Transcript 1 Hour IO Brief - IWS - The Information Warfare Site
College of Aerospace Doctrine, Research and Education The Information Operations Environment IW-200
Information Operations
Why are we talking about IO and IW?
What is it? What are its elements?
(Is it all about computers?)
What is the AF doing about it?
The Aerospace Domain
Air Space Info Air, Space and Info Ops Are Inherently Intertwined IO is an integral part of all successful aerospace functions
Overview
The world we live in
–
The Information Age
–
Changes
–
Technology Driven
Changing Nature of Warfare
–
Impact of Technology
–
Paradigms
–
IO Doctrine - Definitions and differences
I-Bomb Video
Information Age Changes
Industrial Age
Production:
–
Land
–
Labor
Capital:
–
Tangible Assets
Money:
–
Gold, minerals
–
Paper
Information Age
Production:
–
Knowledge
–
Service Oriented
Capital:
–
Intangibles
Money:
–
Electronic / digital
Information Age Changes
Industrial Age
Work:
–
Physical
–
Repetitive, interchangeable Scale:
–
Big plant operations
–
Mass produced Organization:
– –
Bureaucratic Vertical
Information Age
Work:
–
Service oriented
–
Creative Scale:
– –
Small, dispersed Individualized Organization:
–
Virtual, networked
–
Telecommute
Information Age Changes
Industrial Age
Individual:
–
Not unique, homogeneous society
–
Marxism, etc.
Family:
–
Stripped of functions like education, health
Population:
–
Urbanized
Information Age
Individual:
–
Unique, heterogeneous society
–
Individualism Family:
–
Reassuming roles
–
Home-schooling, etc Population:
–
Sub-urbanizing
–
Dispersed
Information Age Changes
Industrial Age
Political:
–
Nationalism
–
Majority-minority conflicts
–
Big government actions
–
Strong political parties
Information Age
Political:
–
Localism, transnationalism
–
Minority-minority conflicts
–
Smaller government
–
Political parties weaker
Living in a Revolution
“We live in an age that is driven by information.
It’s an age which Alvin Toffler has called the Third Wave. The ability to acquire and communicate huge volumes of information in real time, computing power to analyze this information quickly, and the control systems to pass this analysis to multiple users simultaneously - these are the technological breakthroughs that are changing war and how we prepare for war.”
SECEDEF William Perry, 5 May 1994
Technology Explosion
1959 5,000 Stand-alone Computers No FAX Machines No Cellular Phones No E-mail 1999 180 Million Computers 14 Million FAX Machines 40 Million Cellular Phones E-mail Exceeds Postal Service
The Technology Behind The Change
Computing technology and the Chip
Only Ten years ago, 1990
–
MORE People in AF than Computers
–
Just beginning to Network
• •
Stand Alone Functions Sneaker Net Z Series PCs: Z-100, Z-150, Z-200, etc.
–
Primitive by today’s standards
The Technology Behind The Change
Today…
–
#PCs > #AF users
–
Chip speeds > gigahertz
–
Interconnected, WWW
–
AF Networks handle billions of electronic events annually
–
Terminology
•
Systems Administrators
• •
Knowledge managers Chief Information Officers
Microchip is the Driver
Communications bandwidth continues to increase Memory size triples every 18 months 6 months Processor power doubles every 24 months 6 months Density doubles every 24 months 6 months Cost halved every 18 months 12 months
Interconnected World
DMS GCCS GCSS GTN DSN TPFDD TBMCS
Demand for Information
Use breeds dependence...
dependence creates VULNERABILITY Persian Gulf War: PCs, SATCOM, Automated Switching, PGMs, Automated Navigation Vietnam: SATCOM, Mainframe Computers GII NII DII Lanterns Napoleonic Wars: Signal Towers Signal Mirrors Printed Documents WWII, Korea: Radios, Radars, Enigma, Ultra Civil War: Telegraph WWI: Telephone 1300 1400 1500 1600 1700 1800 1900 2000
What is Information?
= Data + Instructions Corrupt Transmit It Exploit Transform It Deny Collect It Destroy Store It
The Real Impact of the Technology
Every military capability depends on computers and networks in one way or another!!
Military / Technology
Technological Revolution Impact on Warfighting
Computer processing power Storage device density Reduce size, weight, power Display resolution Sensors Bandwidth Software Capability Precision Lethality Speed & maneuver Stealth Awareness Reliability Improved logistics
Security Paradigms
Old Known adversaries, understood threat Long warning times Leading edge technology confined to major powers Force-on-force, land centric battle Serial attack, target-by target
Information an adjunct to weapons
Now Unpredictable opponents/challenges Short warning times Leading edge technology proliferates Selective force for effect Asymmetrically applied air and space power Simultaneous, parallel strike
Information a weapon / target
Why is IO Important?
