INFORMATION WA KE HPS S « » A Strategy for Peace The Decisive Edge in 19961126 023 DISCLAIME THIS DOCUMENT IS BEST QUALITY AVAILABLE THE COPY FURNISHED TO DTTC CONTAINED A SIGNIFICANT NUMBER OF PAGES WHICH DO NOT REPRODUCE LEGIBLY This brochure marks yet another aspect of the tremendous progress being made in Information Warfare I W Over the past two years we have made great strides in raising awareness within DOD the rest of Government and industry With that has come a conviction to act and within the Joint Staff we have formulated an IW implementation strategy designed to translate vision into practical processes and capabilities supporting joint warfighting We developed this brochure to outline basic IW concepts and summarize ongoing initiatives implementing those concepts Your continued support is needed to develop and support these initiatives and those yet on the horizon PETER PACE ARTHUR K CEBROWSKI Lieutenant General USMC Vice Admiral USN Director for Operations Director for C4 Systems From the Chairman Information Warfare I W has emerged as a key joint warfighting mission area The explosive proliferation of informationbased technology' significantly impacts warfighting across all phases the range of military operations and all levels of war Our reliance on technology creates dependency and vulnerabilities throughout our global basing and information support networks and generates requirements for defensive 1W capabilities However the same technologies also create vulnerabilities for our adversaries that can be exploited using offensive IW capabilities When fully developed and integrated IW offers enormous potential to support our warfighters A comprehensive IW approach is essential to ensure warfighters have the tools to exploit adversary vulnerabilities while ensuring full access to timely accurate and relevant information wherever and whenever needed The Joint Staff developed an IW vision and strategy to address our most urgent needs The concepts outlined in this brochure provide a common framework to guide our continuing and expanding efforts in this vital mission area JOHN M SHAIJKASHVILI Chainnan of the Joint Chiefs of Staff ttric QUALITY man The Compelling Need Relevance to the Warfighter Use Breeds Dependence Infonnation itself is becoming a strategic Some potential adversaries are rapidly exploiting information and information system resource vital to national security This reality extends to warfighters at all levels Increasingly technologies such as telecommunications automated data processing sophisticated decision complex information systems are being integrated aids remote sensors and other related systems into traditional disciplines such as mobility logistics The spectrum of applied technologies ranges from and C4I Systems are designed and employed with established radio frequency microwave satellite inherent vulnerabilities that are in many cases the coaxial and fiberoptic transmission systems to new unavoidable consequences of enhanced functionality efficiency and convenience to users The generations of digital and advanced personal complexities and vulnerabilities of these information communications systems The availability and relatively low cost of these technologies in global systems are often disguised by userfriendly markets increase the likelihood that they will be software The low cost associated with such technology makes it efficient and cost effective to employed by potential adversaries in advanced extend the capabilities and vulnerabilities to an command and control C2 and information systems as components of advanced weapon systems and unprecedented number of users The broad access to and use of these infonnation systems enhances as offensive 1W capabilities Nationallevel infrastructures including economic industrial and warfighting However these useful capabilities transportation systems that support national and induce dependence and that dependence creates military warfighting objectives are also becoming vulnerabilities These vulnerabilities are a double increasingly dependent on automated control and edged sword — on one hand representing areas the Department of Defense DOD must protect while information systems for their operation on the other hand creating new opportunities that The information age is here Rapidly advancing can be exploited against adversaries informationbased technologies and an increasingly ijsi Di PI NDI NCI competitive global environment have thrust CR1AI1 S information into center stage in society government BRHITXS DHPLNDF NCl VUI NHRABII I I Y and warfare in the 21 st Century Information and informationbased technologies are pervasive and Increasing Access to Information impact every facet of warfighting—from planning deployment and sustainment processes to the plethora of weapons systems employed by joint task Persian Gulf War force JTF commanders Timely accurate and Personal Computer SATCOM Fully Automated Switching PGM Automated Navigation relevant information is absolutely essential to Vietnam SATCOM Mainframe Computer warfighting as large force structures give way to Korea World War II smaller highly trained and technically equipped Radio Radar Enigma Ultra World War I forces Although the nature of war remains Telephone Civil War unchanged its character is now in constant Telegraph transition Printed Documents 700 i 80 1 4 Increasing Speed in Flow Processing of Information The decisive edge in war Information Warfare Operation DESERT STORM highlighted IW focuses on a target set IW is an the increasing dependence of the US Armed Forces amalgam of warfighting capabilities on informationbased technologies and their integrated into a CINC's theater campaign powerful advantages However the impact was only strategy and applied across the range of the tip of a much larger and more complex reality of military operations and all levels of war the evolving information age