INFORMATION WARFARE KE HPS S - A Strategy for Peace The Decisive Edge in 19961126 023 DISCLAIMER THIS DOCUMENT IS BEST QUALITY AVAILABLE THE COPY FURNISHED TO DTTC CONTAINED A SIGNIFICANT NUMBER OF PAGES WHICH REPRODUCE DO LEGIBLY NOT This brochure marks yet another aspect of the tremendous progress being made in Information Warfare I W Over the past two years we have made great strides in raising awareness within DOD the rest ofGovernment and industry With that has come a conviction to act and within the Joint Staff we haveformulated an IW implementation strategy designed to translate vision into practical processes and capabilities supportingjoint warfighting We developed this brochure to outline basic IW concepts and summarize ongoing initiatives implementing those concepts Your continued support is needed to develop and support these initiatives and those yet on the horizon PETER PACE ARTHUR K CEBROWSKI Lieutenant General USMC Vice Admiral USN Director for Operations Director for C4 Systems From the Chairman Information Warfare I W has emerged as a key joint warfighting mission area The explosive proliferation of information-based technology' significantly impacts warfighting across all phases the range of military operations and all levels of war Our reliance on technology creates dependency and vulnerabilities throughout our global basing and information support networks and generates requirements for defensive 1W capabilities However the same technologies also create vulnerabilities for our adversaries that can be exploited using offensive IW capabilities When fully developed and integrated IW offers enormous potential to support our warfighters A comprehensive IW approach is essential to ensure warfighters have the tools to exploit adversary vulnerabilities while ensuring full access to timely accurate and relevant information wherever and whenever needed The Joint Staff developed an IW vision and strategy to address our most urgent needs The concepts outlined in this brochure provide a common framework to guide our continuing and expanding efforts in this vital mission area JOHN M SHAIJKASHVILI Chainnan of the Joint Chiefs of Staff ttric QUALITY man The Compelling Need Relevance to the Warfighter Use Breeds Dependence Infonnation itself is becoming a strategic Some potential adversaries are rapidly resource vital to national security This reality exploiting information and information system extends to warfighters at all levels Increasingly technologies such as telecommunications complex information systems are being integrated automated data processing sophisticated decision into traditional disciplines such as mobility logistics aids remote sensors and other related systems and C4I Systems are designed and employed with The spectrum of applied technologies ranges from inherent vulnerabilities that are in many cases the established radio frequency microwave satellite coaxial and fiberoptic transmission systems to new unavoidable consequences of enhanced functionality efficiency and convenience to users The generations of digital and advanced personal complexities and vulnerabilities of these information communications systems The availability and systems are often disguised by user-friendly relatively low cost of these technologies in global software The low cost associated with such markets increase the likelihood that they will be technology makes it efficient and cost effective to employed by potential adversaries in advanced command and control C2 and information systems extend the capabilities and vulnerabilities to an unprecedented number of users The broad access as components of advanced weapon systems and to and use of these infonnation systems enhances as offensive 1W capabilities National-level warfighting However these useful capabilities infrastructures including economic industrial and induce dependence and that dependence creates transportation systems that support national and vulnerabilities These vulnerabilities are a doublemilitary warfighting objectives are also becoming edged sword -- on one hand representing areas the increasingly dependent on automated control and Department of Defense DOD must protect while information systems for their operation on the other hand creating new opportunities that The information age is here Rapidly advancing can be exploited against adversaries information-based technologies and an increasingly ijsiDi PI NDI NCI competitive global environment have thrust BRHITXS CR1AI1 S information into center stage in society government DHPLNDF NCl- VUI NHRABII I I Y and warfare in the 21 st Century Information and information-based technologies are pervasive and Increasing Access to Information impact every facet of warfighting--from planning deployment and sustainment processes to the plethora of weapons systems employed by joint task Persian Gulf War force JTF commanders Timely accurate and Personal Computer SATCOM Fully Automated Switching PGM Automated Navigation relevant information is absolutely essential to Vietnam SATCOM Mainframe Computer warfighting as large force structures give way to Korea World War II smaller highly trained and technically equipped Radio Radar Enigma Ultra World War I forces Although the nature of war remains Telephone Civil War unchanged its character is now in constant Telegraph transition Printed Documents 4 700 i 80 1 Increasing Speed in Flow Processing of Information The decisive edge in war Information Warfare Operation DESERT STORM highlighted the increasing dependence of the US Armed Forces on information-based technologies and their powerful advantages However the impact was only the tip of a much larger and more complex reality of the evolving information age Military operations and the precise application of decisive combat power are critically dependent on many simultaneous and integrated tasks that in turn depend on information and information systems especially those