Viewing Information Warfare As a Use of Force Prohibited by Article 2(4) of the U.N

Total Page:16

File Type:pdf, Size:1020Kb

Viewing Information Warfare As a Use of Force Prohibited by Article 2(4) of the U.N Case Western Reserve Journal of International Law Volume 30 Issue 2 Article 7 1998 Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2(4) of the U.N. Charter Todd A. Morth Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Todd A. Morth, Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2(4) of the U.N. Charter, 30 Case W. Res. J. Int'l L. 567 (1998) Available at: https://scholarlycommons.law.case.edu/jil/vol30/iss2/7 This Note is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. CONSIDERING OUR POSITION: VIEWING INFORMATION WARFARE AS A USE OF FORCE PROHIBITED BY ARTICLE 2(4) OF THE U.N. CHARTER Todd A. Morth" This is Radio Clash Stealing all transmissions Beaming from the mountaintop Using aural ammunition With extreme prejudice On a terminatormission This is Radio Clash Consider your position.' I. INTRODUCTION INFORMATION WARFARE IS AN EMERGING THREAT TECHNOLOGY HAS RAPIDLY ADVANCED from the radios that the popular singing group The Clash sang about in 1981, as the world's most advanced countries enter into what has been termed the "information age."2 This new epoch is defimed by the use of computers, particularly computers grouped into the "network form 3 - computers used to facili- tate human interactions.4 These information networks have led to numer- ous advances in the quality of life by improving the provision of vital services such as power, medicine, and public safety 5 However, dependence on information networks also places those J.D. Candidate, Case Western Reserve University School of Law, 1998. THE CLASH, Radio Clash, on THIs IS RADIO CLASH, (Epic Records, 1981). 2 See ALviN ToFRLER & HEmI TOF.ER, WAR AND ANT-WAR 19 (1993) (discuss- ing what they view as the "Third Wave" of civilization). 3 See JoHN ARQUILLA & DAVID RONFELDT, THE ADVENT OF NET WAR 33-35 (1996) (explaining that the "network form" involves large-scale use of interconnected groups of information storage and retrieval technologies such as computers). 4 See i. See Security in Cyberspace: Hearings Before the Permanent Subcomm. on Investigations of the Senate Comm. on Gov't. Affairs, 104th Cong. 150, 155 (1996) [hereinafter Security in Cyberspace] (testimony of Jamie S. Gorelick, Deputy Attorney General) (describing how technology generally, and information networks specifically, play critical roles in the functioning and development of these important areas). 567 CASE W. RES. J. INTL L. [Vol. 30:567 countries reliant upon them in a position of vulnerability.' If vital infor- mation networks stopped functioning, an information age society would be paralyzed and could quickly collapse into chaos.7 Attacks on informa- tion networks, or information warfare (IW), could inflict damage rivalled only by other weapons of mass destruction such as nuclear or chemical weapons.' A concerted IW attack could devastate a modem society by crippling the information networks crucial to providing power, transporta- tion, national defense, and medical services.9 The destructive capability of IW presents a significant threat to the international community and creates a need for consideration of a mechanism to respond to 1W attacks. Information warfare is especially troublesome for the international community because relative to chemical, biological, or nuclear weapons, the technology required to attack information networks is simple to acquire.' Information networks can also be sabotaged via the manufac- 6 See David C. Gompert, Keeping Information Warfare in Perspective <http:ll www.rand.org/publicationsfRRR/RRR.fa195.cyber/perspective.htnl> (visited Mar. 5, 1997) (explaining that the U.S. dependency on information networks has grown much faster than our understanding of the vulnerabilities this dependence causes). 7 See WINN SCHWARTAU, INFORMATION WARFARE: CHAOS ON THE ELECTRONIC SUPERHIGHWAY 308-10 (1994) (describing how a concerted attack against critical finan- cial and communication networks could result in widespread panic and lead to a situation resembling anarchy). ' See Paul Mann, Cyber-Threat Expands With Unchecked Speed, AVIATION WK. & SPACE TECH., July 8, 1996, at 63, 64 (reporting that CIA Director, John Deutch, ranks threats of information warfare as "a close third behind the threats from weapons of mass destruction (WMD) and the proliferation and terrorist use of nuclear, biological, and chemical ...weapons). See also Walter Laqueur, Postmodern Terrorism, FOREIGN AFF., Sept.