Military operations and the precise application of decisive combat power are critically dependent on many simultaneous and integrated tasks that in turn depend on information technologies Warfighting information systems are linked through supporting infrastructures thus and information systems especially those tasks exposed to attacks by a broad range of associated with critical command and control adversaries whose motives may be difficult to processes Some of these tasks include measure Therefore the difficulty in defending • Conducting strategic deployment systems and processes upon which our warfighting • Sustaining theater forces capability depends is increased and their defense • Ensuring force protection both in garrison and is absolutely essential in forwarddeployed areas The continuing growth of information systems • Preserving theater strategic command and and technologies offers nearly unlimited potential control for exploiting the power of information in joint • Developing strategic and theater intelligence warfighting Because there are no fixed boundaries Many vital warfighting tasks are dependent in the information environment the labels placed on upon information and informationbased information systems and associated networks may be misleading Open and interconnected systems are coalescing into a rapidly expanding global information infrastructure that enfolds the US National Information Infrastructure National Information Infrastructure Nil and the Defense Infonnation Infrastructure DII Switching Systems Defense Information Infrastructure The DII is embedded within and deeply integrated into the Nil Their seamless relationship makes distinguishing between them impossible The two share terrestrial telecommunications networks a variety of information data bases and satellite communications networks These infrastructures connect geographically separated forces and span international boundaries ReachBack Support for the Warfighter and support data from diverse locations The The successful conduct of warfare in the technical nature of these information infrastructures information age requires access to information inhibits a commander's ability to control the flow available outside the theater of operations of information or dynamically manage available Information infrastructures no longer parallel information and telecommunications resources To traditional command lines and warfighters need support offensive operations warfighters may frequent instant and reliable access to information reachback to employ information attack capabilities at locations in CONUS as well as in theater For and techniques that provide an information example mobility and sustainment of forces are advantage in their area of responsibility highly dependent on commercial reachback' Providing capabilities to support military infrastructures that include international operations require the expansion of our information telecommunications the public switched infrastructure beyond the established peacetime network transportation systems and information environment Warfighters must have commercial electric power grids Warriors assurance that this expanded infrastructure can attain require secure video teleconferencing detailed the level of protection required to enable mission imagery from national sources intelligence logistics Deployment Predeployment Employment Redeployment IW impacts all phases the range of military operations and all levels of war 1 itfi cl©cii sii fi ffflciß in Weil A teamed approach is essential to develop a comprehensive IW strategy Information Warfare Basics success The authority to implement this or any other 1W involves actions taken to achieve level of protection for the Nil lies outside of the information superiority by affecting adversary Department of Defense and government We must information informationbased processes assist in demonstrating to service providers information systems and computerbased networks the compelling need for a collaborative teamed while defending one's own information information approach in crafting solutions not just to based processes information systems and support the Department of Defense and to computerbased networks IW applies across all protect our national security but to protect phases the range of military operations and at their own proprietary interests as well every level of warfare Defensive 1W activities Our dependence on information and information systems and the exposure of our vulnerabilities to a full range of threats from computer hackers through criminals vandals and terrorists to nation states have brought focus and compelling relevance to the emerging discipline of IW Its unique characteristics set in motion revolutionär ' capabilities that will enhance and support warfighting into the next century are conducted on a continuous basis in both peacetime and war and are an inherent part of force protection Offensive IW capabilities may be employed in a variety of circumstances across the range of military operations IW operations may involve complex legal and policy issues requiring careful review and nationallevel coordination and approval A strategy for peace As an integrating strategy IW focuses on affected by the ability of the USG to influence the perceptions and decision making of others In times the vulnerabilities and opportunities presented by an of crisis IW can help deter adversaries from increasing dependence on information and initiating actions detrimental to the interests of the information systems 1W targets and protects information information transfer links information USG or its allies or to the conduct of friendly military operations If carefully conceived coordinated and gathering and processing nodes and human decisional interaction with information systems It executed IW can make an important may have its greatest impact in peace and the contribution