Professional Documents
Culture Documents
22 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
transits the Internet, and how it influences of this model. The Department of •• The United Kingdom reports 120,000
our daily decisions. The trend toward State coordinates the diplomatic role, cyber incidents a day. That is almost
a worldwide mesh-network is nearing, Department of Defense the military as many as the state of Michigan deals
and with the creation of an information role, and Department of Treasury the with.
technology (IT)-based domain comes in- economic role. Twenty-first-century •• Utah says it faces 20 million attempts
creased understanding of the environment challenges presented by the IoT require a day—up from 1 million a day 2
in which we live. There appears to be no a more innovative organization that years ago.8
deviation from Moore’s law, developed in promotes adaptability and agility in the
To meet the challenge that exists
1965, and popularized and demonstrated information space, akin to models used at
in the information age, organizational
since its inception. If Moore’s law contin- Google, Facebook, or Apple.
changes are required. Modern ideas and
ues to be upheld in the future, more apps, Winn Schwartau, author of
incorporating industry concepts may
algorithms, and daily functions will link Information Warfare and recognized
be one way to traverse the information
together each part of our lives, providing IW theorist, describes the information
space and create an advantage in future
increased processing capability and a age as “computers everywhere.”3 The
conflicts.
limitless stream of information creating ultimate fact of the information age is
Within the IoT, actions take place
maximum efficiency for humans. the proliferation of IT, which “incorpo-
in nanoseconds and occur billions of
The Westphalian design of society rates information systems and resources
times daily. Big data concepts attempt
and order contributes to the human need (hardware, software, and wetware) used
to harness massive amounts of infor-
to work within a set of logical models, by military and civilian decisionmakers
mation and distill that information into
whereas the principle of international law to send, receive, control, and manipulate
something that a human can use to make
and orderly division of nations enables information necessary to enable 21st-cen-
a decision. In the near future, the infor-
sovereignty over territory and domestic tury decisionmaking.”4 Additionally,
mation required to win the advantage
affairs. It is possible that globalization, the development of IT allows sharing of
over an enemy may be determined by
which would be nearly impossible information in near real time, at an expo-
who can extract data, identify key centers
without a relatively high transfer rate of nential rate, anonymously and securely.
of gravity in the information space, and
information, will play a critical role and These advances can be used as an asset,
automatically take action though rule sets
may challenge global order. Assuming but also pose a potential vulnerability
and computational criteria based on de-
an information advantage is required to to the United States, our allies, and our
fined “rules of engagement.” The ability
achieve nation-state and military objec- adversaries.5 It takes seconds to upload
to harness big data exists now and is only
tives, and information superiority is not pictures or comments on social media
increasing. Consumer product companies
guaranteed because of the complex IoT, networks. At the same time, adversaries
are mining Facebook, Google, and other
how does the U.S. Government present can use these systems to gain access
data to understand customer prefer-
effective and integrated information war- to critical information. According to a
ences, global trends, and public opinion
fare capability (IW) in the information New York Times article, “In July 2015,
on matters of interest. From a military
age? Moreover, if wars are fought in the 21.5 million people were swept up in a
standpoint, understanding the informa-
information space, can they be won with colossal breach of government computer
tion terrain in relation to the potential
information alone? In other words, can systems that was far more damaging than
adversaries is foundational to discerning
information warfare provide the ways and initially thought, resulting in the theft
points for information operations (IO)
means to fight wars, as well as the ends? of a vast trove of personal information,
across the range of military operations.
Also, does the U.S. Government need to including social security numbers and
Big data concepts used in business could
invest in an organization responsible for some fingerprints.”6 The following list
be advantageous and used in information
the coordination and integration of IW provides a general summary of the num-
warfare. It is possible that data-mining
capabilities and effects? ber of times systems have been attacked
and subsequently an information ad-
To increase the U.S. Government’s via cyber.7 The number of attacks on
vantage could achieve objectives purely
capability and capacity, a new organiza- information systems has increased each
through IW alone.
tion should be created within the U.S. year, reinforcing the fact that warfare is
The United States has used various
Government to focus on information currently being conducted in the infor-
IW strategies, agencies, and professionals,
warfare, with a fundamentally different mation space via IT.
with varying degrees of success. The U.S.
organizational structure than our current
•• The Pentagon reports getting 10 Information Agency (USIA) was created
governmental hierarchical structures.
million attempts a day. in 1953 and was in service until 1999.