-Oct. 1996, at 9 (claiming information warfare will be more destructive than either chemical or biological weapons); Bruce Smith, An Eye for An Eye, A Byte for A Byte, 42 FED. LAW., Oct. 1995, 12, 12-13 (speculating that information warfare might be more effective than nuclear weaponry). But see Larry Seaquist, The Ten-Foot- Tall Electron: Finding Security in the Web, in THE INFORMATION REVOLUTION AND NATIONAL SEcuRrrY 68, 75 (Stuart J.D. Schwartzstein ed., 1996) (arguing that history proves that societies have the resiliency to survive any impacts that information warfare might cause and that comparisons between IW and nuclear and chemical warfare are unjustified). 9 See infra notes 152-54 and accompanying text. 10 See SCHWARTAU, supra note 7, at 308-10. All that would be needed to conduct extensive information warfare would be a bank of high-powered computers and modems and people with the requisite expertise to use them. See id. Moreover, with the end of the "Cold War," the United States and the international community have eased consid- erably their restrictions on the export of computers and other information technology. U.S. CONGRESS, OFFICE OF TECHNOLOGY ASSESSMENT, INFORMATION SECURITY AND PRIVACY IN NETWORK ENVIRONMENTS, OTA-TCT-606, 154-55 (Sept. 1994). 19981 INFORMATION WARFARE AND ARTICLE 2(4) 569 ture of purposely defective equipment and, given the wide manufacturing base for computers, there exists significant opportunity for such sabotage to occur." The current state of international politics, with the demise of the Soviet Union as a superpower and the United Nations coalition victory in the 1991 Gulf War, has created a situation where non-conven- tional means, such as terrorism or information warfare, offer the best mechanism to attack the advanced "Western" countries." This makes non-conventional attack methods such as destroying information networks attractive to those who have interests adverse to those of the United States and its allies.' At least twelve countries have started to develop the capability to conduct attacks on information networks. Twenty-six other countries might be developing this capability. 4 The United States and several European countries have recognized the potential threat posed by IW and are developing their own 1W capabilities in answer to the threat. 5 These countries are also attempting to establish national legal mechanisms to respond to IW. 6 However, the unilateral attempts by these countries to control IW have caused them to overlook critical aspects of it and other mechanisms to control this kind of warfare.17 The U.N. system of dispute resolution by the Security Council and the International Court of Justice offers a mechanism to control 1W."g An " See SCHWARTAU, supra note 7, at 165 (1994) (noting that computer chips for U.S. and Japanese computers are manufactured throughout the Pacific Rim). " See International Terrorism: Hearing Before the Senate Select Comm. on Intelligence, 104th Cong. (1996) [hereinafter International Terrorism] (testimony of James Schlesinger, Former Secretary of Defense, arguing that the break-up of the Soviet Union and the Warsaw Pact caused the dissolution of the only military force capable of challenging the advanced "Western" countries on a global scale. The Gulf War indicated the superiority of U.S. and European military forces over regional powers such as Iraq). 3 See id.; see also R. James Woolsey, Resilience and Vulnerability in the Informa- tion Age, in TmE INFORMATION REVOLUTION AND NATIONAL SEcURIrrY 79, 82-83 (Stuart 3. D. Schwartzstein ed., 1996) (describing incentives rogue states and terrorist groups have to engage in information warfare). 14 See John Donnelly, Intel Report: Dirty Dozen Nations are Industrial Spies, DEFENSE WK., July 1, 1996, available in 1996 WL 7978531. " See J. Knowles, /W Battlelab to Go Operational This Month, J. OF ELEC. DEF., June 1, 1997 (describing how the Air Force is now conducting intensive studies of both offensive and defensive information warfare). 26 See infra notes 55-64 and accompanying text. , See infra notes 115-27 and accompany text. 28 See IAN BROWNLIE, PRINCIPLES OF PUBLIC INTERNATIONAL LAW 58-59 (4th ed. 1990) (explaining capacities necessary for the right to bring an international claim). 570 CASE W. RES. J. INT'L L. [Vol. 30:567 exploration of this mechanism will allow the international community to plan more effectively its response to IW. The U.N. dispute resolution mechanism also offers the advantage of already being in place, while other mechanisms have not yet been formulated, much less implemented. This Note considers whether the international community should view IW as a prohibited use of force under Article 2(4) of the United Nations Charter. Article 2(4) of the Charter proscribes the use of force to resolve international disputes. 9 Part I focuses on creating a clear definition of IW. This process involves defining IW and then contrasting it as defined with similar, yet different activities. Part II explains why the transnational nature of IW requires the international community to recognize and respond to AW. Part I examines whether Article 2(4) of the U.N. Charter is an appropriate mechanism to respond to IW.