to defusing crises reducing the period of confrontation and enhancing the impact initial stages of crisis of informational diplomatic economic and military IW is one of many capabilities within the US efforts and forestalling or eliminating the need to military element of national power IW can support employ forces in a combat situation Thus IW at the overall US Government USG strategic both the nationalstrategic and theaterstrategic engagement policy throughout the range of military levels requires close coordination among a wide operations The effectiveness of deterrence power variety of elements of the USG including the projection and other strategic concepts is greatly Department of Defense Engagement Timeline Information Warfare EVectronic Attack o it LU PSYOP » o 3 OPSEC Deception »nfo Attack i v5 v s i Sj S Sii »»•«i i' i ö S£r$fi ' m® tf i MMi INTEL Peace ► Crisis ■ War The decisive edae in war IW can be waged in wartime within and There are both offensive and defensive beyond the traditional military battlefield As a aspects of IW A common link between the two subset of IW command and control warfare aspects is the target sets involved in IW information and information systems Just as DOD C2 W is an application of IW in military operations that specifically attacks and defends the can use IW to affect the information and information systems of an adversary so too can an adversary C2 target set However the capabilities and disciplines employed in C2W psychological target DOD's information and information systems operations PSYOP deception operations Understanding the basic elements and the potential of security and electronic warfare as well as other offensive and defensive IW is a precursor to grasping less traditional ones focused on information the integrated IW strategy currently being developed systems can be employed to achieve 1W objectives within the Department of Defense The remainder of that are outside the C2 target set this brochure will outline the concepts and ongoing initiatives in the emerging discipline of IW Spectrum of IW Objectives Deter War Affect Infrastructure Disrupt WMD Program Support Peace Ops smi ' PR» H WSHmM ■ i ■ ■ '■ ■ • ■ » ■ sttii m Mm MmWmWBBsWBSm Peace - ■■ • v v •SÄ« _ _ ■ _ Aß t M km mst mBe0mE ► War A strategy for peace Defining the IW Vision The threat to our military and commercial information systems noses a significant risk to national security and is being addressed f 1996 National Security Strategy Organizing Defensive IW IWD 1WD actions must he carefully considered into the larger system of warfighting with the overall objective of capturing the latent potential integrated at all levels of war and applied across the of IW to dramatically enhance warfighting capability range of military operations This requires 1 WD to Collaborative efforts within the Department of he organized as a system and tied together by Defense and elsewhere in the Federal Government policy doctrine technology capability assessments are moving rapidly to organize and implement IWD education training exercises and a mutually supporting national organizational infrastructure as a svstem Along the way the IWD system can be integrated IW-D Implementation Model Ascertain Nature Severity Causality Sponsorship Complicity etc store Detect Attack Protected Information Environment Motives Actors V Civil Criminal Deter Attack Influence Perceptions Domestic Military Force nonforce Informational Response International Diplomatic Economic A comprehensive model scalable to all levels of war „ The decisive edge in war The Protected Information Environment The protected information environment is not an impenetrable fortress that guarantees absolute security because that is neither practical affordable nor even necessary The focus is on defining real needs and dependencies The environment is bounded by what is critical to national security It is a combination of physical systems and places as The IWD System well as abstract processes such as intelligence analysis The protected information environment Organizing IWD as a system begins with a is rooted in a sound approach to managing risk broad vision implemented by collaborative efforts Risk management processes include consideration that move the vision and concepts from the abstract ol' information needs the value of information that into a focused set of questions and answers on may be compromised or lost if the protected specific aspects of policy and standards The five information environment is breached loss of access critical components that should be included in any control system vulnerabilities threats posed by attempt to implement an IWD system are integrity potential adversaries and natural phenomena and authentication non repudiation availability and resources available for protection and defense In confidentiality IWD implementation is designed addition the value ot'information changes in with an objective ot'information assurance to each phase of military operations and must be protect access to timely accurate and relevant considered in the risk management process information wherever and whenever needed The protected information environment not only At the national level the Department of Defense and provides the degree of protection commensurate other elements of government are working with with the value of its contents but also ensures industry to ultimately build the means to mechanisms are in place to respond to a broad appropriately protect and defend the Nil and DI1 using a managedrisk approach The true extent and range of attacks implications of IWD are only visible in a toplevel implementation model This model is scalable as it is applicable at all levels of war and across the range of military operations Elements of the Model The model begins with a defined and appropriately protected and defended information environment Interacting with the protected