The Effectiveness of Influence Activities in Information Warfare

Total Page:16

File Type:pdf, Size:1020Kb

The Effectiveness of Influence Activities in Information Warfare The Effectiveness of Influence Activities in Information Warfare Cassandra Lee Brooker A thesis submitted in fulfilment of the requirements for the degree of Master of Research School of Business May 2020 Thesis/Dissertation Sheet Surname : BROOKER Given Name/s : CASSANDRA LEE Abbreviation for degree : MRes Faculty : UNSW Canberra School : School of Business Thesis Title : The Effectiveness of Influence Activities in Information Warfare Abstract Rapid, globalised power shifts, technological advances, and increasingly interconnected, ungoverned communications networks have resulted in the rise of asymmetric grey zone threats. The lines are now blurred between political, civil, and military information environments. The rise of influence activities is the new ‘sharp power’ in information warfare (the iWar). Western democracies are already at war in the information domain and are being out-communicated by their adversaries. Building on the commentary surrounding this contemporary threat, and based on a review of the literature across three academic disciplines of: Systems Thinking, Influence, and Cognitive Theory; this study aimed to investigate solutions for improving Australia’s influence effectiveness in the iWar. This study asked how systems thinking can offer an effective approach to holistically understanding complex social systems in the iWar; as well as asking why understanding both successful influencing strategies and psychological cognitive theories is central to analysing those system behaviours. To answer the aim, a systems thinking methodology was employed to compare two contrasting case studies to determine their respective influencing effectiveness. The successful case system comprising the terrorist group ISIS was compared and contrasted with the unsuccessful case system of Hillary Clinton’s 2016 election campaign – using a single stock of influence to determine relevant reinforcing and balancing feedback. The findings validated the utility of systems thinking analysis for holistically understanding complex iWar systems, and revealed why the case systems were effective or not in raising influence stocks, dominating the iWar, and manipulating cognitive behaviour. The results highlighted the configurational, behavioural, and causal factors contributing to influence effectiveness and were summarised into key themes for each of the research disciplines, e.g. a successful system has control, resilience, a centrality of focus, and strong communications links. Based on the results, this study concluded with a number of recommendations including: having a resonant strategic narrative and cohesive communications strategy, turning democratic vulnerabilities into strengths, adopting systems thinking approaches, enhancing critical thinking, exploiting civilian capabilities, and regaining control over the media. Further research is required across all three academic disciplines to enhance understanding and resilience, refine approaches, and improve the effectiveness of Australia’s future iWar strategy. Declaration relating to disposition of project thesis/dissertation I hereby grant to the University of New South Wales or its agents a non-exclusive licence to archive and to make available (including to members of the public) my thesis or dissertation in whole or in part in the University libraries in all forms of media, now or here after known. I acknowledge that I retain all intellectual property rights which subsist in my thesis or dissertation, such as copyright and patent rights, subject to applicable law. I also retain the right to use all or part of my thesis or dissertation in future works (such as articles or books). ………………………………………........... ..…30 May 2020…... Signature Date The University recognises that there may be exceptional circumstances requiring restrictions on copying or conditions on use. Requests for restriction for a period of up to 2 years can be made when submitting the final copies of your thesis to the UNSW Library. Requests for a longer period of restriction may be considered in exceptional circumstances and require the approval of the Dean of Graduate Research. 2 | P a g e 5249168 Cassandra Brooker Masters of Research ORIGINALITY STATEMENT ‘I hereby declare that this submission is my own work and to the best of my knowledge it contains no materials previously published or written by another person, or substantial proportions of material which have been accepted for the award of any other degree or diploma at UNSW or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the research by others, with whom I have worked at UNSW or elsewhere, is explicitly acknowledged in the thesis. I also declare that the intellectual content of this thesis is the product of my own work, except to the extent that assistance from others in the project's design and conception or in style, presentation and linguistic expression is acknowledged.’ Signed …………………………………………….............. Date …………......30 May 2020..……………………........ 