Information Warfare : How Does It Work And How To Protect Yourself


Table of Contents

Share this article:

Information warfare, or infowar, aims to employ information and communication technologies (ICT) in order to harm an enemy country or organization.

It is used by hackers, as well as by official governments. But did you know it can also be used against a specific company or person?

Mailfence - Get your free, secure email today.

4.1 based on 177 user reviews

Mailfence - Get your free, secure email today.

4.1 based on 177 user reviews

What is information warfare ?

Information warfare encompasses several techniques:

  • Destruction or disruption of the adversary’s communications and/or information systems. The attacker can, for example, jam military communications or the communications systems involved in his opponent’s weaponry. He can also launch attacks (physical or cyberattacks) on the communication systems of civilian services (e.g., airports, financial markets, hospitals) to cripple these infrastructures.
  • Gathering key information about the adversary, its strategies and maneuvers. For example, this year, the Ukrainian army managed to connect Russian military communications networks to its own networks. This allowed them to spy on Russian communications, and to suspend them at a decisive moment to prevent the transmission of important information. Spying and analysis of personal data are also part of this.
  • The neutralization of certain media (television, radio), Internet sites or computer networks of the adversary. A belligerent can jam his opponent’s television transmissions, or launch Distributed Denial of Service (DDoS) attacks – These DDoS attacks aim to neutralize a computer, a network or a website by overwhelming it with so many computer requests. The infected computer, network or website gets swamped by their number and becomes ineffective).
  • Last but not least, the spreading of incorrect information or propaganda to manipulate the opponent’s public opinion or demoralize it. In some cases, television channels or Internet sites can even be hacked to broadcast misinformation messages. This is what happened recently, when the hacker collective Anonymous hijacked the websites of Russian media outlets including the news agencies TASS and RIA Novosti, and major newspaper titles such as Kommersant. The collective temporarily masked their respective homepages with a message criticizing the Russian attack on Ukraine.

Let’s focus on the latter and its psychological manipulation tactics.

Misinformation, a potent component of information warfare

The psychological operations of information warfare are essentially based on misinformation and propaganda. We call misinformation the deliberate spreading of false or partially incorrect information. This is the famous “fake news”, information created from thin air or modified to influence public opinion.

The aim is to generate political destabilization of an enemy country, by undermining the morale and trust of the population by disseminating fake news, rumors and by trying to create panic. But disinformation can also be used by a State or an organization on a domestic level to promote an idea or a concept ( lobbying), or to spread propaganda messages.

Different types of media can be used: newspapers, television, radio, but above all social media and other internet sites. Indeed, we live in an increasingly connected world. The Internet allows easier access to all kinds of information. But the downside is that it also facilitates the spread of misleading information.

Who are the actors of the information war?

Information warfare was not invented with the Russian-Ukrainian conflict and in the past, propaganda has sometimes been used as a weapon of war. During World War II, propaganda was used by both sides to win over the population.

However, what gives new strength to this tactic today is the exploitation of social networks and algorithms to boost the spread and impact of fake news and misleading messages.

Technology also allows the construction of more and more realistic fictional reports, thanks to “deepfakes”. There are ultra-sophisticated fakes elaborated by artificial intelligence. For example, it is possible to produce a video of a fake interview, based on a real one. Hackers can attribute polemical statements to political figures, and spread the fake video on social networks to discredit this person or shock users.

This technique has been used on several occasions, especially to influence elections in several countries. Russia used it during the 2016 and 2020 US presidential election. In 2016, nearly 126 million Americans were exposed to fake news spread by Russian agents through social networks, Facebook first. This disinformation was intended to arouse distrust of the Democratic candidate Hillary Clinton, and to push voters to vote for her opponent, Donald Trump.

In the aftermath of this scandal, it emerged that Russia had also been spreading disinformation to encourage Britons to vote for Brexit.

But Russia is far from being alone in engaging in this kind of activity. China and Iran are also often accused by the West to join Russia to compose an axis of evil, which would be the instigator of many fake news campaigns.

In fact, many governments are suspected of organizing peddling campaigns to influence the political debate in other nations or within their own countries. The United States, which often blames China and Russia, is itself a leading disinformation player. Recently, it ranked fourth in a report released by Facebook listing powers suspected of pursuing such strategies.

Hackers and official governments are using misinformation as a political tool.

How do infowar players proceed?

These disinformation operations are based on the use of content issued by fictitious journalists or media that imitate official media. The less wary users can be fooled by these fake reports or stories that often rely on sensationalism to get their attention.

They are thus encouraged to share and spread this misleading or inaccurate information within their community.

To multiply the power of this echo, the backers of these infowars may use what are known as troll farms (or troll factories). These are groups of hackers recruited to compose and spread disinformation messages on social networks on a massive scale.

