1 / 28

History and Evolution of IO

History and Evolution of IO. Prepared by the Joint IO Center. Learning Objectives. Origins of IO. Historical applications. IO Today. What is different?. Why is it important?. Information Operations Focus. Actions taken to affect adversary information and information systems . . .

HarrisCezar
Télécharger la présentation

History and Evolution of IO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. History and Evolution of IO Prepared by the Joint IO Center History and Evolution of IO

  2. Learning Objectives Origins of IO Historical applications IO Today What is different? Why is it important? History and Evolution of IO

  3. Information OperationsFocus Actions taken to affect adversary information and information systems. . . Systems, people, & facilities supporting information- dependent functions Attacks take many forms: physical, cyber, psychological, etc. History and Evolution of IO

  4. Info technologies used - secondary to “real” weapons Then The IO Battlefield Info systems critical to military operations Now “Our present theory is to destroy personnel, our new theory should be to destroy command. Not after the enemy’s personnel has been disorganized, but before it has been attacked, so that it may be found in a state of disorganization when attacked.” J.F.C. Fuller Memorandum: Strategic Paralysis as the Objective of the Decisive Attack, 1918 History and Evolution of IO

  5. History IO Supporting and secondary Civil War World War I World War II Vietnam Somalia IO Primary and fully integrated Desert Storm History and Evolution of IO

  6. Use of telegraph (30 wpm) Picket riders for battlefield awareness Attacks on lines of communications Spies, codes, deception Perception management American Civil War History and Evolution of IO

  7. Massive battlefield attrition Use of air forces for battlefield awareness World War I History and Evolution of IO

  8. World War II Strategic attacks against infrastructure Double-edged sword of “Enigma” Communications jamming C2 targets - John Wayne’s radioman Deception critical to success of first fully integrated plan - 1940’s technology History and Evolution of IO

  9. US won the ground war North Vietnam won the media war (“body bag effect”) Public opinion shifted US decision makers crippled by public opinion Vietnam-Tet Offensive Who won the Tet Offensive? North Vietnam victorious in the long run History and Evolution of IO

  10. The Cold War One of which was the US’s demonstrated technological superiority and ability to conduct a coherent information campaign (PSYOP and deception). Can be viewed as a technology contest won by the West for many reasons. . . History and Evolution of IO

  11. Integration of spaceborne, airborne and land based communications and intelligence Desert Storm The first “Information” War Coordinated planning for EW, OPSEC, deception, PSYOP, destruction Targeting against leadership and military C2 History and Evolution of IO

  12. Intelligence deficiencies Communications countermeasures Psychological Operations - Manipulation of mass media Somalia “Turning around your high-powered, fully wired expeditionary force in Somalia with a single, 30-second videoclip. - Weaponry by CNN” History and Evolution of IO

  13. Desert Storm Strong evidence to support Desert Storm as first US offensive info war Less evidence exists that defensive IO was given much consideration by either side Post-war analysis highlighted numerous serious exploitable IO deficiencies with coalition forces OSD, JCS, and service IO functions were created History and Evolution of IO

  14. Desert Storm Patriot missile hits SCUD “Iraq lost the war before it even began. This was a war of intelligence, EW, command and control, and counterintelligence. Iraqi troops were blinded and deafened. . .Modern war can be won by informatika and that is now vital for both the US and the USSR.” LtG Bogdanov, Chief of the General Staff, Center for Operational and Strategic Studies, Oct 1991 History and Evolution of IO

  15. Joint/Special Operations Lethal/Non-Lethal Targeting Area of Operations/Influence Afghanistan “The mission of destroying missile sites and arms depots is almost the easy part. The critical task … is to continue to reshape the information environment and target points of fracture in the opposition.” P.W Singer, Foreign Policy Studies History and Evolution of IO

  16. Is IO THAT Important? Revolution in Military Affairs or Buzzword du jour? History and Evolution of IO

  17. Information Technology Revolution INFORMATION TECHNOLOGY, specifically the use of COMPUTERSand NETWORKING, is a worldwide revolution affecting every aspect of human life from industry to government to entertainment. History and Evolution of IO

  18. Information TechnologiesWhat is Different? Geography is changing. There are few geographical boundaries in the information infrastructure. Target access points are changing and may not be in geographical proximity to the target. The military can no longer create and control the battlespace History and Evolution of IO

  19. Information TechnologiesWhat is Different? TECHNOLOGY is changing. Technology leadership shifting from military to civilian sector Info technology inexpensive and readily available Impact of computers and networking Electromagnetic spectrum (including satellites) and landline History and Evolution of IO

  20. MILITARY is changing. Changing geographic, political, spatial, & time boundaries New threat (state/politically sponsored, others) Selective targeting/ critical nodes Changing military mission (more targets) Minimal forces in “harms way,” Precision targeting Conservation of resources Rules of engagement and legal issues Information TechnologiesWhat is Different? History and Evolution of IO

  21. TIME is a major factor. Information TechnologiesWhat is Different? Technology is rapidly moving - outpacing controls Must anticipate the future to stay ahead (18 month life cycle - or less) Demand for real time, highly reliable, manageable information History and Evolution of IO

  22. New Age Information Industrial Legacy support institutions are becoming less relevant All support is under examination for relevancy Military organizations and other existing institutions under scrutiny (NSA, CIA, etc...) History and Evolution of IO

  23. IO - Lucrative Tool No Quick Fixes Many Targets Anonymous Adversaries Uncertain Responsibilities Simple Technology Deterrence = Infrastructure Resiliency Poorly Defined Remedies (“Takes a licking and keeps on ticking”) Ambiguous Law History and Evolution of IO

  24. ChallengesImmediate No common vocabulary Responsibilities are widely scattered Issues extend beyond DoD Intelligence system challenged I&W: traditional methods are ineffective Defense ignored or focused on classified systems History and Evolution of IO

  25. ChallengesLong Term Technologies are revolutionizing. . . Information collection, processing, dissemination Command & control Conduct of operations Requires development of. . . Expanded collection means New doctrine (supported by training & education) Must make correct decisions about investments in information technologies and human capabilities History and Evolution of IO

  26. Potential Threats Information technologies are available to all (and many are interested) No “rear area” in IO As US reliance on information grows the threat becomes more complex, sophisticated, clandestine Rapid introduction of advanced technologies brings increased capability to adversaries Information can be our vulnerability as well as our strength. History and Evolution of IO

  27. Information Superiority is key. JIOC has a new role. The Information Age is creating a new world. Rapidly emerging technologies Growing dependence on computers - by both weapons and C2 The effectiveness of IO increases. Our vulnerability to IO increases. That’s What’s NewHow Does All This Impact JIOC? History and Evolution of IO

  28. SummaryKey Points IO Not a new concept (origins in writings of Sun Tzu circa 300 BC). However the Information Age elevates it to a new level. Information Age technologies are revolutionizing military operations. However legacy information systems remain and must be considered in mission planning. Dependence on Information Age technologies creates new vulnerabilities. (Use leads to dependence which creates vulnerabilities.) History and Evolution of IO

More Related