3 | P a g e 5249168 Cassandra Brooker Masters of Research INCLUSION OF PUBLICATIONS STATEMENT UNSW is supportive of candidates publishing their research results during their candidature as detailed in the UNSW Thesis Examination Procedure. Publications can be used in their thesis in lieu of a Chapter if: The candidate contributed greater than 50% of the content in the publication and is the “primary author”, ie. the candidate was responsible primarily for the planning, execution and preparation of the work for publication The candidate has approval to include the publication in their thesis in lieu of a Chapter from their supervisor and Postgraduate Coordinator. The publication is not subject to any obligations or contractual agreements with a third party that would constrain its inclusion in the thesis Please indicate whether this thesis contains published material or not: ☒ This thesis contains no publications, either published or submitted for publication Some of the work described in this thesis has been published and it has been ☐ documented in the relevant Chapters with acknowledgement This thesis has publications (either published or submitted for publication) ☐ incorporated into it in lieu of a chapter and the details are presented below CANDIDATE’S DECLARATION I declare that: I have complied with the UNSW Thesis Examination Procedure Where I have used a publication in lieu of a Chapter, the listed publication(s) below meet(s) the requirements to be included in the thesis. Candidate’s Name Signature Date (dd/mm/yy) Cassandra Lee Brooker 30/05/20 4 | P a g e 5249168 Cassandra Brooker Masters of Research COPYRIGHT STATEMENT ‘I hereby grant the University of New South Wales or its agents a non-exclusive licence to archive and to make available (including to members of the public) my thesis or dissertation in whole or part in the University libraries in all forms of media, now or here after known. I acknowledge that I retain all intellectual property rights which subsist in my thesis or dissertation, such as copyright and patent rights, subject to applicable law. I also retain the right to use all or part of my thesis or dissertation in future works (such as articles or books).’ ‘For any substantial portions of copyright material used in this thesis, written permission for use has been obtained, or the copyright material is removed from the final public version of the thesis.’ AUTHENTICITY STATEMENT ‘I certify that the Library deposit digital copy is a direct equivalent of the final officially approved version of my thesis.’ Table of Contents THESIS PART ONE – THE RESEARCH PROBLEM ......................................................................... 9 CHAPTER 1 – INTRODUCTION ......................................................................................................... 10 Introduction .............................................................................................................................................. 10 Information Warfare (iWar) Contextualised ........................................................................................ 11 The Problem ............................................................................................................................................. 13 Research Questions ............................................................................................................................... 14 Significance of Research ....................................................................................................................... 15 Scope of Research ................................................................................................................................. 15 Thesis Overview ....................................................................................................................................... 16 Conclusion ................................................................................................................................................. 17 CHAPTER 2 – LITERATURE REVIEW ............................................................................................. 19 Introduction .............................................................................................................................................. 19 Part One: Systems approaches to the iWar ........................................................................................... 20 Systems thinking theory .......................................................................................................................
Recommended publications
  • Agile Command Capability: Future Command in the Joint Battlespace and Its Implications for Capability Development
    UNCLASSIFIED DRAFT AGILE COMMAND CAPABILITY: FUTURE COMMAND IN THE JOINT BATTLESPACE AND ITS IMPLICATIONS FOR CAPABILITY DEVELOPMENT Steven J. Harland, MPhil(Cantab), C. Psychol, FRSA Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Paul J. Shanahan, PhD Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Cdr David J. Bewick MA RN Command Development Directorate of Command and Battlespace Management/J6 Ministry of Defence St Giles Court 1-13 St Giles High Street London WC2H 8LD United Kingdom UNCLASSIFIED DRAFT UNCLASSIFIED DRAFT AGILE COMMAND CAPABILITY: FUTURE COMMAND IN THE JOINT BATTLESPACE AND ITS IMPLICATIONS FOR CAPABILITY DEVELOPMENT1 Steven J. Harland, MPhil(Cantab), C. Psychol, FRSA Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Paul J. Shanahan, PhD Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Cdr David J. Bewick, MA RN Command Development Directorate of Command and Battlespace Management/J6 Ministry of Defence St Giles Court 1-13 St Giles High Street London WC2H 8LD United Kingdom Command cannot be understood in isolation. The available data processes technology and the nature of armaments in use; tactics and strategy; organisational structure and manpower systems; training, discipline, and…the ethos of war; the political construction of states and the social makeup of armies – all these things and many more impinge on command in war and in turn are affected by it.2 Martin van Creveld, Command in War ABSTRACT The paper defines the Ministry of Defence (MoD) requirements for Future Command3 within the context of the United Kingdom’s (UK) Joint Higher Level Operational Concept (HLOC).