environment is a process to identify threats attacks or other degrading conditions and to disseminate warnings when and if these occur Attack detection initiates both restoration and response processes iw i igjr A strateav for mace» Power technical sophistication of tools increasing 200 1 The required technical sophistication of the average intruder has dramatically decreased Threat determined to be at risk or require warning indications to assist them in other decisionmaking Articulation of the threat must be processes A comprehensive IW indications and comprehensive — overstating the threat leads to warning I W regime will require a policy structure unnecessary levels of protection expense and to establish authorities roles and responsibilities effort Conversely understating the threat leads to across local state and national jurisdictions overconfidcnce in system reliability and resilience Functionally I W for IW will require the closest under adverse conditions This simple realization cooperation between law enforcement the underscores the vital importance of a clearly defined Intelligence Community and private enterprise In and articulated threat National intelligence this environment crippling attacks can occur at organizations continue to characterize the evolving speeds exceeding unaided human capacity to detect threat—a dynamic mission that must adjust to analyze and disseminate warnings I W will not occur changing threat conditions without acollaborativegovernmentindustry effort To get at the essence of the threat requires an Attack Detection understanding of three elements • Identities and intentions of possible attackers Defensive efforts to detect and identify • Possible attack techniques and methods adversary activities require close collaboration • Potential targets extending from the strategic to among government industry and society A the tactical levels critical element of the detection process is identifying indicators of adversary activity Indications and Warning analysis of those indicators and dissemination Threat knowledge is an input to a process that of warnings This process requires a knowledge of the threat built upon information from various analyzes attack indicators and disseminates warnings to persons organizations and processes that are sources including law enforcement the Intelligence The decisive edge in war Community system providers and users Finally automated attack detection capabilities arc necessary given what may be extremely short timelines from initiation to the culmination of attacks Defending against an attack whether against a JTK's intelligence data base or against an automated component of the commercial national power grid is predicated on how well the intelligence threat and associated indications and warning processes function and on the agility of systems providers users and administrators in implementing protective countermeasures The potential subtlety of early indications of adversary prestrike reconnaissance and exploitation techniques as well as the speed with which a powerful attack can proceed from initiation to culmination mandates a need for automated intrusion detection capabilities These capabilities must automatically detect system intrusions or aberrations and instantly generate alerts Additionally automatic threatmitigation that limits the extent of damage or spread of attack must be self initiating Restoration Attack detection mechanisms trigger reactive processes The first of these processes is restoration Restoration relies on a pre established understanding of the desired levels and conditions of system performance and functionality Priorities may be then derived for restoring access to and availability of essential information as well as detect when anomalous conditions have degraded systems and processes below their desired steadystate performance thresholds Procedures for restoration of Restore Ik v v 'J' y Protected Information Environment f Threat I u Detect Attack 4 ' rr T w Attack indicators Warning dissemination Industry and users Intelligence Law enforcement 7 The key elements of a comprehensive indications and warning pn ■ oeess A strategy for peace telecommunications exist for the Department of jurisdictional environment in the response process Defense and the National Communications System In the present IW environment the clear identi fication of motives and actors will not lead to a NCS The NCS facilitates executive and technical simplified set of automatic response processes and expert dialogue between industry and the NCA through the National Security Telecommunications options This is true because the seam between civil Advisor ' Committee NSTAC In the information and military roles in national security is blurred in the age the NSTAC continues to play a vital role in the case of I WD An attack against a commercial system that manifests itself in a DOD network raises Nation's total 1WD posture legal and policy issues thus highlighting the need for increased interagency coordination and joint civil Response Process Motives military response operations Through all of this and Actors the limits of the proper and legitimate role of Attack detection mechanisms serve to trigger government to provide for the common defense must be recognized and respected ensuring no the response process Timely identification of motives and actors is the cornerstone of effective violation of personal freedoms and rights of privacy and properly focused response linking the analytic The effectiveness of the response process is results of the l W process to nationallevel dependent upon efficient integration of attack decision makers detection and analysis capabilities Timely The true nature of motives and actors engaged response is essential to influence adversary in attacks on US information systems or processes perceptions establish user confidence and of national interest