trento02-tsygichko_as.htmlTEXTMSIElލލFUNCTIONAL APPROACH TO CLASSIFICATION AND IDENTIFICATION

Vitaly Tsygichko

Cyber Weapons asNew Means of Combat.

Classificationof Cyber Weapons

Abstract

 

The development of the universalclassification and a system of identification attributes of informationalweapons is a foundation for launching meaningful international negotiations onproblems of its development, application and proliferation. A functionalapproach to informational weapon classification and a subjective classification exercised on its basisare suggested.

 

The definition of the subjectarea of international information security and its conceptual tools is the mostpressing task for drafting an international legal framework securing controlover the development, limitation and proliferation of informational weapons(IW). The key concept for defining the subject area of information security isthe one of “informational weapons”. Yet, despite an  intensive research into the problem conducted in variouscountries, no uniform concept has been developed thus far, Russia included. Webelieve that the definition and classification of IW should be based on afunctional approach, i.e. with regard to the forms, ways and consequences ofits utilization. Key to the suggested approach is the concept of"information war" for this form of armed confrontation suggests theuse of the entire variety of IW. In all other areas of IW potential application(informational confrontation, informational terrorism, and informational crime)only individual types of IW can be used.

The definition of "informationwar" concept sparkedheated debates. The majority of analysts believe, however, that since theconcept of “war” is clearly defined in international legaldocuments as an open armed struggle between states or groups thereof, hence "informationwar" is a part of combat operations along with traditional forms thereof.In outlining a wide range of issues linked to concepts of combat operations in“information age”, international security experts and the militarymore and more frequently use the term "information war". The newconcepts of warfare are closely linked to the fact that a rapid evolution of cyberspace,i.e. the global information infrastructure on national and international levelscan not only open up extra opportunities for upgrading weaponry and militaryequipment, but also give rise to new problems of warring parties’vulnerability. More vulnerable at present is the warring party, which has lessinformation on the battlefield, is slower in data processing and decisionmaking. While an essential shortage of tactical information could, in pastwars, be offset by putting in additional forces, then now informationalsuperiority does, in effect, unambiguously determine the outcome of moderntransient military conflict. Hence, information war can be defined as actionstaken for securing information superiority by damaging information,information-based processes, and information systems of the enemy along withprotecting one’s own information, information-based processes, andinformation systems.

The results of informationalweapons application manifest themselves in a destructive impact on civilian andmilitary information infrastructure of the enemy and in disorganization ofpolitical and military control systems, in damaging or disturbing informationsystems, obtaining or distorting data contained in them, as well as in apurposeful dissemination of beneficial information.

Proceeding from the abovedefinition, it would be logical to refer to the non-traditional means ofarmed struggle, helping to effectively achieve  the information war objectives, as to informational weapons.The latter should assist in gaining informational superiority, preventing heavyfire strikes and orienting at high-precision, selective and possibly maximumlatent non-lethal ways of action. Naturally, these attributes of IW identification are rather generaland can, with time, be specified and expanded. Yet, they are conducive to aprimary IW classification useful for further research in this area.

All types of IW, falling under thesuggested identification attributes, can be classified by objects and means ofinfluence. IW can be classified into:

It would be wrong to say thatthis classification encompasses all possible types of informational weapons,which can emerge in future. However, it fully covers all of the known currentdevelopments.

The informational weapons ofeach type can, in its turn, be classified by a number of attributes:

Informational weapons can bedivided into two categories: information technology based weapons and weaponshaving energy or chemical effect. Examples of informational weapons based onenergy action are given below:

The following means areexamples of informational weapons based on chemical effect: ammunition filledout with gases, aerosols or biological cultures destroying components ofelectronic facilities.

Most promising is utilizationof information technologies as information weaponry. Information technologiesare an integral component of high-precision ammunitions as they are guided bysystems of position finding and reconnaissance by visual, electronic and othergive-away factors. It would therefore be reasonable to treat these functionalsubsystems as informational weapons too.

Also, under intensivedevelopment is soft-code-based informational  weapons. The latter’s delivery to the target isexercised in different ways:

These types of informationweaponry allow the following actions:

The above informational weaponsclassification is far from being universal and complete. We hope, however, thatit can serve as a basis for international negotiations on information securityproblems. We believe also that our suggestions may trigger wide discussions ofthe problem. It is quite possible that, following the future joint activities,the above classification could be expanded, modified or replaced with someother set of attributes and terms of IW identification, reflecting the commonapproach of scientific community to the problem.