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Psychological Operations (PSYOPS)
    Archived Content Information identified as archived on the Web is for reference, research or record-keeping purposes. It has not been altered or updated after the date of archiving. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats on the "Contact Us" page. Information archivée dans le Web Information archivée dans le Web à des fins de consultation, de recherche ou de tenue de documents. Cette dernière n’a aucunement été modifiée ni mise à jour depuis sa date de mise en archive. Les pages archivées dans le Web ne sont pas assujetties aux normes qui s’appliquent aux sites Web du gouvernement du Canada. Conformément à la Politique de communication du gouvernement du Canada, vous pouvez demander de recevoir cette information dans tout autre format de rechange à la page « Contactez-nous ». CANADIAN FORCES COLLEGE / COLLÈGE DES FORCES CANADIENNES JCSP 33 / PCEMJ 33 EXERCISE/EXERCICE New Horizons Core Requirements for the Successful Development of a Psychological Operations Capability for the Canadian Forces By /par LCol M. K. Purcell This paper was written by a student attending the Canadian Forces College in fulfilment of one of the requirements of the Course of Studies. The paper is a scholastic document, and thus contains facts and opinions, which the author alone considered appropriate and correct for the subject. It does not necessarily reflect the policy or the opinion of any agency, including the Government of Canada and the Canadian Department of National Defence.
    [Show full text]
  • New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space
    Journal of Politics and Law March, 2009 New Challenges to the Traditional Principles of the Law of War Presented by Information Operations in Outer Space Jia Huang Graduates’ Team School of Humanities and Social Sciences National University of Defense Technology 47 Yan Wa Chi Street, Changsha 410073, China E-mail: [email protected] Abstract With the rapid development of space information technology and constant advancement of militarization of outer space, the legal aspects of information operations in outer space have aroused the attention of international community. Information operations in outer space have brand-new features and means, which are apparently different from those of traditional operations, thus challenging almost all major aspects of the traditional principles of the warfare law. This paper makes a pilot study on challenges to the traditional principles of the law of war against the background of information operations in outer space from the following three aspects of the regulations in the law of war: Jus ad Bellum, Jus in Bello and neutrality. Keywords: Information operations in outer space, The law of war 1. Introduction The law of war is a branch of international law. It is a combination of promissory principles, regulations and systems that adjust the relationship between each side of belligerents and between belligerents and nonbelligerents, regulate the conduct of operations during the process of war and armed conflict. The current principles and regulations of the law of war are mainly embodied in the system of “Hague Law”, “Geneva Law” and the U.N. Charter. The Hague Conventions and Geneva Conventions established the basic principles of the law of war such as military necessity, discrimination, proportionality, avoiding superfluous injury and unnecessary suffering, prohibition against indiscriminate weapons, prohibition against perfidy, and protecting the rights and interests of neutral powers and persons.
    [Show full text]
  • Civilians in Cyberwarfare: Conscripts
    Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION .............................................................
    [Show full text]
  • S:\FULLCO~1\HEARIN~1\Committee Print 2018\Henry\Jan. 9 Report
    Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. 1 115TH CONGRESS " ! S. PRT. 2d Session COMMITTEE PRINT 115–21 PUTIN’S ASYMMETRIC ASSAULT ON DEMOCRACY IN RUSSIA AND EUROPE: IMPLICATIONS FOR U.S. NATIONAL SECURITY A MINORITY STAFF REPORT PREPARED FOR THE USE OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JANUARY 10, 2018 Printed for the use of the Committee on Foreign Relations Available via World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PUBLISHING OFFICE 28–110 PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5012 Sfmt 5012 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. 9 REPORT FOREI-42327 with DISTILLER seneagle Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. COMMITTEE ON FOREIGN RELATIONS BOB CORKER, Tennessee, Chairman JAMES E. RISCH, Idaho BENJAMIN L. CARDIN, Maryland MARCO RUBIO, Florida ROBERT MENENDEZ, New Jersey RON JOHNSON, Wisconsin JEANNE SHAHEEN, New Hampshire JEFF FLAKE, Arizona CHRISTOPHER A. COONS, Delaware CORY GARDNER, Colorado TOM UDALL, New Mexico TODD YOUNG, Indiana CHRISTOPHER MURPHY, Connecticut JOHN BARRASSO, Wyoming TIM KAINE, Virginia JOHNNY ISAKSON, Georgia EDWARD J. MARKEY, Massachusetts ROB PORTMAN, Ohio JEFF MERKLEY, Oregon RAND PAUL, Kentucky CORY A. BOOKER, New Jersey TODD WOMACK, Staff Director JESSICA LEWIS, Democratic Staff Director JOHN DUTTON, Chief Clerk (II) VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN.
