U.S. Military Innovation in the 21St Century: the Era of the “Spin-On”" (2020)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Effectiveness of Influence Activities in Information Warfare
The Effectiveness of Influence Activities in Information Warfare Cassandra Lee Brooker A thesis submitted in fulfilment of the requirements for the degree of Master of Research School of Business May 2020 Thesis/Dissertation Sheet Surname : BROOKER Given Name/s : CASSANDRA LEE Abbreviation for degree : MRes Faculty : UNSW Canberra School : School of Business Thesis Title : The Effectiveness of Influence Activities in Information Warfare Abstract Rapid, globalised power shifts, technological advances, and increasingly interconnected, ungoverned communications networks have resulted in the rise of asymmetric grey zone threats. The lines are now blurred between political, civil, and military information environments. The rise of influence activities is the new ‘sharp power’ in information warfare (the iWar). Western democracies are already at war in the information domain and are being out-communicated by their adversaries. Building on the commentary surrounding this contemporary threat, and based on a review of the literature across three academic disciplines of: Systems Thinking, Influence, and Cognitive Theory; this study aimed to investigate solutions for improving Australia’s influence effectiveness in the iWar. This study asked how systems thinking can offer an effective approach to holistically understanding complex social systems in the iWar; as well as asking why understanding both successful influencing strategies and psychological cognitive theories is central to analysing those system behaviours. To answer the aim, a systems thinking methodology was employed to compare two contrasting case studies to determine their respective influencing effectiveness. The successful case system comprising the terrorist group ISIS was compared and contrasted with the unsuccessful case system of Hillary Clinton’s 2016 election campaign – using a single stock of influence to determine relevant reinforcing and balancing feedback. -
Psychological Operations (PSYOPS)
Archived Content Information identified as archived on the Web is for reference, research or record-keeping purposes. It has not been altered or updated after the date of archiving. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats on the "Contact Us" page. Information archivée dans le Web Information archivée dans le Web à des fins de consultation, de recherche ou de tenue de documents. Cette dernière n’a aucunement été modifiée ni mise à jour depuis sa date de mise en archive. Les pages archivées dans le Web ne sont pas assujetties aux normes qui s’appliquent aux sites Web du gouvernement du Canada. Conformément à la Politique de communication du gouvernement du Canada, vous pouvez demander de recevoir cette information dans tout autre format de rechange à la page « Contactez-nous ». CANADIAN FORCES COLLEGE / COLLÈGE DES FORCES CANADIENNES JCSP 33 / PCEMJ 33 EXERCISE/EXERCICE New Horizons Core Requirements for the Successful Development of a Psychological Operations Capability for the Canadian Forces By /par LCol M. K. Purcell This paper was written by a student attending the Canadian Forces College in fulfilment of one of the requirements of the Course of Studies. The paper is a scholastic document, and thus contains facts and opinions, which the author alone considered appropriate and correct for the subject. It does not necessarily reflect the policy or the opinion of any agency, including the Government of Canada and the Canadian Department of National Defence. -
New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space
Journal of Politics and Law March, 2009 New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space Jia Huang Graduates’ Team School of Humanities and Social Sciences National University of Defense Technology 47 Yan Wa Chi Street, Changsha 410073, China E-mail: [email protected] Abstract With the rapid development of space information technology and constant advancement of militarization of outer space, the legal aspects of information operations in outer space have aroused the attention of international community. Information operations in outer space have brand-new features and means, which are apparently different from those of traditional operations, thus challenging almost all major aspects of the traditional principles of the warfare law. This paper makes a pilot study on challenges to the traditional principles of the law of war against the background of information operations in outer space from the following three aspects of the regulations in the law of war: Jus ad Bellum, Jus in Bello and neutrality. Keywords: Information operations in outer space, The law of war 1. Introduction The law of war is a branch of international law. It is a combination of promissory principles, regulations and systems that adjust the relationship between each side of belligerents and between belligerents and nonbelligerents, regulate the conduct of operations during the process of war and armed conflict. The current principles and regulations of the law of war are mainly embodied in the system of “Hague Law”, “Geneva Law” and the U.N. Charter. The Hague Conventions and Geneva Conventions established the basic principles of the law of war such as military necessity, discrimination, proportionality, avoiding superfluous injury and unnecessary suffering, prohibition against indiscriminate weapons, prohibition against perfidy, and protecting the rights and interests of neutral powers and persons. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
