College of Aerospace Doctrine, Research and Education The Information

advertisement
College of Aerospace
Doctrine, Research
and Education
The Information
Operations Environment
IW-200
Information Operations



Why are we talking about IO and IW?
What is it? What are its elements?
(Is it all about computers?)
What is the AF doing about it?
The Aerospace Domain
Air
Space
Info
Air, Space and Info Ops Are Inherently Intertwined
IO is an integral part of all successful aerospace functions
Overview

The world we live in
–
–
–

Changing Nature of Warfare
–
–
–

The Information Age
Changes
Technology Driven
Impact of Technology
Paradigms
IO Doctrine - Definitions and differences
I-Bomb Video
Information Age Changes
Industrial Age

Production:
–
–

Information Age

Capital:
–

Land
Labor
–
–
–
Tangible Assets
Money:
Gold, minerals
Paper
Production:
–

Capital:
–

Knowledge
Service Oriented
Intangibles
Money:
–
Electronic / digital
Information Age Changes
Industrial Age

Work:
–
–

Information Age

–
Big plant operations
Mass produced
–

–
Bureaucratic
Vertical
–

Service oriented
Creative
Scale:
–
Organization:
–
Work:
–
Scale:
–

Physical
Repetitive,
interchangeable
Small, dispersed
Individualized
Organization:
–
–
Virtual, networked
Telecommute
Information Age Changes
Industrial Age

Individual:
–
–


Stripped of functions
like education, health
–

Urbanized
–

Unique, heterogeneous
society
Individualism
Family:
–
Population:
–
Individual:
–
Family:
–

Not unique,
homogeneous society
Marxism, etc.
Information Age
Reassuming roles
Home-schooling, etc
Population:
–
–
Sub-urbanizing
Dispersed
Information Age Changes
Industrial Age

Political:
–
–
–
–
Nationalism
Majority-minority
conflicts
Big government
actions
Strong political parties
Information Age

Political:
–
–
–
–
Localism,
transnationalism
Minority-minority
conflicts
Smaller government
Political parties weaker
Living in a Revolution
“We live in an age that is driven by information.
It’s an age which Alvin Toffler has called the
Third Wave. The ability to acquire and
communicate huge volumes of information in
real time, computing power to analyze this
information quickly, and the control systems to
pass this analysis to multiple users
simultaneously -- these are the technological
breakthroughs that are changing war and how
we prepare for war.”
SECEDEF William Perry, 5 May 1994
Technology Explosion
1959
1999
5,000 Stand-alone
Computers
No FAX Machines
No Cellular Phones
No E-mail
180 Million Computers
14 Million FAX Machines
40 Million Cellular Phones
E-mail Exceeds Postal
Service
The Technology Behind
The Change


Computing technology and the Chip
Only Ten years ago, 1990
–
–
MORE People in AF than Computers
Just beginning to Network
• Stand Alone Functions
• Sneaker Net
–
Z Series PCs: Z-100,
Z-150, Z-200, etc.
Primitive by today’s standards
The Technology Behind
The Change

Today…
–
–
–
–
–
#PCs > #AF users
Chip speeds > gigahertz
Interconnected, WWW
AF Networks handle billions of
electronic events annually
Terminology
• Systems Administrators
• Knowledge managers
• Chief Information Officers
Microchip is the Driver
Communications
bandwidth
continues
to increase
Processor power
doubles every 24 months
6 months
Density doubles
every 24 months
6 months
Memory size triples
every 18 months
6 months
Cost halved
every 18 months
12 months
Interconnected World
GCCS
DMS
GCSS
GTN
DSN
TBMCS
TPFDD
Demand for Information
Use breeds dependence...
dependence creates
VULNERABILITY
Persian Gulf War:
PCs, SATCOM, Automated
Switching, PGMs, Automated
Navigation
GII
NII
DII
Vietnam: SATCOM,
Mainframe Computers
WWII, Korea:
Radios, Radars,
Enigma, Ultra
Napoleonic Wars:
Signal Towers
Lanterns
1300
Signal Mirrors
Printed Documents
1400
1500
1600
Civil War:
Telegraph
WWI:
Telephone
1700
1800
1900
2000
What is Information?
= Data + Instructions
Transmit It
Corrupt
Exploit
Transform It
Deny
Destroy
Collect It
Store It
The Real Impact of the
Technology
Every
military
capability
depends on
computers
and
networks in
one way or
another!!
Military / Technology
Technological Revolution
Impact on Warfighting
Computer processing power
Storage device density
Reduce size, weight, power
Display resolution
Precision
Sensors
Lethality
Bandwidth
Speed & maneuver
Software Capability
Stealth
Awareness
Reliability
Improved logistics
Security Paradigms
Old





Known adversaries,
understood threat
Long warning times
Leading edge technology
confined to major powers
Force-on-force, landcentric battle
Serial attack, target-bytarget
Now