Troll factories can also involve bots, i.e., programs that automate these message broadcasts. Bot farms sometimes have several thousand fake social network users. These fake accounts have a profile picture and realistic personal information. Often acting within specific groups, they simulate the activity of human social network users: they can like and share posts.

Worse, they often use artificial intelligence to generate comments and messages that can be personalized to better capture the attention of targeted human users.

Finally, in some cases, troll factories give legitimacy to their fake news by inviting well-known media outlets or personalities to spread it. This technique is called “disinformation laundering”.

A host of cognitive biases at work

Information warfare campaigns work because they are reinforced by various cognitive biases.There are several deviations in the way we process and give credence to the information that comes to us. Here are some of the biases that are most conducive to the spread of misinformation:

  • Confirmation bias. This cognitive bias is defined by the tendency of most of us to be more interested in information that confirms our beliefs than in information that might challenge them.
  • Availability bias: We tend to base our reasoning on information that we have already memorized, rather than trying to update it with new information.
  • Shared information bias: we give more time and credit to information that comes from our loved ones than to information that comes from outside sources (the official media, for example).

The echo chambers

This phenomenon ends up locking people in what is called an echo chamber. As time goes by, their opinion becomes more and more polarized, and they end up developing a deep distrust of public institutions and the press. As a result, public opinion appears increasingly divided.

Social network algorithms do the trick. Many offer a personalized content recommendation feature by default. This feature aims at encouraging the user to stay as long as possible on the platform by submitting more and more content similar to the ones that got them engaged. This is where our cognitive biases come into play: these similar contents are those that conform to our pre-existing opinions, or that come from our relatives. Users are constantly bombarded with contents that confirm and reinforce their ideas.

This fragmentation of society is precisely the result sought by disinformation tactics in an information war. A nation’s enemies seek to reinforce the divisions that fracture its society in order to weaken it even further.

In the United States, this situation had dramatic consequences during the COVID 19 pandemic. A large part of the population, relying on false information, refused to wear the mask, multiplying in a tragic way the number of contaminations and victims of the virus.


Companies are concerned by infowar

It is often assumed that these information wars are being waged by governments or politically motivated groups. It takes a powerful force to create a troll farm such as the Internet Research Agency, a Russian organization that interfered in the 2016 US election.

However, the anti-vaccine fake news that flourished during the COVID crisis, as well as the misleading messages seeking to disprove global warming, remind us that any topic can be subject to information warfare.

Businesses are no exception either, and can be directly targeted by a disinformation campaign, or be a collateral victim.

The bad news is that, unlike cyberattacks, this type of campaign is easy to implement, as it does not cost much.

Indeed, on the dark web, for example, many individuals are willing to sell fake followers and spread any information for money. Jigsaw, a company close to Google that focuses on cyberthreats and these misinformation phenomena, claims that anyone can afford a devastating fake news campaign for a potential rival for just $1,000.

Big brands, which are the most recognizable, make them easy targets. But small and medium-sized businesses are not spared either; now, any business is susceptible to information warfare.

What are the risks incurred?

On the Internet, information is king, and it proliferates. Malicious individuals, possibly paid by your competitors or your enemies, can try to launch an attack to damage your reputation. They may spread fake news intended to inspire disapproval against you, or information gleaned from your directories, such as contracts, photos or confidential documents. And even if you manage to remove the source of the spread, you can’t stop its dissemination.

A hacker can also break into your computer system to steal confidential documents for cash. If you are a journalist, you are particularly concerned by this type of threat.

Another possibility is spoofing: hackers can copy your email address, your domain name to spoof your electronic identity. Most of the time, they seek to access your bank and Internet accounts. But they can also connect to your social network accounts to post false messages and try to damage your reputation.

You can’t rule out espionage either which is also a component of information warfare. A loophole in your IT system may allow a clever hacker to access your secret documents, commercial contracts, prototypes or work contracts.

How to protect yourself against these threats?

It is therefore essential to protect yourself against hacking and data theft and to defend the privacy and anonymity of your data. This requires solid cyber-protection measures to avoid intrusions and spoofing:

Mailfence is favored by many journalists or dissidents who are happy to use the most secure protocols for their sensitive communications. But if you are a business or an organization, you will also appreciate to use a complete secure office suite that includes not only an email, but also a calendar, a meeting planner, a contact and group manager, a document storage and creation platform and a chat tool, all of which are secured by end-to-end encryption.

Interested ? For more information on Mailfence’s secure email suite, please do not hesitate to contact us at

Reclaim your email privacy.
Create your free and secure email today.
Picture of Patrick De Schutter

Patrick De Schutter

Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or He is a strong believer and advocate of encryption and privacy. You can follow @pdeschutter on Twitter and LinkedIn.

Recommended for you