Information Operations: What It Is and Why It Matters Presentation to AOC EW Asia 2014 Conference Mr Jeff Malone Defence Science and Technology Organisation (Australia) Scope • The Origins and Evolution of Information Operations • The US Joint Approach to Information Operations • The Role of Electronic Warfare within Information Operations • Emerging Issues The Origins and Evolution of Information Operations Command Control Communications Countermeasures (C3CM) • Emerged in the late 1970s • Based on identified vulnerabilities in Soviet C3I systems • Integrative operational concept • Entailed both defensive and offensive actions Operation DESERT STORM: The First Information War (?) • First major employment of C3CM • Also entailed major Psychological Operations activities • Presented a range of synchronisation and deconfliction issues Information Warfare (IW) and Command and Control Warfare (C2W) • IW emerges in 1992 – initial definition TOP SECRET – Entailed strategic employment of Computer Network Attack (CNA) • C2W emerges in 1993 – “the operational employment of IW on the battlefield” – Adds Psychological Operations to the C3CM suite of activities – Like C3CM encompasses both offensive and defensive actions The Limitations of IW/C2W and the Emergence of Information Operations (IO) • Scope of IW/C2W problematic: – Only applicable in warfighting? – Only applicable against the Command and Control target set? – Only entails specified capabilities? • By mid 1990s, IO emerges as a more encompassing term (initially in US Army) • Instantiated in joint doctrine in 1998 – Joint Publication 3-13, Information Operations • IO remains the core term (in joint doctrine) Trends in the Evolution of Information Operations • From warfighting only to applicability across the spectrum of operations • Expansion from C3I target set to human decision making more generally (including the systems which enable and support decision making) • Expansion in the range of information-based capabilities to be integrated and deconflicted The US Joint Approach to Information Operations IO: US Joint Doctrinal Definition • “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” Source: Joint Publication 3-13, Information Operations, 27 November 2012 Information-Related Capability (IRC) • “A tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions.” Source: Joint Publication 3-13, Information Operations, 27 November 2012 The Information Environment Source: Joint Publication 3-13, Information Operations, 27 November 2012 Examples of IRCs • Electronic Warfare (Electromagnetic Spectrum Operations) • Cyberspace Operations • Operations Security • Military Deception • Psychological Operations • Kinetic Targeting • (and many others) Source: Joint Publication 3-13, Information Operations, 27 November 2012 The Role of Electronic Warfare within Information Operations Electronic Warfare • “Military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy.” Source: Joint Publication 3-13.1, Electronic Warfare, 8 February 2012 Overview of Electronic Warfare Source: Joint Publication 3-13.1, Electronic Warfare, 8 February 2012 Electronic Warfare and Other IRCs • Cyberspace Operations – Can provide a pathway for attacks on wireless networks (or deny them) • Operations Security – Electronic Protection contributes to overall defensive posture, from platform to force level • Military Deception – Both a channel for conveying deception message and countering adversary deception activities • Psychological Operations – Provides a channel for dissemination and blocking adversary dissemination • Kinetic Targeting – Provides actionable targets for attack • Intelligence Support (common to all the above) – Contributes to overall intelligence effort which supports planning, operations and battle damage assessment/re-tasking Emerging Issues Access to Spectrum Mobile Devices and Social Media Precision Location and Timing The Evolving Counter-IED Battle Unmanned and Autonomous Systems Directed Energy Weapons Conclusion EW-IO-Cyber-EMS Operations Convergence and Synergies Hotel Grand Chancellor Adelaide, South Australia, 18-19 August 2014
© Copyright 2025