    [Show full text]
  • Military Defines PSYOP
    Joint Publication 3-53 Doctrine for Joint Psychological Operations 5 September 2003 PREFACE 1. Scope This publication addresses military psychological operations planning and execution in support of joint, multinational, and interagency efforts across the range of military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth doctrine to govern the joint activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for US military involvement in multinational and interagency operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes doctrine for joint operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall mission. 3. Application a. Doctrine and guidance established in this publication apply to the commanders of combatant commands, subunified commands, joint task forces, and subordinate components of these commands. These principles and guidance also may apply when significant forces of one Service are attached to forces of another Service or when significant forces of one Service support forces of another Service. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise.
    [Show full text]
  • Cyber Warfare: the New Domain and Future Battle Space
    CYBER WARFARE: THE NEW DOMAIN AND FUTURE BATTLE SPACE Maj C.W. Ethelston JCSP 41 PCEMI 41 Exercise Solo Flight Exercice Solo Flight Disclaimer Avertissement Opinions expressed remain those of the author and Les opinons exprimées n’engagent que leurs auteurs do not represent Department of National Defence or et ne reflètent aucunement des politiques du Canadian Forces policy. This paper may not be used Ministère de la Défense nationale ou des Forces without written permission. canadiennes. Ce papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as © Sa Majesté la Reine du Chef du Canada, représentée par represented by the Minister of National Defence, 2015. le ministre de la Défense nationale, 2015. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 41 – PCEMI 41 2014 – 2015 EXERCISE SOLO FLIGHT – EXERCICE SOLO FLIGHT CYBER WARFARE: THE NEW DOMAIN AND FUTURE BATTLE SPACE Maj C.W. Ethelston “This paper was written by a student “La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfilment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is a exigences du cours. L'étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions, which the author contient donc des faits et des opinions alone considered appropriate and que seul l'auteur considère appropriés et correct for the subject. It does not convenables au sujet. Elle ne reflète pas necessarily reflect the policy or the nécessairement la politique ou l'opinion opinion of any agency, including the d'un organisme quelconque, y compris le Government of Canada and the gouvernement du Canada et le ministère Canadian Department of National de la Défense nationale du Canada.
    [Show full text]
  • Defeating Terrorists, Not Terrorism: Assessing U.S
    Defeating Terrorists, Not Terrorism: Assessing U.S. Counterterrorism Policy from 9/11 to ISIS September 2017 Task Force on Terrorism and Ideology Co-Chairs Governor Thomas H. Kean Representative Lee H. Hamilton Former Chairman, 9/11 Commission; Former Governor of Former Vice Chairman, 9/11 Commission; Former Representative New Jersey from Indiana Members Cheryl Benard Sir John Jenkins President, ARCH International Executive Director, International Institute for Strategic Studies Middle East; Former British Ambassador to Syria, Iraq, Libya, Joseph Braude and Saudi Arabia Advisor, Al-Mesbar Studies and Research Center in Dubai; Senior Fellow, Foreign Policy Research Institute Nibras Kazimi Author, Syria Through Jihadist Eyes: A Perfect Enemy Dr. Tarek Elgawhary President, The Coexist Foundation Christopher Kojm Professor of International Affairs, Elliot School of International John Gannon Affairs, The George Washington University; Former Chair of the Adjunct Professor, Center for Security Studies, Georgetown National Intelligence Council University; Former CIA Deputy Director for Intelligence and Chairman of the National Intelligence Council Kristin Lord President and CEO, IREX Ambassador Husain Haqqani Senior Fellow and Director for South and Central Asia, Hudson Institute; Former Ambassador of Pakistan to the United States Bernard Haykel Professor of Near Eastern Studies and Director, Institute for Transregional Study of the Contemporary Middle East, North Africa and Central Asia, Princeton University Charles Hill Brady-Johnson Distinguished Fellow in Grand Strategy at Yale University; Research Fellow of the Hoover Institution, Stanford University 1 bipartisanpolicy.org Staff Blaise Misztal Director of National Security Nicholas Danforth Senior Policy Analyst Jessica Michek Policy Analyst Samuel Tadros Contributor ACKNOWLEDGMENTS BPC staff would like to thank those whose expertise, insights, and efforts are reflected in this report, and gratefully acknowledges Michelle Pea and Blake Hollister for their contributions during their internships.
