Defining Information Power

D. Kuehl
{"title":"Defining Information Power","authors":"D. Kuehl","doi":"10.21236/ada386009","DOIUrl":null,"url":null,"abstract":"Conclusions * All of the various elements and components of national information power, from Command and Control Warfare (C2W) through Military Information Warfare (IW) to Strategic Information Operations (IO) build upon each other to provide the fullest use of information as an element of national power. * The existing DOD definition of IW is dysfunctional: a better concept is to consider IW as \"those offensive and defensive warfighting actions in or via the information environment to control or exploit it.\" * The existing DOD definition of IO is also dysfunctional: a better concept is to consider IO as \"the range of military and government operations to protect and exploit the information environment.\" * Together they provide national information power, \"the broadest range of military, governmental and civilian information capabilities that enable national-level exploitation and dominance of the information realm.\" Changing Definitions The seemingly endless series of changes in the official DOD definition of information warfare--a different one in each of the three years the School of Information Warfare & Strategy has existed--reflects the lack of conceptual certainty about what IW is and where it fits into the range of elements of national power. The fact that there is no universally-accepted understanding of IW is certainly no surprise, given its newness; for comparison, ask a group of military officers to define \"strategic airpower\" or \"maneuver warfare\" and you'll get a variety of answers, even though these have been exercised for most of this century. The intent of this paper is to suggest an approach that leads to an understanding of not just IW, but how it fits into the full range of national information power. Command and Control Warfare: C2W The Joint Chiefs of Staff published the Memorandum of Policy (MOP) 30 in March 1993, defining and establishing guidelines for Command and Control Warfare, or C2W, which is perhaps best understood as the \"strategy that implements IW on the battlefield.\" This is IWOs basic building block, its foundation in a sense, and it incorporates a range of operations the military understands quite well. The five elements or pillars of C2W are Psychological Operations (PSYOP), Operational Security (OPSEC), Deception, Electronic Warfare (EW), and physical destruction of vital C2 nodes. Because the first three of these have been recognizable elements of warfare since biblical times, the question that immediately comes to mind is \"what\"s new about C2W?\" The answer involves several words, including \"stovepipes,\" \"synergies,\" and \"integration.\" Stovepipe activities have largely been conducted by small and isolated groups of little known and frequently less well-regarded specialists, so there was little coordinated effort to integrate them into a unified whole and build on the synergies between them. This approach forfeited much of the advantage that could have been gained by integrating these operations, such as the relationship between psychological operations, deception, and operational security. The fundamental intent of MOP 30 (rescinded in early 1997) and now Joint Pub 3-13.1, \"Joint Doctrine for C2W,\" is to break down the stovepipes and integrate the various elements of C2W so that their synergies and relationships can be magnified. One of the hallmarks of C2W is that it can be conducted in any or all of the different warfighting environments--land, sea, air, outer space, even cyberspace--by any or all of the military services. The objective of C2W is the incapacitation of the enemy's military C2 function, by operations against the enemy's C2 target set and the protection of one's own. The targets can be physical: such as a command center, communications switching system, or planning cell; or cognitive: such as the morale and fighting spirit of the enemy forces, or the enemy commander's knowledge of friendly forces. …","PeriodicalId":165909,"journal":{"name":"National Defense University. Institute for National Strategic Studies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"National Defense University. Institute for National Strategic Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21236/ada386009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Conclusions * All of the various elements and components of national information power, from Command and Control Warfare (C2W) through Military Information Warfare (IW) to Strategic Information Operations (IO) build upon each other to provide the fullest use of information as an element of national power. * The existing DOD