Recommended publications
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age
    IV Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age Daniel T. Kuehl· Introduction hat is "information warfare"? Is it nothing more than a bumper W sticker, used as a "quick fix" rescue for budgets and programs that find it useful to attach themselves to the hot new concept? Is it such a revolu­ tionary new amalgam of technologies and concepts that old and traditional forms of warfare are soon slated to fall into the same receptacle in which out­ moded military technologies such as the catapult and war galley slumber? Is warfare as we understand it, featuring "blast, heat, and fragmentation," about to become obsolete?1 The intent of this brief introduction to information warfare (IW) and information operations (10) is to both explore these issues and present the thesis that they are best understood in light of the environment in which they take place-the information environment-and to explore the relation­ ship of that environment to the specific topic on which this book is focused, computer network attack. Information Operations, Inforntation Warfare, and Computer Network Attack What is Information Warfare? A useful starting place is to trace the evolution of the term information warfare itsel£ The earliest use of the term in the United States probably origi­ nated in the Office of Net Assessment, where in the 1970s Dr. Tom Rona was investigating the relationships among control systems, a field known as cyber­ netics. Dr. Rona described the competition between competing control systems as "information warfare," in the sense that control systems can be described as the means for gathering, processing, and disseminating information, processes which can be diagrammed and described with flow and feedback charts of mind-numbing dryness and complexity.2 In 1993 the Department of Defense published an official definition for the term, in a highly classified DoD Directive, TS3600.1.
    [Show full text]
  • Cyber Wars: a Paradigm Shift from Means to Ends
    Cyber Wars: A Paradigm Shift from Means to Ends Amit SHARMA a,1 a Institute for System Studies and Analysis (I.S.S.A), Defence Research and Development Organization (D.R.D.O), Ministry of Defence, India Abstract. The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commentators are terming this information age as a Revolution in Military Affairs (RMA). These advances have not only revolutionized the way in which wars are fought, but have also initiated a new battle for the control of a new dimension in the current contemporary world: The Cyber Space. Over time cyber warfare has assumed the shape of an elephant assessed by a group of blind people, with every one drawing different meanings based upon their perceptions. Under these circumstances there was a gradual paradigm shift in military thinking and strategies, from the strategic aspect to the tactical aspect of cyber warfare laying more emphasis on cyber attacks and counter measures. This resulted in the formation of a notion that cyber warfare or information warfare is a potent force multiplier, which in a sense downgraded the strategic aspects of cyber war to a low grade tactical warfare used primarily for a force enhancement effect. The author believes this is wrong, cyber war is a new form of warfare and, rather than cyber war merely being an enhancement of traditional operations, traditional operations will be force multipliers of cyber war.
