You are on page 1of 8

As part of Internet of Things display, booth of

Deutsche Telekom at CeBit 2015 shows moving


arms of robots holding magenta umbrellas,
March 16, 2015 (Courtesy Mummelgrummel)

Information Warfare work computer, home monitoring


system, car, Internet television, printer,
scanner, maps, and, if you are really
tech savvy, maybe your coffee pot or

in an Information Age refrigerator.


The Internet of Things (IoT) is
bound by a mesh network that is increas-
By William R. Gery, SeYoung Lee, and Jacob Ninas ingly connected to every part of our lives,
and those devices are becoming increas-
ingly reliant on each other to perform
their functions.1 Computing devices,
n the past week, how many devices number is upward of 10 to 15, and

I have you used that were connected


to the Internet or relied on an algo-
rithm to accomplish a task? Likely, the
most of those devices are used daily,
if not hourly. Examples may include a
Fit-Bit, cell phone, personal computer,
using advanced algorithms, are entering
the machine-learning phase, a subset of
computer science in which the computer
is “learning” about the environment and
presenting predictions based on available
data and conditions.2 Trends include
Major William R. Gery, USAF, is Program Manager for the U.S. Air Force Weapon System Evaluation machine-autonomy and self-learning. The
Program at Air Combat Command. Major SeYoung Lee, Republic of Korea (ROK) Army, is a Student in
the Military History Institution of ROK Army Headquarters. Lieutenant Colonel Jacob Ninas, USA, is a
idea of interconnectivity is not only about
Branch Chief in the 704th Military Intelligence Brigade. the IoT but also the information that

22  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
transits the Internet, and how it influences of this model. The Department of •• The United Kingdom reports 120,000
our daily decisions. The trend toward State coordinates the diplomatic role, cyber incidents a day. That is almost
a worldwide mesh-network is nearing, Department of Defense the military as many as the state of Michigan deals
and with the creation of an information role, and Department of Treasury the with.
technology (IT)-based domain comes in- economic role. Twenty-first-century •• Utah says it faces 20 million attempts
creased understanding of the environment challenges presented by the IoT require a day—up from 1 million a day 2
in which we live. There appears to be no a more innovative organization that years ago.8
deviation from Moore’s law, developed in promotes adaptability and agility in the
To meet the challenge that exists
1965, and popularized and demonstrated information space, akin to models used at
in the information age, organizational
since its inception. If Moore’s law contin- Google, Facebook, or Apple.
changes are required. Modern ideas and
ues to be upheld in the future, more apps, Winn Schwartau, author of
incorporating industry concepts may
algorithms, and daily functions will link Information Warfare and recognized
be one way to traverse the information
together each part of our lives, providing IW theorist, describes the information
space and create an advantage in future
increased processing capability and a age as “computers everywhere.”3 The
conflicts.
limitless stream of information creating ultimate fact of the information age is
Within the IoT, actions take place
maximum efficiency for humans. the proliferation of IT, which “incorpo-
in nanoseconds and occur billions of
The Westphalian design of society rates information systems and resources
times daily. Big data concepts attempt
and order contributes to the human need (hardware, software, and wetware) used
to harness massive amounts of infor-
to work within a set of logical models, by military and civilian decisionmakers
mation and distill that information into
whereas the principle of international law to send, receive, control, and manipulate
something that a human can use to make
and orderly division of nations enables information necessary to enable 21st-cen-
a decision. In the near future, the infor-
sovereignty over territory and domestic tury decisionmaking.”4 Additionally,
mation required to win the advantage
affairs. It is possible that globalization, the development of IT allows sharing of
over an enemy may be determined by
which would be nearly impossible information in near real time, at an expo-
who can extract data, identify key centers
without a relatively high transfer rate of nential rate, anonymously and securely.
of gravity in the information space, and
information, will play a critical role and These advances can be used as an asset,
automatically take action though rule sets
may challenge global order. Assuming but also pose a potential vulnerability
and computational criteria based on de-
an information advantage is required to to the United States, our allies, and our
fined “rules of engagement.” The ability
achieve nation-state and military objec- adversaries.5 It takes seconds to upload
to harness big data exists now and is only
tives, and information superiority is not pictures or comments on social media
increasing. Consumer product companies
guaranteed because of the complex IoT, networks. At the same time, adversaries
are mining Facebook, Google, and other
how does the U.S. Government present can use these systems to gain access
data to understand customer prefer-
effective and integrated information war- to critical information. According to a
ences, global trends, and public opinion
fare capability (IW) in the information New York Times article, “In July 2015,
on matters of interest. From a military
age? Moreover, if wars are fought in the 21.5 million people were swept up in a
standpoint, understanding the informa-
information space, can they be won with colossal breach of government computer
tion terrain in relation to the potential
information alone? In other words, can systems that was far more damaging than
adversaries is foundational to discerning
information warfare provide the ways and initially thought, resulting in the theft
points for information operations (IO)
means to fight wars, as well as the ends? of a vast trove of personal information,
across the range of military operations.
Also, does the U.S. Government need to including social security numbers and
Big data concepts used in business could
invest in an organization responsible for some fingerprints.”6 The following list
be advantageous and used in information
the coordination and integration of IW provides a general summary of the num-
warfare. It is possible that data-mining
capabilities and effects? ber of times systems have been attacked
and subsequently an information ad-
To increase the U.S. Government’s via cyber.7 The number of attacks on
vantage could achieve objectives purely
capability and capacity, a new organiza- information systems has increased each
through IW alone.
tion should be created within the U.S. year, reinforcing the fact that warfare is
The United States has used various
Government to focus on information currently being conducted in the infor-
IW strategies, agencies, and professionals,
warfare, with a fundamentally different mation space via IT.
with varying degrees of success. The U.S.
organizational structure than our current
•• The Pentagon reports getting 10 Information Agency (USIA) was created
governmental hierarchical structures.
million attempts a day. in 1953 and was in service until 1999.
Specifically, the U.S. Government sub-
•• The National Nuclear Security USIA was designed to consolidate all
scribes to the diplomatic, information,
Administration, an arm of the Energy information activities:
military, and economic (DIME) model
Department, also records 10 million
but does not have an organization de-
hacks a day.
signed to lead the information functions

