Information Age Anthology Vol II
Total Page:16
File Type:pdf, Size:1020Kb
DoD C4ISR Cooperative Research Program ASSISTANT SECRETARY OF DEFENSE (C3I) Mr. Arthur L. Money SPECIAL ASSISTANT TO THE ASD(C3I) & DIRECTOR, RESEARCH AND STRATEGIC PLANNING Dr. David S. Alberts Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors. They do not necessarily represent the views of the Department of Defense, or any other U.S. Government agency. Cleared for public release; distribution unlimited. Portions of this publication may be quoted or reprinted without further permission, with credit to the DoD C4ISR Cooperative Research Program, Washington, D.C. Courtesy copies of reviews would be appreciated. Library of Congress Cataloging-in-Publication Data Alberts, David S. (David Stephen), 1942- Volume II of Information Age Anthology: National Security Implications of the Information Age David S. Alberts, Daniel S. Papp p. cm. -- (CCRP publication series) Includes bibliographical references. ISBN 1-893723-02-X 97-194630 CIP August 2000 VOLUME II INFORMATION AGE ANTHOLOGY: National Security Implications of the Information Age EDITED BY DAVID S. ALBERTS DANIEL S. PAPP TABLE OF CONTENTS Acknowledgments ................................................ v Preface ................................................................ vii Chapter 1—National Security in the Information Age: Setting the Stage—Daniel S. Papp and David S. Alberts .................................................... 1 Part One Introduction......................................... 55 Chapter 2—Bits, Bytes, and Diplomacy—Walter B. Wriston ................................................................ 61 Chapter 3—Seven Types of Information Warfare—Martin C. Libicki ................................. 77 Chapter 4—America’s Information Edge— Joseph S. Nye, Jr. and William A. Owens....... 115 Chapter 5—The Internet and National Security: Emerging Issues—David Halperin .................. 137 Chapter 6—Technology, Intelligence, and the Information Stream: The Executive Branch and National Security Decision Making— Loch K. Johnson ............................................. 179 Part Two Introduction....................................... 213 Chapter 7—Critical Foundations: Protecting America’s Infrastructures (excerpts)—The President’s Commission on Critical Infrastructure Protection ................................. 225 i Chapter 8—U.S. Military and Challenges of Information Age Technologies—David S. Alberts and Daniel S. Papp ........................................... 259 Chapter 9—Information Technology and the Terrorist Threat—Kevin Soo Hoo, Seymour Goodman, and Lawrence Greenberg.............. 301 Chapter 10—Class 2 Corporate Information Warfare—Winn Schwartau............................... 339 Chapter 11—Information Technologies and Transnational Organized Crime—John T. Picarelli and Phil Williams ............................... 365 Chapter 12—Civil Liberties and National Security on the Internet—Kate Martin ........................... 403 Chapter 13—Electronic Civil Disobedience and the World Wide Web of Hacktivism: A Mapping of Extraparliamentarian Direct Action Net Politics—Stefan Wray ...................................... 431 Part Three Introduction .................................... 457 Chapter 14—The Cyber-Posture of the National Information Infrastructure (RAND MR-976- OSTP)—Willis H. Ware ..................................... 463 Chapter 15—How Vulnerable Is Our Interlinked Infrastructure?—George Smith ....................... 507 Chapter 16—National Security in the Information Age—David C. Gompert ................................... 525 ii ACKNOWLEDGMENTS he editors wish to thank and acknowledge the Tfollowing publishers for granting permission to reproduce these important articles in Volume II Information Age Anthology: “Bits, Bytes, and Diplomacy” by Walter B. Wriston, courtesy of Foreign Affairs Magazine “America’s Information Edge” by Joseph S. Nye, Jr. and William A. Owens, courtesy of Foreign Affairs Magazine “Information Technology and the Terrorist Threat” by Kevin Soo Hoo, Seymour Goodman, and Lawrence Greenberg, courtesy of Oxford University Press from Survival, Volume 39, Number 3, Autumn 1997 Information Warfare by Winn Schwartau, courtesy of Avalon Publishing “An Electronic Pearl Harbor? Not Likely” by George Smith, courtesy of University of Texas at Dallas from Issues in Science and Technology, pp. 68-73, Richardson, Texas, Fall 1998 “National Security in the Information Age” by David C. Gompert, courtesy of the Naval War College Review v PREFACE ew would argue with the premise that new and Femerging information and communication technologies are transforming the ways that people around the world work, play, think, and live. Indeed, there is a sense