concept

information war

Also known as: information war, information wars, information warfare

Facts (23)

Sources
Hybrid War: High-tech, Information and Cyber Conflicts connections-qj.org Connections: The Quarterly Journal Mar 1, 2026 9 facts
claimInformation warfare can replace kinetic operations in some cases, undermining defensive campaigns before they begin.
accountSince 2014, information warfare actions in Ukraine have resulted in the discrediting of the Armed Forces, mistrust of state authorities, doubt regarding military necessity, damage to civic morale, and the encouragement of desertion among military personnel.
claimCyber-related actions and information warfare are increasing in both scope and importance for warfighters, making them critical factors for understanding the future arc of conflict.
referenceHaroro J. Ingram authored 'Three traits of the Islamic State’s information warfare,' published in The RUSI Journal 159, no. 6 in 2014, pages 4-11.
claimHybrid warfare involves an increasing reliance on radio-electronic, psychological, and information warfare conducted via cyber assets.
claimHybrid warfare is defined as a combination of conventional and unconventional or irregular warfare that extends beyond the battlefield to encompass economic, diplomatic, information (including psychological, cyber, and misinformation), and political warfare.
claimModern hybrid warfare utilizes new technologies to achieve strategic goals through unconventional and cognitive effects, including social influence, manipulation, cyber operations, information warfare, and the degradation of state control systems.
claimCurrent hybrid wars are characterized by the deployment of equal or superior information warfare resources, soft power, and kinetic forces by an enemy, rendering standard distributional design approaches inefficient in real conflict conditions.
claimThe use of fractal analysis, self-organization, and bifurcation models increases the effectiveness of information warfare countermeasures by providing advance warning, improving information completeness and accuracy, and ensuring timely reactions.
Rethinking Espionage in the Modern Era cjil.uchicago.edu Chicago Journal of International Law 5 facts
claimThe Shanghai Cooperation Organization, which includes Russia and China, defines 'information war' as mass psychological brainwashing intended to destabilize society and the state, and to force the state to make decisions in the interest of an opposing party.
claimConcerns regarding information warfare were highlighted following the leaks of emails during the 2016 United States presidential election.
claimStates with established institutions and complex systems are asymmetrically affected by information warfare and are incentivized to impose common regulations that target weaker states capable of engaging in such activities with less fear of reciprocity.
claimThe monitoring rationale for self-defense is becoming less compelling for justifying espionage because it is increasingly difficult to distinguish between defensive and offensive measures, particularly given recent accusations of countries weaponizing information and engaging in information wars.
claimThe Shanghai Cooperation Organization has officially recognized the threat of information wars.
Beyond Missile Deterrence: The Rise of Algorithmic Superiority trendsresearch.org Trends Research & Advisory Mar 16, 2026 5 facts
procedureThe 'AI_Regional_Conflict_Model' conceptual framework illustrates AI's role in regional conflict through four primary branches: (1) UAVs and Autonomous Systems for reconnaissance, strike missions, and swarming; (2) Intelligence Analysis for combining data and generating predictive assessments; (3) Cyber Operations involving offensive and defensive measures; and (4) Information Warfare involving disinformation and influence campaigns. These branches collectively impact regional conflict escalation, deterrence, and the balance of power.
claimInformation warfare involves the deliberate use and manipulation of information to influence the perceptions, decision-making, and behavior of adversaries, allies, and domestic audiences through disinformation campaigns, psychological operations, perception management, and narrative shaping.
claimArtificial intelligence is embedded across unmanned aerial vehicles (UAVs), autonomous systems, intelligence analysis, cyber operations, and information warfare, which changes how states project power and manage crises.
claimIn the digital age, information warfare is amplified by online platforms, algorithmic content curation, and the availability of detailed data on target audiences, enabling more precise and persistent influence operations in conjunction with kinetic and cyber actions.
referenceIDS International published a blog post on February 21, 2023, regarding the digital age of cyber and information warfare.
How Will Cyber Warfare Shape the U.S.-Israel Conflict with Iran? csis.org CSIS Mar 3, 2026 1 fact
claimThe alleged Israeli BadeSaba hack, which coincided with airstrikes, blurred the lines between cyber, information, and electronic warfare, suggesting that distinguishing between these domains is becoming obsolete.
How NATO can integrate AI to prevail in future algorithmic warfare atlanticcouncil.org Atlantic Council 4 days ago 1 fact
claimNuclear electromagnetic pulse (EMP) weapons are categorized by some as electronic warfare or information warfare rather than nuclear warfare.
Navigating the Digital Battlefield - Joint Air Power Competence Centre japcc.org JAPCC 1 fact
claimHezbollah’s cyber arm acts as an extension of Iran’s Revolutionary Guard Corps (IRGC) and has evolved into a force capable of conducting information warfare campaigns.
Strategic analysis of cyber conflicts: A game-theoretic modelling of ... securityanddefence.pl Security and Defence Quarterly May 31, 2025 1 fact
perspectiveNations must strengthen technical defenses, enhance resilience to information warfare, improve international cooperation in cybercrime investigations, and develop robust policy frameworks for responding to state-sponsored cyberattacks.