INFORMATION OPERATIONS and NATO Security: Element of

advertisement
INFORMATION
and National Security
Dr. Dan Kuehl
National Defense University (NDU)
Information Resources Management College (IRMC)
My Opinions: not the USG, DOD, or NDU
The Three Stages of Mankind’s Evolution
Homo Erectus:
Mankind standing up and
staring at movie props
“2001 A Space Odyssey” 1968
Homo Sapiens:
Mankind’s Superior Intellect
Monty Python’s “The Holy Grail”
Homo Connectus:
Mankind as OverlyConnected Cyborg
“Beetle Bailey”
Outline
Information and National Power
Cyberspace and Info Space
Information in National Security Strategy




Infrastructure Protection/Information Assurance
Strategic Communication
Information-Cyber Operations
Joint, Service, Global

New Developments
Measuring Power
An Information Strategy
Information as Power: DIME
Distinct from yet employed
across/integrated with all other
elements of power

Political/Diplomatic
From Radio Free Europe to “War of Ideas”
to Strategic Communication

Military
Military Technical Revolution to Revolution
in Military Affairs to “Transformation” to ??

Economic
Synergy of Information Communication
Technologies and national economies

Infrastructures
Information Power (1)
The Information Component of Power:
“Combination of information content and
technology used as a strategic instrument to
shape fundamental political, economic, military
and cultural forces on a long-term basis to affect
the global behavior of governments, supra- and
non governmental organizations, and societies to
support national security strategies & objectives”
Dan Kuehl, Strategic Forum #115, “Defining Info Power”,(1997)
President Ronald Reagan: National Security Strategy (1987)

Used by every nation state and strategic political
entity, regardless of technological development
Information Environment
Physical/Electronic Connectivity: “Ether”/Cyberspace/”eSpace”

Infrastructures, wires, networks, etc: a means of delivery
Cyberspace as a unique physical domain (land, sea, air, space)

Includes human (non-technical) connectivity
Information Content:

Words, images, databases, 11010111000s

Deeds/Actions are content

Context: identical content may be understood differently
Cognitive: “influence/perception”

Meaning and the Mind: “most important”
Example: Serbian TV vs NATO cohesion 1999

Losing the battle here may negate winning kinetically

Al Q’aida using kinetic ops to create cognitive effects
Information Power (2)
“The relative ability to operate in and exploit the
information environment


the aggregated and synergistic combination of
CONNECTIVITY, CONTENT, & COGNITION. It is an
indispensable underpinning for all other forms of power, yet it
is unique in its own right. It is employed across all other
forms of human activity—economics, war, diplomacy—and
across all levels of conflict, from peace to war. Its elements
can be described, and their impact measured, albeit not
necessarily to the exactness as other components of power.”
Analogous to air-sea-space power
Dan Kuehl, “The Information Revolution & the Transformation
of Warfare” (2007)
Cyberspace is…..??
DOD
 “A global domain within the
information environment
consisting of the interdependent
networks of information
technology infrastructures,
including the Internet,
telecommunications networks,
computer systems, and
embedded processors and
controllers.” (“until further
notice”)
J-5 Cyber Directorate (DepSecDef
memo of 12 May 2008)
DTK
“Cyberspace is a global domain
within the information environment
whose distinctive and unique
character is framed by the use of
electronics and the
electromagnetic spectrum to
create, store, modify, exchange
and exploit information via
interdependent and interconnected
networks using informationcommunications technologies
(ICT)”
Dan Kuehl, “Cyberspace & Cyberpower:
Defining the Problem”, Cyberpower &
National Security, 2009
Cyberspace is….


