By Dr Dan Kuehl, Chairman, Department of Information Operations, Information Resources Management College, National Defense University
The views expressed in this paper are those of the author and do not reflect the official policy or position of the National Defense University, the Department of Defense, or United States Government.
Although the belligerents had all professed their hope that the conflict would not come, all had prepared for it. While all had seen the value of the new information technologies that were changing the face of global affairs and been exploiting them for strategic benefit, the leadership of Oceana had correctly seen one area in which they possessed a crucial advantage over their potential adversary, Teutonia, and planned accordingly. Based on their analysis of a conflict a decade earlier, in which this key information technology, although even more rudimentary at the time, had provided a critical advantage to one of the belligerents, Oceana’s strategic leadership correctly foresaw that if they could act swiftly they could gain a strategic advantage and exploit the global information environment to mount a strategic perception management campaign and shift global opinion decisively in their favor. This was particularly important concerning the stance of Neutralia, for if their populace and leadership could be convinced to join in Oceana’s cause, victory over Teutonia was certain. And their vision was correct: hours after the formal outbreak of the conflict, Oceana struck. Swiftly seizing control of a critical pathway into the information environment, Oceana not only disabled Tuetonia’s ability to operate in this medium but also began exploiting it for their own purposes, especially in Neutralia. Although the perception management campaign did not cause instant success, it was effective, and over the course of time as the conflict raged, the political and popular mindset and attitudes in Neutralia shifted perceptibly, from strict neutrality to outright hostility towards Teutonia. Once they finally entered the fray on the side of Oceana, Teutonia’s doom was sealed. This scenario sounds like something out of William Gipson (author of Neuromancer) or “Wired” magazine, but it’s not...it’s history. Perhaps it will be to point out that the three protagonists are really Great Britain (Oceana), Germany (Teutonia), and the United States (Neutralia), and that Oceana’s swift strike to seize control of the information medium took place on...August 5, 1914! That was the day that the royal cableship Telconia sortied into the North Sea and severed all five of Germany’s undersea telegraph links with the outside world. After that date, the view that the rest of the world had of The Great War increasingly passed through a lens located in London. This enabled British information warriors to mount a very effective strategic perception management campaign that eventually helped bring the United States into the war on the side of the Allies, thus moving from strict neutrality to waging war to ‘make the world safe for democracy.” Thus Oceana—or rather, Great Britain-was waging strategic information warfare.1
What is Information Warfare?
Any effort to define or discuss strategic IW must tread a careful path to avoid falling into the subtle trap in which strategic airpower has been mired for the past several decades, that of defining the concept in terms of a technology or physical entity. For too many years strategic airpower has been viewed in terms of either a technology— nuclear weapons, or long-range bombers—or a physical target— cities or key industries. Even among the practitioners of airpower this erroneous paradigm had a tight grip that on ly in the wake of the Persian Gulf War of 1991 is finally being banished to the dustbin of history. Airpower doctrine is beginning to acknowledge that what defines a use of airpower as strategic is the intended effect.2 The same is true for strategic IW, but this discussion is immediately faced with a clamor of questions which must be addressed before moving forward, chief of which is... what is Information Warfare? A useful starting place is to briefly trace the evolution of the term Information Warfare. The earliest use of the term seems to have originated in the US Department of Defense, in the Office of Net Assessment, where Dr Tom Rona was exploring the relationships among control systems, a field known as cybernetics. Dr Rona described the competition between adversarial control ' systems as “information warfare”, in the sense that control systems can be described as the means for gathering, processing, and disseminating information, processes which can be diagrammed and described with flow and feedback charts of mind-numbing dryness and complexity.3 Not until the publication of a highly-classified DOD Directive, 3600.1, in 1993, however, was there an “official definition” for the term. To add confusion, there were actually several definitions, at differing levels of classification.4 Perhaps not surprisingly, this definition underwent frequent revision as the operational and organizational implications of the concept evolved.
The current definition has been the longest-lived, and has been in effect since the promulgation of the current guidance on Information Warfare—DOD Directive 3600.1—on 9 December 1996. With the pending publication of “Joint Publication 3-13: Joint Doctrine for Information Operations” it seems likely that the official DOD definitions of IW and 10 will remain in effect for some time longer.5 Which is not necessarily a good thing, if one is hoping to find a definition that helps to clarify and explain what might constitute the conduct and intent of IW. However, since one must understand what 10 is in order to move to its less comprehensive building block, IW, they provide a useful starting point:
Information Operations: Actions taken to affect adversary information and information systems while defending one’s own information and information systems.