Specifically, the U.S. Government sub-
•• The National Nuclear Security USIA was designed to consolidate all
scribes to the diplomatic, information,
Administration, an arm of the Energy information activities:
military, and economic (DIME) model
Department, also records 10 million
but does not have an organization de-
hacks a day.
signed to lead the information functions
24 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
Deputy Secretary of Defense Robert Work and Vice Chairman of the Joint Chiefs of Staff General Paul Selva meet with Commander of U.S. Pacific Command,
Admiral Harry Harris, to discuss Third Offset Strategy and its implications for Indo-Asia-Pacific region, October 18, 2016, Camp H.M. Smith, Hawaii
(U.S. Navy/Jay M. Chu)
cyber campaign, such as that observed of potential adversaries, understand their current planning process and traditional
in Estonia in 2007 and Georgia in 2008, lessons learned, and use them to our planning structure provide the formal
raises questions about Russian IW and advantage, the U.S. Government must links between national strategy and
Reflexive Control strategy. While this ensure that the current organization of the tactical level, they do not prescribe
may indicate a desire not to aggravate IW capabilities and strategic planning en- a way in which to gain the informa-
potential adversaries, it may also indicate ables an integrated and cohesive National tion advantage in future conflicts.
Russia’s inability to control all aspects of Security Strategy. Arguably, from a national perspective,
its offensive cyber actions such that it was an information strategy should drive
concerned that actions could produce Strategic Planning Guidance subsequent actions and be integrated
large-scale unintended consequences.19 to Tactical Execution? from the President to the individual
These consequences may have resulted In the joint planning process, IO plan- Servicemember. The information strat-
in the Russians’ inability to deny their in- ning is typically a supporting effort. If egy should be integrated with strategic
volvement, or brought powerful enemies we prescribe to the idea that all wars communications efforts of the U.S.
into the conflict. As discussed, the flaws are fought on the cognitive plane, at Government. However, as noted in the
noted in Reflexive Control doctrine serve least at some point, then it is logical to 2008 report from the Defense Science
as examples of how difficult it is currently, assume that, at one point or another, Board, “Strategic Communications is
and will be in the future, to control IW courses of action (COAs) should a dynamic process with responsibility
the consequences of offensive actions be the supported effort. Moreover, held by those at the highest levels of
and conduct information warfare in an “information operations support government—the President and senior
information age. In an effort to better themes” are sometimes developed after government leaders. . . . But to do so
understand the capabilities and intentions military kinetic COAs are.20 While the requires a commitment not yet seen,
though some steps have been taken.”21 to present ends that may be achieved Government shut down Internet Service
In fact, the report recommends the cre- through information warfare. Planners Providers (ISPs) (that is, the target) that
ation of a nonprofit, nonpartisan Center must articulate why a specific action is ISIL is using? Does the government con-
for Global Engagement as a focal point being taken and when it should occur duct a distributed denial-of-service attack
for strategic communication activities. based on commander’s intent, the oper- against certain Web sites? Does it put
In 2010, Joseph Biden provided the ational environment, and the operational influential messages onto ISIL message
President a report on strategic commu- approach designed to solve the problem. boards on the Internet? All options are
nications that urged synchronization Decades of trial and error in warfare have plausible, but many times are not exe-
and defined the overall concept.22 An led to institutional doctrine and rule sets. cuted due to lengthy and unsynchronized
interagency policy committee, led by While there is an argument that these plans. The lack of leadership and a focal
the National Security staff, was a recom- rules should be applied to both kinetic point in the U.S. Government who can
mended solution; however, a committee and nonkinetic effects, it is important to articulate the second- and third-order
is made up of individuals with allegiances realize that there are certain unique fac- effects of information operations often
to their own organization and likely with tors associated with both. For example, contributes to a lack of action. The ability
other responsibilities, not fully being targeting fundamentals are largely agreed to understand how the information space
dedicated to integrated strategic com- upon and accepted for offensive force-on- will be influenced by the outcome of a
munications. The little IW capability that force operations, but do the theories of U.S. action is not effective because there
exists is based on the current and legacy targeting need to adjust for information is no lead organization.
organizational structure, which hinders warfare? In addition to the tactical-level
effective IO planning and execution. Some argue that the center of gravity information effects, how are strategic
If information space can be consid- (COG) for the Islamic State of Iraq communications vetted and targeted?