definition of IW is dysfunctional: a better concept is to consider IW as "those offensive and defensive warfighting actions in or via the information environment to control or exploit it." * The existing DOD definition of IO is also dysfunctional: a better concept is to consider IO as "the range of military and government operations to protect and exploit the information environment." * Together they provide national information power, "the broadest range of military, governmental and civilian information capabilities that enable national-level exploitation and dominance of the information realm." Changing Definitions The seemingly endless series of changes in the official DOD definition of information warfare--a different one in each of the three years the School of Information Warfare & Strategy has existed--reflects the lack of conceptual certainty about what IW is and where it fits into the range of elements of national power. The fact that there is no universally-accepted understanding of IW is certainly no surprise, given its newness; for comparison, ask a group of military officers to define "strategic airpower" or "maneuver warfare" and you'll get a variety of answers, even though these have been exercised for most of this century. The intent of this paper is to suggest an approach that leads to an understanding of not just IW, but how it fits into the full range of national information power. Command and Control Warfare: C2W The Joint Chiefs of Staff published the Memorandum of Policy (MOP) 30 in March 1993, defining and establishing guidelines for Command and Control Warfare, or C2W, which is perhaps best understood as the "strategy that implements IW on the battlefield." This is IWOs basic building block, its foundation in a sense, and it incorporates a range of operations the military understands quite well. The five elements or pillars of C2W are Psychological Operations (PSYOP), Operational Security (OPSEC), Deception, Electronic Warfare (EW), and physical destruction of vital C2 nodes. Because the first three of these have been recognizable elements of warfare since biblical times, the question that immediately comes to mind is "what"s new about C2W?" The answer involves several words, including "stovepipes," "synergies," and "integration." Stovepipe activities have largely been conducted by small and isolated groups of little known and frequently less well-regarded specialists, so there was little coordinated effort to integrate them into a unified whole and build on the synergies between them. This approach forfeited much of the advantage that could have been gained by integrating these operations, such as the relationship between psychological operations, deception, and operational security. The fundamental intent of MOP 30 (rescinded in early 1997) and now Joint Pub 3-13.1, "Joint Doctrine for C2W," is to break down the stovepipes and integrate the various elements of C2W so that their synergies and relationships can be magnified. One of the hallmarks of C2W is that it can be conducted in any or all of the different warfighting environments--land, sea, air, outer space, even cyberspace--by any or all of the military services. The objective of C2W is the incapacitation of the enemy's military C2 function, by operations against the enemy's C2 target set and the protection of one's own. The targets can be physical: such as a command center, communications switching system, or planning cell; or cognitive: such as the morale and fighting spirit of the enemy forces, or the enemy commander's knowledge of friendly forces. …
定义信息力量
*从指挥与控制战(C2W)到军事信息战(IW)再到战略信息作战(IO),国家信息力量的所有各种要素和组成部分都相互建立,以提供信息作为国家力量要素的最充分利用。*国防部对信息战的现有定义是不正常的:更好的概念是将信息战视为“在信息环境中或通过信息环境控制或利用信息环境的进攻性和防御性作战行动”。*现有的国防部对信息系统的定义也不正常:更好的概念是将信息系统视为“保护和利用信息环境的军事和政府行动范围”。*它们共同提供国家信息力量,“最广泛的军事、政府和民用信息能力,使国家层面的开发和支配信息领域成为可能。”国防部对信息战的官方定义似乎没完没了的变化——在信息战与战略学院成立的三年中,每年都有不同的定义——反映了对信息战是什么以及它在国家力量的范围内的地位缺乏概念上的确定性。鉴于IW的新颖性,它没有被普遍接受的理解这一事实当然不足为奇;相比之下,让一群军官定义“战略空中力量”或“机动战”,你会得到各种各样的答案,尽管这些已经在本世纪的大部分时间里得到了运用。本文的目的是提出一种方法,使人们不仅了解信息战,而且了解它如何适应国家信息力量的全部范围。指挥与控制战争:C2W参谋长联席会议在1993年3月发布了政策备忘录(MOP) 30,定义和建立了指挥与控制战争(C2W)的指导方针,这可能是最好的理解为“在战场上实施IW的战略”。这是iws的基本组成部分,在某种意义上是它的基础,它包含了一系列军方非常了解的操作。C2W的五个要素或支柱是心理战(PSYOP)、作战安全(OPSEC)、欺骗、电子战(EW)和对重要C2节点的物理破坏。因为自《圣经》时代以来,前三种都是可识别的战争元素,所以人们马上想到的问题是“生化武器有什么新东西吗?”答案涉及几个词,包括“烟囱”、“协同效应”和“整合”。“烟囱式”活动主要是由鲜为人知、往往不太受重视的专家组成的小而孤立的小组进行的,因此几乎没有协调一致的努力将它们整合成一个统一的整体,并在它们之间建立协同作用。这种方法丧失了很多可以通过整合这些行动而获得的优势,例如心理战、欺骗和行动安全之间的关系。MOP 30(于1997年初废除)和现在的联合条款3-13.1,“C2W的联合原则”的基本意图是打破烟囱,整合C2W的各种元素,以便它们的协同作用和关系可以被放大。C2W的一个特点是,它可以在任何或所有不同的作战环境中进行——陆地、海洋、空中、外层空间,甚至网络空间——由任何或所有的军事部门进行。C2W的目标是通过针对敌方C2目标集的行动和保护自己的行动,使敌人的军事C2功能丧失能力。目标可以是物理的:例如指挥中心、通信交换系统或规划单元;或认知:如敌军的士气和战斗精神,或敌军指挥官对友军的了解。…
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信