whether domestic or maintain public support international permits an understanding of the Government Industry Society Restore Protected Information Environment i w Yy for IWI Detect Attack Attack detection and rest oral requires teamed efforts'supported by automation The decisive edge in war ft fcA DOD V EBÜÜJMIflJJtJilll INTELLIGENCE _ i¥t — WHITE HOUSE INDUSTRY LAW ENFORCEMENT Effective response requires collaborative interagencv efforts Attacks themselves do not inherently point to the moti es and actors in an unambiguous way Apparently similar events or indications may have completely different causes sponsorship complicity and seventy The di Herein implications lor national security point to the wisdom of providing decision makers w ilh the best and most comprehensive information available on which to base decisions regarding response options As such the need for full cooperation between C4 technology and intelligence processes and capabilities is clear An Assembled IWD System Warlighters depend upon information to plan operations deploy forces and execute missions Additionally advanced information technologies hav e significantly altered these processes Complex information systems support powerful infrastructures that dramatically enhance warlighter capabilities however increasing dependence upon these rapidly ev oh ing technologies make joint forces more ulnerable IWI is a comprehensive strategy being implemented to protect and defend information and information s stems When combined with offensive IW the net result will be the opportunity to use 1W to exploit situations and to win Offensive IW IWO As with the IWD system described above IWO capabilities are employed at every level of warfare and across the range of military operations The employment of offensive IW capabilities to affect an adversary's information and information systems can yield a tremendous advantage to I IS military forces during times of crisis and conflict As a result combatant commanders must carefully consider the potential of IW for deterring and rolling back crisis When viewed as an integrating strategy 1W weaves together related disciplines and capabilities toward satisfy ing a stated objective Offensive IW applies traditional perception management disciplines such as PSYOP and information system attack to produce a synergistic effect against the remaining elements of an adversary's information systems information transfer links and information nodes A strategy for peace Examples of IW Targets 3B8äfc Leadership Key Personnel ADP Support Strategic Comms Power Base Civil Infrastructure Comms Links Nodes • Industry Financial Populace Military Infrastructure in Commanders C2 Comm Links C2 Nodes Troops Intel Collectors Weapons Systems Planes Ships Artillery PGMs Air Defense Ittaek the information systems and processes that support these target sets IW0 in Military Operations Other Than War MOOTW Offensive IW related plans with their associatedeapabilities may be employed in peacetime to deter a crisis control crisis escalation project power or promote peace The employment of offensive IW capabilities in these circumstances may require INCA approval with support coordination deconfliction cooperation and or participation by other USG departments and agencies Although IW0 capabilities can be employed to undermine an adversary's regime the primary locus of IW efforts in MOOTW should be to preserve the peace deter escalation of a conflict and prepare the battlefield so that if crisis escalated to conflict the US military can effectively employ IWO capabilities in a wartime scenario Examples of other potential peacetime applications of offensive IW include the employment of IW capabilities to disrupt drug cartel communications lines in support of drug interdiction efforts and conducting a PS YOP campaign against a belligerent's potential allies with the goal of severing external sources of military economic and political support The decisive edge in wa Wartime Employment of IW0 the Nation to respond quickly effectively and decisively will influence perceptions and assist in Beyond the threshold of crisis IW can be a deterring future attack In this regard information critical force cnabler for the joint warfighter In joins economic political diplomatic legal and addition to protecting information systems vital to the military power as an element of total national US military employment of IWO capabilities strength The preservation of information contributes can affect every aspect of an adversary's to the total power of our Nation and society The decision cycle by impacting its information result is a new form of strategic deterrence for the centers of gravity Many of the activities information age associated with wartime employment of IW0 capabilities focus on the military command and The Vision Comes to Closure control target set However there are many other important information system targets for the National leaders are able to choose from a warfighter to focus on to fully reali e the power broad range of options that are flexible and of IW in wartime combinable to achieve the desired effect in most circumstances The IW vision does not One type of information attack could be the demonstrate a nation that is invulnerable but application of IW capabilities against an adversary's rather one that is vigilant decisive and automated information systems to disrupt production prepared to respond to any threat foreign or of critical war supporting industries Another domestic That reality contributes to strategic application might be the use of IW capabilities to deterrence in a context appropriate to the sever an adversary's communications networks from information age the external military economic and political supportbase Deterrence There are two aspects of deterrence associated with IW The first is the deterrent effect IWO capabilities can have on a potential