information and national security dr. dan kuehl national defense university (ndu) information...

39
INFORMATION INFORMATION and National and National Security Security Dr. Dan Kuehl Dr. Dan Kuehl National Defense University (NDU) National Defense University (NDU) Information Resources Management College Information Resources Management College (IRMC) (IRMC) My Opinions My Opinions : not the USG, DOD, or NDU : not the USG, DOD, or NDU

Upload: earl-hodge

Post on 02-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

INFORMATIONINFORMATION and National Securityand National Security

Dr. Dan KuehlDr. Dan KuehlNational Defense University (NDU)National Defense University (NDU)

Information Resources Management College (IRMC)Information Resources Management College (IRMC)My OpinionsMy Opinions: not the USG, DOD, or NDU: not the USG, DOD, or NDU

Page 2: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Homo Erectus:Mankind standing up and staring at movie props“2001 A Space Odyssey” 1968

Homo Sapiens:Mankind’s Superior IntellectMonty Python’s “The Holy Grail”

Homo Connectus:Mankind as Overly-Connected Cyborg“Beetle Bailey”

The Three Stages of Mankind’s EvolutionThe Three Stages of Mankind’s Evolution

Page 3: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

OutlineOutline

Information and National PowerInformation and National Power Cyberspace and Info SpaceCyberspace and Info SpaceInformation in National Security StrategyInformation in National Security Strategy Infrastructure Protection/Information AssuranceInfrastructure Protection/Information Assurance Strategic CommunicationStrategic Communication Information-Cyber OperationsInformation-Cyber Operations

Joint, Service, GlobalJoint, Service, Global New DevelopmentsNew Developments

Measuring PowerMeasuring PowerAn Information StrategyAn Information Strategy

Page 4: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information as Power: DIMEInformation as Power: DIME

Distinct from yet employed Distinct from yet employed across/integrated with all other across/integrated with all other elements of powerelements of power

Political/DiplomaticPolitical/DiplomaticFrom Radio Free Europe to “War of Ideas” From Radio Free Europe to “War of Ideas” to Strategic Communicationto Strategic Communication

MilitaryMilitaryMilitary Technical Revolution to Revolution Military Technical Revolution to Revolution in Military Affairs to “Transformation” to ??in Military Affairs to “Transformation” to ??

EconomicEconomicSynergy of Information Communication Synergy of Information Communication Technologies and national economiesTechnologies and national economies

InfrastructuresInfrastructures

Page 5: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information Power (1)Information Power (1)

The The Information Component of Power:Information Component of Power:““Combination of information Combination of information content and technologycontent and technology used as a used as a strategic instrumentstrategic instrument to shape fundamental to shape fundamental political, economic, military and cultural forces on a political, economic, military and cultural forces on a long-term basis to affect the long-term basis to affect the global behaviorglobal behavior of of governments, supra- and non governmental governments, supra- and non governmental organizations, and societies to organizations, and societies to support national support national security strategies & objectivessecurity strategies & objectives””

Dan Kuehl, Strategic Forum #115, “Defining Info Power”,(1997)Dan Kuehl, Strategic Forum #115, “Defining Info Power”,(1997)President Ronald Reagan: National Security Strategy (1987)President Ronald Reagan: National Security Strategy (1987)

Used by every nation state and strategic political entity, Used by every nation state and strategic political entity, regardless of technological developmentregardless of technological development

Page 6: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information EnvironmentInformation EnvironmentPhysical/Electronic Physical/Electronic ConnectivityConnectivity: “Ether”/Cyberspace/”eSpace: “Ether”/Cyberspace/”eSpace””

Infrastructures, wires, networks, etc: a means of delivery Infrastructures, wires, networks, etc: a means of delivery Cyberspace as a unique physical domain (land, sea, air, space)Cyberspace as a unique physical domain (land, sea, air, space)

Includes human (non-technical) connectivityIncludes human (non-technical) connectivity

Information Information ContentContent:: Words, images, databases, 11010111000sWords, images, databases, 11010111000s Deeds/Actions are content Deeds/Actions are content Context: identical content may be understood differentlyContext: identical content may be understood differently

CognitiveCognitive: “influence/perception: “influence/perception”” Meaning and the MindMeaning and the Mind: “most important”: “most important”

Example: Serbian TV vs NATO cohesion 1999Example: Serbian TV vs NATO cohesion 1999 Losing the battle here may negate winning kinetically Losing the battle here may negate winning kinetically Al Q’aida using kinetic ops to create cognitive effectsAl Q’aida using kinetic ops to create cognitive effects