Information Warfare: Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.
If these two definitions throw a less-than-blinding light on IW, let’s try a different approach. Most US Service concepts of IW rest in part on the concept of the “information environment”, and whether it is described as an environment, realm, domain, or whatever, there is a clear sense that information has become some kind of “place” in which crucial operations are conducted. The Army’s pathfinding doctrinal publication, Field Manual 100-6 “Information Operations”, even speaks of a “global information environment [and] battlespace” in which conflict is waged. The latest version of the USAF’s basic doctrinal publication explicitly addresses the need to dominate the information realm, and discusses information superiority as “...the ability to collect, control, exploit, and defend information while denying an adversary the ability to do the same...includes gaining control over the information realm...”6 Using this approach, then, IW can be described as the struggle to control and exploit the information environment. Needless to say, this struggle extends across the conflict spectrum from “peace” to “war” and involves all of the government’s agencies and instruments of power. One appeal of this approach is that if one replaces “information” with “aerospace” or “maritime”, you have defined air and naval warfare, or more appropriate to our purposes, airpower and seapower. Thus information warfare can be described as those activities that governments undertake to control and exploit the information environment via the use of the information component of national power. This immediately raises another question: what is the information component of national power? While it might seem to be just another bit of computer-age terminological fluff, its origins actually predate this decade, resting in the strategies developed by the Reagan Administration in its very real struggle with the former USSR. In 1984 the Reagan Administration issued National Security Decision Directive 130, “US International Information Policy”, which outlined a strategy for employing the use of information and information technology as strategic instruments for shaping fundamental political, economic, military and cultural forces on a long-term basis to affect the global behavior of governments, supragovemmental organizations, and societies to support national security.7 If one refers back to the 1914 example with which this paper opened, one can see that this is hardly a new concept, and clearly governments and leaders have been exploiting the information environment for centuries. Indeed, one could argue that the stone carvings that Assyrian rulers made of conquered peoples and cities being enslaved and pillaged were intended as much to cow and terrify current and potential subjects as to inform archeologists thousands of years later about what hard and cruel folks they were. Regardless of the fact that the information technology being employed was stone and chisel, this was exploitation of the information environment for strategic political objectives.
A New Geostrategic
Context By featuring the example of the Assyrians, of course, we immediately raise the question of what is so new and different about the current state of the “information environment” to warrant all the fuss. The answer is fourfold: cyberspace, digital convergence, global digital omnilinking, and computer control of infrastructures. It is a simple matter to determine one’s receptivity to the changes of the information revolution by observing the reaction to the word “cyberspace.” At the very mention of the word, doubters and skeptics literally grimace and display intellectual and sometimes even physical discomfort, while those at ease with the technologies of the information age nod their heads in acceptance as if someone had said “traffic” or “radio” or any other commonplace term. Almost everyone is familiar with the use of information as a tool, a process, even a weapon, yet while all of these remain applicable, none in isolation goes far enough. This paper argues that the synergistic effects of electronic digital technology with an information-dependent society have made information into a virtual environment, with cyberspace as its physical manifestation. Cyberspace, defined here as that place where electronic systems such as computer networks, telecommunications systems, and devices that exert their influence through or in the electromagnetic spectrum connect and interact, has always existed, but not until mankind invented technologies that operated via the electromagnetic spectrum did it become “visible” and noticed.8 A useful analogy is outer space-it’s always been there, but not until mankind developed technologies that enabled us to extend our affairs into it and use it to affect terrestrial affairs did we fully comprehend that it forms another physical and operational environment beyond the land, sea, and air. Outer space does not have the same physical presence or properties of land or water—you cannot “weigh” it or “measure” it in a useful sense~but it nonetheless exists because we can see the physical results of things that happen there.9 The physical laws and principles that govern and delineate how systems function in these environments are the borders that fix their boundaries.10 Submarines function very well in an environment governed by the laws of hydrodynamics, but they cannot fly; the Space Shuttle works in an environment governed by the laws of orbital mechanics, but it cannot function submerged under the water. All of these environments interact with each other and have synergistic effects, but they are distinct and unique. The same holds true for cyberspace. Those devices and systems that operate in cyberspace function because they were designed to conform to and exploit the laws governing radiated and electronic energy. We can date our use of this environment to the mid-19th Century and the invention of the telegraph, which was the first telecommunication system11 to operate in accordance with the laws of this medium. The next hundred years saw regular and ever-more technologically sophisticated advances in the ability to exploit and develop this medium-undersea telegraph cables, radio, television, microwave relay, even communications satellites-that extended the reach of communications to continental and eventually intercontinental distances, as with the example with which we opened this paper. We have enormously increased the volume of information that we can store, manipulate, and transfer. But it has only been in the past two decades, the closing quarter of the 20th Century, that the fortuitous marriage of these technologies with the microchip has led to attainment of “critical mass” and the emergence of cyberspace as a full fledged environment in which military forces and society in general are just beginning to learn how to operate.
