UNITED24 - Make a charitable donation in support of Ukraine!

Military





Understanding Information Power And Organizing For Victory In Joint

Understanding Information Power And Organizing For Victory In Joint

Warfighting

 

CSC 1995

 

SUBJECT AREA - Warfighting

 

 

 

 

                               Executive Summary

 

      Title: Understanding Information Power and Organizing

             for Victory in Joint Warfighting

 

    Author:  Fred W. Gortler, III, Major, United States Air Force

 

   Research  To develop a framework for understanding information power so

   Problem:  the United States armed forces can organize for victory in joint

             information warfighting.

 

Discussion:  We live in the Information Age, a time when information power is

transforming the world. In the US, advanced civil sector technologies passed to the military offer quick, off-the-shelf combat applications.  Some see this as a Revolution in Military Affairs; others say the US armed forces have not begun to understand information power and its impact on modern warfare. Meanwhile, as the US defense community debates the role of information in warfare, new information-age threats             and enemies are emerging. States, even individuals, without traditional sources of military power, can threaten US global military leadership. To confront this new potential, the US armed forces must understand information power and how to organize for victory in joint warfighting.  Perspective must shift from the Cold War to threats and enemies of a new era.

 

             These are vexing challenges. How should the US define its role in

an info-world where military and civilian issues blur, where enemies become amorphic, and where old structures can't keep up with new technologies?  How must the US organize for victory in information warfare? This paper explores information power in relation to US joint warfighting. It seeks to advance the understanding of information power and proposes theater-level organization for joint information warfighting: specifically,             that responsibility for existing tools of information power--command, control, communications, computers, and intelligence--should be functionally assigned to a single combatant commander.

 

Conclusion:  Information power is changing the American way of war. The United

             States armed forces must develop a better understanding of the

             relationship between information power and modern warfare. The

 United States can organize for victory in joint information

 warfighting by assigning functional responsibility for information 

 warfare to a single combatant commander. US Space Command is the

 combatant command most suited for this assignment.

 

                              Table of Contents

 

 

Introduction

1

Background

4. The Gutenberg Analogy 5

Section I

   7 Defining Information Warfare

   .A New Paradox 9

   .Thinking About New Threats and Enemies 11

   .Military Application 13

   .Building on Experience 16

Section II

19 The Electronic Umbrella

   .The New Migration 20

   .Technological Revolution in the US Military 21

   .Integrating New Ideas 23

   .Obstacles to Integration 24

Section III

27 Making the Most of Information Power

   .The Mandate to Pursue Information Power 27

   .The Road Most Travelled 29

   .Redefining Presence 30

Section IV

33 Leveraging Information Power in the Post-Cold War Era

   .The Crossroads 33

   .Contrasting Nuclear and Information Power 34

   .Meeting New Challenges 35

Section V

36 Recommendations and Conclusions

   .Innovating Organizationally 37

   .Innovating Operationally 40

   .Innovating Doctrinally 44

   .A Concluding Parable 46

48 Bibliography

53 Abbreviations

54 Endnotes

 

                        Understanding Information Power

 

                                      and

 

                  Organizing for Victory in Joint Warfighting

 

 

       We live in an age that is driven by information. It's an age which Alvin Toffler

 

       has called the Third Wave. The ability to acquire and communicate huge

 

       volumes of information in real time, the computing power to analyze this

 

       information quickly, and the control systems to pass this analysis to multiple

 

       users simultaneously--these are the technological breakthroughs that are

 

       changing the face of war and how we prepare for war.1

 

                                                               William Perry

                                                          Secretary of Defense

 

 

                                 Introduction

 

 

    Information power is changing the American way of war. Secretary Perry spoke of

 

information's impact on how America fights, of how the Persian Gulf War demonstrated

 

that "information operations can determine a mission's success."2 The Pentagon's vision

 

of future battlespace is built on a cornerstone of information power: soldiers "able to

 

draw intelligence about their adversaries quickly and directly from continually updated

 

electronic displays, then fire weapons from over the horizon without ever having to get

 

close to targets."3 Other visions are more aggressive, expanding "traditional conceptions

 

of military presence to include not only the 'physical merits' of air, land, and sea forces,

 

but also the 'vitural' advantage obtained with space forces and information-based

 

capabilities."4

 

    How must America think of information power to organize for victory in joint

 

warfighting? This is a thorny issue. While most military discussions reflect consensus