    [Show full text]
  • Third-Generation Warfare
    Generations, Waves, and Epochs MODES OF WARFARE AND THE RPMA* DR ROBERT J. BUNKER HE PUBLICATION of the article written by Col Specifically, these modes of warfare and perspectives Owen E. Jensen, USAF, entitled “Information on the revolution in political and military affairs TWarfare: Principles of Third-Wave War” in the (RPMA) need to be analyzed because these assump­ Winter 1994 issue of Airpower Journal represents a tions provide the foundations behind each theory’s pro­ significant event. Tofflerian concepts, which have jections of future warfare. 3 Instances where the meth­ gained so much credence with the Army, are now be- odology behind such assumptions falls short should thus ginning to openly influence Air Force dialogue on in- be a cause for concern because if a theory cannot accu­ formation-based future war. In that article, Colonel rately explain past modes of warfare and military revo­ Jensen states that “the Tofflers provide probably the lutions, it will surely be unable to account for future clearest and most accurate explanation of how this new ones. type of warfare evolved.” 1 Only after such analysis is undertaken can Air Force Before the Air Force openly embraces the officers decide what attributes of the Tofflerian frame- Tofflerian trinity of agrarian, industrial, and informa­ work, and potentially those of the competing frame- tional war forms, some well-informed reflection should works, should be utilized in the creation of post- first take place. This reflection requires an understand­ Clausewitzian principles of future warfare. 4 This ar­ ing of the three dominant theories of future war cur­ ticle provides an overview and synopsis of each com­ rently debated in the military journals— fourth-gen­ peting theory, discusses its impact and shortcomings, eration warfare, third-wave war, and fourth-epoch war.
    [Show full text]
  • Nuclear Deterrence in the 21St Century
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY Support RAND Purchase this document Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo
    [Show full text]
  • On Cyberwarfare
    DCAF HORIZON 2015 WORKING PAPER No. 7 On Cyberwarfare Fred Schreier DCAF HORIZON 2015 WORKING PAPER No. 7 On Cyberwarfare Fred Schreier Table of Contents On Cyberwarfare 7 1. The Basic Building Blocks: Cyberspace, Cyberpower, Cyberwarfare, and Cyberstrategy 10 2. The Difference between Information Warfare and Cyberwarfare 19 3. Understanding the Threats in Cyberspace 31 4. Cyber Vulnerabilities and how Cyber Attacks are Enabled 48 5. Major Issues, Ambiguities, and Problems of Cyberwar 68 Annex 1: In which Ways is Cyberwar different from the other Warfighting Domains? 93 Annex 2: Summary of major Incidents of Cyber Conflict 107 Glossary 116 Select Bibliography 121 DCAF HORIZON 2015 WORKING PAPER 5 6 DCAF HORIZON 2015 WORKING PAPER On Cyberwarfare The digital world has brought about a new type of clear and present danger: cyberwar. Since information technology and the internet have developed to such an extent that they have become a major element of national power, cyberwar has become the drumbeat of the day as nation-states are arming themselves for the cyber battlespace. Many states are not only conducting cyber espionage, cyber reconnaissance and probing missions; they are creating offensive cyberwar capabilities, developing national strategies, and engaging in cyber attacks with alarming frequency. Increasingly, there are reports of cyber attacks and network infiltrations that can be linked to nation-states and political goals. What is blatantly apparent is that more financial and intellectual capital is being spent figuring out how to conduct cyberwarfare than for endeavors aiming at how to prevent it.1 In fact, there is a stunning lack of international dialogue and activity with respect to the containment of cyberwar.
    [Show full text]
  • Information Warfare: Issues for Congress
    Information Warfare: Issues for Congress Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations March 5, 2018 Congressional Research Service 7-5700 www.crs.gov R45142 Information Warfare: Issues for Congress Summary Information warfare is hardly a new endeavor. In the Battle of Thermopylae in 480 BC, Persian ruler Xerxes used intimidation tactics to break the will of Greek city-states. Alexander the Great used cultural assimilation to subdue dissent and maintain conquered lands. Military scholars trace the modern use of information as a tool in guerilla warfare to fifth-century BC Chinese military strategist Sun Tzu’s book The Art of War and its emphasis on accurate intelligence for decision superiority over a mightier foe. These ancient strategists helped to lay the foundation for information warfare strategy in modern times. Taking place below the level of armed conflict, information warfare (IW) is the range of military and government operations to protect and exploit the information environment. Although information is recognized as an element of national power, IW is a relatively poorly understood concept in the United States, with several other terms being used to describe the same or similar sets of activity. IW is a strategy for using information to pursue a competitive advantage, including offensive and defensive efforts. A form of political warfare, IW is a means through which nations achieve strategic objectives and advance foreign policy goals. Defensive efforts include information assurance/information security, while offensive efforts include information operations. Similar terms sometimes used to characterize information warfare include active measures, hybrid warfare, and gray zone warfare.