Air & Space Power Journal
AIR & SPACE POWER JOURNAL, Winter 2018 AIR & SPACE WINTER 2018 Volume 32, No. 4 A Model of Air Force Squadron Vitality Maj Gen Stephen L. Davis, USAF Dr. William W. Casey Wars of Cognition How Clausewitz and Neuroscience Influence Future War-Fighter Readiness Maj Michael J. Cheatham, USAF Seize the Highest Hill A Call to Action for Space-Based Air Surveillance Lt Col Troy McLain, USAF Lt Col Gerrit Dalman, USAF The Long-Range Standoff Cruise Missile A Key Component of the Triad Dr. Dennis Evans Dr. Jonathan Schwalbe Science and Technology Enablers of Live Virtual Constructive Training in the Air Domain Dr. Christopher Best, Defence Science and Technology Group FLTLT Benjamin Rice, Royal Australian Air Force WINTER 2018 Volume 32, No. 4 AFRP 10-1 Senior Leader Perspective A Model of Air Force Squadron Vitality ❙ 4 Maj Gen Stephen L. Davis, USAF Dr. William W. Casey Features Wars of Cognition: How Clausewitz and Neuroscience Influence Future War-Fighter Readiness ❙ 16 Maj Michael J. Cheatham, USAF Seize the Highest Hill: A Call to Action for Space-Based Air Surveillance ❙ 31 Lt Col Troy McLain, USAF Lt Col Gerrit Dalman, USAF The Long-Range Standoff Cruise Missile: A Key Component of the Triad ❙ 47 Dr. Dennis Evans Dr. Jonathan Schwalbe Science and Technology Enablers of Live Virtual Constructive Training in the Air Domain ❙ 59 Dr. Christopher Best, Defence Science and Technology Group FLTLT Benjamin Rice, Royal Australian Air Force Departments 74 ❙ Views Operation Vengeance: Still Offering Lessons after 75 Years ❙ 74 Lt Col Scott C. Martin, USAF Three Competing Options for Acquiring Innovation ❙ 85 Lt Col Daniel E. -
Download Paper
BUILDING AN AGILE FORCE: The Imperative for Speed and Adaptation in the U.S. Aerospace Industrial Base L INS EL TIT CH U IT T E M f s o e r i Ae ud By Lt Gen David A. Deptula, USAF (Ret.) rospace St and Heather R. Penney BUILDING AN AGILE FORCE: The Imperative for Speed and Adaptation in the U.S. Aerospace Industrial Base By Lt Gen David A. Deptula, USAF (Ret.) and Heather R. Penney The Mitchell Institute for Aerospace Studies Air Force Association Arlington, VA May 2021 About the Mitchell Institute for Aerospace Studies The Mitchell Institute for Aerospace Studies is an independent, nonpartisan policy research institute established to promote understanding of the national security advantages of exploiting the domains of air, space, and cyberspace. The Mitchell Institute goals are: 1) to educate the public about the advantages of aerospace power in achieving America’s global interests; 2) to inform key decision makers about the policy options created by exploiting the domains of air, space, and cyberspace, and the importance of necessary investment to keep America the world’s premier aerospace nation; and 3) to cultivate future policy leaders who understand the advantages of operating in air, space, and cyberspace. Mitchell Institute maintains a policy not to advocate for specific proprietary systems or specific companies in its research and study efforts. Disclaimer: Mitchell Institute for Aerospace Studies would like to recognize that this publication is based upon work supported by the Defense Advanced Research Projects Agency (DARPA). Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of DARPA. -
Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age
IV Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age Daniel T. Kuehl· Introduction hat is "information warfare"? Is it nothing more than a bumper W sticker, used as a "quick fix" rescue for budgets and programs that find it useful to attach themselves to the hot new concept? Is it such a revolu tionary new amalgam of technologies and concepts that old and traditional forms of warfare are soon slated to fall into the same receptacle in which out moded military technologies such as the catapult and war galley slumber? Is warfare as we understand it, featuring "blast, heat, and fragmentation," about to become obsolete?1 The intent of this brief introduction to information warfare (IW) and information operations (10) is to both explore these issues and present the thesis that they are best understood in light of the environment in which they take place-the