360 likes | 540 Views
Information Warfare. Capabilities and Policy Issues. Agenda. Define IWCapabilitiesPolicy Issues. Definition. It is NotHacking into a school computerDenial of service attack against e-commerceIt isDoD Technical View of IW :
E N D
1. Lt Col Maxie Thom, USAF
National Defense Fellow
Visiting Air Force Researcher
University Park Campus, DM 434C
(305) 348-1920
thomm@fiu.edu
2. Information Warfare Capabilities and Policy Issues
3. Agenda Define IW
Capabilities
Policy Issues
4. Definition It is Not
Hacking into a school computer
Denial of service attack against e-commerce
It is
DoD Technical View of IW : information itself is now a realm, a weapon, and a target
5. Working Definition Information warfare is comprised of operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions
6. Information Operations (IO) Military Information Warfare
IO is conducted during time of crisis or conflict to affect adversary information and information systems while defending one's own information and systems
7. History ". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence."
Sun Tzu, The Art of War
8. History "There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind."
Napoleon Bonaparte
9. Core Capabilities Psychological Operations (PSYOPS)
Military Deception (MILDEC)
Operations Security (OPSEC)
Computer Network Operations (CNO)
Electronic Warfare (EW)
10. PSYOPS Definition : Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.
Purpose: Induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.
11. PSYOP (Weapons) Email, Faxes, Cell phones
Encouraged Iraqi leaders to abandon support
Broadcast
Encouraged fielded troops to not fight
Leaflets
Variety of themes
12. MILDEC Definition: Actions executed to deliberately mislead adversary military decision makers with regard to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the success of the friendly military operation.
Purpose: Guide an enemy into making mistakes by presenting false information, images, or statements
13. MILDEC (Weapons) Operations
MINCEMEAT The Man That Never Was
Camouflage
Mockups Aircraft on a stick
Electronic
Tactical Air Launched Decoy (TALD)
14. OPSEC The formation and procedure used by the military should not be divulged beforehand.
Sun Tzu, The Art of War
15. OPSEC (Definition) A process of identifying and analyzing information that is critical to friendly operations:
(a) identify which information can be observed by adversary intelligence systems
(b) determine indicators that hostile intelligence systems might piece together to derive critical information in time to be useful to adversaries,
(c) select and execute measures that eliminate or reduce the vulnerability of friendly actions to adversary exploitation.
16. CNO The ability to attack and disrupt enemy computer networks, protect military information systems, and exploit enemy computer networks through intelligence collection.
CNA
CND
CNE
17. CNO (CNA) Operations conducted to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.
Viruses
Trojan Horses
18. CNO (CND) Protect and defend information, computers, and networks from nasty Ds
It utilizes security measures to keep the enemy from learning about U.S. military capabilities and intentions.
Includes actions taken to protect, monitor, analyze, detect and respond to unauthorized activity within DOD information systems and networks.
CND focuses on detecting or stopping intrusions, whereas OPSEC focuses on identifying and reducing vulnerabilities
Firewalls - Encryption
19. EW Any military action involving the use of electromagnetic (EM) or directed energy to manipulate the EM spectrum or to attack an adversary
Jamming
TALD
Stealth (RAM)
High Power Microwave (HPM)
20. CNA vs. EW CNA relies on interpreted signals in a data stream to execute an attack
21.
QUESTIONS
??????????
22. Implications Policy
Law
23. Policy Issues NSPD 16 (classified)
Jul 2002
PSYOP that affect friendly nations
National Security Vulnerability of dependency
Legal issues resulting from use of cyberweapons
24. Law of Armed Conflict The LOAC arises from a desire among civilized nations to prevent unnecessary suffering and destruction while not impeding the effective waging of war. A part of public international law (precedence), LOAC regulates the conduct of armed hostilities. It also aims to protect civilians, prisoners of war, the wounded, sick, and shipwrecked. LOAC applies to international armed conflicts and in the conduct of military operations and related activities in armed conflict, however such conflicts are characterized.
- Hot Pursuit - Self Defense
32. K-Site Airfield
33. Prior to Assembly
34. After Assembly
35. Flat Dummy
36. TALD
37.
QUESTIONS
??????????