 

that information warfare is important militarily, little agreement exists on precisely what

 

it constitutes. "[E]ach of the services has its own definition; none are exactly alike; and

 

all are similar...."5 A coherent information warfighting strategy is thus unlikely to

 

emerge.  "US leaders need a roadmap--an azimuth enabling all concerned to march

 

toward a common objective."6 At the national level, the President of the United States is

 

considering a Presidential Decision Directive.7 But more is needed. Since the

 

Goldwater-Nichols Department of Defense Reorganization Act of 1986, combatant

 

command, or warfighting authority, was assigned to the unified commands; military

 

services organize, train, and equip the forces. The Joint Staff's Unified Action Armed

 

Forces (UNAAF), JCS Pub-02, establishes these principles for the armed forces.

 

Therefore, the US needs a theater-level commander to plan and execute joint information

 

warfighting.

 

    This paper explores aspects of information power in order to foster a more precise

 

understanding of its relation to modern, joint warfare. The paper proposes that functional

 

responsibility for existing tools of information power--command, control,

 

communications, computers, and intelligence (C4I)--be assigned to a single combatant

 

commander so this power can truly revolutionize the US armed forces. Section I,

 

Defining Information Warfare, begins to make this case. It defines information warfare

 

by presenting the best definitions offered by Department of Defense (DoD) organizations

 

at the unclassified level, and introduces the reader to new threats and enemies spawned

 

by information power.

 

    Information power is transforming modern societies. Why is this important to the

 

US Military? Section II, The Electronic Umbrella, describes the effects of information

 

power on the civil sector which are, in turn, migrating to the military. It explores the

 

concept of a Revolution in Military Affairs (RMA), and seeks perspective for changes

 

the US military is now undergoing.

 

    The Global Information Infrastructure (GII), the systems of commercial grids and

 

telecommunications sub-infrastructures that comprise the information superhighway,

 

gives life to the RMA. Section III, Making the Most of Information Power, characterizes

 

the GII and opportunities it presents for US warfighting. Equally important, this section

 

explains why information warfare is larger than the DoD, more than just a military issue.

 

    Information power poses unique, organizational challenges for the US military.

 

Section IV, Organizing for Success in Information Warfare, transitions the reader from

 

understanding information power to addressing how the US must organize at the theater

 

level to succeed in joint information warfighting. To add perspective, this section

 

contrasts information and nuclear power, and draws lessons from the US military's past.

 

It also raises concerns about the fitness of our current military organization to deal with

 

threats posed by hostile use of information power.

 

    Section V argues that the US armed forces are at the dawn of opportunity for

 

information power. Revolutionizing military affairs through information power is the

 

sine qua non to global military leadership. Before it can revolutionize, the US armed

 

forces must modify its military organization, as well as its operational and doctrinal

 

approaches. This section concludes with a parable underscoring the challenge of

 

changing one's perspective in order to consider new constructs. Only in this way will

 

the US armed forces be able to understand information power and organize for victory in

 

joint warfighting.

 

                                  Background

 

    Information warfare has been a hotly debated topic since the Persian Gulf War.

 

Leaders from the highest levels of our government and military, private industry, and

 

academia have called for the President of the United States to articulate a national policy

 

on information warfare. Yet four years after the war, when many glimpsed the potential

 

of information warfare for the first time, its relevance to how America fights or her role

 

as an international leader remains unclear. As a result, the concept of information

 

warfare is hazy, and even leadership of the US military services offer divergent views.

 

    Information warfare--applying information-age technologies militarily--is generally

 

accepted to mean the competition between friendly and hostile information-based

 

systems.8 The information revolution is transforming warfare as it has nearly every

 

aspect of modern society. Secretary of Defense William Perry calls it "the ability to

 

acquire and communicate huge volumes of information in real time, the computing

 

power to analyze this information quickly, and the control systems to pass this analysis to

 

multiple users simultaneously--these are the technological breakthroughs that are

 

changing the face of war and how we prepare for war."9 Yet little consensus exists on the

 

significance of these breakthroughs on warfighting. Those who would diminish their

 

value argue the US military has long engaged in information warfare activities, though

 

they were known by different names. For example, Allied planners in World War II

 

relied on deception to adversely affect Hitler's information processes in an action that

 

also provided protection for Operational OVERLORD's landing. But the US must be

 

careful not to underestimate information power's significance. Information-age

 

technologies hold the promise of revolutionizing our weaponry and the very character of

 

war itself--but only if military organizations retool to assimilate information power.

