AC 506--INTRODUCTION TO INFORMATION OPERATIONS & INFORMATION WARFARE [SAE 3]
LESSON OBJECTIVES:
506.1 Comprehend the fundamental concepts of dominant battlespace knowledge (DBK), information operations (IO), and information warfare (IW) .
506.11 Identify C4ISR systems and precision force weapons that foster DBK.
See ADMIRAL WILLIAM OWENS Dominant Battlespace Knowledge
Requirements fall into three general categories, which, for convenience, we may call intelligence, command and control, and precision force (see Figure 1 for an illustration of interrelationships):
What is happening, driven in part by broad conceptual architectures, in part by serendipity, is the creation of a new system of systems. Merging our increasing capacity to gather real-time, all-weather information continuously with our increasing capacity to process and make sense of this voluminous data builds the realm of dominant battlespace knowledge (DBK). DBK involves everything from automated target recognition to knowledge of an opponent's operational scheme and the networks relied on to pursue that scheme. The result will be an increasing gap between U.S. military forces and any opponent in awareness and understanding of everything of military significance in any arena in which we may be engaged.
506.12 Explain IO and IW (from the various Service perspectives), how they relate to each other, and the activities comprising each one.
Army
Information operations are "continuous military operations within the
military information environment that enable, enhance, and protect the commander's
decision cycle and mission execution to achieve an information advantage across the full
range of military operations."43 Information operations include "interacting
with the global information environment and, as required, exploiting or degrading an
adversary's information and decision systems." The Army recognizes that information
affects operations far beyond the traditional battlefield and, thus, information
operations is seen as the proper "word" to include both information warfare and
command and control warfare.
NAVY
"Information Warfare will give us the ability to slow and influence the
enemy's decision making cycle, to prepare the battlespace before the start of hostilities,
and to dictate the battle on our terms."47 While naval doctrine for IW is in at least
as much flux as that of the other services, current doctrine straddles the big view of IW
and the little view of IW as C2W. Operations Naval Instruction (OPNAVIST) 3430.26 defines
IW as "action taken in support of national security strategy to seize and maintain a
decisive advantage by attacking an adversary's information infrastructure through
exploitation, denial, and influence, while protecting friendly information systems.
AIR FORCE
The USAF recognizes correctly that information dominance is a broad concept and
describes it, in Air Force Doctrine Document 1 (AFDD-1) "Air Force Basic
Doctrine," in the war-fighting context as that condition in which the commanders have
"greater understanding of the strengths, weaknesses, and centers of gravity of an
adversary's military, political, social, and economic infrastructure" than the enemy
has about our side. Iinformation dominance provides a decisive degree of
information-in-war that is essential for the successful application, enhancement, or
employment of air and space power or, indeed, any other kind of military power. On the
other hand, in Air Force Doctrine Document 5 (AFDD-5) "Information Warfare,"
information dominance is defined as that "degree of superiority in information
functions that permit friendly forces to operate at a given time and place without
prohibitive interference from opposing forces
The USAF, IW is any action to "deny, exploit, corrupt, or destroy an adversary's information, information systems, and information operations" while protecting "friendly forces from similar actions." While the joint Staff, the Army, and Navy see part of IW as protecting our military systems and military information infrastructure, the USAF appears to envision part of IW as defending the armed forces against enemy information actions, as well as, defending the military information infrastructure.
506.2 Comprehend how command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) systems apply at all levels of war. [I.5(b)] (see JOINT PUB 6-0,)
The joint C4 architecture provides a framework of functional and technical relationships for achieving compatibility and interoperability of C4 systems. Architectures provide the logical link between operational requirements and C4 systems development. They are based on doctrine defining command relationships and information.