Man-made technologies are necessary to exploit ALL of our operational
domains and the natural phenomena from which they derive their
characteristics:
Chariots on land, Airplanes in the air, Ships at sea, Satellites in space
PP
CC
Tim Harrell, Booz-Allen-Hamilton
Cyber operations are…
“the employment of cyber capabilities where the primary
purpose is to achieve military objectives or effects in or
through cyberspace. Such operations include computer
network operations and activities to operate and defend
the Global Information Grid”


Is the GIG our “base” in cyberspace?
A foundation for Organize, Train & Equip
What is excluded: “operations that may cause effects in
cyberspace—EW, Psyop—[but] that do not employ cyber
capabilities.”
VCJCS Memo 25 September 2008
(Do you agree?)
“First Battles’” Thesis
Traditional Warfare: first defeats-even disastersdid not always equal final defeat; strategic
“space” allowed for recovery

Geographic and Temporal (“land/distance & time”)
Russia, 1941-44; Pacific, 1941-44
Battles for operational/technological superiority:
Radar, Airspace, Battle of Atlantic
Cyberwarfare: defeat in the first cyberbattle may
be the defining condition for victory

“Victory” in Clausewitzian terms, ie./ political
objectives, not solely/narrowly military
US National Security Strategy
(Past)
President Reagan, 1987/1988
Political and Informational Power




federal agencies & private sector
counter “public deception &
propaganda”
“full range of US informational
programs” to “reach peoples of denied
areas”
“electronic media, written materials,
increased contact & exchange”
Technology


strategic advantage
“free flow of information” facilitates
creation & exploitation of advanced
technology
economic health and military capability
computer technology and software
Info support to diplomatic power

“fight the war of ideas”
President Clinton, 1999/2000
3 Key pillars

Info Assurance/Critical Infrastructure
Protection (IA/CIP)
Vital national interest, use unilateral
force to defend; “Partnership”

Information Warfare/Ops (IW/IO)
MTR/RMA to Network Centric Ops to
Transformation: Desert Storm to
Kosovo to Afghanistan and Iraq

Public Diplomacy/International Public
Information (PD/IPI)
”Softpower” (Joe Nye); (Strategic
Communication)
“increasingly vital….transmit [our]
message to people around the world”
to “counter misinformation &
incitement…mitigate conflict”

“Softpower & Smartpower” (Joe Nye
and SecDef Gates, 2008)
Obama Admin
Three Suggestions

Do not treat cyberspace in isolation from information
environment (See DepSecDef Memo of May 07)
Need comprehensive Cyberstrategy as a segment of an even
more comprehensive National Info Strategy


“Comprehensive National Cybersecurity Initiative” (CNCI) is
vital but not enough by itself
Grow the Partnership
Public Sector: Interagency/Government (all levels), Military,
Congress, Intel, Agencies, etc
Private Sector: Industry/Business, Academia, Society
International partners and organizations

Develop an Information Strategy
Build the “3Cs” (later)
Information Assurance
Critical Infrastructure Protection
Dependency/Interconnections create Vulnerability
National Infrastructure controls


complex, interconnected, centralized, autonomous: SCADA
energy, transportation, communications, finance, etc
US Government actions 1990s – 200Xs


Australia, Norway, Sweden, Canada…
Just as valid for Europe, Asia as US: A global trend
NATO, EU
Partnership of Public-Private sectors

Lessons from Estonia & Georgia?
“Smaller is Better”
Strategic/economic impact/threat

“Strategic Fragility”
Mobilization = German railroad system 1914?
Cybersecurity Report (Melissa Hathaway’s effort)
The New National/Global
Security Environment
“Global Asymmetric Engagement/Asymmetric
Counterforce’

Cyberwar vs information & networks; operating in a contested
global commons
(see Flournoy/Brimley in USNI July 2009)
Asymmetric warfare & the “revolution in military affairs” =
others are looking for OUR weaknesses



Information-dependent military operations
Critical infrastructure-dependent national societies
Inter-connected global economies
Have we the organizations, doctrines, personnel needed
to survive and win the First Battle in Cyberspace?
Potential Cyber
Attack Objectives


Disrupt enemy infrastructure, logistics and supply
chains
Distract, confuse, and disable enemy C4ISR
OODA-Loop effects