 

Viewed from this perspective, information warfare is not just a new name for the

 

traditional military activities it encompasses; it is the recognition of an Information Age,

 

a new era for both American society and its military, the impact of which can now only

 

remotely be perceived and understood. This is why the debate on information warfare

 

has raged without bringing critical issues into focus.

 

 

The Gutenberg Analogy

 

As we explore the information revolution and its significance to modern warfare, it is

 

helpful to consider other breakthroughs that have profoundly influenced whole societies.

 

By leveraging the mechanical power of a simple wine press, Johannes Gutenberg

 

launched the first information revolution. His mechanized printing press spread the

 

power of the written word--previously the domain of the privileged--to ordinary people.

 

The result: mass education and literacy, first for Europe and soon the New World.

 

Today Gutenberg's influence reaches nearly every corner of modern life. Electronic

 

publishing takes Gutenberg's revolution to the next level, with paperless operation as the

 

ultimate goal. Some doubt a paperless world is likely. Yet explosive popularity of the

 

Internet, computer on-line services, and even the computerized grocery check-out signal

 

the contrary. In a parallel sense, the Information Age offers America's military new

 

opportunities to leverage the mechanics of warfare to revolutionary proportions.

 

    The advent of the airplane is another breakthrough that ultimately redefined modern

 

warfare. When closely scrutinized, aerospace power and information power share key

 

characteristics. Indeed, information warfare appears to be aerospace power raised to an

 

exponential level. Offensively, information power, like air power, can strike at targets

 

across the globe. Travelling through the medium called cyberspace, information power is

 

unencumbered by events occurring on the earth's surface. As aerospace power is

 

projected rapidly and flexibly, information power is projected through cyberspace's

 

computers and telecommunications systems, connecting the world's communities through

 

the GII. Immediate and relatively boundless, these are the key characteristics of

 

information power.

 

    If the armed forces successfully revolutionize information power for military ends,

 

perhaps information power alone can create the kind of effect we have traditionally

 

produced with fire and steel on target. In this way information warfare promises to

 

leapfrog mechanical processes through system-to-system interface. Warfare as we know

 

it is raised to the next level. Applying the Gutenberg analogy, aerospace power can be

 

thought of as the mechanical level of information power, just as the printing press was

 

the springboard to electronic publishing.

 

    If aerospace and information power share characteristics, then aerospace doctrine,

 

refined through a century of aerospace warfare, may likewise apply to information

 

power. Aerospace axioms gleaned from early battles of World War I, retried in World

 

War II, and validated over the jungles of Vietnam and the sands of the Persian Gulf may

 

offer insight into how the US should organize its armed forces to integrate new ideas

 

about information power into military operations.

 

                                  Section I:

 

                         Defining Information Warfare

 

    Before US armed forces leadership can understand information power and organize

 

for victory in information warfare, they must be able to define it. Yet, defining

 

information warfare has not been an easy task for policy makers, perhaps because it

 

mixes elements as old as warfare itself, like deception and psychological operations, with

 

new technologies and applications. Or perhaps the very nature of information warfare is

 

partly to blame. Since information warfare requires intensive peacetime intelligence

 

operations, the US government is understandably circumspect in deciding exactly how

 

federal agencies will weigh intelligence needs with the citizens' right to privacy. As a

 

result, the term means a variety of things to different organizations.

 

      The military services have each forged their own vision of information warfare and

 

are aggressively seeking programmatic support within the DoD. At the same time, the

 

military services and federal agencies, especially within the DoD, have embraced

 

information warfare, and academic and scientific circles have eagerly contributed to the

 

discussion. Even so, forging a joint definition or vision of information warfare has

 

proved complex. Adding to the confusion, "other terms, such as command and control

 

warfare, are used in related contexts, but they are also interpreted in varying ways."10

 

    Meanwhile, the pace of information technology continues to outstrip information

 

warfare policy making. Here are some indications. The Joint Staff's Department of

 

Defense Dictionary of Military and Associated Terms,11 revised in March 1994, does not

 

contain an unclassified definition for information warfare. In the CJCS' Joint Doctrine

 

for Command and Control Warfare (C2W) Operations, Part II--Terms and Definitions, a

 

definition for information warfare is deferred: "information warfare: To be provided by

 

Joint Staff."12 The Office of the Secretary of Defense (OSD), which has been steadfast in

 

its efforts to build consensus on information warfare among the services,13 is obviously

 

confronted by similar obstacles. More than two years since OSD's Assistant Secretary of

 

Defense for Command, Control, Communications, and Intelligence (ASD/C3I) issued a

 

classified definition of information warfare,14 only a "working unclassified definition" is

 

offered: "Actions taken to achieve information superiority in support of national military

 

strategy by affecting adversary information and information systems while leveraging

 

and protecting our information and information systems."

