Redefining Information Warfare Boundaries for an Army in a Wireless World

Redefining Information Warfare Boundaries for an Army in a Wireless World

CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Arroyo Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. REDEFINING INFORMATION WARFARE BOUNDARIES FOR AN ARMY IN A WIRELESS WORLD Isaac R. Porche III, Christopher Paul, Michael York, Chad C. Serena, Jerry M. Sollinger, Elliot Axelband, Endy Y. Min, Bruce J. Held Prepared for the United States Army Approved for public release; distribution unlimited ARROYO CENTER The research described in this report was sponsored by the United States Army under Contract No. W74V8H-06-C-0001. The findings and views expressed in this report are those of the authors and do not necessarily reflect the views of the Army or the U.S. Department of Defense. Library of Congress Cataloging-in-Publication Data Porche, Isaac, 1968- Redefining information warfare boundaries for an Army in a wireless world / Isaac R. Porche III, Christopher Paul, Michael York, Chad C. Serena, Jerry M. Sollinger, Elliot Axelband, Endy Y. Min, Bruce J. Held. pages cm Includes bibliographical references. ISBN 978-0-8330-5912-3 (pbk. : alk. paper) 1. Information warfare—United States. 2. Military doctrine—United States. 3. United States. Army—Communication systems. 4. Computer networks—Security measures—United States—Planning. 5. Cyberspace—Security measures—United States. I. Paul, Christopher, 1971- II. Title. UA23.P58 2013 355.3'43—dc23 2013000702 The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2013 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND website is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/ permissions.html). Published 2013 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Preface As the Army observed in the 2010 cyberspace operations concept capa- bility plan, society’s dependence on the wireless and wired mediums is converging. Computer and telecommunication networks are becom- ing one and the same. And the transmission of digitized packets on Internet-protocol and space-based networks is rapidly supplanting the use of old technology (e.g., dedicated analog channels) when it comes to information sharing and media broadcasting. This monograph identifies the implications of these trends and reconsiders the resulting boundaries of Army cyber operations, at least from a practical standpoint. It focuses on the general and overlapping areas of network operations, information operations, and the more focused areas of electronic warfare, signals intelligence, electromag- netic spectrum operations, public affairs, and military information support operations (formerly psychological operations). Most impor- tantly, it compares the emerging doctrine of cyber operations to all of the aforementioned areas. The intent is to make clear the prevailing boundaries between the areas of interest and the expected progression of these boundaries in the near future. It constructs some new defini- tions that encapsulate these areas, such as information warfare. This is important because the Army is now studying ways to best apply its cyber power and reconsider doctrinally defined areas that are integral to cyberspace. This monograph asserts that the relevant realms that contain the functional areas pertaining to information warfare are just two: the psychological and the technical. The psychological is focused on mes- iii iv Redefining Information Warfare Boundaries for an Army in a Wireless World sage content, and the target is people. The technical realm is focused on the means to deliver (or prevent delivery of) content, and the targets are machines. This monograph considers how the technical realm and the psychological realm can best be organized and perhaps consolidated. This study and monograph were not specifically requested by the Army; rather, this monograph summarizes the results of a short study conducted in response to a question about the future of information operations asked by Army senior leadership. RAND Arroyo Center sought an answer to this question as a “Quick Response” study. Quick Response studies are designed to support near-term decisions to be made by Army officials or to provide analyses to the Army leadership to inform U.S. Department of Defense, administration, or congressio- nal decisions and actions. A brief was provided to Army senior leaders within two months of initiation of this project; this monograph sum- marizes and reports the analytic effort that went into that briefing. The findings and views expressed here are those of the authors and do not necessarily reflect the views of the Army or the U.S. Department of Defense. This research was conducted within the Arroyo Center’s Force Development and Technology Program. RAND Arroyo Center, part of the RAND Corporation, is a federally funded research and devel- opment center sponsored by the U.S. Army. Questions and comments about this research are welcome and should be directed to the program director, Christopher Pernin ([email protected]), the project leader, Isaac Porche ([email protected]), or Christopher Paul ([email protected]). For more information on RAND Arroyo Center, contact the Director of Operations (telephone 310-393-0411, extension 6419; FAX 310-451-6952; email [email protected]), or visit Arroyo’s website at http://www.rand.org/ard. The Project Unique Identifica- tion Code (PUIC) for the project that produced this document is R AND10473. Contents Preface ............................................................................. iii Figures ............................................................................. xi Tables .............................................................................xiii Summary ..........................................................................xv Acknowledgments .............................................................xxix Abbreviations .................................................................. xxxi CHaptER ONE Introduction ....................................................................... 1 Background ......................................................................... 1 The Army’s Role in Cyberspace .................................................. 2 What Is Cyberspace? ............................................................... 3 Environments ..................................................................... 3 Domains .......................................................................... 4 Information Environment ...................................................... 4 Cyberspace Defined ............................................................. 6 Cyber-Electromagnetic/Cyber-Electronic Operations ....................... 9 Purpose .............................................................................. 9 Approach ...........................................................................10 How This Monograph Is Organized ............................................10 CHaptER TWO The Information Environment and Information Warfare ...............11 The Information Environment ..................................................11 The U.S. Department of Defense View of the Information Environment ................................................................11

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    178 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us