The emergence of cyberspace as an operational environment generates certain requirements that military forces will have to meet to be fully effective, requirements that mirror those of the other environments in which we operate...technology, people, organizations, and doctrine. It should be obvious that as the use of cyberspace depends totally on its technologies, we need to continuously advance and refine those technologies and seek for newer, faster and more comprehensive systems, both hardware and software, for öperating in this medium. We also need to continue to explore the interfaces between this environment and human beings, because unless one assumes that the ultimate cybernetic operator is a machine or “cyborg,” we will need intelligent and highly-trained people to develop the technology, operate the systems, and analyze the environment. Those people and technologies will need to be grouped into organizations that can exploit this new environment in order to exploit the opportunities and protect ourselves from the vulnerabilities that arise.12 As counterintuitive as it may seem, we need doctrine by which to operate and with which our operations in cyberspace can be integrated and synchronized with our plans and activities in the other environments in which we operate. Two additional advances of the information revolution which have transformed the strategic landscape are the increasing capability to transform almost any kind of information into ones and zeroes, in a development known as digital convergence, and the growing internetting of the world’s different telecommunications media in a condition referred to here as global omnilinking. While these developments are distinctly different they are at the same time synergistic and interdependent. Thomas Kuhn suggested in his landmark study of scientific revolutions that the history of technological advancement has not been one of steady discoveries or developments but rather one marked by spikes or sharp advances that flow from extraordinary finds or revelations that yield discontinuous and revolutionary changes.13 Such has been the case with information technology in this century. The changes in communication technologies prior to the middle of this century were relatively linear-telegraph to telephone to radio and so forth. The break point came with the invention of the microchip, because the synergistic advances in information storage, manipulation, and transmission capabilities made possible by digital convergence are being generated at an explosive and nonlinear rate, with no end in sight. These developments have occurred in two areas, the speed of information manipulation/transmission, and the volume of information that can be manipulated/transmitted. The marriage of these attributes with computer-enhanced and controlled telecommunications systems have led to the “omnilinking” of the electronic digital world. These two developments are the fuel for the explosion that has resulted from the application of the microchip to communications technologies to form the new science of telematics- -the marriage of computers and telecommunications. Telematics has created a new environment in which we must learn to operate. In some ways the “information age” is misleading and imprecise, because one can legitimately ask “hasn’t information always been around?” Of course it has, but the technology of the telematic age that enables us to use and exploit cyberspace is new, perhaps less than two decades old. This condition, referred to here as “omnilinking”, is inseparably tied to the emergence of cyberspace as an operational environment. Our machines that function in this environment are like early biplanes compared to the 747 or B-2, and our mastery of this environment is akin to our mastery of the air in the 1920s...like Lindbergh or Mitchell, we’re just learning our way. Even so, the omnilinking of the world is increasing every day, as more and more computer networks and telecommunications systems tie together and pass the lifeblood of today’s economic and political world...information. The degree to which our societal dependence on this environment is growing is startling. Our military forces already depend on it. The Gulf War simply could not have been fought in the way we fought it without precision information for precision weapons, command and control systems that enabled us to operate like a matador around a woozy and half-conscious bull, or satellite communications links that enabled organizations half a world away (NORAD) to monitor Iraqi missile launches and pass targeting information to Patriot batteries to engage the missiles.14 Our microchip-driven information collection and manipulation capabilities are sufficiently advanced, and the links that move the information around so intemetted, that we worry about TV news commentators skewing election results on the west coast by announcing that “analysis of east coast voting trends indicate candidate ‘Z’ has won the election.” The global economy cannot function without the constant supply of digital electronic information...it has become a form of energy or capital, and global business is utterly dependent on telematic systems and capabilities to keep the world’s economy going twenty-four hours a day. Business practices such as “just in time inventory” cannot function without the digital information that fuels it. The “internet” is less a finite place or thing than it is a description of the increasing omnilinking of the world, and thinking of the internet in terms of its useVs, such as “America OnLine” or “CompuServe”, is as shortsighted as describing the aerospace in terms of an airline. While some dismiss this environment and the Internet as merely entertainment or worse, this view ignores the fact that a very large percentage of the information available on TV or in print would fall into the same category. Few, however, would deny the impact of visual media on the American populace’s support of the Vietnam War or the impact of the printed word on democracy and freedom via the “Declaration of Independence” or “Emancipation Proclamation.” What’s different is that the internet and omnilinking make it increasingly possible for that televised image to be seen instantly by an ever increasing percentage of the