 

    Will all of this discussion ever meld into an information warfighting strategy for the

 

combatant commander? Without consensus on a single definition, it seems unlikely that

 

the military services will be able to fulfill ASD/C3I's intent. Even less certain is the

 

prospect for information warfighting success at the US combatant command level. Yet

 

while the US defense community may be hamstrung, advances in civilian information

 

technology continue to migrate to potential adversaries, yielding quantum changes in

 

both the character and focus of warfare. The Persian Gulf War has heightened

 

expectations of the US military and the public for military operations that are

 

accomplished rapidly, surgically, and with minimum casualties. For success in

 

information warfighting, OSD envisions "the exploitation and disruption of hostile

 

information systems, while protecting the integrity of one's own information systems and

 

architecture. The objective of information warfare is to gain an information advantage--

 

measured in time and space--to enable our forces to quickly overwhelm the enemy

 

force."15 Like ours, the enemy's observe-orient-decide-act (OODA) loops are bounded by

 

factors of time and space (Figure 1 16). "When the US effort can increase the friction, it

 

extends the time the adversary needs to observe, orient, decide, and act. If this effort

 

simultaneously reduces friction and time for the United States, the military effectively

 

will outperform an adversary in combat and will prevail in an engagement, crisis, or

 

conflict."17 Failure of the US defense community to organize for joint information

 

warfighting may place the US military in the same vulnerable position that OSD

 

envisions the enemy will occupy.

 

Click here to view image

 

A New Paradox

 

    This is not about war by conventional means. This is about war by other means,

 

    and those other means do not wear a uniform, salute, pull a trigger, or even

 

    appear for muster.... Everything we ever learned about warfare, and especially

 

    about the difference between war and peace, between allies and enemies, between

 

    combat arms and supporting services, between CONUS and OCONUS, is out the

 

    window.18

 

                                                             Robert D. Steele

                                              President, Open Source Solutions

 

 

    Historian and Congressman Newt Gingrich agrees with Steele. In a presentation to

 

senior Pentagon leadership in Summer 1994, Gingrich offered that in the 200-plus years

 

since the American Revolution, such incredible changes in military operations have

 

occurred that Washington and Schwarzkopf would find little common ground.19 If Steele

 

and Gingrich are correct, the US military may require an equally dramatic shift in

 

emphasis.

 

    Combat in the Information Age mandates that the US warfighting commander

 

contemplate issues never before associated with warfare; information power poses so

 

many new opportunities and threats for the US military commander. Unfortunately the

 

warfighting organization built for the Cold War and adapted for success in Southwest

 

Asia is not equipped for these new threats. Information power presents the US military

 

with a new paradox that must be considered if we are to organize for new, relevant

 

strategies: As the US armed forces become more reliant upon information-based systems,

 

its information infrastructure becomes more vulnerable than ever before.

 

    Information-age technologies shrink the dimensions of time and space, conversely

 

expanding the US commander's battlespace to global dimensions. Offensively, this

 

provides opportunities to strike global targets as if they were nearby. Defensively, it

 

adds risk. The enemy is no longer confined to a battlespace for which control is

 

completely within the purview of the warfighting commander. That many warriors do

 

not readily accept this notion does not diminish its significance. The warfighter, the

 

troops with GPS receivers, even our smart weapons share a reliance on a high volume of

 

precise information. US forces in the Persian Gulf minimized the fog of war for

 

themselves while maximizing it for the Iraqis. Should the US fail to grasp the wartime

 

implications of the Information Age, it may find itself in the same position as the Iraqis

 

in the next conflict.