information environment-and to explore the relation ship of that environment to the specific topic on which this book is focused, computer network attack. Information Operations, Inforntation Warfare, and Computer Network Attack What is Information Warfare? A useful starting place is to trace the evolution of the term information warfare itsel£ The earliest use of the term in the United States probably origi nated in the Office of Net Assessment, where in the 1970s Dr. Tom Rona was investigating the relationships among control systems, a field known as cyber netics. Dr. Rona described the competition between competing control systems as "information warfare," in the sense that control systems can be described as the means for gathering, processing, and disseminating information, processes which can be diagrammed and described with flow and feedback charts of mind-numbing dryness and complexity.2 In 1993 the Department of Defense published an official definition for the term, in a highly classified DoD Directive, TS3600.1. -
The Power to Wage War Successfully
THE POWER TO WAGE WAR SUCCESSFULLY MattheW C. Waxman* A century ago and in the midst of American involvement in World War I, future Chief Justice Charles Evans Hughes delivered one of the most influential lectures on the Constitution in wartime. In it he uttered his famous axiom that “the power to wage war is the power to wage war successfully.” That statement continues to echo in modern jurisprudence, though the background and details of the lecture have not previously been explored in detail. Drawing on Hughes’s own research notes, this Article examines his 1917 formulation and shows how Hughes pre- sciently applied it to the most pressing war powers issues of its day— namely, a national draft and intrusive federal economic regulation. Though critical to supporting American military operations in Europe, these were primarily questions about Congress’s domestic authority—not the sorts of interbranch issues that naturally come to mind today in thinking about “waging war.” This Article also shows, however, how Hughes struggled unsuccessfully to define when war powers should turn off or revert to peacetime powers. The story of Hughes’s defense of (and later worry about) expansive wartime powers in World War I sheds much light on present constitutional war powers and debates about them, including in the context of indefinite and sweeping wars against transnational terrorist groups. INTRODUCTION ......................................................................................... 614 I. OUR “FIGHTING CONSTITUTION” ......................................................... -
MAPPING the DEVELOPMENT of AUTONOMY in WEAPON SYSTEMS Vincent Boulanin and Maaike Verbruggen
MAPPING THE DEVELOPMENT OF AUTONOMY IN WEAPON SYSTEMS vincent boulanin and maaike verbruggen MAPPING THE DEVELOPMENT OF AUTONOMY IN WEAPON SYSTEMS vincent boulanin and maaike verbruggen November 2017 STOCKHOLM INTERNATIONAL PEACE RESEARCH INSTITUTE SIPRI is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. The Governing Board is not responsible for the views expressed in the publications of the Institute. GOVERNING BOARD Ambassador Jan Eliasson, Chair (Sweden) Dr Dewi Fortuna Anwar (Indonesia) Dr Vladimir Baranovsky (Russia) Ambassador Lakhdar Brahimi (Algeria) Espen Barth Eide (Norway) Ambassador Wolfgang Ischinger (Germany) Dr Radha Kumar (India) The Director DIRECTOR Dan Smith (United Kingdom) Signalistgatan 9 SE-169 72 Solna, Sweden Telephone: +46 8 655 97 00 Email: [email protected] Internet: www.sipri.org © SIPRI 2017 Contents Acknowledgements v About the authors v Executive summary vii Abbreviations x 1. Introduction 1 I. Background and objective 1 II. Approach and methodology 1 III. Outline 2 Figure 1.1. A comprehensive approach to mapping the development of autonomy 2 in weapon systems 2. What are the technological foundations of autonomy? 5 I. Introduction 5 II. Searching for a definition: what is autonomy? 5 III. Unravelling the machinery 7 IV. Creating autonomy 12 V. Conclusions 18 Box 2.1. Existing definitions of autonomous weapon systems 8 Box 2.2. Machine-learning methods 16 Box 2.3. Deep learning 17 Figure 2.1. Anatomy of autonomy: reactive and deliberative systems 10 Figure 2.2. -
Misinformation, Disinformation, and Malinformation During the COVID-19 / SARS-Cov-2 Pandemic