world’s population, or for that opinion-shaping paper to be sent to tens or even hundreds of millions of people simultaneously and in their own language. Digital convergence, combined with connectivity, adds up to the second major part of the fundamental difference between the information age and the period “BMC”~”Before the Micro Chip”. The final major development, which is shaping the new geostrategic context, is the increasing reliance on computerized systems for the control and operation of key infrastructures in advanced societies. The growing reliance on SCADA systems (Supervisory Control And Data Acquisition) for the control and functioning of an increasingly large segment of the infrastructures on which societies depend for their economic, social, political, and even military strength is both a boon and a vulnerability for these systems and societies. Whether it be the supply of energy (electricity, oil, gas), the management of transportation (railroads, air traffic control, motor vehicle movement), the transference of digital wealth (electronic funds transfer, digital banking, control of stock exchanges), or the operation of the very telematic media that supports the entire structure, look below the surface of almost any segment of daily life in modem societies and one will find a computer.15 The degree to which this is invisible to the general populace can be illustrated by an incident from real life. In February 1996, Washington DC suffered a relatively typical industrial-age accident—a train wreck. During a snowstorm a commuter train carrying people into the capital collided with a freight train, and in the tragic fire that followed eleven people were killed. The investigations by the news media examined almost every aspect of the accident, including the signaling system that provided instructions to the train operator (who was killed, heroically trying to warn passengers instead of saving himself) via the ubiquitous red and green lights that line railroad tracks all over the world. The news media asked whether the operator saw the signals, whether they were properly placed, and whether they functioned properly. None of the news reports asked whether the signals had been electronically tempered with (they had not been) nor even raised the issue of how the signals were controlled or where those controls were located. Those types of signals are controlled, of course, by SCADA systems, and the computers which control the rail signals for that segment of track on which the accident occurred are located at the operations center for CSX Railways, in Jacksonville, Florida, several hundred miles distant. This is an illustration of how deeply imbedded within modem societies such control systems have become, and how unaware most of us are of their functioning.16 It is the responsibility of governments, however, to not only be aware of such developments but to take actions to mitigate potential disruptions to the effective functioning of systems upon which the society depends. In July 1996 the Clinton Administration issued Executive Order 13010, which directed the formation of a unique commission, the President’s Commission on Critical Infrastructure Protection, or PCCIP, that would bring together senior governmental officials and representatives from those private sector industries and businesses that comprised these key infrastructures into a commission tasked with studying the vulnerability of these infrastructures to disruption. The PCCIP examined a range of infrastructures, grouped into several broad categories. While the commission examined both the physical and cyber threats, they freely acknowledged that their emphasis was on the cyber threat, in part because it is less well understood than physical threats. Their conclusion that the threat is real and growing might seem unsurprising, but reflects nonetheless the growing awareness that our very dependency on computerized control of infrastructures creates an inherent vulnerability. It is this vulnerability that is at the heart of hypothetical scenarios for strategic information warfare in which computer network attacks on critical infrastructures “take down” key segments of those infrastructures and thus generate cascading effects on such systems as transportation, banking, or emergency services. It was the need to respond to this vulnerability that the Clinton Administration issued Presidential Decision Directive (PDD) 63 on the 22nd of May this year, establishing a national coordinator for infrastructure protection and creating an organizational structure by which such threats and vulnerabilities could be mitigated. Called for a public sector-private sector partnership that would develop cooperative procedures and organizations to assess the threats and vulnerabilities and create countermeasures, PDD 63 thus stands as a latndmark step in what could be termed strategic defensive information warfare against the threat of what has in some quarters been termed “infrastructural warfare.” However, it will at best provide defensive capabilities in only two of the three possible target sets for information warfare.17
The “3 ‘Wares”
Information warfare can be waged against an extremely diverse group of target sets, and almost the entire DOD has seemingly been engaged in the effort to categorize these targets and their grouping into sets and categories. This effort is both valuable and thought provoking in that it has armed and supplied the intellectual firepower being directed against the problem of exploring what IW is, and although those who are unsettled by the lack of definite answers have sometimes become naysayers regarding IW, this intellectual effort is critical and will continue. One way of looking at the potential set of IW targets is to examine the different elements or components of an information or control system, as described by Dr Tom Rona in the 1970s and outlined in official Department of Defense analyses. These incorporate three distinct elements in any information system: the hardware, the software, and the "wetware".18 The hardware is easily the most visible element as it represents the physical components of the system. Telecommunication structures such as phone lines, fiber optic cables, satellite uplink stations, the satellites