The IT Law Wiki



Disruption is

an event that causes a computer program, computer, computer system, network, or component thereof, to be inoperable, or operate in an unintended manner, for a length of time due to destruction of and/or interference with a computer program, computer, computer system, network, computer data, content data, and/or traffic data.[1]

Electronic warfare[]

Disruption aims to confuse or delay enemy action. Forces achieve disruption with electromagnetic jamming, electromagnetic deception, and electromagnetic intrusion.


Disruption is

[a]n unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).[2]
[a]n event which causes unplanned interruption in operations or functions for an unacceptable length of time.[3]
[d]enial of service or corruption of information resulting from a single event, cause, or source; whether direct or indirect, accidental or intentional, rare or common.[4]

Disruption is "an event affecting an organisation's ability to perform its critical operations."[5]

Overview (Electronic warfare)[]

"Disruption techniques interfere with the adversary's use of the electromagnetic spectrum to limit adversary combat capabilities. Disruption resembles denial but is not as comprehensive in execution or impact on the enemy. A trained enemy operator can thwart disruption through electronic protection measures, such as procedures to counter communications jamming. Disruption enhances attacks on hostile forces and acts as a force multiplier by increasing adversary uncertainty while reducing uncertainty for friendly forces. Advanced electronic attack activities offer the opportunity to nondestructively disrupt or degrade adversary infrastructure."[6]

Overview (Infrastructure)[]

Disruption of any infrastructure is inconvenient and can be costly and even life threatening. Major disruptions could lead to major losses and affect national security, the economy, and the public good. Mutual dependence and the interconnectedness made possible by the information and communications infrastructure has lead to the possibility that infrastructures may be vulnerable in ways they never have been before. Intentional exploitation of these new vulnerabilities could have severe consequences for our economy, security, and way of life.


See also[]