The Common Global Vision. C4I For The Warrior (C4IFTW) (see Figure II-3) sets forth a 21st century vision of a global information infrastructure made up of a web of computer controlled telecommunications grids that transcends industry, media, government, military, and other nongovernment entities. C4IFTW provides a unifying theme, guiding principles, and milestones for achieving global command, control, communications, computers, and intelligence (C4I) joint interoperability that:
TRACK PRODUCERS
506.21 Explain how to employ sensors, C4I, and precision force to achieve DBK and the JV 2010 objectives of information superiority and full-dimensional protection. [SAE 1]
The Infosphere Architecture. The C4I For The Warrior vision put the Armed Forces of the United States on a course toward an open systems architecture referred to as the global grid (see Figure II-4) that will provide virtual connectivity from anywhere to anywhere instantaneously on warrior demand. The architecture of grid networks can support both vertical and horizontal information flow to joint and multinational forces. Commanders at all levels require a distributed communications grid comprised of links employing any electronic transmission media overlaying an area of responsibility/joint operations area. Nodal points may be terrestrial, airborne, and/or space-based. Nodal points automatically store, relay, and process information. Voice, data, and imagery flows together in digitized form across all communication paths. Automated user terminals from man portable to more stationary types allow personnel to instantly connect in any fashion desired (e.g., electronic mail; instantly reconfigured (virtual) voice radio nets; imagery; connected sensor grids; or extended personal presence by creating synthetic environments such as virtual reality). The specific paths used to set-up virtual connectivity are controlled by computers. Warriors no longer depend on a single communication link, but have vastly increased reliability and flexibility with access via any of hundreds or thousands of circuits available through the GCCS and DOD information infrastructures, host nation, commercial service, or any combination. Virtual connectivity is automatically determined, established, and maintained on warrior demand through the grid network. When no longer needed, the resource is automatically made available providing efficient use of C4 resources.
The Warrior Vision of the Infosphere. The bottom line is a shared image of the battlespace between joint decisionmakers and warfighters at all levels and with instantaneous sensor to shooter connectivity. The JFC and subordinate leaders gain a coherent understanding of operational situations, regardless of the enemy's actions or responses, strategically, operationally, or tactically. Commanders see the battlespace together as a team-they perceive and move ideas and knowledge in a timely and coherent fashion. The virtual grid also links sensors to shooters to allow rapid exploitation of opportunity and generate quick, decisive actions.
506.22 Explain how C4I For The Warrior will help warfighters and decisionmakers achieve DBK.
Decision support systems are included within the umbrella definition of C4 systems. a. Joint Reporting System Support
b. Intelligence Support
d. Planning Support. In addition to conveying force status and intelligence information, C4 systems provide processing capabilities for planning.
e. Decision Support. Operational and tactical decision support systems also include maneuver, fire support and target planning, C2W, air operations, and C4 systems control and management. TARGETS FIXED TARGETS
506.3 Comprehend that opportunities and vulnerabilities are created by increased reliance on technology throughout the range of military operations. [I.5(d)]
506.31 Predict obstacles to achieving dominant battlespace knowledge.
The transition is Inevitable, but the speed at which we complete it depends on recognition of what is emerging and on our defense planning and programming decisions over the next several years. If accelerated the transition can be completed early in the next century. We could therefore be on the other side of this new revolution in military affairs years, perhaps decades, before any other nation. This is important for many reasons; one of the most significant is that completing the revolution offers us the opportunity to shape the international environment, rather than simply react to it. This, then, is the essence of the argument in favor of accelerating RMA. It is a bold vision and a controversial one. Visions count, however, only if people try to make them real, and the professional military should not try to reify this one unless it holds up to honest critique.