themselves, mainframe computers, desk and laptop models, the chips themselves-all these are part of the hardware of an information system. They are the physical means by which we store, manipulate, and transmit information, and are quite obviously an important target in IW, regardless of the means used to affect them. When an F-117 bomber destroyed the Iraqi "AT&T" building19 on the first night of Operation Desert Storm to cut Iraqi communications connections with the outside world, the intent was to gain control of the strategic information environment. The "AT&T Building" is a prime example of a hardware target. The software is the invisible and seemingly non-physical element of an information system; it represents the coded instructions that control the functioning of the hardware. A computer and the myriad microprocessors ("chips") contained within the computer are essentially useless until a program tells it what to do, after which other programs are layered onto the base program. In a simple desktop machine these programs, which we call software, establish the basic functioning of the system, control its word processing and graphics programs-i.e. MS Word and PowerPoint how it handles emails, how it interfaces with the Internet and other computer systems, etc. In more complex systems, such as the SCADA systems that control railroad and other transportation infrastructures, the software is the key element that makes the difference between efficient and cost effective operations and possible disaster. When President Clinton directed the formation of the Commission on Critical Infrastructure Protection in July 1996- better known as the PCCIP-it was the potential threat from intrusion and tampering with the coded software that provided the driving force behind the Commission's work. The least well understood target for IW has, conversely, been around the longest-the wetware, or human element. This aspect is almost certainly the most difficult to confidently model or simulate, yet at the strategic level may be the most critical part of the information environment. When one reads ancient history from a military perspective, for example, one is struck by the numerous examples of what modem soldiers would call "psychological operations", or Psyops.20 The teachings of the Chinese military philosopher Sun Tzu—the “patron saint” of Information Warriorswere infused with the sense that the enemy's mind was the target that possessed the greatest potential payoff.21 Western armies, however, have perhaps for cultural reasons focused on the physical clash of arms as the ultimate arbiter. American training manuals during World War II, for example, proclaimed "battle is the payoff!", and the Western military’s adoption of Clausewitz in the centrality of most war college curricula is additional evidence of our focus on the physical and kinetic means of combat. It is not surprising that in this climate the military perspective on psychological operations was—and perhaps remains—focused on the battlefront and the potential impact on the morale and fighting spirit of the enemy's troops. While this is a vital and valid target for psychological operations, the potential target base is much larger and more diffused throughout society, thus the term "wetware centered" operations. The very word “wetware” itself is new, approximately a decade old, and it is used here to intentionally parallel the hard-and-software terminology to emphasize that in modem information systems the human cortex is as important as cables and code.
Strategic Information Warfare
We have now established some of the key technological and societal developments that are shaping the information age and which provide the key contextual milieu for strategic information warfare (SIW), and we have outlined the three key “target sets”, in a sense, against which SIW can be conducted. The last critical task is to explore what we mean by “strategic” information warfare, an issue that many publications or articles on IW treat only tangentially. Martin Libicki, one of the leading IW analysts, has not written about SIW directly, and has focused instead on attempts to analyze the component activities or actions that make up his conception of IW.22 A team at RAND, summarizing and drawing lessons from their “Day After” IW exercise, conceptualized SIW in terms of the potential risk to high-value national assets made possible by the information revolution. They characterized this activity, in which “nations utilize cyberspace to affect strategic military operations and inflict damage on national information infrastructures”, as strategic information warfare.23 This was perhaps the first serious attempt to explore and conceptualize SIW, and it contains some excellent work. The chapter on “Defining Features”, in particular, is an excellent analysis of the technological and societal changes resulting from the information age. A relatively little-known 1995 study of the internet by a DOD analyst, Charles Swett, provided useful examples of how the new information and communications medium of the internet is being exploited for political purposes.24 Finally, a series of US government studies, such as the previously-cited report of the PCCIP, have focused on the threat of an “electronic pearl harbor” and the potential damage that could be inflicted on national infrastructures. What all of these studies have done is to focus primarily on the means used or the physical assets affected, to the neglect of the intent or objective. In other words, they have made the samemistake that strategic airpower fell victim to, that of trying to develop a concept by describing the instruments instead of the goal. Strategic information warfare is simply the exploitation of the information environment for strategic purposes. The RAND study, for example, discussed at length information actions against “electronic power, money flow, air traffic, oil and gas, and other information dependent items”, and stated that damaging these assets using IW would “inevitably take on a strategic aspect.”25 While this is almost certainly true, it does not get into the critical “why” question, and that is the factor which makes something strategic. To illustrate, let’s use another analogy from airpower. Cargo planes have been