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  23


[USIA] comprised all of the foreign infor- subdue the enemy without fighting is the The ability to operate in relative se-
mation activities formerly carried out by acme of skill.”13 In another example, the crecy also allowed Russia to successfully
the Department of State’s International Russian operations in Crimea provide a mask its true desired endstate. By doing
Information Administration (IIA) and modern case study where the outcome of so, it allowed for almost any action to
Technical Cooperation Administration, operations was directly attributed to IW potentially be considered a successful
and by the Mutual Security Agency. principles and capability. mission to enemies and outside observ-
Overseas, existing United States ers, due to a lack of understanding of
Information Service posts became the field Information Warfare: The Russian intentions. This also allowed for
operations offices of the new agency. The Russian Invasion of Crimea unchallenged Russian saber rattling and
exchange of persons program conducted The Russian incursion into eastern threats against the North Atlantic Treaty
by IIA remained in the Department of Ukraine, and eventual annexation of Organization and the West as Russia at-
State, but USIA administered the program Crimea in 2014, serves as the current tempted to paint Western Europe and the
overseas. The Department of State provided model of a sustained IW campaign and United States as weak, especially in the
foreign policy guidance.9 provides examples of successes and eyes of developing nations. In addition to
failures in these efforts. Russian IW, actions on the ground in Ukraine, Russia
Historically, information warfare was known as Reflexive Control, has its integrated and utilized television, print
identified as critical to national security, origins in Soviet doctrine and serves media, and social media to deflect and
and USIA was required to erode support as a key component in their hybrid hide its efforts at occupation and annex-
for the Soviet Union during the Cold warfare operations.14 Reflexive Control ation while reducing potential Western
War.10 Today, we usually consider IW “relies . . . on Russia’s ability to take involvement.16 The successful use of IW
as the means, or sometimes a way, to advantage of preexisting dispositions allowed Russian forces to occupy eastern
achieve an objective. But currently we among its enemies to choose its pre- Ukraine and annex Crimea without a
rarely think of IW as an end, even though ferred courses of action.”15 During large-scale response from the West.
we live in an information age where we operations in Ukraine, Russia’s primary As the world continues to move into
are all affected by the information envi- impediments included Western Euro- the information age, the ability of na-
ronment every day. Brian Nichiporuk, the pean powers and the United States. tion-state and nonstate actors to employ
author of “U.S. Military Opportunities,” Russia took multiple actions to seize successful IO tactics into their overall
discusses IW concepts and postulates: the advantage of preexisting dispo- strategy will undoubtedly increase. To
sitions among its enemies in order successfully deter and respond to these
The goals of an offensive information-war- to conduct successful operations in threats, the United States must innovate
fare campaign are to deny, corrupt, Ukraine and, at the same time, avoid a and develop organizations with expertise
degrade, or destroy the enemy’s sources of large-scale confrontation with the West. in both preventing and conducting such
information on the battlefield. Doing so As part of Reflexive Control, Russia actions.
successfully, while maintaining the oper- utilized a well-coordinated deni- Russia’s IW campaign in Ukraine
ational security of your own information al-and-deception plan, called maskirovka, enabled it to achieve the objective of
sources, is the key to achieving “information through the use of “little green men” annexing Crimea, but it was not a flaw-
superiority”—that is, the ability to see the to establish checkpoints and secure key less strategy. One flaw was the effort
battlefield while your opponent cannot.11 terrain in Ukraine. These little green that Russian leaders took to deny the
men operated with speed and efficiency, existence of troops in Ukraine. Even
In current and future warfare, infor- and wore no identifying patches or unit after undeniable proof, including geo-