    [Show full text]
  • Operationally Responsive Space (ORS): an Architecture and Enterprise Model for Adaptive Integration, Test and Logistics
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 6-2008 Operationally Responsive Space (ORS): An Architecture and Enterprise Model for Adaptive Integration, Test and Logistics Jeff A. Alexander Martha Charles-Vickers Talbot L. Smith Michael L. Vickers Follow this and additional works at: https://scholar.afit.edu/etd Part of the Other Aerospace Engineering Commons, and the Systems Engineering Commons Recommended Citation Alexander, Jeff A.; Charles-Vickers, Martha; Smith, Talbot L.; and Vickers, Michael L., "Operationally Responsive Space (ORS): An Architecture and Enterprise Model for Adaptive Integration, Test and Logistics" (2008). Theses and Dissertations. 2880. https://scholar.afit.edu/etd/2880 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. OPERATIONALLY RESPONSIVE SPACE (ORS): AN ARCHITECTURE AND ENTERPRISE MODEL FOR ADAPTIVE INTEGRATION, TEST AND LOGISTICS THESIS Jeff Alexander Martha Charles-Vickers Talbot Smith Michael S. Vickers AFIT/GSE/ENV/08-J01DL DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of the authors and do not reflect the official policy or position of the United States Air Force,
    [Show full text]
  • Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age
    IV Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age Daniel T. Kuehl· Introduction hat is "information warfare"? Is it nothing more than a bumper W sticker, used as a "quick fix" rescue for budgets and programs that find it useful to attach themselves to the hot new concept? Is it such a revolu­ tionary new amalgam of technologies and concepts that old and traditional forms of warfare are soon slated to fall into the same receptacle in which out­ moded military technologies such as the catapult and war galley slumber? Is warfare as we understand it, featuring "blast, heat, and fragmentation," about to become obsolete?1 The intent of this brief introduction to information warfare (IW) and information operations (10) is to both explore these issues and present the thesis that they are best understood in light of the environment in which they take place-the information environment-and to explore the relation­ ship of that environment to the specific topic on which this book is focused, computer network attack. Information Operations, Inforntation Warfare, and Computer Network Attack What is Information Warfare? A useful starting place is to trace the evolution of the term information warfare itsel£ The earliest use of the term in the United States probably origi­ nated in the Office of Net Assessment, where in the 1970s Dr. Tom Rona was investigating the relationships among control systems, a field known as cyber­ netics. Dr. Rona described the competition between competing control systems as "information warfare," in the sense that control systems can be described as the means for gathering, processing, and disseminating information, processes which can be diagrammed and described with flow and feedback charts of mind-numbing dryness and complexity.2 In 1993 the Department of Defense published an official definition for the term, in a highly classified DoD Directive, TS3600.1.
    [Show full text]
  • Environmental Factors Affecting Military Operations in the Littoral Battlespace
    CHARLES H. SINEX and ROBERT S. WINOKUR ENVIRONMENTAL FACTORS AFFECTING MILITARY OPERATIONS IN THE LITTORAL BATTLESPACE The changing world situation is causing the Navy to shift from open-ocean warfighting to joint operations conducted in the littoral battlespace. This battlespace encompasses a complex coastal environment with highly dynamic oceanographic and meteorological processes that can affect military operations in ways not seen in the open ocean. The coastal environment and its effects on the military can be described as a complex series of interactions between bathymetry, oceanography, meteorology, and man-made influences. Specific examples are given of important features and their effect on the various phases of an amphibious operation. The article concludes with a discussion of several new methods of measuring and predicting these features that are being developed and applied by the Navy. INTRODUCTION The world is rapidly changing, forcing the Navy and by enemy submarines. Special warfare operations before other services to rethink their roles and missions. The the landing could also be part of the activity. strategic direction envisioned for the Navy is a shift away The coastal environment will be discussed in four from open-ocean warfighting toward joint operations major sections, each limited to a few key, representative conducted from the sea with the Marines, Air Force, processes and the influence of those processes on am­ Army, and Coast Guard. The new littoral battlespace has phibious operations. The first section examines coastal two regional components: a seaward segment, comprising bathymetry, followed by sections on some significant the area from the open ocean to the shore, that must be oceanographic and meteorological features unique to the controlled to support operations ashore; and a landward coastal regime.
    [Show full text]