Page 7: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information Power (2)Information Power (2)““The relative ability to The relative ability to operate in and exploit the operate in and exploit the information environmentinformation environment

the aggregated and synergistic combination of the aggregated and synergistic combination of CONNECTIVITY, CONTENT, & COGNITIONCONNECTIVITY, CONTENT, & COGNITION. It is an . It is an indispensable underpinning for all other forms of power, yet it indispensable underpinning for all other forms of power, yet it is unique in its own right. It is employed across all other forms is unique in its own right. It is employed across all other forms of human activity—economics, war, diplomacy—and across of human activity—economics, war, diplomacy—and across all levels of conflict, from peace to war. Its elements can be all levels of conflict, from peace to war. Its elements can be described, and their impact measured, albeit not necessarily described, and their impact measured, albeit not necessarily to the exactness as other components of power.”to the exactness as other components of power.”

Analogous to air-sea-space powerAnalogous to air-sea-space powerDan Kuehl, “The Information Revolution & the Transformation Dan Kuehl, “The Information Revolution & the Transformation of Warfare” (2007)of Warfare” (2007)

Page 8: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Cyberspace is…..??Cyberspace is…..??

““Cyberspace is a global domain Cyberspace is a global domain within the information environment within the information environment whose whose distinctive and unique distinctive and unique character is framed by the use of character is framed by the use of electronics and the electromagnetic electronics and the electromagnetic spectrumspectrum to create, store, modify, to create, store, modify, exchange and exploit information exchange and exploit information via interdependent and via interdependent and interconnected networks interconnected networks using using information-communications information-communications technologies (ICT)”technologies (ICT)”

Dan Kuehl, “Cyberspace & Cyberpower: Defining the Problem”, Cyberpower & National Security, 2009

““A global domain within the A global domain within the information environment information environment consisting of the interdependent consisting of the interdependent networks of information networks of information technology infrastructures, technology infrastructures, including the Internet, including the Internet, telecommunications networks, telecommunications networks, computer systems, and computer systems, and embedded processors and embedded processors and controllers.” (“until further controllers.” (“until further notice”)notice”)

J-5 Cyber Directorate (DepSecDef J-5 Cyber Directorate (DepSecDef memo of 12 May 2008)memo of 12 May 2008)

DOD DTK

Page 9: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Cyberspace is….Cyberspace is….

Man-made technologies are necessary to exploit ALL of our operational domains and the natural phenomena from which they derive their characteristics:

Chariots on land, Airplanes in the air, Ships at sea, Satellites in space

PCPC

Tim Harrell, Booz-Allen-Hamilton

Page 10: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Cyber operations are…Cyber operations are…

““the employment of cyber capabilities where the primary the employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or purpose is to achieve military objectives or effects in or through cyberspace. Such operations include computer through cyberspace. Such operations include computer network operations and activities to operate and defend network operations and activities to operate and defend the Global Information Grid” the Global Information Grid”

Is the GIG our “base” in cyberspace?Is the GIG our “base” in cyberspace? A foundation for Organize, Train & EquipA foundation for Organize, Train & Equip

What is excluded: “operations that may cause effects in What is excluded: “operations that may cause effects in cyberspace—EW, Psyop—[but] that do not employ cyber cyberspace—EW, Psyop—[but] that do not employ cyber capabilities.”capabilities.”

VCJCS Memo 25 September 2008 VCJCS Memo 25 September 2008

(Do you agree?) (Do you agree?)

Page 11: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

““First Battles’” ThesisFirst Battles’” Thesis

Traditional Warfare: first defeats-even disasters- Traditional Warfare: first defeats-even disasters- did not always equal final defeat; strategic did not always equal final defeat; strategic “space” allowed for recovery“space” allowed for recovery Geographic and Temporal (“land/distance & time”)Geographic and Temporal (“land/distance & time”)

Russia, 1941-44; Pacific, 1941-44Russia, 1941-44; Pacific, 1941-44Battles for operational/technological superiority:Battles for operational/technological superiority:Radar, Airspace, Battle of AtlanticRadar, Airspace, Battle of Atlantic

Cyberwarfare: defeat in the first cyberbattle may Cyberwarfare: defeat in the first cyberbattle may be the defining condition for victorybe the defining condition for victory ““Victory” in Clausewitzian terms, ie./ political Victory” in Clausewitzian terms, ie./ political

objectives, not solely/narrowly militaryobjectives, not solely/narrowly military

Page 12: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

US National Security StrategyUS National Security Strategy(Past)(Past)