that the transformations underway are so fundamental, so pervasive and all- encompassing, so qualitatively and quantitatively different, that they are ushering in a new era, the so- called Information Age. What does this mean for national security, and how will the concept of national security change because of Information Age technologies? Is the Information Age bringing with it new challenges and threats, and if so, what are they? What sorts of dangers will these challenges and threats present? From where will they—and do they—come? Is Information Warfare a reality? What responses will be required, and by whom, to safeguard national security from a potential adversary’s information warriors during the Information Age? And how will national security decision-making be affected? This publication, Volume II of the Information Age Anthology, explores these questions and provides preliminary answers to some of them. This volume follows on the heels of Volume I of the Information Age Anthology, published in 1997 by NDU Press and DoD CCRP Publications, which examined the broader context of the impact of new and emerging information and communication technologies on business, vii commerce, and services; government and the military; and international affairs. It is within this broader context of human activities that questions of national security must be pursued. This publication also precedes Volume III of the Information Age Anthology. Volume III will provide a detailed examination of the potential impacts of new and emerging information and communication technologies on military affairs and operations. It will provide views of the impact of these technologies on military command, control, and organization; on operations, strategy, and tactics; and on foreign perspectives of military affairs. Together, the three volumes of the Information Age Anthology will offer an understanding of the broad societal and human contexts within which national security must be pursued in the Information Age; provide an understanding of the issues that national security decision makers must cope with during the Information Age; and prognosticate about the ways in which wars and military operations may be conducted during the Information Age, at least in so far as such Information Age contexts, issues, and operations can be ascertained today. The Information Age has just begun. But if we are to reap its benefits to the fullest and avoid its pitfalls to the best of our ability, we must attempt to understand not only where we are in the Information Age, but also where we may be going. It will then be up to us to take this understanding so that we can help chart the wisest direction. This volume, like the one that preceded it and the one that will follow it, is part of this very large and very important effort. viii CHAPTER 1 NATIONAL SECURITY IN THE INFORMATION AGE: SETTING THE STAGE By Daniel S. Papp and David S. Alberts s we enter the Information Age, information and Aknowledge related technologies are becoming increasingly important factors in the national security equation of the United States. Throughout the 1980s and 1990s, these Information Age technologies, defined here to include advanced semiconductors, increasingly capable computers, fiber optics, cellular technologies, better and more capable satellites, advanced networking, digital technology (including digital compression),1 improved human-computer interaction, data mining and knowledge extraction and creation tools, have had a growing impact on military capabilities and are beginning to shape the strategic environment within which national security is pursued. As we move further into Information Age, the impact that these technologies will have on national security affairs will become even more important, witness the growing significance of Joint Vision 2010 both here and abroad. 1 2 Information Age Anthology Vol. II The importance of advanced information knowledge and communication technologies for national security is not, however, just about new technologies for the military. It is about how these technologies will alter military strategy, operational concepts, organizational and command structures, doctrine and tactics. It is about all of the elements of a mission capability package— those things needed to turn a concept into a real operational capability. It is about who will have these new information enabled technologies, and what they do with them. Indeed, since Information is inevitably tied to decision-making and organization, it will be in this area that change may be the most difficult and where we and our coalition partners may drift apart. At the most comprehensive level, it is also how these technologies will change national security objectives and the environment in which