tasks associated with critical command and control processes Some of these tasks include o Conducting strategic deployment o Sustaining theater forces o Ensuring force protection both in garrison and in forward-deployed areas o Preserving theater strategic command and control o Developing strategic and theater intelligence Many vital warfighting tasks are dependent upon information and information-based National Information Infrastructure Switching Systems IW focuses on a target set IW is an amalgam of warfighting capabilities integrated into a CINC's theater campaign strategy and applied across the range of military operations and all levels of war technologies Warfighting information systems are linked through supporting infrastructures thus exposed to attacks by a broad range of adversaries whose motives may be difficult to measure Therefore the difficulty in defending systems and processes upon which our warfighting capability depends is increased and their defense is absolutely essential The continuing growth of information systems and technologies offers nearly unlimited potential for exploiting the power of information in joint warfighting Because there are no fixed boundaries in the information environment the labels placed on information systems and associated networks may be misleading Open and interconnected systems are coalescing into a rapidly expanding global information infrastructure that enfolds the US National Information Infrastructure Nil and the Defense Infonnation Infrastructure DII The DII is embedded within and deeply integrated into the Nil Their seamless relationship makes distinguishing between them impossible The two share terrestrial telecommunications networks a variety of information data bases and satellite communications networks These Defense Information Infrastructure infrastructures connect geographically separated forces and span international boundaries Reach-Back Support for the Warfighter The successful conduct of warfare in the information age requires access to information available outside the theater of operations Information infrastructures no longer parallel traditional command lines and warfighters need frequent instant and reliable access to information at locations in CONUS as well as in theater For example mobility and sustainment of forces are highly dependent on commercial reach-back' infrastructures that include international telecommunications the public switched network transportation systems and commercial electric power grids Warriors require secure video teleconferencing detailed imagery from national sources intelligence logistics Predeployment Redeployment and support data from diverse locations The technical nature of these information infrastructures inhibits a commander's ability to control the flow of information or dynamically manage available information and telecommunications resources To support offensive operations warfighters may reach-back to employ information attack capabilities and techniques that provide an information advantage in their area of responsibility Providing capabilities to support military operations require the expansion of our information infrastructure beyond the established peacetime information environment Warfighters must have assurance that this expanded infrastructure can attain the level of protection required to enable mission Deployment Employment IW impacts all phases the range of military operations and all levels of war 1 itfi cl C cii sii fi ffflciss in Weil A teamed approach is essential to develop a comprehensive IW strategy Information Warfare Basics success The authority to implement this or any other level of protection for the Nil lies outside of the Department of Defense and government We must assist in demonstrating to service providers the compelling need for a collaborative teamed approach in crafting solutions - not just to support the Department of Defense and to protect our national security but to protect their own proprietary interests as well Our dependence on information and information systems and the exposure of our vulnerabilities to a full range of threats from computer hackers through criminals vandals and terrorists to nation states have brought focus and compelling relevance to the emerging discipline of IW Its unique characteristics set in motion revolutionar ' capabilities that will enhance and support warfighting into the next century 1W involves actions taken to achieve information superiority by affecting adversary information information-based processes information systems and computer-based networks while defending one's own information informationbased processes information systems and computer-based networks IW applies across all phases the range of military operations and at every level of warfare Defensive 1W activities are conducted on a continuous basis in both peacetime and war and are an inherent part of force protection Offensive IW capabilities may be employed in a variety of circumstances across the range of military operations IW operations may involve complex legal and policy issues requiring careful review and national-level coordination and approval A strategy for peace affected by the ability of the USG to influence the perceptions and decision making of others In times of crisis IW can help deter adversaries from initiating actions detrimental to the interests of the USG or its allies or to the conduct of friendly military operations If carefully conceived coordinated and executed IW can make an important contribution to defusing crises reducing the period of confrontation and enhancing the impact of informational diplomatic economic and military efforts and forestalling or eliminating the need to employ forces in a combat situation Thus IW at both the national-strategic and theater-strategic levels requires close coordination among a wide variety of elements of the USG including the Department of Defense As an