adversary during peace and crisis As new IW capabilities continue to emerge their potential usefulness to deter technologydependent adversaries must be leveraged as much as possible The second more specific aspect is the deterrence of an informationbased attack against the United States Deterring IW attack requires the application of both offensive and defensive capabilities Strong IW defenses help to discourage casual threats thereby narrowing the playing field to a more distinct set of actors When faced with an informationbased attack the ability of The IW vision supporting oii'üi v d t rr nt til ihv Infmimifmn L»U A strategy for peace tint' V I lit %f pie in en ii i ii I % l I We must have Information Superiority Information Superiority will require both offensive and defensive information warfare Joint Vision 2010 Taking It to the Troops A common focus is essential to ensure a credible IW vision becomes a reality The three principles of the Joint Staffs implementation vision are • Reduce the opportunities presented to potential adversaries by educating training and increas ing the awareness of warriors to vulnerabilities and protective measures • Improve information attack capabilities and measures to protect against and detect attack on information and information systems by pursuing emerging technological capabilities and the synergy created by integrated defenseindepth solutions • Build the necessary relationships within govern ment and throughout the Nation to secure the infonnation needs of all constituencies Seal those arrangements in law and policy resulting in reconstituted national deterrence to preserve peace security and stability Efforts are under wav to integrate IW into all Technology aspects of joint warfare The Joint Staff in cooperation with the Services and Defense agencies is focusing on a common approach toward opcrationalizing IW Efforts in six major areas are coming together to support the warfighter They include • Education training and exercises • Policy • Doctrine • Assessments • Organizational infrastructure • Technology Education Training and Exercises User Tra'rvng • System Ad'vims'ratior Access Controls • Emergency Respons Multilevel Security Itis aecisive odae m war Education training and exercises offer the greatest return on investment Highlevel military education at the National Defense University and Service professional military education institutions focus on the study of IW concepts policy issues doctrine integration and the role of IW throughout the range of military' operations and all levels of war Additionally the DOD Inter Service Training Review Organization Initiative for Joint IW Training DIIJIT initiated 11 courses for DOD personnel These courses range from senior level awareness to technical training for systems administrators The D11 1 IT is a great success story that epitomizes jointness Additional courses are forthcoming that will continue to generate and focus IW study throughout the joint environment IW into joint exercises also will help accelerate and shape policy and doctrine IW Policy The Department of Defense is participating in interagency discussions that focuses on IW policy issues and has created internal executive and workinglevel forums to identify develop and implement policies and concepts Across a broad range of issues IW efforts are examining DOD's role the role of government in society and the potential impact of emerging technologies and other factors A Defense Science Board study is also helping to fuse nationallevel and DOD efforts in broad areas Given these considerations appropriate policy positions and designation of responsibilities Information systems incident reports continue are being thoughtfully considered and reflected in to reveal that most intrusions result from a lack of DOD and CJCS policy documents The Joint understanding and improper implementation of Staff is participating in the revision of existing security measures by information users Awareness policy in addition to developing new IW and training modules are being inserted into a broad instructions where needed Consistent with those range of officer enlisted and civilian curriculum that efforts Chairman of the Joint Chiefs of Staff explain vulnerabilities inherent in information systems describe potential adversary threats and educate people in proper system use Training for system and network administrators to identify and mitigate vulnerabilities is another investment yielding high dividends Industry places a premium on and commits a great deal of resources to acquire and train specialists to administer and enforce information systems security policies The Department of Defense should follow suit in this area At the organizational level the Joint Staff is accelerating the integration of IW into joint exercises Demonstration of IW concepts and capabilities in CINCsponsored exercises will help planners and users better integrate IW into operations Lessons learned from incorporating Defense Science Board Objectives • Identifying the information users of national interest • Determining the scope of national information interests to be defended • Characterizing the procedures processes and operational arrangements required to establish a comprehensive national defenseindepth strategy • Identifying the reasonable roles of government and the private sector in creating managing and operating a national IWD capability A strategy for p ace process by the Chairman's Program Assessment Instruction CJCSI 3210 01 established Joint IW Policy to support warfighting Also CJCSI 6510 01 A established Defensive Information Warfare Implementation that focuses on key areas of protecting and defending information and information systems Organizational Infrastructure Many components have begun to organize to support IW activities The interageney coordination requirements so central to IW effectiveness require careful