President Reagan, 1987/1988President Reagan, 1987/1988Political and Political and Informational Informational PowerPower

federal agencies & private sectorfederal agencies & private sector counter “public deception & counter “public deception &

propaganda”propaganda” ““full range of US informational full range of US informational

programs” to “reach peoples of denied programs” to “reach peoples of denied areas”areas”

““electronic media, written materials, electronic media, written materials, increased contact & exchange”increased contact & exchange”

TechnologyTechnology strategic advantagestrategic advantage ““free flow of information” facilitates free flow of information” facilitates

creation & exploitation of advanced creation & exploitation of advanced technologytechnology

economic health and military capabilityeconomic health and military capabilitycomputer technology and softwarecomputer technology and software

Info support to diplomatic powerInfo support to diplomatic power ““fight the war of ideasfight the war of ideas””

President Clinton, 1999/2000President Clinton, 1999/20003 Key pillars3 Key pillars

Info Assurance/Critical Infrastructure Info Assurance/Critical Infrastructure Protection Protection (IA/CIP)(IA/CIP)

Vital national interest, use unilateral Vital national interest, use unilateral force to defend; “Partnership” force to defend; “Partnership”

Information Warfare/Ops Information Warfare/Ops (IW/IO)(IW/IO)MTR/RMA to Network Centric Ops to MTR/RMA to Network Centric Ops to Transformation: Desert Storm to Transformation: Desert Storm to Kosovo to Afghanistan and IraqKosovo to Afghanistan and Iraq

Public Diplomacy/International Public Diplomacy/International Public Information Public Information (PD/IPI(PD/IPI))

””Softpower” (Joe Nye); (Strategic Softpower” (Joe Nye); (Strategic Communication)Communication)““increasingly vital….transmit [our] increasingly vital….transmit [our] message to people around the message to people around the world” to “counter misinformation & world” to “counter misinformation & incitement…mitigate conflict”incitement…mitigate conflict”

““Softpower & Smartpower” (Joe Nye Softpower & Smartpower” (Joe Nye and SecDef Gates, 2008)and SecDef Gates, 2008)

Page 13: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Obama AdminObama Admin

Three SuggestionsThree Suggestions Do not treat cyberspace in isolation from information Do not treat cyberspace in isolation from information

environment (See DepSecDef Memo of May 07)environment (See DepSecDef Memo of May 07)Need comprehensive Cyberstrategy as a segment of an Need comprehensive Cyberstrategy as a segment of an even more comprehensive National Info Strategyeven more comprehensive National Info Strategy

““Comprehensive National Cybersecurity Initiative” (CNCI) is Comprehensive National Cybersecurity Initiative” (CNCI) is vital but not enough by itselfvital but not enough by itself

Grow the PartnershipGrow the PartnershipPublic Sector: Interagency/Government (all levels), Military, Public Sector: Interagency/Government (all levels), Military, Congress, Intel, Agencies, etcCongress, Intel, Agencies, etcPrivate Sector: Industry/Business, Academia, SocietyPrivate Sector: Industry/Business, Academia, SocietyInternational partners and organizationsInternational partners and organizations

Develop an Information StrategyDevelop an Information StrategyBuild the “3Cs” (later)Build the “3Cs” (later)

Page 14: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information AssuranceInformation Assurance Critical Infrastructure Protection Critical Infrastructure Protection

Dependency/Interconnections create VulnerabilityDependency/Interconnections create VulnerabilityNational Infrastructure controlsNational Infrastructure controls

complex, interconnected, centralized, autonomous: SCADAcomplex, interconnected, centralized, autonomous: SCADA energy, transportation, communications, finance, etc energy, transportation, communications, finance, etc

US Government actions 1990s – 200XsUS Government actions 1990s – 200Xs Australia, Norway, Sweden, Canada…Australia, Norway, Sweden, Canada… Just as valid for Europe, Asia as US: Just as valid for Europe, Asia as US: A global trendA global trend

NATO, EUNATO, EU

Partnership of Public-Private sectorsPartnership of Public-Private sectors Lessons from Estonia & Georgia?Lessons from Estonia & Georgia?

““Smaller is Better”Smaller is Better”

Strategic/economic impact/threat Strategic/economic impact/threat ““Strategic Fragility”Strategic Fragility”

Mobilization = German railroad system 1914?Mobilization = German railroad system 1914?