integrating strategy IW focuses on the vulnerabilities and opportunities presented by an increasing dependence on information and information systems 1W targets and protects information information transfer links information gathering and processing nodes and human decisional interaction with information systems It may have its greatest impact in peace and the initial stages of crisis IW is one of many capabilities within the US military element of national power IW can support the overall US Government USG strategic engagement policy throughout the range of military operations The effectiveness of deterrence power projection and other strategic concepts is greatly Engagement Timeline Information Warfare EVectronic Attack o it LU PSYOP o 3 OPSEC Deception nfo Attack i v5v s i Sj S Sii o i i' i o SGBPr$fi ' m R tf i MMi INTEL Peace - Crisis War The decisive edae in war IW can be waged in wartime within and beyond the traditional military battlefield As a subset of IW command and control warfare C2 W is an application of IW in military operations that specifically attacks and defends the C2 target set However the capabilities and disciplines employed in C2W psychological operations PSYOP deception operations security and electronic warfare as well as other less traditional ones focused on information systems can be employed to achieve 1W objectives that are outside the C2 target set There are both offensive and defensive aspects of IW A common link between the two aspects is the target sets involved in IW information and information systems Just as DOD can use IW to affect the information and information systems of an adversary so too can an adversary target DOD's information and information systems Understanding the basic elements and the potential of offensive and defensive IW is a precursor to grasping the integrated IW strategy currently being developed within the Department of Defense The remainder of this brochure will outline the concepts and ongoing initiatives in the emerging discipline of IW Spectrum of IW Objectives Deter War Affect Infrastructure Disrupt WMD Program Support Peace Ops smi - - PR ' H o -v - v - oSA WSHmM i ' o sttii m Mm MmWmWBBsWBSm Peace - _ _ _ Ass t- M km mst mBe0mE - War A strategy for peace Defining the IW Vision The threat to our military and commercial information systems noses a significant risk to national security and is being addressed f 1996 National Security Strategy Organizing Defensive IW IW-D 1W-D actions must he carefully considered integrated at all levels of war and applied across the range of military operations This requires 1 W-D to he organized as a system and tied together by policy doctrine technology capability assessments education training exercises and a mutually supporting national organizational infrastructure Along the way the IW-D system can be integrated into the larger system of warfighting -- with the overall objective of capturing the latent potential of IW to dramatically enhance warfighting capability Collaborative efforts within the Department of Defense and elsewhere in the Federal Government are moving rapidly to organize and implement IW-D as a svstem IW-D Implementation Model Ascertain Nature Severity Causality Sponsorship Complicity etc store Detect Attack Protected Information Environment Motives Actors V- Civil Criminal Deter Attack Influence Perceptions Domestic Military Force non-force Informational Response International Diplomatic Economic A comprehensive model scalable to all levels of war The decisive edge in war The Protected Information Environment The IW-D System Organizing IW-D as a system begins with a broad vision implemented by collaborative efforts that move the vision and concepts from the abstract into a focused set of questions and answers on specific aspects of policy and standards The five critical components that should be included in any attempt to implement an IW-D system are integrity authentication non repudiation availability and confidentiality IW-D implementation is designed with an objective ot'information assurance to protect access to timely accurate and relevant information wherever and whenever needed At the national level the Department of Defense and other elements of government are working with industry to ultimately build the means to appropriately protect and defend the Nil and DI1 using a managed-risk approach The true extent and implications of IW-D are only visible in a top-level implementation model This model is scalable as it is applicable at all levels of war and across the range of military operations The protected information environment is not an impenetrable fortress that guarantees absolute security because that is neither practical affordable nor even necessary The focus is on defining real needs and dependencies The environment is bounded by what is critical to national security It is a combination of physical systems and places as well as abstract processes such as intelligence analysis The protected information environment is rooted in a sound approach to managing risk Risk management processes include consideration ol' information needs the value of information that may be compromised or lost if the protected information environment is breached loss of access control system vulnerabilities threats posed by potential adversaries and natural phenomena and resources available for protection and defense In addition the value ot'information changes in each phase of military operations and must be considered in the risk management process The protected information environment not only provides the degree of protection commensurate with the value of its contents but also ensures mechanisms are in place to respond to a broad range of attacks Elements of the Model The model begins with a defined and appropriately protected and defended information environment Interacting with the protected environment is a process to identify threats attacks or other