01226nas a2200193 4500000000100000000000100001008004100002260000900043653002400052653002000076653004500096653002400141653002600165100001800191245007300209300001000282490000600292520073400298 2000 d c200010aasymmetric response10acyber-terrorism10ainformation infrastructure vulnerability10ainformation warfare10apsychological warfare1 aDeyan Gotchev00aKaleidoscopic Approach to Security Shadows in the Age of Information a13-320 v43 a

Information defies constraint by unique locus or finite production, i.e. space-related laws of functional spaces would not apply to "digital" systems. Information Warfare (IW) is impossible to be prosecuted in the established terms of national and transnational architectures. It is the next stage in evolution of attitudes toward authority. Security in the age of information warfare will be characterized by operations in the obscurant boundary region between real, often incomprehensible phenomena and dominating bluff. The opponents of future battlefields will become much more on a par. In an asymmetric strategic response the "victory" is based on a very small, or fuzzy differential of talent, performance, or luck.