Misinformation, Disinformation, and Malinformation During the COVID-19 / SARS-CoV-2 Pandemic Submission to the Senate Select Committee on Foreign Interference through Social Media 19th June, 2019 Dr Carlo Kopp Biological versus Digital Pandemics Australia, like other democracies, has suffered from a deluge of misinformation, disinformation and malinformation related to the COVID-19 / SARS-CoV-2 pandemic1. Like other democracies, this deluge of falsehoods has produced social discord and adversely influenced public understanding of the pandemic, and how to deal with these unusual and challenging circumstances. Foreign nation states and non-state actors have been major producers of these falsehoods and therefore merit close attention. The best starting point for appreciating the potential and actual impacts of the digital COVID-19 / SARS-CoV-2 pandemic is to explore the remarkable similarities between the spread of deceptive content in digital media, and biological pandemics. Jointly with Drs Korb and Mills, the author2 published research in late 2018 that exposes both the sensitivity of a population to the effects of “fake news”, and the sensitivity of “fake news” to costs incurred, leading us to subsequently provide evidence to the UK Parliament’s DCMS Select Committee’s Inquiry on Disinformation and ‘Fake News’, and the JSCEM in Australia. Many observations in this submission are drawn from that evidence. An important finding from our 2017-2018 research effort was that deceptive messaging in social media can produce serious disruption in consensus forming behaviors in groups of users. Since democracies rely upon some degree of consensus to function, these disruptive effects can produce impacts out of all proportion to the effort invested in producing them. -
Transformation and Transition: DARPA's Role in Fostering an Emerging Revolution in Military Affairs Volume 1
INSTITUTE FOR DEFENSE ANALYSES Transformation and Transition: DARPA’s Role in Fostering an Emerging Revolution in Military Affairs Volume 1 – Overall Assessment Richard H. Van Atta, Project Leader and Michael J. Lippitz with Jasper C. Lupo Rob Mahoney Jack H. Nunn April 2003 Approved for public release; distribution unlimited. IDA Paper P-3698 Log: H 03-000693 Copy This work was conducted under contract DASW01 98 C 0067, Task DA-6-2018, for the Defense Advanced Research Projects Agency (DARPA). The publication of this IDA document does not indicate endorsement by the Department of Defense, nor should the contents be construed as reflecting the official position of that Agency. © 2003 Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria, Virginia 22311-1882 • (703) 845-2000. This material may be reproduced by or for the U.S. Government pursuant to the copyright license under the clause at DFARS 252.227-7013 (Nov. 95). INSTITUTE FOR DEFENSE ANALYSES IDA Paper P-3698 Transformation and Transition: DARPA’s Role in Fostering an Emerging Revolution in Military Affairs Volume 1 – Overall Assessment Richard H. Van Atta, Project Leader and Michael J. Lippitz with Jasper C. Lupo Rob Mahoney Jack H. Nunn PREFACE This report summarizes work performed by the Institute for Defense Analyses for the Director of the Defense Advanced Research Projects Agency (DARPA), in partial fulfillment of the task entitled “DARPA’s Role in Fostering a Revolution in Military Affairs (RMA).” It highlights the roles DARPA has played since the 1970s in developing and exploiting advanced technological systems to create fundamental warfighting advantages for US military forces. -
Observations on Misinformation, Disinformation, and Malinformation
EMC Submission No 79 Received 29 September 2020 Observations on Misinformation, Disinformation, and Malinformation in Digital Media Submission to the Electoral Matters Committee of the Parliament of Victoria 29th September, 2020 Dr Carlo Kopp The deluge of misinformation, disinformation and malformation that pervades digital media1 of all type has been justifiably labelled a pandemic2. Australia, like other democracies, has not been immune: this deluge of falsehoods has produced social discord and adversely influenced public understanding of a wide range of policy matters, most recently the SARS-CoV-2 / COVID-19 pandemic. Foreign nation states and non-state actors have both been major producers of these falsehoods and therefore merit close attention – both have arguably produced impacts on major votes overseas and we should expect to see spillover effects in Australian federal and state politics due to the globalised distribution of content in digital media. The author has been conducting research in Information Warfare since the early 1990s, and since 1999 has explored how to mathematically model deceptions such as “fake news” and their impacts on large and complex social systems. Jointly with Drs Korb and Mills the author published research in late 2018 that exposed both the sensitivity of a population to the effects of “fake news”, and the sensitivity of “fake news” to costs incurred, leading us to subsequently provide evidence to the UK Parliament’s DCMS Select Committee’s Inquiry on Disinformation and ‘Fake News’, and the JSCEM in Australia. Many observations in this submission are drawn from that evidence. Biological versus Digital Pandemics The best starting point for appreciating the potential and actual impacts of the deception pandemic in digital media is to explore the remarkable similarities between the spread of deceptive content in digital media, and biological pandemics.