degrading conditions and to disseminate warnings when and if these occur Attack detection initiates both restoration and response processes iw i igjr A strateav for mace Power technical sophistication of tools increasing 200 1 The required technical sophistication of the average intruder has dramatically decreased Articulation of the threat must be comprehensive -- overstating the threat leads to unnecessary levels of protection expense and effort Conversely understating the threat leads to overconfidcnce in system reliability and resilience under adverse conditions This simple realization underscores the vital importance of a clearly defined and articulated threat National intelligence organizations continue to characterize the evolving threat--a dynamic mission that must adjust to changing threat conditions determined to be at risk or require warning indications to assist them in other decision-making processes A comprehensive IW indications and warning I W regime will require a policy structure to establish authorities roles and responsibilities across local state and national jurisdictions Functionally I W for IW will require the closest cooperation between law enforcement the Intelligence Community and private enterprise In this environment crippling attacks can occur at speeds exceeding unaided human capacity to detect analyze and disseminate warnings I W will not occur without acollaborativegovernment-industry effort To get at the essence of the threat requires an understanding of three elements Attack Detection Threat o Identities and intentions of possible attackers o Possible attack techniques and methods o Potential targets extending from the strategic to the tactical levels Indications and Warning Threat knowledge is an input to a process that analyzes attack indicators and disseminates warnings to persons organizations and processes that are Defensive efforts to detect and identify adversary activities require close collaboration among government industry and society A critical element of the detection process is identifying indicators of adversary activity analysis of those indicators and dissemination of warnings This process requires a knowledge of the threat built upon information from various sources including law enforcement the Intelligence The decisive edge in war Community system providers and users Finally automated attack detection capabilities arc necessary given what may be extremely short timelines from initiation to the culmination of attacks Defending against an attack whether against a JTK's intelligence data base or against an automated component of the commercial national power grid is predicated on how well the intelligence threat and associated indications and warning processes function and on the agility of systems providers users and administrators in implementing protective countermeasures The potential subtlety of early indications of adversary prestrike reconnaissance and exploitation techniques as well as the speed with which a powerful attack can proceed from initiation to culmination mandates a need for automated intrusion detection capabilities These capabilities must automatically detect system intrusions or aberrations and instantly generate alerts Additionally automatic threat-mitigation that limits the extent of damage or spread of attack must be self initiating Restoration Attack detection mechanisms trigger reactive processes The first of these processes is restoration Restoration relies on a preestablished understanding of the desired levels and conditions of system performance and functionality Priorities may be then derived for restoring access to and availability of essential information as well as detect when anomalous conditions have degraded systems and processes below their desired steady-state performance thresholds Procedures for restoration of Restore --Ik v v- --'-J-'- -y Protected Information Environment f Threat I u 4 ' rr T Attack indicators Detect Attack w Warning dissemination Industry and users Intelligence Law enforcement 7 The key elements of a comprehensive indications and warning pn oeess A strategy for peace jurisdictional environment in the response process telecommunications exist for the Department of In the present IW environment the clear Defense and the National Communications System NCS The NCS facilitates executive and technical- identi fication of motives and actors will not lead to a simplified set of automatic response processes and expert dialogue between industry and the NCA options This is true because the seam between civil through the National Security Telecommunications and military roles in national security is blurred in the Advisor ' Committee NSTAC In the information age the NSTAC continues to play a vital role in the case of I W-D An attack against a commercial system that manifests itself in a DOD network raises Nation's total 1W-D posture legal and policy issues thus highlighting the need for increased interagency coordination and joint civilResponse Process - Motives military response operations Through all of this and Actors the limits of the proper and legitimate role of Attack detection mechanisms serve to trigger government to provide for the common defense must be recognized and respected ensuring no the response process Timely identification of violation of personal freedoms and rights of privacy motives and actors is the cornerstone of effective and properly focused response linking the analytic The effectiveness of the response process is results of the l W process to national-level dependent upon efficient integration of attack decision makers detection and analysis capabilities Timely The true nature of motives and actors engaged response is essential to influence adversary in attacks on US information systems or processes perceptions establish user confidence and of national interest whether domestic or maintain public support international permits an