Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Information Operations, Electronic Warfare, and Cyberwar Capabilities and Related Policy Issues

Information Operations, Electronic Warfare, and Cyberwar Capabilities and Related Policy Issues

Ratings: (0)|Views: 11 |Likes:
Order Code RL31787

Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues

Updated March 20, 2007

Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division

Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues
Summary
This report describes the emerging areas of information operations, electronic warfare, and cyberwar in the context of U.S. national security. It a
Order Code RL31787

Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues

Updated March 20, 2007

Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division

Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues
Summary
This report describes the emerging areas of information operations, electronic warfare, and cyberwar in the context of U.S. national security. It a

More info:

Categories:Types, Letters
Published by: James Allen Isaacs Jr. on Dec 10, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/22/2014

pdf

text

original

 
Order Code RL31787
Information Operations, Electronic Warfare,and Cyberwar:Capabilities and Related Policy Issues
Updated March 20, 2007
Clay WilsonSpecialist in Technology and National SecurityForeign Affairs, Defense, and Trade Division
 
Information Operations, Electronic Warfare, and Cyberwar:Capabilities and Related Policy Issues
Summary
This report describes the emerging areas of information operations, electronicwarfare, and cyberwar in the context of U.S. national security. It also suggestsrelated policy issues of potential interest to Congress.For military planners, the control of information is critical to military success,and communications networks and computers are of vital operational importance.The use of technology to both control and disrupt the flow of information has beengenerally referred to by several names: information warfare, electronic warfare,cyberwar, netwar, and Information Operations (IO). Currently, IO activities aregrouped by the Department of Defense (DOD) into five core capabilities: (1)Psychological Operations, (2) Military Deception, (3) Operational Security, (4)Computer Network Operations, and (5) Electronic Warfare.Current U.S. military doctrine for IO now places increased emphasis onPsychological Operations, Computer Network Operations, and Electronic Warfare,which includes use of non-kinetic electromagnetic pulse (EMP) weapons, and non-lethal weapons for crowd control. However, as high technology is increasinglyincorporated into military functions, the boundaries between all five IO corecapabilities are becoming blurred.DOD has noted that military functions involving the electromagnetic spectrumtake place in what is now called the cyber domain, similar to air, land, and sea. Thiscyber domain is the responsibility of the new Air Force Cyber Command andincludes cyberwarfare, electronic warfare, and protection of U.S. criticalinfrastructure networks that support telecommunications systems, utilities, andtransportation.This report will be updated to accommodate significant changes.
 
Contents
Introduction......................................................1Background..................................................1Definitions.......................................................2Information...................................................2DOD Information Operations....................................2DOD Information Operations Core Capabilities..........................3Psychological Operations (PSYOP)................................3Military Deception (MILDEC)...................................4Operational Security (OPSEC)...................................4Computer Network Operations (CNO).............................4Computer Network Defense (CND)...........................4Computer Network Exploitation (CNE)........................5Computer Network Attack (CNA).............................5Electronic Warfare (EW)........................................6Domination of the Electromagnetic Spectrum....................6Electromagnetic Non-Kinetic Weapons.........................7New U.S.A.F. Cyber Command......................................7Joint Command Structure for Cyberwarfare.............................9DOD and the U.S. Critical Infrastructure...............................10Information Operations by Adversaries................................10Law and Proportionality for Information Operations.....................11Cyberwarrior Education............................................12Policy Issues.....................................................13Current Legislation...............................................14

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->