Cybersecurity Report (Melissa Hathaway’s effort)Cybersecurity Report (Melissa Hathaway’s effort)

Page 15: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

The New National/GlobalThe New National/Global Security Environment Security Environment

““Global Asymmetric Engagement/Asymmetric Global Asymmetric Engagement/Asymmetric Counterforce’Counterforce’

Cyberwar vs information & networks; operating in a contested Cyberwar vs information & networks; operating in a contested global commons global commons

(see Flournoy/Brimley in USNI July 2009)(see Flournoy/Brimley in USNI July 2009)

Asymmetric warfare & the “revolution in military affairs” = Asymmetric warfare & the “revolution in military affairs” = others are looking for OUR weaknessesothers are looking for OUR weaknesses

Information-dependent military operationsInformation-dependent military operations Critical infrastructure-dependent national societiesCritical infrastructure-dependent national societies Inter-connected global economiesInter-connected global economies

Have we the organizations, doctrines, personnel needed Have we the organizations, doctrines, personnel needed to survive and win the First Battle in Cyberspace?to survive and win the First Battle in Cyberspace?

Page 16: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Potential Cyber Potential Cyber Attack ObjectivesAttack Objectives

Disrupt enemy infrastructure, logistics and supply Disrupt enemy infrastructure, logistics and supply chainschains

Distract, confuse, and disable enemy C4ISRDistract, confuse, and disable enemy C4ISROODA-Loop effectsOODA-Loop effects

Impair the movement of military forcesImpair the movement of military forces Deny similar capabilities to the enemyDeny similar capabilities to the enemy Create opportunities for strategic attacks on enemy Create opportunities for strategic attacks on enemy

infrastructuresinfrastructures Weaken, distract and disorient social cohesion and Weaken, distract and disorient social cohesion and

political will of both military forces and civil populacepolitical will of both military forces and civil populace Shape global perceptions of the conflictShape global perceptions of the conflict Time-Gap: potentially NANOSECONDS!Time-Gap: potentially NANOSECONDS!

Bob Miller & Irv Lachow, “Strategic Fragility”,http://www.ndu.edu/CTNSP/defense_horizons/DH59.pdf

Page 17: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Strategic InfluenceStrategic InfluenceStrategic CommunicationStrategic Communication

““Strategic Influence” is a strategic instrument…Strategic Influence” is a strategic instrument…and always has beenand always has been

Assyrian palace at Nimrud 700BCAssyrian palace at Nimrud 700BCTV is everywhere (“Softwar”)TV is everywhere (“Softwar”)

““This weapon of television could be useful”; Edward This weapon of television could be useful”; Edward R. Murrow 1951R. Murrow 1951

Vietnam to “Tear Down This Wall” to Al Firdos Vietnam to “Tear Down This Wall” to Al Firdos bunker to “Live from the WTC”bunker to “Live from the WTC”

New mediums: Internet, cell phone cameras New mediums: Internet, cell phone cameras (London 2005), Twitter(London 2005), Twitter

Cyberspace & Terrorism = cyberterrorism?Cyberspace & Terrorism = cyberterrorism?Info battle of Iraq: winning?Info battle of Iraq: winning?Global influence: succeeding?Global influence: succeeding?

MUST see through THEIR lensMUST see through THEIR lens Al Jazeera - Al Hurra, Radio Sawa Al Jazeera - Al Hurra, Radio Sawa

Recent congressional engagementRecent congressional engagement Needed for resources, supportNeeded for resources, support

Page 18: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Strategic CommunicationStrategic CommunicationSymphony Orchestra or Jazz Ensemble?Symphony Orchestra or Jazz Ensemble?

Cdr Steve Tatham, RN “Strategic Communication: a Primer”

Page 19: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

War of Ideas…or Images?War of Ideas…or Images?Narratives and PicturesNarratives and Pictures

Page 20: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Influence “Campaigning”Influence “Campaigning”

Perceiving-Internalizing

Believing

Behaving

Goal:Desired Action

CognitiveDissonance

CulturalMismatch

Faith and/or Reason

Confirmation orContradiction

Sensing-ReceivingElements of an Information “Campaign”Elements of an Information “Campaign”

WHAT is the desired EFFECT?WHAT is the desired EFFECT? WHO is the audience?WHO is the audience?

Cultural awareness Cultural awareness Are we listening or just talking?Are we listening or just talking?