mation superiority could be the single insignia. This lack of identification al- tagged photographs on social media and
most decisive factor. For instance, we lowed Russia to deny any association with captured Russian troops inside Ukrainian
could think about the China-Taiwan these forces, which were later acknowl- territory, Russian President Vladimir
scenario. China is employing a robust edged as Russian troops. By controlling Putin continued to deny involvement.
IW strategy targeting the Taiwanese gov- information and being able to deny its These excessive and continual denials
ernment in order to bring Taiwan under involvement in the occupation of Ukraine served only to discredit Russian lead-
Chinese control, without engaging in ki- during the early stages of the conflict, ers and provide additional reason to
netic war. They are simultaneously using Russia was viewed as an interested party believe that Russian forces were in fact
information operations to delay U.S. in- by the international community—as operating inside Ukraine.17 In addition,
volvement to the point where any outside opposed to a belligerent. This fed directly the lack of an overwhelming campaign
interdiction occurs too late to affect the into Russia’s view that Western Europe of offensive cyber actions brings into
outcome.12 This concept is fully realized and the United States did not desire a question the overarching hybrid warfare
by a dedicated focus on IW strategy, or- direct conflict and would not press the campaign. Russia is arguably one of the
ganization, and capabilities. This could be issue of Russian involvement, even if most capable nation-state cyber actors.18
analyzed best by Sun Tzu’s strategy: “To discovered. The lack of a comprehensive offensive

24  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
Deputy Secretary of Defense Robert Work and Vice Chairman of the Joint Chiefs of Staff General Paul Selva meet with Commander of U.S. Pacific Command,
Admiral Harry Harris, to discuss Third Offset Strategy and its implications for Indo-Asia-Pacific region, October 18, 2016, Camp H.M. Smith, Hawaii
(U.S. Navy/Jay M. Chu)

cyber campaign, such as that observed of potential adversaries, understand their current planning process and traditional
in Estonia in 2007 and Georgia in 2008, lessons learned, and use them to our planning structure provide the formal
raises questions about Russian IW and advantage, the U.S. Government must links between national strategy and
Reflexive Control strategy. While this ensure that the current organization of the tactical level, they do not prescribe
may indicate a desire not to aggravate IW capabilities and strategic planning en- a way in which to gain the informa-
potential adversaries, it may also indicate ables an integrated and cohesive National tion advantage in future conflicts.
Russia’s inability to control all aspects of Security Strategy. Arguably, from a national perspective,
its offensive cyber actions such that it was an information strategy should drive
concerned that actions could produce Strategic Planning Guidance subsequent actions and be integrated
large-scale unintended consequences.19 to Tactical Execution? from the President to the individual
These consequences may have resulted In the joint planning process, IO plan- Servicemember. The information strat-
in the Russians’ inability to deny their in- ning is typically a supporting effort. If egy should be integrated with strategic
volvement, or brought powerful enemies we prescribe to the idea that all wars communications efforts of the U.S.
into the conflict. As discussed, the flaws are fought on the cognitive plane, at Government. However, as noted in the
noted in Reflexive Control doctrine serve least at some point, then it is logical to 2008 report from the Defense Science
as examples of how difficult it is currently, assume that, at one point or another, Board, “Strategic Communications is
and will be in the future, to control IW courses of action (COAs) should a dynamic process with responsibility
the consequences of offensive actions be the supported effort. Moreover, held by those at the highest levels of
and conduct information warfare in an “information operations support government—the President and senior
information age. In an effort to better themes” are sometimes developed after government leaders. . . . But to do so
understand the capabilities and intentions military kinetic COAs are.20 While the requires a commitment not yet seen,