The means by which enlightened rulers and sagacious generals moved and conquered others…was advance knowledge . Advance knowledge cannot be gained from ghosts and spirits, inferred from phenomena, or projected from the measures of Heaven, but must be gained from men, for it is the knowledge of the enemy’s true situation.
Sun Tzu
Joint Vision 2020
The Goal: Full Spectrum Dominance
–
Dominant Maneuver
–
Precision Engagement
–
Focused Logistics
–
Full-Dimensional Protection
All Bounded & Enabled by Information Superiority
AF Core Competencies
Global Attack
Precision Engagement
Rapid Global Mobility
Air And Space Superiority
Agile Combat Support
Information Superiority Land Space Air Sea The other realm Information
Information Operations
AFDD 2-5, Aug 1998
AF CONOPS, Dec 1999
AF Organizations are restructuring or being created to perform IO/IW AFDD 2-5.1 EW AFDD 2-5.2 ISR AFDD 2-5.3 PSYOP AFDD 2-5.4 PAO
IO Definition
Information Operations comprise those actions taken to gain, exploit, defend, or attack information and information systems and include both information-in-warfare information warfare and are and conducted through-out all phases of an operation and across the range of military operations.
AFDD 2-5
ISR Precision Nav & Positioning Weather Other Info Collection/ Dissemination Activities
Gain
PAO
Exploit
DCI OPSEC, CND, PAO Counterdeception Counterpropaganda Electronic Protection Counterintelligence Information Assurance
Defend
Counterinformation OCI CNA Military Deception EW PSYOP Physical attack PAO
Attack
AFDD 2-5
INFORMATION SUPERIORITY INFORMATION OPERATIONS
INFORMATION-in-WARFARE
gain exploit Precision Nav & Position ISR Other Info Collection/ Dissemination Activities Weather PAO Successfully executed Information Operations achieve information superiority
INFORMATION WARFARE
defend attack
COUNTERINFORMATION DEFENSIVE COUNTERINFORMATION
Information Assurance Counter Intelligence OPSEC Electronic Protect Counter Propaganda Counter Deception CND PAO
OFFENSIVE COUNTERINFORMATION
PSYOP Physical Attack Military Deception Electronic Warfare CNA PAO
Joint Doctrine
JP 3-13 IO
JP 3-13.1 C2W
JP 3-51 EW
JP 3-53 PSYOP
JP 3-54 OPSEC
JP 3-58 Deception
JP 3-61 PA
Joint Doctrine
Joint Pub 3-13:
–
IO comprise those actions taken to affect adversary information and information systems while defending one’s own information and information systems
AFDD 2-5:
–
IO comprise those actions taken to gain, exploit, defend, or attack information and information systems and include both information-in-warfare and information warfare
IIW
Gain / Exploit
ISR PNP WX PA Joint Doctrine vs new AF Doctrine Information Superiority Information Operations JP 3-13 AFDD 2-5 AFDD 2-5 Draft Information Warfare Counter Information OFFENSIVE Deception EW (EA) Physical Attack PSYOP CNA PA (Info Attack) OPSEC SIO DEFENSIVE Counter Deception EW (EP) Counter Propaganda Info Assurance (C-PSYOP) OPSEC Counter Intelligence PA Physical Security SIO CND
When do we do IO?
PEACE CRISIS WAR RESTORAL PEACE Even when the US is at peace, the AF is fully engaged, on a daily basis, in conducting some IO functions.
Information Operations
Physical Attack / CNA Deception, PSYOP, EW Command, Control, Communications & Computers Intelligence, Surveillance and Reconnaissance Assurance (OPSEC, INFOSEC, COMPUSEC, COMSEC, EMSEC) Position/Navigation, Weather, PAO, Transmission/Storage Peace Crisis Conflict Restoration Peace
“Warfare is intended not to kill someone, but to change their behavior. If you kill someone, you dramatically change their behavior.” Vice Adm. Arthur Cebrowski President, Naval War College
ACT
Objectives of IO
Control, Exploit, Enhance OBSERVE OBSERVE ORIENT DECIDE DECIDE ORIENT
IO: A Warrior’s Perspective
CNA OPSEC PSYOP Destruction Deception EW
IO can support, and can be supported by, all other aspects of aerospace power.
Influencing Enemy’s Objectives
Attack - Insert False Data Decision Maker
Data is interrupted either by jamming or manipulation Replace Information Source with Deception or PSYOP
Shape the Enemy’s Allocation of Resources
The Aerospace Domain
IO is an integral part of all successful aerospace functions Air Space Info
GAIN INFORMATION EXPLOIT INFORMATION DEFEND INFORMATION ATTACK INFORMATION