ered a way and means to fight and win and the Levant (ISIL) is the Internet. Do the processes differ or are they the
wars, then a framework is required to If we accept this idea, how does the same? If the view of this process were to
assist in prioritization and planning and United States target ISIL? Does the U.S. change, and targeting were to become a
26 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
process within which information targets security apparatus? Furthermore, what members to develop solutions unabated
are held at risk (for example, the ISP organization is responsible for providing by personnel unfamiliar with the tech-
example or building a strategic weapon to information operation COAs for the nical situation. The concept capitalizes
deter an enemy), then it is possible that President, specifically designed as an end? on meritocracy-based principles and
realistic options could be presented to a The contrarian viewpoint to the focuses on a federated approach as well
combatant commander in a crisis action idea of driving development down to as crowd-sourcing solutions internally to
scenario. To execute a concept where the the operator level (that is, the Soldier) the military, or even in the public sector,
United States holds information targets is that authorities do not come with to arrive at solutions. Within the U.S.
at risk, it must have access to the target. capability. This is true. A tactical-level Government, it is unlikely that a lattice
Access for information-related effects unit should not have authority to execute organization would be wholly integrated;
delivered through the information space operations in the information space, just however, a hybrid concept that captures
is no different than for physical effects as the Soldier with the rifle would not the value of a legal and hierarchical
delivered by airplanes or ships. The fire without orders. There should be a framework along with realizing the po-
delivery method could be news, a cyber strategy with clear and precise guidance tential benefit of a lattice organization
capability, a military action, or even a for operational and tactical targeting. would be valuable, as globalization and
comment by the President. The path to This does not require “execution author- IT increasingly integrate our world.
employ information-related capabilities ities,” but it does require guidance from Additionally, a lattice framework would
(IRCs) requires access from the sender to national-level leadership on the issue. In more closely align conceptually with the
the receiver, and that targeting path must other words, because technical acumen is mass-network IT environment in which
be sustainable. Without sustained access, required, the U.S. Government cannot we live. Ideas presented in the corporate
a target cannot be held at risk because afford to have a disjointed IW strategy world are potential solutions that can
gaining access to the receiver could take in which progress is slowed due to an be used or modified for complicated IW
an extended amount of time, with rela- overly complicated and bureaucratic concepts within the U.S. Government. In
tion to the operation. hierarchical structure. A lack of unity of a thought piece from business, Cathleen
Additionally, the capability must be effort results, and risk to mission and risk Benko and Molly Anderson from Forbes
attainable. Software development can be to force increase. Developers, operators, magazine highlight a few key benefits of a
a potential strategic advantage. Driving and analysts need flexibility and agility to lattice organizational structure:
education and training for software solve problems quickly with innovative
development down to the tactical level technology and an understanding of the With employees working in geographically
empowers young Servicemembers to information age, just as a Soldier does dispersed teams, the old ways of commu-
create capabilities linked to the target, when in battle. nicating [are] no longer served. Lattice
reduce cost, and create efficiencies. For ways to participate moved the organization
example, a Soldier is taught how to use Is the World Organizationally toward more interactive, transparent com-
a rifle, the foundations are built in train- Changing? munication. In one instance, the finance
ing, and he is able to utilize the weapon Military organizations have generally division gave a role traditionally reserved
through the employment of various followed hierarchical models as early as for management—identifying improve-
tactics, techniques, and procedures on the the Greeks in 400 BCE for organizing ment priorities—to employees, by launching
battlefield as the situation dictates. If the and equipping. It is possible that global a “pain points” portal where they can voice
situation changes, he adjusts to the enemy IT trends will require a foundationally their views of current challenges for every-
in an instant. From an IW perspective, different way of thinking and organizing one to see. The company appoints teams to
software is but one tool, as is the rifle. IRCs in the U.S. Government to main- address the highest priorities.
Foundations are built, skills are honed, tain pace with the speed of information.
but it is left to the tactical level to ensure Largely, from the time of the Greeks to At Deloitte, our annual employee survey
the capability is “tuned” to the target that of the current U.S. Government, shows that 90% of workers who experience
because the tactical-level operator should militaries have been designed around all three lattice ways are engaged. Contrast
have the most accurate knowledge of that a hierarchical system. As IW becomes that with the results of a major global
target. Additionally, as accesses change, increasingly more important during workforce study by Towers Perrin in 2007–
the tactical and operational level should the conduct of government or military 2008 that found just over 60% of employees
ensure consistent and reliable access operations, a lattice framework and in surveyed companies were engaged.23
to the target. Indeed, the Soldier does system may be a logical way to organize
not develop the strategy; the national information warfare–based capabilities Not only does a lattice framework
security staff, President, and combatant and personnel. promote internal integration and
commanders do. But what organization This concept prescribes basic guid- idea-sharing, the concept also promotes
is responsible for coordinating the stra- ance and a certain rule set (that is, the use of solutions from external sources.
tegic message throughout the national authorities) but empowers individual In many cases, members of a lattice-type
organization are encouraged to look the desired data from the terrorist’s organizationally, to harness IW concepts
for nonstandard solutions to difficult phone. This example shows the power of and be positioned to maintain the in-
problems, even if that means branching information in multiple ways; the first is formation advantage in a dynamic and
outside of organizational norms. the fact that the government was unable unsure information age.
