College of Aerospace Doctrine, Research and Education The Information Operations Environment IW-200 Information Operations Why are we talking about IO and IW? What is it? What are its elements? (Is it all about computers?) What is the AF doing about it? The Aerospace Domain Air Space Info Air, Space and Info Ops Are Inherently Intertwined IO is an integral part of all successful aerospace functions Overview The world we live in – – – Changing Nature of Warfare – – – The Information Age Changes Technology Driven Impact of Technology Paradigms IO Doctrine - Definitions and differences I-Bomb Video Information Age Changes Industrial Age Production: – – Information Age Capital: – Land Labor – – – Tangible Assets Money: Gold, minerals Paper Production: – Capital: – Knowledge Service Oriented Intangibles Money: – Electronic / digital Information Age Changes Industrial Age Work: – – Information Age – Big plant operations Mass produced – – Bureaucratic Vertical – Service oriented Creative Scale: – Organization: – Work: – Scale: – Physical Repetitive, interchangeable Small, dispersed Individualized Organization: – – Virtual, networked Telecommute Information Age Changes Industrial Age Individual: – – Stripped of functions like education, health – Urbanized – Unique, heterogeneous society Individualism Family: – Population: – Individual: – Family: – Not unique, homogeneous society Marxism, etc. Information Age Reassuming roles Home-schooling, etc Population: – – Sub-urbanizing Dispersed Information Age Changes Industrial Age Political: – – – – Nationalism Majority-minority conflicts Big government actions Strong political parties Information Age Political: – – – – Localism, transnationalism Minority-minority conflicts Smaller government Political parties weaker Living in a Revolution “We live in an age that is driven by information. It’s an age which Alvin Toffler has called the Third Wave. The ability to acquire and communicate huge volumes of information in real time, computing power to analyze this information quickly, and the control systems to pass this analysis to multiple users simultaneously -- these are the technological breakthroughs that are changing war and how we prepare for war.” SECEDEF William Perry, 5 May 1994 Technology Explosion 1959 1999 5,000 Stand-alone Computers No FAX Machines No Cellular Phones No E-mail 180 Million Computers 14 Million FAX Machines 40 Million Cellular Phones E-mail Exceeds Postal Service The Technology Behind The Change Computing technology and the Chip Only Ten years ago, 1990 – – MORE People in AF than Computers Just beginning to Network • Stand Alone Functions • Sneaker Net – Z Series PCs: Z-100, Z-150, Z-200, etc. Primitive by today’s standards The Technology Behind The Change Today… – – – – – #PCs > #AF users Chip speeds > gigahertz Interconnected, WWW AF Networks handle billions of electronic events annually Terminology • Systems Administrators • Knowledge managers • Chief Information Officers Microchip is the Driver Communications bandwidth continues to increase Processor power doubles every 24 months 6 months Density doubles every 24 months 6 months Memory size triples every 18 months 6 months Cost halved every 18 months 12 months Interconnected World GCCS DMS GCSS GTN DSN TBMCS TPFDD Demand for Information Use breeds dependence... dependence creates VULNERABILITY Persian Gulf War: PCs, SATCOM, Automated Switching, PGMs, Automated Navigation GII NII DII Vietnam: SATCOM, Mainframe Computers WWII, Korea: Radios, Radars, Enigma, Ultra Napoleonic Wars: Signal Towers Lanterns 1300 Signal Mirrors Printed Documents 1400 1500 1600 Civil War: Telegraph WWI: Telephone 1700 1800 1900 2000 What is Information? = Data + Instructions Transmit It Corrupt Exploit Transform It Deny Destroy Collect It Store It The Real Impact of the Technology Every military capability depends on computers and networks in one way or another!! Military / Technology Technological Revolution Impact on Warfighting Computer processing power Storage device density Reduce size, weight, power Display resolution Precision Sensors Lethality Bandwidth Speed & maneuver Software Capability Stealth Awareness Reliability Improved logistics Security Paradigms Old Known adversaries, understood threat Long warning times Leading edge technology confined to major powers Force-on-force, landcentric battle Serial attack, target-bytarget Now Information an adjunct to weapons Unpredictable opponents/challenges