Impair the movement of military forces
Deny similar capabilities to the enemy
Create opportunities for strategic attacks on enemy
infrastructures
Weaken, distract and disorient social cohesion and
political will of both military forces and civil populace
Shape global perceptions of the conflict
Time-Gap: potentially NANOSECONDS!
Bob Miller & Irv Lachow, “Strategic Fragility”,
http://www.ndu.edu/CTNSP/defense_horizons/DH59.pdf
Strategic Influence
Strategic Communication
“Strategic Influence” is a strategic
instrument…and always has been

Assyrian palace at Nimrud 700BC
TV is everywhere (“Softwar”)
“This weapon of television could be
useful”; Edward R. Murrow 1951

Vietnam to “Tear Down This Wall” to Al
Firdos bunker to “Live from the WTC”
New mediums: Internet, cell phone
cameras (London 2005), Twitter

Cyberspace & Terrorism =
cyberterrorism?
Info battle of Iraq: winning?
Global influence: succeeding?


MUST see through THEIR lens
Al Jazeera - Al Hurra, Radio Sawa
Recent congressional engagement

Needed for resources, support
Strategic Communication
Symphony Orchestra or Jazz Ensemble?
Cdr Steve Tatham, RN
“Strategic Communication: a Primer”
War of Ideas…or Images?
Narratives and Pictures
Influence “Campaigning”
Elements of an Information “Campaign”

WHAT is the desired EFFECT?

WHO is the audience?
Cultural awareness


Behaving
Cognitive
Dissonance
Confirmation or
Contradiction
Are we listening or just talking?
WHAT is the message?
Content analysis
Perceptions = Reality
DEEDS = messages!

SensingReceiving
HOW to deliver it?
Goal:
Desired Action
Faith and/or
Reason
Cultural
Mismatch
Which Media and Spokesman:
Shortwave to Arab street, or Imam in
Mosque?

WAS it successful?
Metrics & measurement
Measure impact, not effort
Believing
PerceivingInternalizing
C2W to Info Ops Roadmap
“Integrated use of
OPSEC, military
deception, PSYOP, EW,
and physical destruction,
mutually supported by
intelligence, to deny
information to, influence,
degrade or destroy
adversary C2
capabilities, while
protecting friendly
capabilities against such
actions.”
JCS, Command and
Control Warfare”

1993
 “Integrated employment
of the core capabilities
of EW, Computer
Network Operations,
Psyop, Military
Deception, and Opsec,
in concert with specified
supporting and related
capabilities, to influence,
disrupt, corrupt or usurp
adversarial human and
automated decision
making while protecting
our own”
 Info Ops Roadmap
 2003
Doctrine Pub 3-13, 2006
“the Thesis”
Highlights/Key Points




Retains Roadmap definition of Info Ops
Part of “Transformation”
“IW” no longer used; (irregular warfare)
Three interrelated dimensions
Physical, Informational, Cognitive

Strategic Command
Coord IO across AORs and functional boundaries


Importance of Strategic Communication
Important role of allied/coalition Info Ops
An Info Ops Map
Services
Air Force
•
•
•
•
•
Army
EW, Influence, Networks
AFDD-1, 2-5
Realm to control
Cyberspace Command?
24th AF – 67th NW Wg
•
•
•
•
•
•
Navy
Maritime Dominance
Fleet Operations
Net Centric Ops
NETWAR Command
Cyber Forces Cmd?
Info Warriors
•
•
•
•
•
Digital battlefield
FM 3-0 & 3-13
Info Superiority
1st IOpsCmd – 4th POG
FAs 29, 30 & 39
JOINT
Info Ops
•
•
•
•
•
USMC
Human factors & Tech
MCWP 3-40.5
Command Dominance
• OODA loop
MCIOC at Quantico
IOps career field
RMAs require Operational and Organizational change/”Transformation”
A DOD Map
USD(I)
SERVICES
Info Operations
Mil Dec, CNO, Opsec
Organize/Train/Equip
ASD/NII
Networks &
Info Integration
IA/CIP
Combat Cmds
Plan-Exercise
Execution
SOCOM-Psyop
JCS
JOINT
Info Ops
JROC Process
J2 Threats/TGTS
J39 (DDGO) Offensive
J5 Cyber Division
J6 Networks/Cyberspace
J7 Doctrine/Education
NSA
Threat Analysis
E-space Analysis
JFCC-NW
DIA
DISA
INTEL Focal Point
Indications & Warning
Human Factors Analysis
JIOWCntr
Defensive IW
Support to CoComs
Stratcom –
Global Strike
JTF-GNO
Indications & Warning
NCS/NSTAC
USD(P)
Policy
Roadmap
Psyop-DSPD
STRATCOM
Nodal analysis
Mission/Advocate
Support to CoComs
Plan/Execute
New Cyber Command
JWAC
Nodal Analysis
Allies’ Info Ops
UK Joint Warfare Pub 3-80