WHAT is the message?WHAT is the message?Content analysisContent analysis

Perceptions = RealityPerceptions = Reality

DEEDS = messages!DEEDS = messages! HOW to deliver it?HOW to deliver it?

Which Media and Spokesman: Which Media and Spokesman: Shortwave to Arab street, or Imam in Shortwave to Arab street, or Imam in Mosque?Mosque?

WAS it successful?WAS it successful?Metrics & measurementMetrics & measurement

Measure impact, not effortMeasure impact, not effort

Page 21: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

C2W to Info Ops RoadmapC2W to Info Ops Roadmap

“Integrated use of OPSEC, military deception, PSYOP, EW, and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade or destroy adversary C2 capabilities, while protecting friendly capabilities against such actions.”

JCS, Command and Control Warfare”

1993

“Integrated employment of the core capabilities of EW, Computer Network Operations, Psyop, Military Deception, and Opsec, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own”

Info Ops Roadmap 2003

Page 22: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Doctrine Pub 3-13, 2006Doctrine Pub 3-13, 2006“the Thesis”“the Thesis”

Highlights/Key PointsHighlights/Key Points Retains Roadmap definition of Info OpsRetains Roadmap definition of Info Ops Part of “Transformation”Part of “Transformation” ““IW” no longer used; (irregular warfare)IW” no longer used; (irregular warfare) Three interrelated dimensionsThree interrelated dimensions

Physical, Informational, CognitivePhysical, Informational, Cognitive Strategic Command Strategic Command

Coord IO across AORs and functional boundariesCoord IO across AORs and functional boundaries Importance of Strategic CommunicationImportance of Strategic Communication Important role of allied/coalition Info OpsImportant role of allied/coalition Info Ops

Page 23: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

An Info Ops MapServices

An Info Ops MapServices

• EW, Influence, Networks

• AFDD-1, 2-5• Realm to control• Cyberspace

Command?• 24th AF – 67th NW Wg

Air ForceAir Force ArmyArmy

NavyNavyUSMCUSMC

• Human factors & Tech

• MCWP 3-40.5• Command

Dominance• OODA loop

• MCIOC at Quantico• IOps career field

• Maritime Dominance• Fleet Operations• Net Centric Ops• NETWAR Command• Cyber Forces Cmd?• Info Warriors

• Digital battlefield• FM 3-0 & 3-13• Info Superiority• 1st IOpsCmd – 4th POG• FAs 29, 30 & 39

JOINTJOINTInfo OpsInfo Ops

RMAs require Operational and Organizational change/”Transformation”

Page 24: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

A DOD MapA DOD Map

JCS JOINT JOINT Info OpsInfo Ops

JROC ProcessJ2 Threats/TGTSJ39 (DDGO) OffensiveJ5 Cyber DivisionJ6 Networks/Cyberspace J7 Doctrine/Education

DISADefensive IWJTF-GNOIndications & WarningNCS/NSTAC

JIOWCntrSupport to CoComsStratcom –

Global Strike

Nodal AnalysisJWAC

Nodal analysis

DIAINTEL Focal PointIndications & WarningHuman Factors Analysis

NSAThreat AnalysisE-space AnalysisJFCC-NW

Combat CmdsPlan-Exercise

ExecutionSOCOM-Psyop

USD(I)Info OperationsMil Dec, CNO, Opsec

SERVICESSERVICESOrganize/Train/EquipOrganize/Train/Equip

ASD/NIINetworks & Info IntegrationIA/CIP

PolicyRoadmapPsyop-DSPD

USD(P) STRATCOMMission/AdvocateSupport to CoComsPlan/ExecuteNew Cyber Command

Page 25: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Allies’ Info OpsAllies’ Info Ops

UK Joint Warfare Pub 3-80UK Joint Warfare Pub 3-80 ““Co-ordinated actions Co-ordinated actions

undertaken to undertaken to influence influence an an adversary or potential adversary or potential adversary in support of adversary in support of political and military political and military objectives by undermining objectives by undermining his his will, cohesion and will, cohesion and decision-making abilitydecision-making ability, , through affecting his through affecting his information, information-information, information-based processes and based processes and systems while protecting systems while protecting one’s own decision-makers one’s own decision-makers and decision-making and decision-making processes.”processes.”

EU Military Info Ops EU Military Info Ops EU Mil Committee 2/2008EU Mil Committee 2/2008 ““Military function that Military function that

provides advice and provides advice and coordination of coordination of military military activities affecting activities affecting information and information information and information systems in order to systems in order to create create desired effectsdesired effects in support of in support of the mission specific Crisis the mission specific Crisis Information Strategy and of Information Strategy and of the political and military the political and military objectives of the EU”objectives of the EU”

What is a “crisis info strat”?What is a “crisis info strat”?