506.32 Distinguish advantages and disadvantages of acquiring and implementing dominant battlespace knowledge.
(OWENS)
Advantages: Our growing capacity to transfer DBK to all our forces, coupled with the
real-time awareness of the status of all our forces and the understanding of what they can
do with their growing capacity to apply force with speed, accuracy, and precision, builds
the realm of "near perfect" mission allocation. We will increasingly assign the
right mission to the right force, matching our forces to the most successful course of
action at both the tactical and operational levels of warfare. Further, our increasing
capacity to use force faster, more accurately, and more precisely over greater distances
and interacting with the advances in ISR will build a qualitatively better realm of battle
assessment. We will know the effects of our actions-and understand what those effects
mean-with far more fidelity, far earlier than anything we have experienced to date. This
dominant knowledge, in turn, will make any subsequent actions we undertake even more
effective, because we will truly be able to operate within the opponent's decision cycle,
and the opponent's capacity to operate at all will have been greatly eroded.
Disadvantages: The conflicts we face will remain competitions among thinking, learning, and adaptive human beings, so we need to recognize that any future opponent could diligently and intelligently try to counter capabilities the system-of-systems gives us. Assuming opponents will try to counter the system-of-systems does not mean they will succeed, however.
Reliance on "information" technologies-the kind of sensors, data processing and communications subsystems -carries an inherent weakness that opponents can exploit: the vulnerability of such technologies to offensive information warfare, or "hacking." Heavy reliance on the system-of-systems might make the United States vulnerable to catastrophic failure in efforts to use it successfully in conflict.
The system-of-systems may work only in a conflict similar to Desert Storm, with relatively open terrain and with an opponent who turns out to be scared and stupid, one who gives us enough time to amass an overwhelming force. That was the last war, however, not the next one. Future conflicts may take place in terrain less open, with an opponent not as militarily naive as Saddam Hussein, and against an army that is a lot more skilled in hiding. Urban areas, jungles, and mountains are as likely to be arenas as open deserts. There, it is argued, the system-of-systems is less applicable, and relying on it at the expense of a force built for close combat, in very ambiguous tactical situations, is a recipe for failure.
The vision refutes the wisdom of combat experience and military history regarding the fog and friction of war. War, they point out, is inherently chaotic and ambiguous. The only things certain about it are that you will know less than you need to and your strategies and plans will not work out as well as you had hoped
506.4 Comprehend the factors influencing joint doctrine. [I.2(b)]
506.41 Explain how the varying Service perspectives on IO and IW impact development of joint doctrine for IO and IW.
Excerpt from GEORGE STEIN Information Attack: Information Warfare in 2025
The US Army
Information operations include "interacting with the global information environment and, as required, exploiting or degrading an adversary's information and decision systems." That is, the Army recognizes that information affects operations far beyond the traditional battlefield and, thus, information operations is seen as the proper "word" to include both information warfare and command and control warfare. This is a potentially important evolution in Army thinking but, currently, it results in a limited view of information warfare. Information operations may, in fact, be a better word than information warfare, and could be adopted by the Joint Staff and the other services, but only if the concept is expanded to mean more than "military operations within the military information environment."
Information warfare, for the US Army, are actions "taken to preserve the integrity of one's own information system from exploitation, corruption, or destruction while at the same time exploiting, corrupting, or destroying an adversary's information system and in the process achieving an information advantage in the application of force."44 That is, information warfare remains in the universe of traditional platform-versus-platform thinking like "only armor can confront armor," with the information system as the new platform. Information warfare thus has been constrained to the universe of the combat support elements where techno-wizards will provide advantage for Willie and Joe to apply force with real weapons like tanks and artillery.
The US Army appears to confuse information-in-war with information warfare. The Army's goal to "assimilate thousands of bits of information to visualize the battlefield, assess the situation, and direct military action appropriate to the situation" is the use of information-in-war for traditional battle. The Army's "Information Age" Force XXI will "know the precise location of their own forces, while denying that kind of information to their foes" because, for the Army, information is "an essential dynamic enabling dominant military power at the strategic, operational, and tactical levels." This will be achieved by "using and protecting information infrastructures" while influencing or denying a potential adversary's use of these infrastructures.45
By constraining its doctrinal thinking to the infrastructure aspects of information and adopting uncritically the Joint Staff definition of C2W, the US Army may have let its traditional, and proper, land-warfare focus prematurely narrow its vision to the battlespace of armor, artillery, and infantry divisions. While it is undoubtedly important that the Army study and apply its notion of information warfare to C2W, it is also undoubtedly obvious that the Army must develop its concept of information operations beyond "the military information environment." Information operations, if conceived synergistically with the USAF concept of information attack, are much more than "integrated support to battle command" in traditional military operations.