“Co-ordinated actions
undertaken to influence an
adversary or potential
adversary in support of
political and military
objectives by undermining
his will, cohesion and
decision-making ability,
through affecting his
information, informationbased processes and
systems while protecting
one’s own decision-makers
and decision-making
processes.”
EU Military Info Ops


EU Mil Committee 2/2008
“Military function that
provides advice and
coordination of military
activities affecting
information and information
systems in order to create
desired effects in support of
the mission specific Crisis
Information Strategy and of
the political and military
objectives of the EU”
What is a “crisis info strat”?
NATO
Info Ops comprises three interrelated activities



Changing, influencing or reinforcing perceptions and
attitudes or adversaries, potential adversaries, others
Preserve and protect Alliance freedom of maneuver in
the information environment by defending the data
and information [of] decision makers/processes
Countering command, functions, and capabilities by
affecting data/info of adversaries’ C2, intelligence,
surveillance, target acquisition and weapons systems
an integrating function focused on the info
environment, not a capability in its own right


Military Policy on IO MC 422/3 9 March 07 (agreed July 2008)
Allied Joint Pub 3-10 (pending official publication)
Others’ IO
China
Russia

“Information Security Doctrine
of the Russian Federation”




Protect the IT industry
Send: reliable info on the RF
Protect: spiritual life of the RF



Info Technical, Psychological
Tim Thomas, FMSO at
Ft Leavenworth
Focus on non-technological
Unconventional warfare
Not a battlefield force
enabler/multiplier
“Anti-Info-Strategy
Technology”
Russian Info Ops
Two, not five, core areas
Overlays IW with ideology
“New People’s War”-“Overcome superior with
inferior”
9 Sept 2000
Protect “national interests…in
the information sphere”



Info campaign precludes the
need for military action!---a
preemption weapon

Jim Mulvenon, “PLA in Info
Age”, RAND
Discussion
Is Cyberspace a warfighting domain?

Define “domain” (Definitions DO matter!)
Did the USAF try to “grab the cyberturf”?

How much of Cyberspace does AF/DOD
“own”?...civilian infrastructure is 90%+ of DOD use
Are we making the right changes in…

Organizations, doctrines, technology
What are coalition partners/allies doing?
Who will be the “Billy Mitchell” of Cyberspace?
(do we need/want one?)
Cyber Changes
US Strategic Command

New Subordinate Unified
Cyber Command
Director National Security
Agency 4 stars, 2 hats
JFCC-NW and JTF-GNO
folded into it
Missions, Roles,
Responsibilities evolving
Protect military—not
civilian—networks

Generating significant
discussion/unease
QDR Cyber Strategy

Broad goals (draft)
Freedom of Action in
cyberspace
Prevent/Deter conflict
Cyber support to
homeland defense

Supports
Secure Networks
Cyber Ops
External partners
DOD & national efforts
Information Operations
QDR sub-panel on Info Ops
Moving away from “5 core competencies”, and
towards the “Information Environment”

DTK proposal (based on QDR proposals):
[M] = Military
Information Operations are [M] activities conducted in or via
the information environment to affect and protect information
itself as well as the connectivity necessary to exchange that
information and create cognitive effects. Info Ops is thus the
integrated and coordinated [M] use of the information
environment in order to create desired [M] effects. This use
of the [M] information environment spans the range of
operations, and exists within and supports larger
governmental and national uses of the information
environment and information power in national security.
Measuring PIME
Traditional measure of power is control of
resources

Land, iron/coal/oil, people
M and E: easily visible and quantifiable

Military: hardware, troops, training

Economic: GDP, trade, industry
P/D: may have some visible metrics

Stability, continuity, participation
Embassies, treaties, diplomats
I most difficult of all

What metrics can we use?