delivering things like food and fuel for decades, and they’ve done this at a wide variety of locations, from isolated firebases to entire cities. So what differentiates “tactical” airlift from “strategic” airlift? Answer: the political level of the objective.26 Thus airlifting food to a group of soldiers on an exercise is tactical, but supplying the population of Berlin to achieve the political objective of resisting Soviet domination of Europe was strategic. The same distinction can be made regarding strategic information warfare. The example with which this paper opened was strategic because the ultimate objective of the operation was at the national political level. It becomes immediately apparent that “national political objectives” can have a broader meaning in the information age than the term might have been understood to have a few decades ago, perhaps because our understanding of what groups can be seen to have political objectives has expanded. This is due in part to some of the factors discussed above, particularly digital convergence and global omnilinking. Three years ago (1995), when Ecuador and Peru engaged in a brief skirmish over a disputed segment of their shared border (not strategic to us, perhaps, but certainly so to them) the Ecuadorians made rapid and adroit use of the internet and a series of websites to vociferously make their case to a global audience. This author spoke personally with representatives from both the Peruvian and Ecuadorian embassies in Washington, and was told by both that Ecuadorians gained a significant diplomatic advantage during the dispute. In previous decades the plight of the East Timorese might not have made even the back pages of the global news. Now you type “Timor” into your search field, which yields 11,000+ “hits” that electronically link you to an unbelievable number of resources that examine and propagandize the situation in East Timor from almost any direction imaginable. In all of the above-mentioned example the ultimate objective for the information activities underway has been at the national strategic level, and thus constitutes SIW. The “target category” for these operations has been somebody’s “wetware”: the mindsets, attitudes, and beliefs that shape how human beings make decisions and act on them. The information age has created many new tools and media for influencing and shaping perceptions. The crude propaganda of World War I depicting German troops joyfully murdering Belgian babies has been replaced with extremely sophisticated technical means for shaping perceptions, and by equally sophisticated human tools for understanding what perceptions can be most effectively manipulated. You don’t believe it? Try watching the commercial advertisements during the American “Super Bowl” football championship or its Australian Rules equivalent! The use of radio in the recent (1994) genocide in Rwanda, in which radio broadcasts were a key means to incite entire population groups to ethnic violence and megamurder, was an example of strategic information warfare because it featured the exploitation of the information environment—in this case the radio realm—for national political objectives.27 The critical arena rests in the junctions of the different “target categories”, or where the “three wares” come together. How could an adversary use the hardware of global telecommunications systems to alter content or software, thus leading to an alteration of the target group’s wetware and a strategic result? The intersections of these three elements of the information environment are perhaps the critical nodes or “centers of information gravity” via which one adversary could act against another. These would change depending on the situation or scenario, and would require detailed and difficult analysis in order to prepare a plan for a strategic information operation. It might well require an analysis of first the hardware comprising the telecommunications network to be used, then the coded software, and finally the human analysis to determine how to shape the perceptions (“wetware”) in order to generate the desired political impact. Virtually all of the hypothetical (and rather farfetched) discussions in the “IW press” create scenarios in which national infrastructure elements such as banking or electricity are “taken down”, with serious national impact. While this threat should not be minimized, the question often left unasked is...why were these infrastructures attacked? Has a segment of the national electric grid been attacked in order to degrade the effectiveness of an airbase and thus delay operations from that base? That could be a strategic event, but it might also be of merely tactical impact.
Conclusion
Information warfare is not a fad or a trendy buzz word that defense planners and contractors use to make their presentations and view graphs appear up to date, but rather reflects the growing recognition that the global information environment is atn arena of strategic importance to the safety and security of modem nation states and political groups. The information environment and the evolving form of warfare that seeks to control and exploit that environment— IW—does not relegate the other environments and forms of warfare to the dustbin of history, but they are changed, and those that do not or cannot adapt to these changes—intellectually, organizationally, doctrinally—may have to learn via the harsh mechanism of defeat. Strategic information warfare is one of those changes. As this paper pointed out at its opening, SIW has been going on for at least this entire century, and while it is not solely dependent on technology, the adversary that can best exploit the synergy of technology and human factors has an advantage. As the technologies of the information revolution have expanded, and as the global populace has become more dependent on those technologies ands more adroit in their use, the opportunities for its use—and the vulnerabilities to its use—have expanded apace. Strategic information warfare is here, now, and how we respond is up to us—as a tool with which to meet our national strategic objectives and safeguard our national security, or as a victim to its use by someone more mentally, organizationally and doctrinally agile than we. The choice is ours.