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  25


Routers and switches inside Google’s campus network room at Council Bluffs, Iowa, allow data centers to talk to one another, with fiber-optic networks
that run at speeds more than 200,000 times faster than typical home Internet connections (Photo courtesy Google Inc.)

though some steps have been taken.”21 to present ends that may be achieved Government shut down Internet Service
In fact, the report recommends the cre- through information warfare. Planners Providers (ISPs) (that is, the target) that
ation of a nonprofit, nonpartisan Center must articulate why a specific action is ISIL is using? Does the government con-
for Global Engagement as a focal point being taken and when it should occur duct a distributed denial-of-service attack
for strategic communication activities. based on commander’s intent, the oper- against certain Web sites? Does it put
In 2010, Joseph Biden provided the ational environment, and the operational influential messages onto ISIL message
President a report on strategic commu- approach designed to solve the problem. boards on the Internet? All options are
nications that urged synchronization Decades of trial and error in warfare have plausible, but many times are not exe-
and defined the overall concept.22 An led to institutional doctrine and rule sets. cuted due to lengthy and unsynchronized
interagency policy committee, led by While there is an argument that these plans. The lack of leadership and a focal
the National Security staff, was a recom- rules should be applied to both kinetic point in the U.S. Government who can
mended solution; however, a committee and nonkinetic effects, it is important to articulate the second- and third-order
is made up of individuals with allegiances realize that there are certain unique fac- effects of information operations often
to their own organization and likely with tors associated with both. For example, contributes to a lack of action. The ability
other responsibilities, not fully being targeting fundamentals are largely agreed to understand how the information space
dedicated to integrated strategic com- upon and accepted for offensive force-on- will be influenced by the outcome of a
munications. The little IW capability that force operations, but do the theories of U.S. action is not effective because there
exists is based on the current and legacy targeting need to adjust for information is no lead organization.
organizational structure, which hinders warfare? In addition to the tactical-level
effective IO planning and execution. Some argue that the center of gravity information effects, how are strategic
If information space can be consid- (COG) for the Islamic State of Iraq communications vetted and targeted?
ered a way and means to fight and win and the Levant (ISIL) is the Internet. Do the processes differ or are they the
wars, then a framework is required to If we accept this idea, how does the same? If the view of this process were to
assist in prioritization and planning and United States target ISIL? Does the U.S. change, and targeting were to become a