Analyzing a recent case, the iPhone to use traditional methods of gaining Future IW solutions will also need
encryption issue surrounding the San support from a private company. Second, to involve multidomain skills from in-
Bernardino terrorist attack is an example media, as the primary driver, brought dividuals with varying backgrounds. In
of a federated approach to problem-solv- attention to the problem and forced a today’s military, once a Servicemember is
ing. The Federal Bureau of Investigation public debate, which worked in favor of branded with a specific skill set, it is chal-
(FBI) was able to crack the iPhone’s the government. There were arguments lenging to break from that community
encryption, despite Apple’s unwillingness on both sides of the issue, but it should and maneuver effectively between com-
to support. Apple’s fear stemmed from be assumed that the challenge in and of munities, while still maintaining upward
the idea that if it provided the requested itself was enough to stimulate a solution, mobility. To achieve greater effectiveness
support, the government would then whether right or wrong. The key point to in IO planning and execution, cross-do-
own the key to all encryption security this example is that the proliferation of in- main and diverse IRC careers should
measures for iPhones around the world.24 formation drove a solution, regardless of become a desired career path option for
When the international media reported Apple’s standpoint, the FBI’s authority, future leaders.
and publically debated the issue, the and even despite popular public opinion
FBI received calls from individuals and for or against the FBI. If the power of Amazon Meets the
companies claiming to possess the tools information can easily dictate the out- U.S. Government
necessary to break the encryption. In fact, come of such an example, what are the To harness the information age and
one company was able to break the en- long-term implications for warfare? The enable IW capability toward the success
cryption and allowed the FBI to retrieve U.S. Government can take measures now, of future U.S. conflicts, a new organiza-
28 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
tion should be created within the U.S.
14
Maria Snegovaya, Putin’s Information
Notes Warfare in Ukraine: Soviet Origins of Russia’s
Government. The Cold War has passed, Hybrid Warfare, Russia Report 1 (Washington,
and so has USIA; however, it is possible 1
“A mesh network is a Local Area Network DC: Institute for the Study of War, September
that a new version of USIA is required (LAN), Wireless Local Area Network (WLAN), 2015), 7, available at <http://understand-
as Russia continues to test its limits or Virtual Local Area Network (VLAN) that ingwar.org/report/putins-information-war-
of power. As in the case of Ukraine, employs one of two decentralized connection fare-ukraine-soviet-origins-russias-hybrid-war-
arrangements: full mesh topology or partial fare>.
Georgia, and Estonia, as well as the mesh topology. In a full mesh topology, each 15
Ibid.
need to combat terrorist groups such as network node is connected directly to others. 16
Ibid.
ISIL, a renewed effort on U.S. informa- In a partial mesh topology, some nodes are 17
Dimitry Gorenburg, “Crimea Taught
tion warfare is required. The dynamic connected to all the others, but are only Us a Lesson, But Not How the Russian
and ever-changing environment requires connected to those nodes with which they Military Fights,” War on the Rocks, May 19,
exchange the most data.” See “Mesh Network 2014, available at <http://warontherocks.
a fundamentally different organizational Topology (Mesh Network),” IoTAgenda.com, com/2014/05/crimea-taught-us-a-lesson-but-
structure than that of current govern- available at <http://internetofthingsagenda. not-about-how-the-russian-military-fights/>.
ment hierarchical structures in order to techtarget.com/definition/mesh-network-to- 18
LookingGlass Cyber Threat Intelli-
be flexible and adaptable for 21st-cen- pology-mesh-network>. gence Group, Operation Armageddon: Cyber
tury problems. Additionally, as we move
2
Machine-learning is a subfield of comput- Espionage as a Strategic Component of Russian
er science that evolved from the study of pat- Modern Warfare, CTIG-20150428-01 (Reston,
forward in the information age, our tern recognition and computational learning VA: LookingGlass Cyber Solutions, Inc., April
lives will be increasingly intertwined and theory in artificial intelligence. Machine-learn- 28, 2015), available at <https://lookingglass-
connected with information systems. ing explores the construction and study of cyber.com/wp-content/uploads/2015/08/
This information environment will con- algorithms that can learn from and make Operation_Armageddon_FINAL.pdf>.