Fodnoter
1 Daniel R. Headrick, The Invisible Weapon: Telecommunications and International Politics, 1851-1945, (New York, NY: Oxford, 1991), pp. 140-141. Although the US Department of Defense draws a clear distinction between information “warfare” and “operations”, this distinction is lost on most of the world, and this paper will use the terms interchangeably. 2 In Richard T. Reynolds’ eye-opening account of the initial planning for the Gulf War air campaign, Heart of the Storm: The Genesis of the Air Campaign Against Iraq (Maxwell AFB, AL: Air University Press, 1995), pp, he provides an insightful example of this in recounting the initial reaction that many Air Force members had when they first learned of the proposed “strategic” air campaign. For a more scholarly and analytical account of the tactical-strategic dilemma see Edward C. Mann III, Thunder and Lightning: Desert Storm and the Airpower Debates (Maxwell AFB, AL: Air University Press, 1995), p. 15.
3 This author first met Dr Rona and heard his concepts in 1994, during a presentation on 13 June 1994 at the Information Resources Management College, National Defense University, in Washington DC. He defined IW as “...the sequence of actions undertaken by all sides in a conflict to destroy, degrade, and exploit the information systems of their adversaries. Conversely, information warfare also comprises all the actions aimed at protecting information systems against hostile attempts at destruction, degradation and exploitation. Information warfare actions take place in all phases of conflict evolution: peace, crisis, escalation, war, de-escalation and post conflict periods.” Dr. Rona, a gentle man and brilliant analyst, unfortunately passed away in December 1997.
4 This author has vivid memories of the initial classroom meeting of the School of Information Warfare & Strategy’s first class in August 1994, during which the sixteen students reacted with dismay to the plethora of official and unofficial definitions of information warfare. While some argue, with sound logic, that any attempt to formally define IW is premature and counterproductive* others argue with equally sound logic that some degree of consensus is essential, and that unless the different organizations that are involved in the issue have some common language and currency, any attempt to develop and execute DOD and governmental plans and operations are doomed to frustration and failure. While this author agrees that trying to put a “stone tablet on the wall” degree of finality on the terminology of IW is futile because the discipline is still evolving, some kind of terminological commonality is vital, even if it only provides a target at which all the parties can shoot together.
5 One of the reasons for the creation of the term 10 is the visceral dislike and mistrust of the word “war” by many of the agencies and people who are beginning to find that the information age envelops their activities and mission. Thus the creation of a term—10—that points at the larger arena in which information “stuff’ is conducted, but does not tie those operations so visibly to the military.
6 See Field Manual 100-6, “Information Operations”, (US Army Training and Doctrine Command, or TRADOC), dated August 1996; also see Air Force Doctrine Document-1, “Air Force Basic Doctrine”, (USAF Doctrine Center) dated September 1997, pp. 31- 32.
7 See “National Security Decision Directive (NSDD) 130, “US International Information Policy” 6 March 1984. The concept described above is based on NSDD 130 but paraphrases it and expands on some of its key components.
8 While it’s impossible to say when the term “cyberspace” was first used, several authors stand out as being among the leaders. William Gibson’s classic work of science fiction, Neuromancer, (NY: Ace, 1984) first raised the concept of humans seamlessly operating within a cybernetic, virtual reality environment, while Nicholas Negroponte’s book Being Digital (NY: Knopf, 1995) is an exploration of the impact of cyberspace on our daily lives. The term itself has only recently come into widespread use. A search of several automated databases, for example, covering the years 1986- 89 and 1986-91 contained only 17 “hits” on the term; the same databases for 1996 contained 754!
9 Of course outer space can be measured in a scientific sense, but not in terms which are useful in a lay sense.
10 The question of where the borders of cyberspace lay is an intriguing one. Michael Benedikt has written perceptively on it in his book Cyberspace: First Steps (Cambridge, MA: MIT, 1991), while Anne Wells Branscomb in a recent monograph “Cybercommunities and Cybercommerce: Can We Learn to Cope?” (Harvard University, Program on Information Resources Policy) suggests that the borders of cyberspace are discernible at the interconnection points between segments of the inter let, with network managers and systems administrators acting as the border guards, in a sense.
11 This construct omits communication methods such as signal flags, smoke signals, drums or even heliograph because they did not require manipulation of the electronic environment.