26  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
process within which information targets security apparatus? Furthermore, what members to develop solutions unabated
are held at risk (for example, the ISP organization is responsible for providing by personnel unfamiliar with the tech-
example or building a strategic weapon to information operation COAs for the nical situation. The concept capitalizes
deter an enemy), then it is possible that President, specifically designed as an end? on meritocracy-based principles and
realistic options could be presented to a The contrarian viewpoint to the focuses on a federated approach as well
combatant commander in a crisis action idea of driving development down to as crowd-sourcing solutions internally to
scenario. To execute a concept where the the operator level (that is, the Soldier) the military, or even in the public sector,
United States holds information targets is that authorities do not come with to arrive at solutions. Within the U.S.
at risk, it must have access to the target. capability. This is true. A tactical-level Government, it is unlikely that a lattice
Access for information-related effects unit should not have authority to execute organization would be wholly integrated;
delivered through the information space operations in the information space, just however, a hybrid concept that captures
is no different than for physical effects as the Soldier with the rifle would not the value of a legal and hierarchical
delivered by airplanes or ships. The fire without orders. There should be a framework along with realizing the po-
delivery method could be news, a cyber strategy with clear and precise guidance tential benefit of a lattice organization
capability, a military action, or even a for operational and tactical targeting. would be valuable, as globalization and
comment by the President. The path to This does not require “execution author- IT increasingly integrate our world.
employ information-related capabilities ities,” but it does require guidance from Additionally, a lattice framework would
(IRCs) requires access from the sender to national-level leadership on the issue. In more closely align conceptually with the
the receiver, and that targeting path must other words, because technical acumen is mass-network IT environment in which
be sustainable. Without sustained access, required, the U.S. Government cannot we live. Ideas presented in the corporate
a target cannot be held at risk because afford to have a disjointed IW strategy world are potential solutions that can
gaining access to the receiver could take in which progress is slowed due to an be used or modified for complicated IW
an extended amount of time, with rela- overly complicated and bureaucratic concepts within the U.S. Government. In
tion to the operation. hierarchical structure. A lack of unity of a thought piece from business, Cathleen
Additionally, the capability must be effort results, and risk to mission and risk Benko and Molly Anderson from Forbes
attainable. Software development can be to force increase. Developers, operators, magazine highlight a few key benefits of a
a potential strategic advantage. Driving and analysts need flexibility and agility to lattice organizational structure:
education and training for software solve problems quickly with innovative
development down to the tactical level technology and an understanding of the With employees working in geographically
empowers young Servicemembers to information age, just as a Soldier does dispersed teams, the old ways of commu-
create capabilities linked to the target, when in battle. nicating [are] no longer served. Lattice
reduce cost, and create efficiencies. For ways to participate moved the organization
example, a Soldier is taught how to use Is the World Organizationally toward more interactive, transparent com-
a rifle, the foundations are built in train- Changing? munication. In one instance, the finance
ing, and he is able to utilize the weapon Military organizations have generally division gave a role traditionally reserved
through the employment of various followed hierarchical models as early as for management—identifying improve-
tactics, techniques, and procedures on the the Greeks in 400 BCE for organizing ment priorities—to employees, by launching
battlefield as the situation dictates. If the and equipping. It is possible that global a “pain points” portal where they can voice
situation changes, he adjusts to the enemy IT trends will require a foundationally their views of current challenges for every-
in an instant. From an IW perspective, different way of thinking and organizing one to see. The company appoints teams to
software is but one tool, as is the rifle. IRCs in the U.S. Government to main- address the highest priorities.
Foundations are built, skills are honed, tain pace with the speed of information.
but it is left to the tactical level to ensure Largely, from the time of the Greeks to At Deloitte, our annual employee survey
the capability is “tuned” to the target that of the current U.S. Government, shows that 90% of workers who experience
because the tactical-level operator should militaries have been designed around all three lattice ways are engaged. Contrast
have the most accurate knowledge of that a hierarchical system. As IW becomes that with the results of a major global
target. Additionally, as accesses change, increasingly more important during workforce study by Towers Perrin in 2007–
the tactical and operational level should the conduct of government or military 2008 that found just over 60% of employees
ensure consistent and reliable access operations, a lattice framework and in surveyed companies were engaged.23
to the target. Indeed, the Soldier does system may be a logical way to organize
not develop the strategy; the national information warfare–based capabilities Not only does a lattice framework
security staff, President, and combatant and personnel. promote internal integration and
commanders do. But what organization This concept prescribes basic guid- idea-sharing, the concept also promotes
is responsible for coordinating the stra- ance and a certain rule set (that is, the use of solutions from external sources.
tegic message throughout the national authorities) but empowers individual In many cases, members of a lattice-type