 

    Frederick Cohen warns: "When the fog of war hits the information infrastructure, the

 

warfighter better be able to restore clarity in short order." What does this mean for the

 

US commander? Absent a full range of concrete data, telecommunications experts

 

provide estimates of the threat new enemies portend. Consider that 95 percent of US

 

military communications transit commercial systems,20 and that teenagers regularly take

 

control of these systems.21 Simple viruses have taken down computer networks for

 

extended periods, and most military systems have the same vulnerabilities.22 US

 

commanders must address the information warfare capability of the opposing force and

 

also of "'information assassins' [who] are bringing a new level of sophistication to

 

deliberate attacks. The FBI reports 57 countries are targeting Silicone Valley alone."23

 

"The threat is not the rag-tag teenage hacker, but rather well-organized and financed

 

groups with clear objectives detrimental to national security...."24

 

    Cohen provides alarming estimates of US vulnerability to foreign information

 

warfare attacks. He estimates that ten people with $100,000 to target the US Defense

 

Information Infrastructure could disrupt it for a period of weeks. Twice the number of

 

information warriors and $1,000,000 could bring the US to its knees for two to four

 

weeks. With 100 warriors and $30,000,000, Cohen estimates the disruption to the total

 

US information infrastructure would require a recovery period of several years. Since

 

anyone armed with a modem is a potential combatant, the joint warfighting commander

 

loses control of weapons in a battlespace with a new cyber-dimension.

 

    The Information Age brandishes a two-edge sword. The US armed forces must

 

define the threat, then organize for the opportunity.

 

 

 

Thinking About New Threats and Enemies

 

A popular cartoon hangs in several classrooms at the US Marine Corps University. A

 

sketch shows the giant Goliath laying flat on the ground, while the much smaller David

 

looks on, slingshot in hand. Inscribed are the words "He who thinks...wins."

 

    The US must muster all with a stake in information power, military and non-

 

military, to harness the collective thought capability if it hopes to win the information

 

war. So many factors critical to victory in information warfare are beyond the

 

commander's traditional forces and capabilities. When faced with new challenges,

 

organizations, like the people that comprise them, are often tempted to turn to

 

comfortable solutions. The services continue to think in terms of a battlespace defined

 

by dimensions of time, space, and height. Yet, as Steele asserts for information warfare,

 

"it is counter-productive to limit our discussion to arcane issues of 'space and electronic

 

warfare' or 'offensive command and control.' The enemy is not just inside the gate, there

 

is no gate, there are no perimeters, nothing is sacrosanct."25

 

    The US armed forces traditionally operate best when the threat is defined and

 

structured. Threat drives acquisition, training, force build, nearly everything. Yet a

 

vision of a defined threat--or even clear sight of the enemy--is growing increasingly

 

elusive. With information power, the threat is less defined, less organized, and

 

consequently, far more dangerous. The critical question then is whether the US armed

 

forces are organizing, training, and equipping to support new, amorphic enemies. And

 

while the Information Age has spawned new threats and enemies, it has not eradicated

 

the old threats; North Korea is perhaps the best example. Battle in the Information Age

 

will potentially pit the joint warfighting commander against formal and informal enemies

 

whose activities may or may not be synchronized or even coordinated. Steele succinctly

 

describes four warrior classes that have emerged:

 

    The high-tech brute, with expensive armor and aircraft which require huge

 

    logistic trains to support, is the traditional enemy. while this enemy will be with

 

    us for decades to come, this is also the least likely opponent. The other three

 

    warrior classes require differing levels of investment which we have not

 

    undertaken: the low-tech brute, meaning the transitional criminal, the narco-

 

    terrorist, these represent the very difficult low slow singleton' problem for

 

    intelligence, and are especially difficult for the military to address because of

 

    their tight kinship and ethnic foundations and their unconventional aspects. The

 

    low-tech seer, represented by major cultural and religious movements, and

 

    including for convenience's sake massive groups of refugees spawned by internal

 

    disorder as well as environmental disaster, is another challenge which the

 

    military will have to deal with and for which it is not ready.... But it is the last

 

    class, the high-tech seer that is of concern to us here today; I count in this group

 

    both those who conduct information-based economic warfare and those who use

 

    information warfare for personal, financial, or political motives. The balance of

 

    power has shifted from organized forces supported by taxation and

 

    conscription, to autonomous electronic agents dawned at no cost in

 

    cyberspace, and targeted by single individuals against complex systems which

 

    are at this time impossible to defend.[Emphasis added.]26

 

    Like Steele, a recent report by DoD's Undersecretary for Acquisition and

 

Technology forecasts dramatic changes for the US armed forces. "The world is fraught

 

with destabilizing factors that make the threat to US interests ambiguous and hard to

 

define."27 The DoD foresees operations other than war (OOTW), including combat and