understanding of the Government Industry Society Restore Protected Information Environment i w Yy for IW-I Detect Attack Attack detection and rest oral requires teamed efforts'supported by automation The decisive edge in war ft fcA DOD V E-BUUJMIflJJ-tJ-illlINTELLIGENCE _- iJPYt - --- INDUSTRY WHITE HOUSE LAW ENFORCEMENT Effective response requires collaborative interagencv efforts Attacks themselves do not inherently point to the moti es and actors in an unambiguous way Apparently similar events or indications may have completely different causes sponsorship complicity and seventy The di Herein implications lor national security point to the wisdom of providing decision makers w ilh the best and most comprehensive information available on which to base decisions regarding response options As such the need for full cooperation between C4 technology and intelligence processes and capabilities is clear An Assembled IW-D System Warlighters depend upon information to plan operations deploy forces and execute missions Additionally advanced information technologies hav e significantly altered these processes Complex information systems support powerful infrastructures that dramatically enhance warlighter capabilities however increasing dependence upon these rapidly ev oh ing technologies make joint forces more ulnerable IW-I is a comprehensive strategy being implemented to protect and defend information and information s stems When combined with offensive JnL IW the net result will be the opportunity to use 1W to exploit situations and to win Offensive IW IW-O As with the IW-D system described above IW-O capabilities are employed at every level of warfare and across the range of military operations The employment of offensive IW capabilities to affect an adversary's information and information systems can yield a tremendous advantage to I IS military forces during times of crisis and conflict As a result combatant commanders must carefully consider the potential of IW for deterring and rolling back crisis When viewed as an integrating strategy 1W weaves together related disciplines and capabilities toward satisfy ing a stated objective Offensive IW applies traditional perception management disciplines such as PSYOP and information system attack to produce a synergistic effect against the remaining elements of an adversary's information systems information transfer links and information nodes A strategy for peace Examples of IW Targets 3B8afc Military Infrastructure Leadership in Commanders C2 Comm Links C2 Nodes Troops Intel Collectors Key Personnel ADP Support Strategic Comms Power Base Weapons Systems Civil Infrastructure Planes Ships Artillery PGMs Air Defense Comms Links Nodes o Industry - Financial Populace Ittaek the information systems and processes that support these target sets IW-0 in Military Operations Other Than War MOOTW Offensive IW related plans with their associatedeapabilities may be employed in peacetime to deter a crisis control crisis escalation project power or promote peace The employment of offensive IW capabilities in these circumstances may require INCA approval with support coordination deconfliction cooperation and or participation by other USG departments and agencies Although IW-0 capabilities can be employed to undermine an adversary's regime the primary locus of IW efforts in MOOTW should be to preserve the peace deter escalation of a conflict and prepare the battlefield so that if crisis escalated to conflict the US military can effectively employ IW-O capabilities in a wartime scenario Examples of other potential peacetime applications of offensive IW include the employment of IW capabilities to disrupt drug cartel communications lines in support of drug interdiction efforts and conducting a PS YOP campaign against a belligerent's potential allies with the goal of severing external sources of military economic and political support JBL The decisive edge in war Wartime Employment of IW-0 Beyond the threshold of crisis IW can be a critical force cnabler for the joint warfighter In addition to protecting information systems vital to the US military employment of IW-O capabilities can affect every aspect of an adversary's decision cycle by impacting its information centers of gravity Many of the activities associated with wartime employment of IW-0 capabilities focus on the military command and control target set However there are many other important information system targets for the warfighter to focus on to fully reali e the power of IW in wartime One type of information attack could be the application of IW capabilities against an adversary's automated information systems to disrupt production of critical war supporting industries Another application might be the use of IW capabilities to sever an adversary's communications networks from the external military economic and political support-base the Nation to respond quickly effectively and decisively will influence perceptions and assist in deterring future attack In this regard information joins economic political diplomatic legal and military power as an element of total national strength The preservation of information contributes to the total power of our Nation and society The result is a new form of strategic deterrence for the information age The Vision Comes to Closure National leaders are able to choose from a broad range of options that are flexible and combinable to achieve the desired effect in most circumstances The IW vision does not demonstrate a nation that is invulnerable but rather one that is vigilant decisive and prepared to respond to any threat foreign or domestic That reality contributes to strategic deterrence in a context appropriate to the information age Deterrence There are two aspects of deterrence associated with IW The first is the deterrent effect IW-O capabilities can have on a potential adversary during peace and crisis As new IW capabilities continue to