    [Show full text]
  • The Next Generation of Cyber-Enabled Information Warfare
    2020 12th International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or 20/20 Vision: The Next Decade non-commercial purposes is granted providing that copies bear this notice T. Jančárková, L. Lindström, and a full citation on the first page. Any other reproduction or transmission M. Signoretti, I. Tolga, G. Visky (Eds.) requires prior written permission by NATOCCD COE. 2020 © NATO CCDCOE Publications, Tallinn The Next Generation of Cyber-Enabled Information Warfare Kim Hartmann Keir Giles Conflict Studies Research Centre Conflict Studies Research Centre [email protected] [email protected] Abstract: Malign influence campaigns leveraging cyber capabilities have caused significant political disruption in the United States and elsewhere; but the next generation of campaigns could be considerably more damaging as a result of the widespread use of machine learning. Current methods for successfully waging these campaigns depend on labour-intensive human interaction with targets. The introduction of machine learning, and potentially artificial intelligence (AI), will vastly enhance capabilities for automating the reaching of mass audiences with tailored and plausible content. Consequently, they will render malicious actors even more powerful. Tools for making use of machine learning in information operations are developing at an extraordinarily rapid pace, and are becoming rapidly more available and affordable for a much wider variety of users. Until early 2018 it was assumed that the utilisation of AI methods by cyber criminals was not to be expected soon, because those methods rely on vast datasets, correspondingly vast computational power, or both, and demanded highly specialised skills and knowledge.
    [Show full text]
  • Information Warfare
    Information Warfare: New Roles for Information Systems in Military Operations Captain George A. Crawford For to win one hundred victories in one hundred battles is not the acme of skill. To subdue an enemy without fighting is the acme of skill. - Sun Tzu Introduction In the past decade we have witnessed phenomenal growth in the capabilities of information management systems. National security implications of these capabilities are only now beginning to be understood by national leadership. Information warfare (IW) is one of the new concepts receiving a great deal of attention inside the Washington DC beltway; in some circles IW is even touted as the cornerstone of future US military doctrine. There is no doubt IW is a concept the modern military officer should be familiar with, for advancements in computer technology have significant potential to dramatically change the face of military command and control. Information warfare theory has tremendous political, technical, operational and legal implications for the military. This article seeks to define IW for the layman and discuss its potential applications. It will also attempt to identify potential military uses of existing information systems technology and address some of the issues facing those who will be responsible for implementing this new doctrine. Information Warfare--What is it? Since the dawn of life, animals have developed senses in order to tell the difference between that which should be eaten and that which might eat them. Governments spend untold billions of dollars establishing agencies to gather and maintain information on potential threats to their security. Computer hackers--most notably members of "The Legion of Doom"--have been tried, convicted and sent to prison because they conspired to provide access to proprietary information.