Page 26: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

NATONATOInfo Ops comprises three interrelated activitiesInfo Ops comprises three interrelated activities Changing, Changing, influencing influencing or reinforcing perceptions and or reinforcing perceptions and

attitudes or adversaries, potential adversaries, othersattitudes or adversaries, potential adversaries, others Preserve and Preserve and protectprotect Alliance freedom of maneuver in Alliance freedom of maneuver in

the information environment by defending the data and the information environment by defending the data and information [of] decision makers/processes information [of] decision makers/processes

CounteringCountering command, functions, and capabilities by command, functions, and capabilities by affecting data/info of adversaries’ C2, intelligence, affecting data/info of adversaries’ C2, intelligence, surveillance, target acquisition and weapons systems surveillance, target acquisition and weapons systems

an an integrating function focused on the info integrating function focused on the info environment, not a capability in its own rightenvironment, not a capability in its own right

Military Policy on IO MC 422/3 9 March 07 (agreed July 2008)Military Policy on IO MC 422/3 9 March 07 (agreed July 2008) Allied Joint Pub 3-10 (pending official publication)Allied Joint Pub 3-10 (pending official publication)

Page 27: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Others’ IOOthers’ IO

RussiaRussia ““Information Security Doctrine Information Security Doctrine

of the Russian Federation”of the Russian Federation” 9 Sept 20009 Sept 2000

Protect “national interests…in Protect “national interests…in the information sphere”the information sphere”

Protect the IT industryProtect the IT industry Send: reliable info on the RFSend: reliable info on the RF Protect: spiritual life of the RFProtect: spiritual life of the RF

Russian Info OpsRussian Info OpsTwo, not five, core areasTwo, not five, core areas

Info Technical, PsychologicalInfo Technical, PsychologicalTim Thomas, FMSO at Tim Thomas, FMSO at Ft LeavenworthFt Leavenworth

ChinaChina Overlays IW with ideologyOverlays IW with ideology

““New People’s New People’s War”--“Overcome superior War”--“Overcome superior with inferior”with inferior”

Focus on non-technologicalFocus on non-technological Unconventional warfare Unconventional warfare

Not a battlefield force Not a battlefield force enabler/multiplierenabler/multiplier““Anti-Info-Strategy Anti-Info-Strategy Technology”Technology”

Info campaign precludes the Info campaign precludes the need for military action!---a need for military action!---a preemption weaponpreemption weapon

Jim Mulvenon, “PLA in Info Jim Mulvenon, “PLA in Info Age”, RANDAge”, RAND

Page 28: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

DiscussionDiscussion

Is Cyberspace a warfighting domain?Is Cyberspace a warfighting domain? Define “domain” (Definitions DO matter!)Define “domain” (Definitions DO matter!)

Did the USAF try to “grab the cyberturf”?Did the USAF try to “grab the cyberturf”? How much of Cyberspace does AF/DOD How much of Cyberspace does AF/DOD

“own”?...civilian infrastructure is 90%+ of DOD use“own”?...civilian infrastructure is 90%+ of DOD use

Are we making the right changes in…Are we making the right changes in… Organizations, doctrines, technologyOrganizations, doctrines, technology

What are coalition partners/allies doing?What are coalition partners/allies doing?Who will be the “Billy Mitchell” of Cyberspace? Who will be the “Billy Mitchell” of Cyberspace? (do we need/want one?)(do we need/want one?)

Page 29: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Cyber ChangesCyber Changes

US Strategic CommandUS Strategic Command New Subordinate Unified New Subordinate Unified

Cyber Command Cyber Command Director National Security Director National Security Agency 4 stars, 2 hatsAgency 4 stars, 2 hatsJFCC-NW and JTF-GNO JFCC-NW and JTF-GNO folded into itfolded into itMissions, Roles, Missions, Roles, Responsibilities evolvingResponsibilities evolvingProtect military—not civilianProtect military—not civilian—networks—networks

Generating Generating significantsignificant discussion/uneasediscussion/unease

QDR Cyber StrategyQDR Cyber Strategy Broad goals (draft)Broad goals (draft)

Freedom of Action in Freedom of Action in cyberspacecyberspacePrevent/Deter conflictPrevent/Deter conflictCyber support to Cyber support to homeland defensehomeland defense