The US Navy
The US Air Force
For the USAF, currently, information is seen as analogous to air and space. Information is seen as a realm in which dominance will be contested and in which and from which military power can be employed. Like air and space power, information dominance is a necessary, but not sufficient, condition for the application or employment of all other military power and, likewise, is a global mission. Mastering information warfare, then, will become a USAF core competency like air and space superiority. Unfortunately, USAF thinking currently suffers some of the same internal contradictions as does the IW thinking of the Army and Navy and, more importantly, that of the Joint Staff. The issue is, again, confusion among information-in-war, information, and information warfare.
The USAF recognizes correctly that information dominance is a broad concept and describes it, in Air Force Doctrine Document 1 (AFDD-1) "Air Force Basic Doctrine," in the war-fighting context as that condition in which the commanders have "greater understanding of the strengths, weaknesses, and centers of gravity of an adversary's military, political, social, and economic infrastructure" than the enemy has about our side.51 That is, information dominance provides a decisive degree of information-in-war that is essential for the successful application, enhancement, or employment of air and space power or, indeed, any other kind of military power. On the other hand, in Air Force Doctrine Document 5 (AFDD-5) "Information Warfare," information dominance is defined as that "degree of superiority in information functions that permit friendly forces to operate at a given time and place without prohibitive interference from opposing forces."52 As will be discussed presently, information "functions" is a problematic limitation. While information dominance must become a core USAF competency by 2025, it is only one key step, potentially, toward full-information warfare competency. Like the US Army, USAF thinking on information warfare must not be constrained to "information functions."
Unlike Joint Pub 3-13 (1995), Joint Doctrine for Command and Control Warfare, USAF thinking on information warfare appears to see aerospace power as not constrained by political considerations from protecting the military forces against hostile enemy information actions. That is, for the USAF, IW is any action to "deny, exploit, corrupt, or destroy an adversary's information, information systems, and information operations" while protecting "friendly forces from similar actions." While the joint Staff, the Army, and Navy see part of IW as protecting our military systems and military information infrastructure, the USAF appears to envision part of IW as defending the armed forces against enemy information actions, as well as, defending the military information infrastructure. The USAF is right: waiting for an electronic Pearl Harbor and then beginning the slow buildup and deployment of Army land power to apply force is not the way to prepare the armed forces for the fight, or to deter fighting, in the information age.
506.5 Comprehend the fundamentals of campaign planning. [I.4(e)] .
We must assist in demonstrating to service providers the compelling need for a collaborative, teamed approach in crafting solution-not just to support the Department of Defense and to protect our national security, but to protect their own proprietary interests as well. . IW applies across all phases, the range of military operations, and at every level of warfare. Defensive IW activities are conducted on a continuous basis, in both peacetime and war, and are an inherent part of force protection. Offensive IW capabilities may be employed in a variety of circumstances across the range of military operations.
506.51 Explain how differences among the services in doctrine and organization impact incorporation of information warfare in campaign plans.
JCS Information Warfare: A strategy for peace
A common focus is essential to ensure a credible IW vision becomes a reality. The three principles of the Joint Staff's implementation vision are:
Efforts are under way to integrate IW into all aspects of joint warfare. The Joint Staff, in cooperation with the Services and Defense agencies, is focusing on a common approach toward operationalizing IW. Efforts in six major areas are coming together to support the warfighter. They include:
Education, training, and exercises offer the greatest return on investment. High-level military education at the National Defense University and Service professional military education institutions focus on the study of IW concepts, policy issues, doctrine integration, and the role of IW throughout the range of military operations and all levels of war. Additionally, the DOD InterService Training Review Organization Initiative for Joint IW Training (DIIJIT) initiated 11 courses for DOD personnel. These courses range from senior-level awareness to technical training for systems administrators.
