treated by its foremost western proponents as a strategic revolution, the reasons for such a claim are actually rather weak if one considers how non-western approaches to the informational components of warfare have put forth their positions within a multidimensional context of strategy. This article ventures an Asian perspective that can potentially offer a more nuanced contribution to the study of IW. This article will pan out by first critically analyzing the predominantly American interpretation of IW as a set of five characteristics that can be contrasted to an Asian rival. Subsequently, we will elaborate a list of features likely to characterize a generic Asian IW approach, which I will argue, is more appropriately termed information operations (IO). These Asian IO features will be teased out through a reading of Sun Tzu, Mao Zedong, and Vo Nguyen Giap. An Asian IO approach will not distinguish wartime and peacetime applications, and neither will it place a premium on liberal democratic ideology as a basis for information superiority.

[1]  Chalmers Johnson,et al.  The Third Generation of Guerrilla Warfare , 1968 .

[2]  Alexander Klimburg,et al.  Mobilising Cyber Power , 2011 .

[3]  Peter Lorge,et al.  The Asian Military Revolution: From Gunpowder to the Bomb , 2008 .

[4]  Michael Warner,et al.  The divine skein: Sun Tzu on intelligence , 2006 .

[5]  David C. Gompert,et al.  Right Makes Might: Freedom and Power in the Information Age , 1998 .

[6]  M. Castells The Internet Galaxy , 2001 .

[7]  John Arquilla,et al.  A New Epoch - And Spectrum - Of Conflict , 1997 .

[8]  Jacqueline Newmyer The Revolution in Military Affairs with Chinese Characteristics , 2010 .

[9]  Daniel R. Headrick,et al.  Makers of Modern Strategy: From Machiavelli to the Nuclear Age , 1988 .

[10]  H. Besser,et al.  : In Athena's Camp: Preparing for Conflict in the Information Age , 2000 .

[11]  Võ Nguyên Giáp People's war, People's Army , 1963, The Journal of Asian Studies.

[12]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[13]  Robert J. Bunker,et al.  Unconventional warfare philosophers , 1999 .

[14]  Dale Peterson,et al.  Offensive Cyber Weapons: Construction, Development, and Employment , 2013 .

[15]  Zeynep Erdeniz International Herald Tribune , 2007 .

[16]  John William Donaldson,et al.  Philosophy of Language , 1998 .

[17]  Gerald L. Kovacich,et al.  Information Warfare , 2009, Encyclopedia of Information Assurance.

[18]  James C. Mulvenon,et al.  The People’s Liberation Army in the Information Age: , 1999 .

[19]  Alexander Kott,et al.  Information Warfare and Organizational Decision-Making , 2006 .

[20]  Walter Jajko A Critical Commentary on the Department of Defense Authorities for Information Operations , 2002 .

[21]  M. Finnemore The Culture of National Security : Norms and Identity in World Politics , 2011 .

[22]  Bernard Brodie,et al.  The Absolute Weapon: Atomic Power and World Order. , 1946 .

[23]  Edward L. Katzenbach,et al.  The Revolutionary Strategy of Mao Tse-Tung , 1955 .

[24]  J. Nye,et al.  Soft Power: The Means to Success in World Politics , 2004 .

[25]  Mao Tse-Tung CHARACTERISTICS OF CHINA'S REVOLUTIONARY WAR , 1965 .

[26]  Robert Mandel,et al.  Reassessing Victory in Warfare , 2007 .

[27]  Rik Farrow,et al.  Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace , 2000 .

[28]  Hammond Rolph Vietnamese Communism and the Protracted War , 1972 .

[29]  Thomas Rid More Attacks, Less Violence , 2013 .

[30]  Adam P. Liff Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War , 2012 .

[31]  Edward N. Luttwak,et al.  Strategy: The Logic of War and Peace , 1988 .

[32]  M. Symonds,et al.  Government and the Internet-The next revolution , 2000 .

[33]  Bernard Kouchner Stand Up to the Enemies of the Internet , 2010 .

[34]  Kenton G. Fasana Using Capabilities to Drive Military Transformation: An Alternative Framework , 2011 .

[35]  Leigh Armistead,et al.  Information Operations: Warfare and the Hard Reality of Soft Power , 2004 .