SupportsSupportsSecure NetworksSecure NetworksCyber OpsCyber OpsExternal partnersExternal partnersDOD & national effortsDOD & national efforts

Page 30: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information OperationsInformation Operations

QDR sub-panel on Info OpsQDR sub-panel on Info OpsMoving away from “5 core competencies”, and Moving away from “5 core competencies”, and towards the “Information Environment”towards the “Information Environment” DTK proposal (based on QDR proposals):DTK proposal (based on QDR proposals):

[M] = Military[M] = Military

Information Operations are [M] activities conducted in or via the Information Operations are [M] activities conducted in or via the information environment to affect and protect information itself information environment to affect and protect information itself as well as the connectivity necessary to exchange that as well as the connectivity necessary to exchange that information and create cognitive effects. Info Ops is thus the information and create cognitive effects. Info Ops is thus the integrated and coordinated [M] use of the information integrated and coordinated [M] use of the information environmentenvironment in order to create desired [M] effects. This use of in order to create desired [M] effects. This use of the [M] information environment spans the range of operations, the [M] information environment spans the range of operations, and exists within and supports larger governmental and and exists within and supports larger governmental and national uses of the information environment and information national uses of the information environment and information power in national security. power in national security.

Page 31: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Measuring PIMEMeasuring PIME

Traditional measure of power is control of Traditional measure of power is control of resourcesresources

Land, iron/coal/oil, people Land, iron/coal/oil, people M M and and EE: easily visible and quantifiable: easily visible and quantifiable

Military: hardware, troops, trainingMilitary: hardware, troops, training Economic: GDP, trade, industryEconomic: GDP, trade, industry

P/D:P/D: may have some visible metrics may have some visible metrics Stability, continuity, participationStability, continuity, participation Embassies, treaties, diplomatsEmbassies, treaties, diplomats

I most difficult of allI most difficult of all What metrics can we use? What metrics can we use?

Page 32: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information/Cyber PowerInformation/Cyber Power

““Use of information Use of information content and technology content and technology as strategic instrumentsas strategic instruments to…affect global to…affect global behaviors”behaviors”

“ “The relative ability to The relative ability to operate in and exploit operate in and exploit the information (cyber) the information (cyber) environment…environment…””

Two Critical Two Critical and measurableand measurable factors:factors:

CONNECTIVITYExchange of informationExchange of information

CONTENTWhat’s exchangedWhat’s exchanged

One somewhat less—but still-measurable factor

COGNITIVEInfluence/behavior

Bottom Line: Impact and Effectiveness

Page 33: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information Power…Information Power…Who’s in Charge?Who’s in Charge?

Diplomatic and Military…Centralized and Hierarchical

Economic and Information…Diffused and Shared

Which model is correct for Information?

Page 34: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

What’s LackingWhat’s LackingWho and Where do we go to Who and Where do we go to shape and create Information shape and create Information Power?Power?

National Information Council?National Information Council? Public & Private PartnersPublic & Private Partners

What do need from them?What do need from them? National Information StrategyNational Information Strategy

What are we lacking? Why What are we lacking? Why don’t we have one?don’t we have one?

We need a strategic and We need a strategic and conceptual foundation for how conceptual foundation for how we can employ Information we can employ Information Power to support national Power to support national securitysecurity

Needed: Information-age Needed: Information-age corollary to the “Long corollary to the “Long Telegram”Telegram”

861.00/2 - 2246: Telegram861.00/2 - 2246: TelegramThe Charge in the Soviet Union (George The Charge in the Soviet Union (George Kennan) to the Secretary of StateKennan) to the Secretary of State[was classified at the time…now declassified][was classified at the time…now declassified]Moscow, February 22, 1946--9 p.m. [Received February 22--3: Moscow, February 22, 1946--9 p.m. [Received February 22--3: 52 p.m.]52 p.m.]511. Answer to Dept's 284, Feb 3 [13] involves questions so 511. Answer to Dept's 284, Feb 3 [13] involves questions so intricate, so delicate, so strange to our form of thought, and so intricate, so delicate, so strange to our form of thought, and so important to analysis of our international environment that I important to analysis of our international environment that I cannot compress answers into single brief message without cannot compress answers into single brief message without yielding to what I feel would be dangerous degree of over-yielding to what I feel would be dangerous degree of over-simplification. I hope, therefore, Dept will bear with me if I simplification. I hope, therefore, Dept will bear with me if I submit in answer to this question five parts, subjects of which submit in answer to this question five parts, subjects of which will be roughly as follows: will be roughly as follows: (1) Basic features of post-war Soviet outlook.(1) Basic features of post-war Soviet outlook.(2) Background of this outlook(2) Background of this outlook(3) Its projection in practical policy on official level. (3) Its projection in practical policy on official level. (4) Its projection on unofficial level.(4) Its projection on unofficial level.(5) Practical deductions from standpoint of US policy.(5) Practical deductions from standpoint of US policy.

