1 Hour IO Brief - IWS - The Information Warfare Site

Download Report

Transcript 1 Hour IO Brief - IWS - The Information Warfare Site

College of Aerospace Doctrine, Research and Education The Information Operations Environment IW-200

Information Operations

Why are we talking about IO and IW?

What is it? What are its elements?

(Is it all about computers?)

What is the AF doing about it?

The Aerospace Domain

Air Space Info Air, Space and Info Ops Are Inherently Intertwined IO is an integral part of all successful aerospace functions

Overview

The world we live in

The Information Age

Changes

Technology Driven

Changing Nature of Warfare

Impact of Technology

Paradigms

IO Doctrine - Definitions and differences

I-Bomb Video

Information Age Changes

Industrial Age

Production:

Land

Labor

Capital:

Tangible Assets

Money:

Gold, minerals

Paper

Information Age

Production:

Knowledge

Service Oriented

Capital:

Intangibles

Money:

Electronic / digital

Information Age Changes

  

Industrial Age

Work:

Physical

Repetitive, interchangeable Scale:

Big plant operations

Mass produced Organization:

– –

Bureaucratic Vertical

Information Age

  

Work:

Service oriented

Creative Scale:

– –

Small, dispersed Individualized Organization:

Virtual, networked

Telecommute

Information Age Changes

Industrial Age

Individual:

Not unique, homogeneous society

Marxism, etc.

Family:

Stripped of functions like education, health

Population:

Urbanized

  

Information Age

Individual:

Unique, heterogeneous society

Individualism Family:

Reassuming roles

Home-schooling, etc Population:

Sub-urbanizing

Dispersed

Information Age Changes

Industrial Age

Political:

Nationalism

Majority-minority conflicts

Big government actions

Strong political parties

Information Age

Political:

Localism, transnationalism

Minority-minority conflicts

Smaller government

Political parties weaker

Living in a Revolution

“We live in an age that is driven by information.

It’s an age which Alvin Toffler has called the Third Wave. The ability to acquire and communicate huge volumes of information in real time, computing power to analyze this information quickly, and the control systems to pass this analysis to multiple users simultaneously - these are the technological breakthroughs that are changing war and how we prepare for war.”

SECEDEF William Perry, 5 May 1994

Technology Explosion

1959 5,000 Stand-alone Computers No FAX Machines No Cellular Phones No E-mail 1999 180 Million Computers 14 Million FAX Machines 40 Million Cellular Phones E-mail Exceeds Postal Service

The Technology Behind The Change

Computing technology and the Chip

Only Ten years ago, 1990

MORE People in AF than Computers

Just beginning to Network

• •

Stand Alone Functions Sneaker Net Z Series PCs: Z-100, Z-150, Z-200, etc.

Primitive by today’s standards

The Technology Behind The Change

Today…

#PCs > #AF users

Chip speeds > gigahertz

Interconnected, WWW

AF Networks handle billions of electronic events annually

Terminology

Systems Administrators

• •

Knowledge managers Chief Information Officers

Microchip is the Driver

Communications bandwidth continues to increase Memory size triples every 18 months 6 months Processor power doubles every 24 months 6 months Density doubles every 24 months 6 months Cost halved every 18 months 12 months

Interconnected World

DMS GCCS GCSS GTN DSN TPFDD TBMCS

Demand for Information

Use breeds dependence...

dependence creates VULNERABILITY Persian Gulf War: PCs, SATCOM, Automated Switching, PGMs, Automated Navigation Vietnam: SATCOM, Mainframe Computers GII NII DII Lanterns Napoleonic Wars: Signal Towers Signal Mirrors Printed Documents WWII, Korea: Radios, Radars, Enigma, Ultra Civil War: Telegraph WWI: Telephone 1300 1400 1500 1600 1700 1800 1900 2000

What is Information?

= Data + Instructions Corrupt Transmit It Exploit Transform It Deny Collect It Destroy Store It

The Real Impact of the Technology

Every military capability depends on computers and networks in one way or another!!

Military / Technology

Technological Revolution Impact on Warfighting

Computer processing power Storage device density Reduce size, weight, power Display resolution Sensors Bandwidth Software Capability Precision Lethality Speed & maneuver Stealth Awareness Reliability Improved logistics

Security Paradigms

    

Old Known adversaries, understood threat Long warning times Leading edge technology confined to major powers Force-on-force, land centric battle Serial attack, target-by target

Information an adjunct to weapons

     

Now Unpredictable opponents/challenges Short warning times Leading edge technology proliferates Selective force for effect Asymmetrically applied air and space power Simultaneous, parallel strike

Information a weapon / target

Why is IO Important?

