Information Warfare Lecture

25
Lt Col Maxie Thom, USAF National Defense Fellow Visiting Air Force Researcher University Park Campus, DM 434C (305) 348-1920 [email protected]

Transcript of Information Warfare Lecture

Page 1: Information Warfare Lecture

Lt Col Maxie Thom, USAF

National Defense Fellow

Visiting Air Force Researcher

University Park Campus, DM 434C

(305) 348-1920

[email protected]

Page 2: Information Warfare Lecture

Information Warfare

Capabilities and Policy Issues

Page 3: Information Warfare Lecture

Agenda

• Define IW

• Capabilities

• Policy Issues

Page 4: Information Warfare Lecture

Definition

• It is Not– Hacking into a school computer– Denial of service attack against e-commerce

• It is– DoD Technical View of IW : “information

itself is now a realm, a weapon, and a target”

Page 5: Information Warfare Lecture

Working Definition

Information warfare is comprised of operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions

Page 6: Information Warfare Lecture

Information Operations (IO)

• Military Information Warfare

• IO is conducted during time of crisis or conflict to affect adversary information and information systems while defending one's own information and systems

Page 7: Information Warfare Lecture

History

". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence."

Sun Tzu, The Art of War

Page 8: Information Warfare Lecture

History

"There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind."

Napoleon Bonaparte

Page 9: Information Warfare Lecture

Core Capabilities

• Psychological Operations (PSYOPS)

• Military Deception (MILDEC)

• Operations Security (OPSEC)

• Computer Network Operations (CNO)

• Electronic Warfare (EW)

Page 10: Information Warfare Lecture

PSYOPS

• Definition : Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.

• Purpose: Induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.

Page 11: Information Warfare Lecture

PSYOP (Weapons)

• Email, Faxes, Cell phones– Encouraged Iraqi leaders to abandon support

• Broadcast– Encouraged fielded troops to not fight

• Leaflets– Variety of themes

Page 12: Information Warfare Lecture

MILDEC

• Definition: Actions executed to deliberately mislead adversary military decision makers with regard to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the success of the friendly military operation.

• Purpose: Guide an enemy into making mistakes by presenting false information, images, or statements

Page 13: Information Warfare Lecture

MILDEC (Weapons)

• Operations– MINCEMEAT “The Man That Never Was”

• Camouflage– Mockups “Aircraft on a stick”

• Electronic– Tactical Air Launched Decoy (TALD)

Page 14: Information Warfare Lecture

OPSEC

“The formation and procedure used by the military should not be divulged beforehand.”

Sun Tzu, The Art of War

Page 15: Information Warfare Lecture

OPSEC (Definition)

A process of identifying and analyzing information that is critical to friendly operations: (a) identify which information can be observed by adversary intelligence systems(b) determine indicators that hostile intelligence systems might piece together to derive critical information in time to be useful to adversaries, (c) select and execute measures that eliminate or reduce the vulnerability of friendly actions to adversary exploitation.

Page 16: Information Warfare Lecture

CNO

• The ability to attack and disrupt enemy computer networks, protect military information systems, and exploit enemy computer networks through intelligence collection.– CNA– CND– CNE

Page 17: Information Warfare Lecture

CNO (CNA)

• Operations conducted to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.– Viruses– Trojan Horses

Page 18: Information Warfare Lecture

CNO (CND)

• Protect and defend information, computers, and networks from nasty D’s

• It utilizes security measures to keep the enemy from learning about U.S. military capabilities and intentions.

• Includes actions taken to protect, monitor, analyze, detect and respond to unauthorized activity within DOD information systems and networks.

• CND focuses on detecting or stopping intrusions, whereas OPSEC focuses on identifying and reducing vulnerabilities

– Firewalls - Encryption

Page 19: Information Warfare Lecture

EW

• Any military action involving the use of electromagnetic (EM) or directed energy to manipulate the EM spectrum or to attack an adversary– Jamming– TALD– Stealth (RAM)– High Power Microwave (HPM)

Page 20: Information Warfare Lecture

CNA vs. EW

CNA relies on interpreted signals in a data stream to execute an attack

EW relies more on the power of electromagnetic energy

Page 21: Information Warfare Lecture

QUESTIONS

??????????

Page 22: Information Warfare Lecture

Implications

• Policy

• Law

Page 23: Information Warfare Lecture

Policy Issues

• NSPD 16 (classified)…Jul 2002– PSYOP that affect friendly nations

– National Security Vulnerability of dependency

– Legal issues resulting from use of cyberweapons

Page 24: Information Warfare Lecture

Law of Armed Conflict

The LOAC arises from a desire among civilized nations to prevent unnecessary suffering and destruction while not impeding the effective waging of war. A part of public international law (precedence), LOAC regulates the conduct of armed hostilities. It also aims to protect civilians, prisoners of war, the wounded, sick, and shipwrecked. LOAC applies to international armed conflicts and in the conduct of military operations and related activities in armed conflict, however such conflicts are characterized.

- Hot Pursuit - Self Defense

Page 25: Information Warfare Lecture

QUESTIONS

??????????