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  27


USS Freedom and USS John C. Stennis are under way conducting Independent Deployer Certification exercise in surface warfare, air defense, maritime-
interception operations, command and control/information warfare, C4 systems intelligence, and mine warfare, April 28, 2015 (U.S. Navy/Ignacio D. Perez)

organization are encouraged to look the desired data from the terrorist’s organizationally, to harness IW concepts
for nonstandard solutions to difficult phone. This example shows the power of and be positioned to maintain the in-
problems, even if that means branching information in multiple ways; the first is formation advantage in a dynamic and
outside of organizational norms. the fact that the government was unable unsure information age.
Analyzing a recent case, the iPhone to use traditional methods of gaining Future IW solutions will also need
encryption issue surrounding the San support from a private company. Second, to involve multidomain skills from in-
Bernardino terrorist attack is an example media, as the primary driver, brought dividuals with varying backgrounds. In
of a federated approach to problem-solv- attention to the problem and forced a today’s military, once a Servicemember is
ing. The Federal Bureau of Investigation public debate, which worked in favor of branded with a specific skill set, it is chal-
(FBI) was able to crack the iPhone’s the government. There were arguments lenging to break from that community
encryption, despite Apple’s unwillingness on both sides of the issue, but it should and maneuver effectively between com-
to support. Apple’s fear stemmed from be assumed that the challenge in and of munities, while still maintaining upward
the idea that if it provided the requested itself was enough to stimulate a solution, mobility. To achieve greater effectiveness
support, the government would then whether right or wrong. The key point to in IO planning and execution, cross-do-
own the key to all encryption security this example is that the proliferation of in- main and diverse IRC careers should
measures for iPhones around the world.24 formation drove a solution, regardless of become a desired career path option for
When the international media reported Apple’s standpoint, the FBI’s authority, future leaders.
and publically debated the issue, the and even despite popular public opinion
FBI received calls from individuals and for or against the FBI. If the power of Amazon Meets the
companies claiming to possess the tools information can easily dictate the out- U.S. Government
necessary to break the encryption. In fact, come of such an example, what are the To harness the information age and
one company was able to break the en- long-term implications for warfare? The enable IW capability toward the success
cryption and allowed the FBI to retrieve U.S. Government can take measures now, of future U.S. conflicts, a new organiza-