Short warning times Leading edge technology proliferates Selective force for effect Asymmetrically applied air and space power Simultaneous, parallel strike Information a weapon target / Why is IO Important? The means by which enlightened rulers and sagacious generals moved and conquered others…was advance knowledge. Advance knowledge cannot be gained from ghosts and spirits, inferred from phenomena, or projected from the measures of Heaven, but must be gained from men, for it is the knowledge of the enemy’s true situation. Sun Tzu Joint Vision 2020 The Goal: Full Spectrum Dominance – – – – Dominant Maneuver Precision Engagement Focused Logistics Full-Dimensional Protection All Bounded & Enabled by Information Superiority AF Core Competencies Global Attack Precision Engagement Rapid Global Mobility Air And Space Superiority Agile Combat Support Information Superiority Space Air The other realm Information Land Sea Information Operations AFDD 2-5, Aug 1998 AF CONOPS, Dec 1999 AF Organizations are restructuring or being created to perform IO/IW AFDD 2-5.1 EW AFDD 2-5.2 ISR AFDD 2-5.3 PSYOP AFDD 2-5.4 PAO IO Definition Information Operations comprise those actions taken to gain, exploit, defend, or attack information and information systems and include both information-in-warfare and information warfare and are conducted through-out all phases of an operation and across the range of military operations. AFDD 2-5 ISR Precision Nav & Positioning Weather Other Info Collection/ Dissemination Activities PAO Gain Exploit DCI OCI OPSEC, CND, PAO Counterdeception Counterpropaganda Electronic Protection Counterintelligence Information Assurance CNA Military Deception EW PSYOP Physical attack PAO Defend Counterinformation Attack AFDD 2-5 INFORMATION SUPERIORITY INFORMATION OPERATIONS INFORMATION-in-WARFARE gain exploit INFORMATION WARFARE attack defend COUNTERINFORMATION Precision Nav & Position ISR Other Info Collection/ Dissemination Activities Weather DEFENSIVE COUNTERINFORMATION PAO Information CounterAssurance Intelligence Successfully executed Information Operations achieve information superiority OFFENSIVE COUNTERINFORMATION PSYOP Physical Attack OPSEC CounterPropaganda Military Deception Electronic Warfare Electronic Protect CounterDeception CNA PAO CND PAO Joint Doctrine JP 3-13 IO JP 3-13.1 C2W JP 3-51 EW JP 3-53 PSYOP JP 3-54 OPSEC JP 3-58 Deception JP 3-61 PA Joint Doctrine Joint Pub 3-13: – IO comprise those actions taken to affect adversary information and information systems while defending one’s own information and information systems AFDD 2-5: – IO comprise those actions taken to gain, exploit, defend, or attack information and information systems and include both information-in-warfare and information warfare Joint Doctrine vs new AF Doctrine Information Superiority Information Operations IIW Gain / Exploit ISR PNP WX PA JP 3-13 AFDD 2-5 AFDD 2-5 Draft Information Warfare Counter Information OFFENSIVE Deception EW (EA) Physical Attack PSYOP CNA (Info Attack) PA OPSEC SIO DEFENSIVE Counter Deception EW (EP) Counter Propaganda (C-PSYOP) Info Assurance OPSEC Counter Intelligence PA Physical Security SIO CND When do we do IO? WAR CRISIS RESTORAL PEACE PEACE Even when the US is at peace, the AF is fully engaged, on a daily basis, in conducting some IO functions. Information Operations Physical Attack / CNA Deception, PSYOP, EW Command, Control, Communications & Computers Intelligence, Surveillance and Reconnaissance Assurance (OPSEC, INFOSEC, COMPUSEC, COMSEC, EMSEC) Position/Navigation, Weather, PAO, Transmission/Storage Peace Crisis Conflict Restoration Peace “Warfare is intended not to kill someone, but to change their behavior. If you kill someone, you dramatically change their behavior.” Vice Adm. Arthur Cebrowski President, Naval War College Objectives of IO Control, Exploit, Enhance OBSERVE OBSERVE ACT ACT ACT ORIENT DECIDE DECIDE ORIENT IO: A Warrior’s Perspective CNA OPSEC PSYOP Destruction Deception EW IO can support, and can be supported by, all other aspects of aerospace power. Influencing Enemy’s Objectives Attack - Insert False Data Decision Maker Data is interrupted either by jamming or manipulation Replace Information Source with Deception or PSYOP Shape the Enemy’s Allocation of Resources The Aerospace Domain IO is an integral part of all successful aerospace functions Air Space GAIN INFORMATION EXPLOIT INFORMATION Info DEFEND INFORMATION ATTACK INFORMATION