attention to current organizational approaches IW Doctrine The Joint Staff is the lead agent for developing joint doctrine for information warfare This doctrine will include both offensive and defensive IW principles Joint IW doctrine will cover the organization for IW responsibilities coordination between levels of command IW planning considerations integration and deconfliction of IW activities and intelligence support to IW IW doctrine also will expand upon the principles of the Joint Pub 313 1 Joint Doctrine for Command and Control Warfare C2W DOD experiences will assist in illuminating broader IW concepts extending beyond the base doctrine of C2W To complement this doctrine effort the revision to the Joint Operation Planning and Execution System will fully integrate IW into the operations planning process Services and Defense agencies have initiated or expanded some capabilities to respond to security incidents and perform vulnerability assessments to fielded systems These capabilities will play a vital role in mitigating vulnerabilities overtime Most of the combatant commands have formed a tailored IW cell to meet the challenges presented by this emerging area To provide the support the CINCs require the Joint Staff has focused responsibility for CINC operational support Assessments Capability assessments focus on the programmatic aspects of IW The Joint Warfighting Capabilities Assessment process under the guidance of the Joint Requirements Oversight Council and with CINC participation serves as the primary analytic tool to support the Chairman in articulating joint warfighting requirements This process achieves its objective by zeroing in on two key milestones of the Planning Programming and Budgeting System PPBS First is the Chairman's Program Recommendations leading to focused language in the Defense Planning Guidance This is followed later in the PPBS Building information warfare means merging traditionally separate disciplines SSL The decisive edge in war Idvanc ed information-based technologies a key enahler of the IW vision aspects oflW within the Operations Directorate through the creation of an IW cell that mirrors those at the combatant commands to meet the significant challenges that lay ahead in IW Intelligence underpins IW operations in peace crisis and war Critical to the continued success ofIWD efforts will be the availability of intelligence to support a comprehensive threat awareness Ongoing Intelligence Community efforts have produced initial assessments of the foreign threat and other efforts are under way to expand that work A comprehensive and rigorous understanding of the total threat is a critical requirement to develop a credible risk management strategy effective and focused training education and awareness programs Infonnationbased technology is a principal cnabler of the IW vision The Joint Staffcontinues to develop and maintain ties with government and industry laboratories to keep abreast of the latest discoveries and to explore ways to leverage technology to support IW requirements Maintaining ties to academic and scientific organizations provide a glimpse at the leading edge thinking that may influence future warfighting strategy and doctrine This process also provides valuable insights that can direct current IW capabilities and architectures in favor of emer«ine trends The Intelligence Community also is stepping up to the unique requirements of targeting and battle damage assessment These efforts will require new processes and techniques to link the intelligence and operational communities The net effect will be an intelligence community that is prepared and focused Technology Conclusions An Assembled Vision We have entered an age of information where nations and military organizations have opportunities to gain decisive advantage through timely access to accurate relevant information Information is fast becoming a strategic resource that will drive a global competitive environment and permeate every facet of warfighting in the 21 century Warfighters depend upon information to plan operations deploy forces and execute missions Additionally advanced information technologies have significantly altered these processes Complex information systems support powerful infrastructures that dramatically enhance warfighter capabilities how ever increasing dependence upon these rapidly evolving technologies makes joint forces more vulnerable Conversely many of these same vulnerabilities extend to our adversaries offering new opportunities to use offensive capabilities to help gain a friendly advantage IW concepts are being implemented to protect and defend information and information systems When combined with offensive IW the net result will be the opportunity to use IW to exploit situations—and to win IW is a reality today and in the future it impacts societies governments and the range of military operations and all levels of war Implementing the IW vision is a challenging task Warriors should understand IW and its relevance to survive and fight now and in the future This concept has set forth a common v ision that will generate an awareness of the strategy and the many complex issues yet on the horizon The Joint Staff in cooperation with the Services combatant commands and Defense agencies is working toward implementing the common vision highlighted in this brochure Efforts are under way now Warriors must help implement these concepts to capture the latent potential of Information Warfare a strategy for peace the decisive edge in war ' J '' f » _ _ _ ' ' ■ ' '■ ■ ' ' 7 ''• '• '' ' •' r '' T' i' ■ '' T ' ' • - '' rf '' ''' '• H i' V' 'l 0' i 'i i For questions comments or additional copies of this document please contact The Joint Staff Information Assurance Division J6K 703 6142918 or the Informa tion Warfare Special Technical Operations Division J38 703 6950392
OCR of the Document
View the Document >>