Title: Digital Warfare: Using Malicious Computer Code As A Weapon

Subject: Strategies for employing digital data warfare.

Author(s): Lawrence G. Downs, Jr.; James R. Brungess (Faculty Advisor)

DTIC Keywords: COMPUTER VIRUSES, INFORMATION SYSTEMS, UNCONVENTIONAL WARFARE

Abstract: Digital Data Warfare (DDW) is an emerging field that has great potential as a means to meet military, political, economic, and personal objectives. Distinguished from the "hacker" variety of malicious computer code, by its predictable nature and the ability to target specific systems, DDW provides the hacker with the means to deny, degrade, decieve, and/or exploit a targeted system. The five phases of DDW attack--penetration, propogation, dormancy, execution, and termination, are presented for the first time by the author in this paper.

The nature allows it to be used in the stategic, operational, and tactical warfare roles. Three questions should be considered when developing a strategy for employing DDW: (1) Who should control the employment of DDW? (2) What types of systems should be targeted, and (3) Under what circumstances should DDW be used?

Finally, a brief overview of possible countermeasures against DDW is provided as well as an outline of an effective information system security program that would provide a defense against DDW.


Download Adobe Acrobat viewer:

Last updated 1996 Dec 16
Return to Air University Home Page
Return to Air University Research Database