Information an adjunct
to weapons

Unpredictable
opponents/challenges
Short warning times
Leading edge technology
proliferates
Selective force for effect
Asymmetrically applied air
and space power
Simultaneous, parallel
strike
Information a weapon
target
/
Why is IO Important?
The means by which enlightened rulers and
sagacious generals moved and conquered
others…was advance knowledge. Advance
knowledge cannot be gained from ghosts and
spirits, inferred from phenomena, or
projected from the measures of Heaven, but
must be gained from men, for it is the
knowledge of the enemy’s true situation.
Sun Tzu
Joint Vision 2020

The Goal: Full Spectrum Dominance
–
–
–
–

Dominant Maneuver
Precision
Engagement
Focused Logistics
Full-Dimensional
Protection
All Bounded &
Enabled by
Information
Superiority
AF Core Competencies






Global Attack
Precision Engagement
Rapid Global Mobility
Air And Space Superiority
Agile Combat Support
Information
Superiority
Space
Air
The other
realm
Information
Land
Sea
Information Operations



AFDD 2-5, Aug 1998
AF CONOPS,
Dec 1999
AF Organizations are
restructuring or
being created to
perform IO/IW
AFDD 2-5.1 EW
AFDD 2-5.2 ISR
AFDD 2-5.3 PSYOP
AFDD 2-5.4 PAO
IO Definition
Information Operations comprise
those actions taken to gain, exploit,
defend, or attack information and
information systems and include
both information-in-warfare and
information warfare and are
conducted through-out all phases
of an operation and across the
range of military operations.
AFDD 2-5
ISR
Precision Nav & Positioning
Weather
Other Info Collection/
Dissemination Activities
PAO
Gain
Exploit
DCI
OCI
OPSEC, CND, PAO
Counterdeception
Counterpropaganda
Electronic Protection
Counterintelligence
Information Assurance
CNA
Military Deception
EW
PSYOP
Physical attack
PAO
Defend
Counterinformation
Attack
AFDD 2-5
INFORMATION SUPERIORITY
INFORMATION OPERATIONS
INFORMATION-in-WARFARE
gain
exploit
INFORMATION WARFARE
attack
defend
COUNTERINFORMATION
Precision
Nav & Position
ISR
Other Info Collection/
Dissemination Activities
Weather
DEFENSIVE
COUNTERINFORMATION
PAO
Information CounterAssurance Intelligence
Successfully executed
Information Operations
achieve information superiority
OFFENSIVE
COUNTERINFORMATION
PSYOP
Physical
Attack
OPSEC
CounterPropaganda
Military
Deception
Electronic
Warfare
Electronic
Protect
CounterDeception
CNA
PAO
CND
PAO
Joint Doctrine







JP 3-13 IO
JP 3-13.1 C2W
JP 3-51 EW
JP 3-53 PSYOP
JP 3-54 OPSEC
JP 3-58 Deception
JP 3-61 PA
Joint Doctrine

Joint Pub 3-13:
–

IO comprise those actions taken to affect
adversary information and information
systems while defending one’s own
information and information systems
AFDD 2-5:
–
IO comprise those actions taken to gain,
exploit, defend, or attack information and
information systems and include both
information-in-warfare and information
warfare
Joint Doctrine vs new AF Doctrine
Information Superiority
Information Operations
IIW
Gain / Exploit
ISR
PNP
WX
PA
JP 3-13
AFDD 2-5
AFDD 2-5 Draft
Information Warfare
Counter Information
OFFENSIVE
Deception
EW (EA)
Physical Attack
PSYOP
CNA (Info Attack)
PA
OPSEC
SIO
DEFENSIVE
Counter Deception
EW (EP)
Counter Propaganda (C-PSYOP)
Info Assurance
OPSEC
Counter Intelligence
PA
Physical Security
SIO
CND
When do we do IO?
WAR
CRISIS
RESTORAL
PEACE
PEACE
Even when the US is at peace, the AF is fully engaged,
on a daily basis, in conducting some IO functions.
Information Operations
Physical Attack / CNA
Deception, PSYOP, EW
Command, Control, Communications & Computers
Intelligence, Surveillance and Reconnaissance
Assurance (OPSEC, INFOSEC, COMPUSEC, COMSEC, EMSEC)
Position/Navigation, Weather, PAO, Transmission/Storage
Peace
Crisis
Conflict
Restoration
Peace
“Warfare is intended not to kill someone,
but to change their behavior.
If you kill someone, you dramatically
change their behavior.”
Vice Adm. Arthur Cebrowski
President, Naval War College
Objectives of IO
Control, Exploit, Enhance
OBSERVE
OBSERVE
ACT
ACT
ACT
ORIENT
DECIDE
DECIDE
ORIENT
IO: A Warrior’s Perspective
CNA
OPSEC
PSYOP
Destruction
Deception
EW
IO can support, and can be supported by,
all other aspects of aerospace power.
Influencing Enemy’s Objectives
Attack - Insert False Data
Decision Maker
Data is interrupted
either by jamming
or manipulation
Replace Information
Source with
Deception or PSYOP
Shape the
Enemy’s Allocation
of Resources
The Aerospace Domain
IO is an integral part of all
successful aerospace functions
Air
Space
GAIN
INFORMATION
EXPLOIT
INFORMATION
Info
DEFEND
INFORMATION
ATTACK
INFORMATION
Download