The DIIJIT is a great success story that epitomizes jointness. Additional courses are forthcoming that will continue to generate and focus IW study throughout the environment.
Information systems incident reports continue to reveal that most intrusions result from a lack of understanding and improper implementation of security measures by information users. Awareness and training modules are being inserted into a broad range of officer, enlisted, and civilian curriculum that explain vulnerabilities inherent in information systems, describe potential adversary threats, and educate people in proper system use.
Training for system and network administrators to identify and mitigate vulnerabilities is another investment yielding high dividends. Industry places a premium on and commits a great deal of resources to acquire and train specialists to administer and enforce information systems security policies. The Department of Defense should follow suit in this area.
506.52 Explain how the Services are integrating IO and IW into operational plans and exercises and using them to help accomplish strategic and military objectives.
At the organizational level, the Joint Staff is accelerating the integration of IW into joint exercises. Demonstration of IW concepts and capabilities in CINC-sponsored exercises will help planners and users better integrate IW into operations.
Lessons learned from incorporating IW into joint exercises also will help accelerate and shape policy and doctrine.
Definitions (from CORNERSTONES of IW)
AC COURSE OBJECTIVES:
CONTACT HOURS: This lesson can be completed in 8 hours.
READINGS:
Edge in War (extracted) - also in coursebook
READING RATIONALE:
The Johnson and Libicki selection introduces Admiral Owens' systems of systems vision
and counters some of the arguments against its viability. Tirpak outlines current and
projected initiatives in the information warfare arena. Cornerstones provides the
building blocks for USAF IW doctrine. The Stein papers provide a good overview of this
topic by examining how we should use Air Force doctrine to develop information warfare
doctrine and strategy and by outlining the various Service perspectives on information
operations and information warfare. The JCS brochure published in December 1996 outlines
basic IW concepts and summarizes ongoing initiatives (IW implementation strategy)
translating vision into processes and capabilities supporting joint warfighting. Finally,
Rodgers offers six recommendations for how to apply information warfare in the joint
campaign.
LESSON OUTLINE:
Thesis: This lesson lays the foundation for understanding information's impact on the
campaign. Though information-based warfare and command and control warfare (C2W) are not
new, technology's impact in this realm and high-level guidance, like JV 2010,
demands increased emphasis on information operations (IO) and information warfare (IW) in
campaign planning. Unfortunately, this emphasis has also created confusion, due to the
different Service perspectives and definitions of IO and IW. Notwithstanding, today's
campaign planners must understand how IW can assist the NCA at the strategic level and
what C2W means for warfighters at the operational and tactical levels.
Main Point I: The theoretical concept of dominant battlespace knowledge (DBK)
provides the basis for its application in the form of information operations (IO) or
information warfare (IW).
a. Know what these concepts mean.
b. Know what C4ISR systems and precision force weapons are required to achieve DBK,
conduct IO and IW, and accomplish the JV 2010 objectives of information superiority
and full-dimensional protection.
c. Explain how C4I For The Warrior will aid in achieving DBK.
Main Point II: The current doctrinal controversies and confusion in this area are
rooted in the varying Service perspectives on IO and IW.
a. The Army emphasizes information operations, while the Air Force and Navy focus more
heavily on information warfare.
b. The JCS categorizes IW into offensive IW and defensive IW and tends to stress the
deterrence aspects associated with information warfare.
LESSON INTEGRATION & RATIONALE:
Though information permeates every military activity, the lessons most closely tied to
this one are AC 505, Space in Campaign Planning, and AC 507, Emerging Technology.
LESSON OPR: War Theory and Campaign Studies Department