emerge their potential usefulness to deter technology-dependent adversaries must be leveraged as much as possible The second more specific aspect is the deterrence of an information-based attack against the United States Deterring IW attack requires the application of both offensive and defensive capabilities Strong IW defenses help to discourage casual threats thereby narrowing the playing field to a more distinct set of actors When faced with an information-based attack the ability of m The IW vision supporting oii'ui v d t rr nt til ihv Infmimifmn L U A strategy for peace lit pie in en ii i ii IItint' V % f % l I We must have Information Superiority Information Superiority will require both offensive and defensive information warfare Joint Vision 2010 Taking It to the Troops A common focus is essential to ensure a credible IW vision becomes a reality The three principles of the Joint Staffs implementation vision are o Reduce the opportunities presented to potential adversaries by educating training and increasing the awareness of warriors to vulnerabilities and protective measures o Improve information attack capabilities and measures to protect against and detect attack on information and information systems by pursuing emerging technological capabilities and the synergy created by integrated defense-in-depth solutions o Build the necessary relationships within government and throughout the Nation to secure the infonnation needs of all constituencies Seal those arrangements in law and policy resulting in reconstituted national deterrence to preserve peace security and stability Efforts are under wav to integrate IW into all Technology aspects of joint warfare The Joint Staff in cooperation with the Services and Defense agencies is focusing on a common approach toward opcrationalizing IW Efforts in six major areas are coming together to support the warfighter They include o Education training and exercises o Policy o o o o Doctrine Assessments Organizational infrastructure Technology Education Training and Exercises User Tra'rvng o System Ad'vims'ratior Access Controls o Emergency Respons Multilevel Security Itis aecisive odae m war Education training and exercises offer the greatest return on investment High-level military education at the National Defense University and Service professional military education institutions focus on the study of IW concepts policy issues doctrine integration and the role of IW throughout the range of military' operations and all levels of war Additionally the DOD InterService Training Review Organization Initiative for Joint IW Training DIIJIT initiated 11 courses for DOD personnel These courses range from seniorlevel awareness to technical training for systems administrators The D11 1 IT is a great success story that epitomizes jointness Additional courses are forthcoming that will continue to generate and focus IW study throughout the joint environment Information systems incident reports continue to reveal that most intrusions result from a lack of understanding and improper implementation of security measures by information users Awareness and training modules are being inserted into a broad range of officer enlisted and civilian curriculum that explain vulnerabilities inherent in information systems describe potential adversary threats and educate people in proper system use Training for system and network administrators to identify and mitigate vulnerabilities is another investment yielding high dividends Industry places a premium on and commits a great deal of resources to acquire and train specialists to administer and enforce information systems security policies The Department of Defense should follow suit in this area At the organizational level the Joint Staff is accelerating the integration of IW into joint exercises Demonstration of IW concepts and capabilities in CINC-sponsored exercises will help planners and users better integrate IW into operations Lessons learned from incorporating IW into joint exercises also will help accelerate and shape policy and doctrine IW Policy The Department of Defense is participating in interagency discussions that focuses on IW policy issues and has created internal executive and working-level forums to identify develop and implement policies and concepts Across a broad range of issues IW efforts are examining DOD's role the role of government in society and the potential impact of emerging technologies and other factors A Defense Science Board study is also helping to fuse national-level and DOD efforts in broad areas Given these considerations appropriate policy positions and designation of responsibilities are being thoughtfully considered and reflected in DOD and CJCS policy documents The Joint Staff is participating in the revision of existing policy in addition to developing new IW instructions where needed Consistent with those efforts Chairman of the Joint Chiefs of Staff Defense Science Board Objectives o Identifying the information users of national interest o Determining the scope of national information interests to be defended o Characterizing the procedures processes and operational arrangements required to establish a comprehensive national defense-in-depth strategy o Identifying the reasonable roles of government and the private sector in creating managing and operating a national IW-D capability A strategy for p ace Instruction CJCSI 3210 01 established Joint IW Policy to support warfighting Also CJCSI 6510 01 A established Defensive Information Warfare Implementation that focuses on key areas of protecting and defending information and information systems IW Doctrine The Joint Staff is the lead agent for developing joint doctrine for information warfare This doctrine will include both offensive and defensive IW principles Joint IW doctrine will cover the organization for IW responsibilities coordination between levels of command IW planning considerations integration