tinue to play a critical role in how the predictions on data. 19
David Talbot, “Watching for a Crime-
3
Richard M. Crowell, War in the Informa- an Cyberwar Crisis,” MIT Technology Re-
U.S. Government and military interact tion Age: A Primer for Cyberspace Operations in view, March 4, 2014, available at <www.
with allies, partners, and adversaries in 21st Century Warfare (Newport, RI: U.S. Naval technologyreview.com/s/525336/watch-
all of the operational domains. War College, 2010). ing-for-a-crimean-cyberwar-crisis/>.
To shape the environment to meet 4
Ibid. 20
JP 5-0, Joint Operation Planning (Wash-
our desired endstates, we must recognize
5
Joint Publication (JP) 3-13, Information ington, DC: The Joint Staff, August 11, 2012),
Operations (Washington, DC: The Joint Staff, II-9.
the importance of information warfare November 27, 2012), I-1. 21
Report of the Defense Science Board Task
and work to ensure that IO concepts are 6
Julie Hirschfeld Davis, “Hacking of Force on Strategic Communication (Washing-
properly integrated into all actions and Government Computers Exposed 21.5 Million ton, DC: Department of Defense, January
operations, if not become an end them- People,” New York Times, July 9, 2015. 2008), available at <www.acq.osd.mil/dsb/
selves. We must also search for innovative
7
Brian Fung, “How Many Cyberattacks Hit reports/ADA476331.pdf>.
the United States Last Year?” National Journal, 22
National Framework for Strategic
ways to build and employ IO concepts. March 8, 2013, available at <www.nextgov. Communication (Washington, DC: The White
Our IO experts must have the required com/cybersecurity/2013/03/how-many-cy- House, 2010).
training and expertise necessary to meet berattacks-hit-united-states-last-year/61775/>. 23
Cathleen Benko and Molly Anderson,
these requirements by way of strategic 8
Ibid. “The Lattice that Has Replaced the Corporate
guidance. Operators must have flexibility
9
U.S. Information Agency, available at Ladder,” Forbes.com, March 16, 2011, available
<www.archives.gov/research/foreign-policy/ at <www.forbes.com/2011/03/16/corpo-
and agility engrained into their ethos related-records/rg-306.html>. rate-lattice-ladder-leadership-managing-hierar-
through a lattice-type organizational 10
Alvin A. Snyder, Warriors of Disinforma- chy.html>.
structure, which honors a multidomain tion: American Propaganda, Soviet Lies, and the 24
Pierre Thomas and Mike Levine, “How
career path. The ability to carry out all Winning of the Cold War (New York: Arcade the FBI Cracked the iPhone Encyption and
IW requirements must be done in a Publishing, 1995). Averted a Legal Showdown with Apple,” ABC
11
Brian Nichiporuk, “U.S. Military Op- News, May 29, 2016, available at <http://
timely and succinct manner that allows portunities: Information-Warfare Concepts of abcnews.go.com/US/fbi-cracked-iphone-en-
for the fastest possible action with the Operation,” in The Changing Role of Infor- cryption-averted-legal-showdown-apple/sto-
most flexibility. If we are not able to mation in Warfare, ed. Zalmay Khalilzad and ry?id=38014184>.
achieve these objectives, we will most John White (Santa Monica, CA: The RAND
definitely fall behind in the fast-paced Corporation, Project Air Force, 1999), 181.
12
Eric A. McVadon, “Systems Integration
and constantly changing world of IT in China’s People’s Liberation Army,” in The
and IW, and we will likely be ineffective People’s Liberation Army in the Information
in identifying and combating enemy Age, ed. James C. Mulvenon and Richard H.
COGs, such as ISIL’s reliance on IT. It Yang (Santa Monica, CA: The RAND Cor-
is time to implement ideas that exist in poration, 1999), available at <www.rand.org/
content/dam/rand/pubs/conf_proceedings/
industry, and force change, before change CF145/- CF145.chap9.pdf>.
is unattainable—through a sustainable 13
Sun Tzu, The Art of War (Oxford: Ox-
and repeatable process and organization ford University Press, 1963), 77.
within the U.S. Government. JFQ