Information/Cyber Power
“Use of information
content and technology
as strategic instruments
to…affect global
behaviors”
“The relative ability to
operate in and exploit
the information (cyber)
environment…”
Two Critical and measurable
factors:

CONNECTIVITY
Exchange of information

CONTENT
What’s exchanged
One somewhat less—but
still-measurable factor

COGNITIVE
Influence/behavior
Bottom Line:

Impact and Effectiveness
Information Power…
Who’s in Charge?
Diplomatic and Military…
Centralized and Hierarchical
Economic and Information…
Diffused and Shared
Which model is correct for Information?
What’s Lacking
Who and Where do we go to
shape and create Information
Power?


National Information Council?
Public & Private Partners
What do need from them?

National Information Strategy
What are we lacking? Why
don’t we have one?

We need a strategic and
conceptual foundation for how
we can employ Information
Power to support national
security
Needed: Information-age
corollary to the “Long
Telegram”
The “Long
Telegram”
861.00/2 - 2246: Telegram
The Charge in the Soviet Union (George
Kennan) to the Secretary of State
[was classified at the time…now declassified]
Moscow, February 22, 1946--9 p.m. [Received
February 22--3: 52 p.m.]
511. Answer to Dept's 284, Feb 3 [13] involves
questions so intricate, so delicate, so strange to our
form of thought, and so important to analysis of our
international environment that I cannot compress
answers into single brief message without yielding
to what I feel would be dangerous degree of oversimplification. I hope, therefore, Dept will bear with
me if I submit in answer to this question five parts,
subjects of which will be roughly as follows:
(1) Basic features of post-war Soviet outlook.
(2) Background of this outlook
(3) Its projection in practical policy on official level.
(4) Its projection on unofficial level.
(5) Practical deductions from standpoint of US
policy.
Information Strategy
Builds on “3Cs”

Build, enhance, support Connectivity
Physical: networks, infrastructures, Information-Communication
Technology (ICT)
Human: one-one, one-many, many-many
Get the REAL experts (ie. Private Sector)

Build/Use institutions that create Content
Entertainment, News, Marketing, Education, more
Get the REAL experts (ie. Private Sector)

Measure Cognitive impact
Get the REAL experts (ie. Private Sector)
All Three require partnerships beyond government,
military, and especially the private sector to include nonUS, and they require a long-term view…this isn’t years,
it’s decades

Taliban: “Americans have all the watches, we have all the time”
What’s Needed?
“Wire the World!”
New strategy is not
“Containment”…it’s
CONNECTIVITY


See Hart-Rudman Commission’s 2nd
Report, May 2000
An (increasingly) Networked World
Free flows of information and
exchange of CONTENT



Via both Human & Technological
Interaction
Enhance economic growth and
productivity, standards of living and
health care, etc
Enhance strategic communication,
which can enhance
Human rights, Democracy, Peace


Bridge the “Core-Gap” paradigm
…BUT: won’t be 100% successful
Critical Issues
Questions for Discussion
How do we develop and protect “National Cyberspace?

What is it? Who?
Organizations, people, doctrines
How do we leverage Info Ops to fully support military
operations/commanders?

Enabler? Multiplier? Partner? Supported/ing?
How do we communicate and influence?

Who? What? How? Did we Succeed?
Roles

Intel Community, Private Sector, Allies/Friends, NGOs
Where fit within NATO security strategy?
Cubicle-Centric Warfare
Are we too busy fighting ourselves…and not paying
sufficient attention to THEM?
Dr Dan Kuehl
kuehld@ndu.edu 202-685 2257
Twittersphere: “Daninfowar”
http://www.ndu.edu/irmc/programs/index.html
Programs/Certifications for/in…
Chief Information Officers
Information Assurance
Organizational Transformation…
…and
Information Strategists
Download