The means by which enlightened rulers and sagacious generals moved and conquered others…was advance knowledge . Advance knowledge cannot be gained from ghosts and spirits, inferred from phenomena, or projected from the measures of Heaven, but must be gained from men, for it is the knowledge of the enemy’s true situation.

Sun Tzu

Joint Vision 2020

The Goal: Full Spectrum Dominance

Dominant Maneuver

Precision Engagement

Focused Logistics

Full-Dimensional Protection

All Bounded & Enabled by Information Superiority

AF Core Competencies

Global Attack

Precision Engagement

Rapid Global Mobility

Air And Space Superiority

Agile Combat Support

Information Superiority Land Space Air Sea The other realm Information

Information Operations

AFDD 2-5, Aug 1998

AF CONOPS, Dec 1999

AF Organizations are restructuring or being created to perform IO/IW AFDD 2-5.1 EW AFDD 2-5.2 ISR AFDD 2-5.3 PSYOP AFDD 2-5.4 PAO

IO Definition

Information Operations comprise those actions taken to gain, exploit, defend, or attack information and information systems and include both information-in-warfare information warfare and are and conducted through-out all phases of an operation and across the range of military operations.

AFDD 2-5

ISR Precision Nav & Positioning Weather Other Info Collection/ Dissemination Activities

Gain

PAO

Exploit

DCI OPSEC, CND, PAO Counterdeception Counterpropaganda Electronic Protection Counterintelligence Information Assurance

Defend

Counterinformation OCI CNA Military Deception EW PSYOP Physical attack PAO

Attack

AFDD 2-5

INFORMATION SUPERIORITY INFORMATION OPERATIONS

INFORMATION-in-WARFARE

gain exploit Precision Nav & Position ISR Other Info Collection/ Dissemination Activities Weather PAO Successfully executed Information Operations achieve information superiority

INFORMATION WARFARE

defend attack

COUNTERINFORMATION DEFENSIVE COUNTERINFORMATION

Information Assurance Counter Intelligence OPSEC Electronic Protect Counter Propaganda Counter Deception CND PAO

OFFENSIVE COUNTERINFORMATION

PSYOP Physical Attack Military Deception Electronic Warfare CNA PAO

Joint Doctrine

JP 3-13 IO

JP 3-13.1 C2W

JP 3-51 EW

JP 3-53 PSYOP

JP 3-54 OPSEC

JP 3-58 Deception

JP 3-61 PA

Joint Doctrine

Joint Pub 3-13:

IO comprise those actions taken to affect adversary information and information systems while defending one’s own information and information systems

AFDD 2-5:

IO comprise those actions taken to gain, exploit, defend, or attack information and information systems and include both information-in-warfare and information warfare

IIW

Gain / Exploit

ISR PNP WX PA Joint Doctrine vs new AF Doctrine Information Superiority Information Operations JP 3-13 AFDD 2-5 AFDD 2-5 Draft Information Warfare Counter Information OFFENSIVE Deception EW (EA) Physical Attack PSYOP CNA PA (Info Attack) OPSEC SIO DEFENSIVE Counter Deception EW (EP) Counter Propaganda Info Assurance (C-PSYOP) OPSEC Counter Intelligence PA Physical Security SIO CND

When do we do IO?

PEACE CRISIS WAR RESTORAL PEACE Even when the US is at peace, the AF is fully engaged, on a daily basis, in conducting some IO functions.

Information Operations

Physical Attack / CNA Deception, PSYOP, EW Command, Control, Communications & Computers Intelligence, Surveillance and Reconnaissance Assurance (OPSEC, INFOSEC, COMPUSEC, COMSEC, EMSEC) Position/Navigation, Weather, PAO, Transmission/Storage Peace Crisis Conflict Restoration Peace

“Warfare is intended not to kill someone, but to change their behavior. If you kill someone, you dramatically change their behavior.” Vice Adm. Arthur Cebrowski President, Naval War College

ACT

Objectives of IO

Control, Exploit, Enhance OBSERVE OBSERVE ORIENT DECIDE DECIDE ORIENT

IO: A Warrior’s Perspective

CNA OPSEC PSYOP Destruction Deception EW

IO can support, and can be supported by, all other aspects of aerospace power.

Influencing Enemy’s Objectives

Attack - Insert False Data Decision Maker

Data is interrupted either by jamming or manipulation Replace Information Source with Deception or PSYOP

Shape the Enemy’s Allocation of Resources

The Aerospace Domain

IO is an integral part of all successful aerospace functions Air Space Info

GAIN INFORMATION EXPLOIT INFORMATION DEFEND INFORMATION ATTACK INFORMATION