1 / 36

Lt Col Maxie Thom, USAF National Defense Fellow Visiting Air Force Researcher University Park Campus, DM 434C 305 348-19

Information Warfare. Capabilities and Policy Issues. Agenda. Define IWCapabilitiesPolicy Issues. Definition. It is NotHacking into a school computerDenial of service attack against e-commerceIt isDoD Technical View of IW :

bryony
Download Presentation

Lt Col Maxie Thom, USAF National Defense Fellow Visiting Air Force Researcher University Park Campus, DM 434C 305 348-19

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Lt Col Maxie Thom, USAF National Defense Fellow Visiting Air Force Researcher University Park Campus, DM 434C (305) 348-1920 thomm@fiu.edu

    2. Information Warfare Capabilities and Policy Issues

    3. Agenda Define IW Capabilities Policy Issues

    4. Definition It is Not Hacking into a school computer Denial of service attack against e-commerce It is DoD Technical View of IW : “information itself is now a realm, a weapon, and a target”

    5. Working Definition Information warfare is comprised of operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions

    6. Information Operations (IO) Military Information Warfare IO is conducted during time of crisis or conflict to affect adversary information and information systems while defending one's own information and systems

    7. History ". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence." Sun Tzu, The Art of War

    8. History "There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind." Napoleon Bonaparte

    9. Core Capabilities Psychological Operations (PSYOPS) Military Deception (MILDEC) Operations Security (OPSEC) Computer Network Operations (CNO) Electronic Warfare (EW)

    10. PSYOPS Definition : Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. Purpose: Induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.

    11. PSYOP (Weapons) Email, Faxes, Cell phones Encouraged Iraqi leaders to abandon support Broadcast Encouraged fielded troops to not fight Leaflets Variety of themes

    12. MILDEC Definition: Actions executed to deliberately mislead adversary military decision makers with regard to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the success of the friendly military operation. Purpose: Guide an enemy into making mistakes by presenting false information, images, or statements

    13. MILDEC (Weapons) Operations MINCEMEAT “The Man That Never Was” Camouflage Mockups “Aircraft on a stick” Electronic Tactical Air Launched Decoy (TALD)

    14. OPSEC “The formation and procedure used by the military should not be divulged beforehand.” Sun Tzu, The Art of War

    15. OPSEC (Definition) A process of identifying and analyzing information that is critical to friendly operations: (a) identify which information can be observed by adversary intelligence systems (b) determine indicators that hostile intelligence systems might piece together to derive critical information in time to be useful to adversaries, (c) select and execute measures that eliminate or reduce the vulnerability of friendly actions to adversary exploitation.

    16. CNO The ability to attack and disrupt enemy computer networks, protect military information systems, and exploit enemy computer networks through intelligence collection. CNA CND CNE

    17. CNO (CNA) Operations conducted to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Viruses Trojan Horses

    18. CNO (CND) Protect and defend information, computers, and networks from nasty D’s It utilizes security measures to keep the enemy from learning about U.S. military capabilities and intentions. Includes actions taken to protect, monitor, analyze, detect and respond to unauthorized activity within DOD information systems and networks. CND focuses on detecting or stopping intrusions, whereas OPSEC focuses on identifying and reducing vulnerabilities Firewalls - Encryption

    19. EW Any military action involving the use of electromagnetic (EM) or directed energy to manipulate the EM spectrum or to attack an adversary Jamming TALD Stealth (RAM) High Power Microwave (HPM)

    20. CNA vs. EW CNA relies on interpreted signals in a data stream to execute an attack

    21. QUESTIONS ??????????

    22. Implications Policy Law

    23. Policy Issues NSPD 16 (classified)…Jul 2002 PSYOP that affect friendly nations National Security Vulnerability of dependency Legal issues resulting from use of cyberweapons

    24. Law of Armed Conflict The LOAC arises from a desire among civilized nations to prevent unnecessary suffering and destruction while not impeding the effective waging of war. A part of public international law (precedence), LOAC regulates the conduct of armed hostilities. It also aims to protect civilians, prisoners of war, the wounded, sick, and shipwrecked. LOAC applies to international armed conflicts and in the conduct of military operations and related activities in armed conflict, however such conflicts are characterized. - Hot Pursuit - Self Defense

    32. K-Site Airfield

    33. Prior to Assembly

    34. After Assembly

    35. Flat Dummy

    36. TALD

    37. QUESTIONS ??????????

More Related