and deconfliction of IW activities and intelligence support to IW IW doctrine also will expand upon the principles of the Joint Pub 3-13 1 Joint Doctrine for Command and Control Warfare C2W DOD experiences will assist in illuminating broader IW concepts extending beyond the base doctrine of C2W To complement this doctrine effort the revision to the Joint Operation Planning and Execution System will fully integrate IW into the operations planning process process by the Chairman's Program Assessment Organizational Infrastructure Many components have begun to organize to support IW activities The interageney coordination requirements so central to IW effectiveness require careful attention to current organizational approaches Services and Defense agencies have initiated or expanded some capabilities to respond to security incidents and perform vulnerability assessments to fielded systems These capabilities will play a vital role in mitigating vulnerabilities overtime Most of the combatant commands have formed a tailored IW cell to meet the challenges presented by this emerging area To provide the support the CINCs require the Joint Staff has focused responsibility for CINC operational support Assessments Capability assessments focus on the programmatic aspects of IW The Joint Warfighting Capabilities Assessment process under the guidance of the Joint Requirements Oversight Council and with CINC participation serves as the primary analytic tool to support the Chairman in articulating joint warfighting requirements This process achieves its objective by zeroing in on two key milestones of the Planning Programming and Budgeting System PPBS First is the Chairman's Program Recommendations leading to focused language in the Defense Planning Guidance This is followed later in the PPBS Building information warfare means merging traditionally separate disciplines SSL The decisive edge in war Idvanc ed information-based technologies a key enahler of the IW vision aspects oflW within the Operations Directorate through the creation of an IW cell that mirrors those at the combatant commands to meet the significant challenges that lay ahead in IW Intelligence underpins IW operations in peace crisis and war Critical to the continued success ofIW-D efforts will be the availability of intelligence to support a comprehensive threat awareness Ongoing Intelligence Community efforts have produced initial assessments of the foreign threat and other efforts are under way to expand that work A comprehensive and rigorous understanding of the total threat is a critical requirement to develop a credible risk management strategy effective and focused training education and awareness programs Infonnation-based technology is a principal cnabler of the IW vision The Joint Staffcontinues to develop and maintain ties with government and industry laboratories to keep abreast of the latest discoveries and to explore ways to leverage technology to support IW requirements Maintaining ties to academic and scientific organizations provide a glimpse at the leading edge thinking that may influence future warfighting strategy and doctrine This process also provides valuable insights that can direct current IW capabilities and architectures in favor of emer ine trends The Intelligence Community also is stepping up to the unique requirements of targeting and battle damage assessment These efforts will require newprocesses and techniques to link the intelligence and operational communities The net effect will be an intelligence community that is prepared and focused JMHL Technology Conclusions An Assembled Vision We have entered an age of information where nations and military organizations have opportunities to gain decisive advantage through timely access to accurate relevant information Information is fast becoming a strategic resource that will drive a global competitive environment and permeate every facet of warfighting in the 21 century Warfighters depend upon information to plan operations deploy forces and execute missions Additionally advanced information technologies have significantly altered these processes Complex information systems support powerful infrastructures that dramatically enhance warfighter capabilities how ever increasing dependence upon these rapidly evolving technologies makes joint forces more vulnerable Conversely many of these same vulnerabilities extend to our adversaries offering new opportunities to use offensive capabilities to help gain a friendly advantage IW concepts are being implemented to protect and defend information and information systems When combined with offensive IW the net result will be the opportunity to use IW to exploit situations--and to win IW is a reality today and in the future it impacts societies governments and the range of military operations and all levels of war Implementing the IW vision is a challenging task Warriors should understand IW and its relevance to survive and fight now and in the future This concept has set forth a common v ision that will generate an awareness of the strategy and the many complex issues yet on the horizon The Joint Staff in cooperation with the Services combatant commands and Defense agencies is working toward implementing the common vision highlighted in this brochure Efforts are under way now Warriors must help implement these concepts to capture the latent potential of Information Warfare - a strategy for peace the decisive edge in war - ' '' ' ' ' ' ' 7 - ' o f - _ _ _ ' J ''o 'o '' ' o-' -r '' T' i' '' T ' - '' '' ''' 'o rfH i' V' 'l 0' i 'i i For questions comments or additional copies of this document please contact The Joint Staff Information Assurance Division J6K 703 614-2918 or the Information Warfare - Special Technical Operations Division J-38 703 695-0392 National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994‐7000 Fax 202 994‐7005 nsarchiv@gwu edu
OCR of the Document
View the Document >>