28  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
tion should be created within the U.S.
14
Maria Snegovaya, Putin’s Information
Notes Warfare in Ukraine: Soviet Origins of Russia’s
Government. The Cold War has passed, Hybrid Warfare, Russia Report 1 (Washington,
and so has USIA; however, it is possible 1
“A mesh network is a Local Area Network DC: Institute for the Study of War, September
that a new version of USIA is required (LAN), Wireless Local Area Network (WLAN), 2015), 7, available at <http://understand-
as Russia continues to test its limits or Virtual Local Area Network (VLAN) that ingwar.org/report/putins-information-war-
of power. As in the case of Ukraine, employs one of two decentralized connection fare-ukraine-soviet-origins-russias-hybrid-war-
arrangements: full mesh topology or partial fare>.
Georgia, and Estonia, as well as the mesh topology. In a full mesh topology, each 15
Ibid.
need to combat terrorist groups such as network node is connected directly to others. 16
Ibid.
ISIL, a renewed effort on U.S. informa- In a partial mesh topology, some nodes are 17
Dimitry Gorenburg, “Crimea Taught
tion warfare is required. The dynamic connected to all the others, but are only Us a Lesson, But Not How the Russian
and ever-changing environment requires connected to those nodes with which they Military Fights,” War on the Rocks, May 19,
exchange the most data.” See “Mesh Network 2014, available at <http://warontherocks.
a fundamentally different organizational Topology (Mesh Network),” IoTAgenda.com, com/2014/05/crimea-taught-us-a-lesson-but-
structure than that of current govern- available at <http://internetofthingsagenda. not-about-how-the-russian-military-fights/>.
ment hierarchical structures in order to techtarget.com/definition/mesh-network-to- 18
LookingGlass Cyber Threat Intelli-
be flexible and adaptable for 21st-cen- pology-mesh-network>. gence Group, Operation Armageddon: Cyber
tury problems. Additionally, as we move
2
Machine-learning is a subfield of comput- Espionage as a Strategic Component of Russian
er science that evolved from the study of pat- Modern Warfare, CTIG-20150428-01 (Reston,
forward in the information age, our tern recognition and computational learning VA: LookingGlass Cyber Solutions, Inc., April
lives will be increasingly intertwined and theory in artificial intelligence. Machine-learn- 28, 2015), available at <https://lookingglass-
connected with information systems. ing explores the construction and study of cyber.com/wp-content/uploads/2015/08/
This information environment will con- algorithms that can learn from and make Operation_Armageddon_FINAL.pdf>.
tinue to play a critical role in how the predictions on data. 19
David Talbot, “Watching for a Crime-
3
Richard M. Crowell, War in the Informa- an Cyberwar Crisis,” MIT Technology Re-
U.S. Government and military interact tion Age: A Primer for Cyberspace Operations in view, March 4, 2014, available at <www.
with allies, partners, and adversaries in 21st Century Warfare (Newport, RI: U.S. Naval technologyreview.com/s/525336/watch-
all of the operational domains. War College, 2010). ing-for-a-crimean-cyberwar-crisis/>.
To shape the environment to meet 4
Ibid. 20
JP 5-0, Joint Operation Planning (Wash-
our desired endstates, we must recognize
5
Joint Publication (JP) 3-13, Information ington, DC: The Joint Staff, August 11, 2012),
Operations (Washington, DC: The Joint Staff, II-9.
the importance of information warfare November 27, 2012), I-1. 21
Report of the Defense Science Board Task
and work to ensure that IO concepts are 6
Julie Hirschfeld Davis, “Hacking of Force on Strategic Communication (Washing-
properly integrated into all actions and Government Computers Exposed 21.5 Million ton, DC: Department of Defense, January
operations, if not become an end them- People,” New York Times, July 9, 2015. 2008), available at <www.acq.osd.mil/dsb/
selves. We must also search for innovative
7
Brian Fung, “How Many Cyberattacks Hit reports/ADA476331.pdf>.
the United States Last Year?” National Journal, 22
National Framework for Strategic
ways to build and employ IO concepts. March 8, 2013, available at <www.nextgov. Communication (Washington, DC: The White
Our IO experts must have the required com/cybersecurity/2013/03/how-many-cy- House, 2010).
training and expertise necessary to meet berattacks-hit-united-states-last-year/61775/>. 23
Cathleen Benko and Molly Anderson,
these requirements by way of strategic 8
Ibid. “The Lattice that Has Replaced the Corporate
guidance. Operators must have flexibility
9
U.S. Information Agency, available at Ladder,” Forbes.com, March 16, 2011, available
<www.archives.gov/research/foreign-policy/ at <www.forbes.com/2011/03/16/corpo-
and agility engrained into their ethos related-records/rg-306.html>. rate-lattice-ladder-leadership-managing-hierar-
through a lattice-type organizational 10
Alvin A. Snyder, Warriors of Disinforma- chy.html>.
structure, which honors a multidomain tion: American Propaganda, Soviet Lies, and the 24
Pierre Thomas and Mike Levine, “How
career path. The ability to carry out all Winning of the Cold War (New York: Arcade the FBI Cracked the iPhone Encyption and
IW requirements must be done in a Publishing, 1995). Averted a Legal Showdown with Apple,” ABC
11
Brian Nichiporuk, “U.S. Military Op- News, May 29, 2016, available at <http://
timely and succinct manner that allows portunities: Information-Warfare Concepts of abcnews.go.com/US/fbi-cracked-iphone-en-
for the fastest possible action with the Operation,” in The Changing Role of Infor- cryption-averted-legal-showdown-apple/sto-
most flexibility. If we are not able to mation in Warfare, ed. Zalmay Khalilzad and ry?id=38014184>.
achieve these objectives, we will most John White (Santa Monica, CA: The RAND
definitely fall behind in the fast-paced Corporation, Project Air Force, 1999), 181.
12
Eric A. McVadon, “Systems Integration
and constantly changing world of IT in China’s People’s Liberation Army,” in The
and IW, and we will likely be ineffective People’s Liberation Army in the Information
in identifying and combating enemy Age, ed. James C. Mulvenon and Richard H.
COGs, such as ISIL’s reliance on IT. It Yang (Santa Monica, CA: The RAND Cor-
is time to implement ideas that exist in poration, 1999), available at <www.rand.org/
content/dam/rand/pubs/conf_proceedings/
industry, and force change, before change CF145/- CF145.chap9.pdf>.
is unattainable—through a sustainable 13
Sun Tzu, The Art of War (Oxford: Ox-
and repeatable process and organization ford University Press, 1963), 77.
within the U.S. Government. JFQ

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  29

You might also like