The “LongTelegram”

Page 35: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Information StrategyInformation Strategy

Builds on “3Cs”Builds on “3Cs” Build, enhance, support Build, enhance, support ConnectivityConnectivity

Physical: networks, infrastructures, Information-Communication Physical: networks, infrastructures, Information-Communication Technology (ICT)Technology (ICT)Human: one-one, one-many, many-manyHuman: one-one, one-many, many-manyGet the REAL experts (ie. Private Sector)Get the REAL experts (ie. Private Sector)

Build/Use institutions that create Build/Use institutions that create ContentContentEntertainment, News, Marketing, Education, moreEntertainment, News, Marketing, Education, moreGet the REAL experts (ie. Private Sector)Get the REAL experts (ie. Private Sector)

Measure Measure CognitiveCognitive impact impactGet the REAL experts (ie. Private Sector)Get the REAL experts (ie. Private Sector)

All Three require All Three require partnershipspartnerships beyond government, beyond government, military, and especially the private sector to include non-military, and especially the private sector to include non-US, and they require a long-term view…this isn’t years, US, and they require a long-term view…this isn’t years, it’s it’s decades decades

Taliban: “Americans have all the watches, we have all the time”Taliban: “Americans have all the watches, we have all the time”

Page 36: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

What’s Needed?What’s Needed?“Wire the World!”“Wire the World!”

New strategy is not “Containment”…New strategy is not “Containment”…

it’s it’s CONNECTIVITYCONNECTIVITY See Hart-Rudman Commission’s 2See Hart-Rudman Commission’s 2ndnd

Report, May 2000Report, May 2000 An (increasingly) Networked WorldAn (increasingly) Networked World

Free flows of information and Free flows of information and exchangeexchange of of CONTENTCONTENT

Via both Via both Human & Technological Human & Technological InteractionInteraction

Enhance Enhance economic growtheconomic growth and and productivity, standards of living and productivity, standards of living and health care, etchealth care, etc

EnhanceEnhance strategic strategic communicationcommunication, , which which cancan enhance enhance

Human rights, Democracy, PeaceHuman rights, Democracy, Peace Bridge the “Core-Gap”Bridge the “Core-Gap” paradigm paradigm ……BUT: won’t be 100% successfulBUT: won’t be 100% successful

Page 37: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Critical IssuesCritical IssuesQuestions for DiscussionQuestions for Discussion

How do we develop and protect “National Cyberspace? How do we develop and protect “National Cyberspace? What is it? Who?What is it? Who?

Organizations, people, doctrinesOrganizations, people, doctrines

How do we leverage Info Ops to fully support military How do we leverage Info Ops to fully support military operations/commanders?operations/commanders?

Enabler? Multiplier? Partner? Supported/ing?Enabler? Multiplier? Partner? Supported/ing?

How do we communicate and influence?How do we communicate and influence? Who? What? How? Did we Succeed?Who? What? How? Did we Succeed?

RolesRoles Intel Community, Private Sector, Allies/Friends, NGOsIntel Community, Private Sector, Allies/Friends, NGOs

Where fit within NATO security strategy?Where fit within NATO security strategy?

Page 38: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

Cubicle-Centric WarfareCubicle-Centric WarfareAre we too busy fighting ourselves…and not paying Are we too busy fighting ourselves…and not paying

sufficient attention to THEM?sufficient attention to THEM?

Page 39: INFORMATION and National Security Dr. Dan Kuehl National Defense University (NDU) Information Resources Management College (IRMC) My Opinions: not the

http://www.ndu.edu/irmc/programs/index.html

Programs/Certifications for/in…Programs/Certifications for/in…Chief Information OfficersChief Information OfficersInformation AssuranceInformation AssuranceOrganizational Transformation…Organizational Transformation…

……and and Information StrategistsInformation Strategists

Dr Dan KuehlDr Dan [email protected] 202-685 2257 202-685 2257Twittersphere: “Daninfowar”Twittersphere: “Daninfowar”