    [Show full text]
  • Legal and Practical Constraints Information Warfare
    Legal and Practical Constraints on Information Warfare Maj Karl Kuschner ABSTRACT OF LEGAL AND PRACTICAL CONSTRAINTS ON INFORMATION WARFARE Like any new weapon, revolutionary new techniques of information warfare must be reviewed for legal and practical constraints on their use. Because of the unique capabilities and employment methods of these "information weapons," such review will require significantly more attention than other, more evolutionary, types of weapons. Information warfare weapons must meet the same tests for necessity and proportionality as other weapons under the laws of armed conflict. In addition, commanders must recognize and weigh the possible consequences of weapons that can devastate the information systems of an adversary. Problems such as lack of enemy command and control, post-hostility reconstruction, and retaliation, among others, must be considered by the commander contemplating the use of information weapons. Because of the extraordinary consequences of these weapons, developers must provide guidance for their employment, and commanders must carefully consider adverse effects from their use. PREFACE The promise of infowar has grown exponentially with the increasing power and pervasiveness of computer microprocessors, high-speed communications and sophisticated sensors.... The potential for low-cost and bloodless resolution of conflicts brings with it other problems. Douglas Waller in Onward Cyber Soldiers Information Warfare is probably the greatest "fad" for discussion in the U.S. military today. There are, however, some age old questions that need to be asked when "digital solutions" are advanced as a panacea for the problems of declining budgets and increasing global political uncertainty. The armed forces as an institution has started asking these questions.
    [Show full text]
  • Mutual Assured Destruction in Information, Influence and Cyber
    Technology in Society 59 (2019) 101177 Contents lists available at ScienceDirect Technology in Society journal homepage: www.elsevier.com/locate/techsoc Mutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios T Jeremy Straub Institute for Cybersecurity Education and Research, North Dakota State University, 1320 Albrecht Blvd., Room 258, Fargo, ND, 58102, USA ARTICLE INFO ABSTRACT Keywords: Mutual assured destruction is a key deterrent against the use of the most powerful weapons. The threat of it Mutual assured destruction (MAD) successfully prevented the deployment of a nuclear weapon during and since the United States versus Soviet Cyber warfare Union Cold War. It has also prevented the escalation to total warfare scenarios (where countries fully deploy Information warfare their arsenals and capabilities against each other). Cyber weapons are poised to potentially create more havoc, Influence warfare death and destruction than a single nuclear weapon would and there has been significant contemporary use of Influence operations information and influence warfare. Given the foregoing, this paper investigates whether mutual assured de- Multi-modal warfare struction scenarios may exist which are (or could be) responsible for keeping the use of these warfare methods in check. Further, the paper considers whether the three types of warfare might be effective in holding the others in check. 1. Introduction during and subsequent to the Cold War, similar influence could be exerted in any strategic multi-polarity situation. As long as a state is The advent of nuclear weapons fundamentally changed warfare. willing to trust that its retaliation interests are ensured (either by its During the United States and Soviet Union Cold War, both sides de- own capabilities or that of an ally), it does not need to have the cap- veloped enough nuclear weapons to destroy each other multiple times abilities to fully destroy all possible enemies.
    [Show full text]
  • An Information Warfare Framework for the Department of Defense Maj Andrew Caulk, USAF
    AIR & SPACE POWER JOURNAL - COMMENTARY An Information Warfare Framework for the Department of Defense MAJ ANDREW CAULK, USAF Disclaimer: The views and opinions expressed or implied in the Journal are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government. This article may be reproduced in whole or in part without permission. If it is reproduced, the Air and Space Power Journal requests a courtesy line. Introduction As we begin to grapple with the role the Air Force should play in the informa- tion domain, we must also lift our gaze beyond the tasks of our service to also consider the framework, or lack thereof, in which we participate. The information environment (IE) is a noisy, risky, and asymmetric place. It is noisy in the sense that it takes a significant signal to break through the noise to create an impact. It is risky, as unlike conventional munitions, the munitions we fire here (ideas, messages, and engagements) can always be turned back against us. It is also inherently asymmetric as large actors, such as the US, pres- ent more target area to potential adversaries and often respond more slowly than smaller opponents. P. W. Singer, author of LikeWar, recently said that the US has no information strategy.1 The last time the US had something approaching a strategy was 2007.2 This lapse is a significant shortfall. While the Department of Defense (DOD) has begun to outline information engagement concepts such as the Joint Concept for Operating in the IE ( JCOIE),3 we have yet to establish clear national or military information objectives, determine required resources to achieve those objectives, understand how to assess those objectives, or build a framework that can opera- tionalize said objectives.
    [Show full text]