12 This does not mean, however, that those need to be “physical” organizations. The technology makes “virtual” organizations ever more plausible and perhaps in some scenarios even desirable. Four people physically located on the Greenland Icecap, in the Australian Outback, in the Amazon Rainforest, and halfway up Mount Everest will be able to meet in cyberspace, discuss a problem, develop a solution, and monitor the corrective actions via information technologies. Already, totally global voice communication is possible via the satellite-based telephone system Iridium (see their website at www.iridium.com), and within a few years it is planned to have the same capability for heavy bandwidth data transmission; see, for example, the Teledesic plan at www.teledesic.com.
13 Thomas Kuhn, The Structure of Scientific Revolutions (Chicago, IL: University of Chicago, 1970)
14 This warning system used Air Force Space Command’s spacebased platforms to note Iraqi Scud missile launches, US Space Command assessed the indications, and Paitriot missile systems operated by US Central and European Commands to engage the Scuds. This system thus crossed several physical boundaries (outer space, several oceans, and cyberspace), national boundaries (the US, Israel and Saudi Arabia, at a minimum), and organizational boundaries (one Service major command and at least three joint Unified Commands) all at the speed of light. This example illustrates the capabilities, opportunities, and difficulties of warfare in the information age.
15 Richard S. Berardino, “SCADA and Related Systems: Critical and Vulnerable Elements of Domestic Components of National and Economic Security”; unpublished research paper, in author’s files at NDU.
16 See the Washington Post, 24 February 1996, page 4, for a detailed analysis of the accident.
17 For the PCCIP see the Commission’s report, “Critical Foundations: Protecting America’s Infrastructures”, which at the time of this writing is electronically available via the Commission’s website at www.pccip.gov. For the text of the White Paper announcing PDD 63 see the White House’s website, www.whitehouse.gov. The concept of “infrastructural warfare” has even generated an electronic journal, The Journal of Infrastructural Warfare, at www.iwar.org.
18 This construct sets aside the content of any information transmission, although that content is quite obviously critical. It is the content, for example, that impacts the wetware.
19 At least that was what those of us involved in air campaign planning called it; in actuality it was an Iraqi telecommunications center that had nothing whatever to do with the AT&T corporation.
20 One could certainly argue that when Joshua paraded around the city of Jericho with trumpets blaring he was depending more on the psychological impact of his music rather than its wall-shattering power; see the Old Testament, “Joshua 6: 1-17”.
21 Sun Tzu has enjoyed a renaissance within the American military community in recent years, with the realization that there might be merit in his wise aphorism that "the acme of skill is to subdue the enemy without fighting." The very phrase "military philosopher" would until recent years have seemed to be a complete non sequitur in American military parlance.
22 See especially his monograph, What is Information Warfare? (Washington, DC: National Defense University Press, 1995), in which he uses a reductionist approach to delineate seven activities that comprise IW: command and control warfare; intelligence-based warfare; electronic warfare; psychological warfare; hacker warfare; economic information warfare; and cyberwar. The danger of this approach, in this author’s opinion, is that it misses the gestalt of IW, and the possibility that the whole may be—because of the synergies amongst the parts—much greater than the mere sum of those parts.
23 Roger C. Molander, Andrew S. Riddile, and Peter A. Wilson^ Strategic Information Warfare: a New Face of War (Santa Monica, CA: RAND, 1996), pi. See especially Chapter 4, “Defining Characteristics of Strategic Information Warfare”, pp. 15-34. See the RAND website, www.rand.org.
24 Charles Swett, “Strategic Assessment: the Internet” (Office of the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict, 1995). This paper provided many example of how the Internet is being used politically, and this tr end has intensified in the three+ years since the preparation of the paper.
25 Molander, et al, “Strategic Information Warfare”, p. xiii.
26 There is an excellent discussion of political objectives in a recent and seminal (but still unpublished) dissertation on information warfare; see Gregory J. Rattray, “Strategic Information Warfare: Challenges for the United States” (Fletcher School of Law and Diplomacy, 1998).
27 For the importance of radio as a medium for SIW see Kevin J. McNamara, “Reaching Captive Minds with Radio”, Orbis (Vol 36, #1, Winter 1992), pp. 23-40. For details of the use of radio to incite Hutus to massacre tens or hundreds of thousands of Tutsis see “Sounds of Violence”, The New Republic (Vol 211, #8-9, 22 August 1994), p 18; and “Rwanda’s Mass of Murderers”, The Economist (Vol 333, #7887, 29 October 1994), p. 43.