 

non-combat, as the predominant type of military operations in the future. Also like

 

Steele, the report expresses concern for outlaw groups in possession of weapons of mass

 

destruction (WMD) and associated technology that "pose the most complex and serious

 

challenges that the US is likely to face short of war." Figure 2 illustrates the "continuum

 

of potential military operations between peace and regional contingencies."28

 

    Before proceeding, it is important to define the boundaries of this discussion. Since

 

information technologies have affected nearly every aspect of how America lives and

 

fights, it is reasonable to assume that every major governmental and industrial player

 

involved in these aspects may also have a stake in information warfare. Clearly,

 

information warfare is bigger than just the armed forces. With information as the

 

common denominator, the distinction between the civil and military communities in

 

information warfare continues to blur. America's society and her armed forces now rely

 

on the same base of information technologies. Warfare, traditionally the domain of

 

combatants, may be a misnomer for the Information Age. Therefore, while accounting

 

for the important non-defense agencies involved in information warfare, this discussion

 

is limited to the impact of information power on the US armed forces. And for the US

 

armed forces, information warfare is command and control warfare (C2W).

 

 

Military Application

 

   Here's how to wage a revolution in the Information Age: two weeks ago Mexican

 

   government troops lunged into the rain forest of Chiapas state in renewed pursuit

 

   of the Zapatista rebels.... [T]he guerrillas melted into the jungle, leaving behind

 

   a few trucks but taking with them their most valuable equipment--fax machines

 

   and laptop computers. In retreat, the Zapatistas faxed out a communique

 

   claiming that the army was 'killing children, beating and raping women...and

 

   bombing us.' ...[T]he government...stopped the offensive and allowed reporters

 

   into the area. They found no signs of atrocities or bombing. But the government

 

   Click here to view image

 

   attack had been thwarted, and the rebels were free to fight on, with words as their

 

   best weapons.29

 

 

    A picture of a Samburu warrior from a remote, desolate region of northern Kenya

 

was featured in a recent Newsweek30 article on the power of information. The warrior,

 

dressed in traditional garb, held a spear in one hand and a cellular phone in the other.

 

Around the globe, not just in the United States and the West, information power is

 

revolutionizing military operations. In the US, DoD is grappling with the difficult issues

 

of how it will leverage information power. Some consensus has been achieved.

 

    Recognizing information warfare is bigger than the military, the Joint Staff has

 

redefined C2W as the military application of information warfare. Effective C2W,

 

according to the Joint Staff; combines the denial and influence of information, deception,

 

disruption, and destruction to counter adversary C2 while simultaneously protecting

 

friendly C2.31 From this definition, the military's charter for information warfare

 

includes the two broad categories of offense and defense. A third category addresses the

 

integration of information-age technologies with weapons systems, essentially making

 

them smart. Butler et al...32 refer to these as information-attack, information-protect, and

 

information-enhance.

 

    With information-attack, the warfighter "achieve[s] the same precision kill as he

 

presently accomplishes with precision guided munitions;"33 however, the target is the

 

information system controlling an adversary's weapons and platforms. Many think of

 

information-attack as non-lethal, or less than lethal, but this is only one dimension.

 

Attack encompasses military deception, psychological operations, electronic warfare, and

 

physical destruction.34

 

    Information-protect is designed to defend friendly forces and information sources. It

 

includes operations security, communications security, computer security, and physical

 

security.35 Since DoD continues to field information systems vulnerable to outside

 

attack,36 protect may represent the US' Achilles' heel, a tantalizing soft target for virtually

 

every class of warrior Steele describes.

 

    Information-enhance seeks to provide the commander an accurate, comprehensive

 

picture of the battlespace. "Information-[e]nhance attempts to clarify a friendly decision

 

maker's understanding of the entire environment of the battlefield."37 The goal is to get

 

the right information, to the right individual, in the right format, at the right time.

 

    The US Army, Navy, and Air Force have each established information warfare

 

centers to pursue these categories and their respective visions of how information power

 

will revolutionize military operations. The services' intelligence organizations were

 

among the first in DoD to become enamored with information warfare after the Gulf War

 

and remain deeply committed. In fact, just as the USAF established its information

 

warfare center in the new Air Intelligence Agency (formerly the Air Force Intelligence

 

Command), each of the services have closely associated their new centers with their

 

intelligence organizations. The Army's Land Warfare Center was activated at the

 

Intelligence and Security Command while the Navy's was with the Naval Security

 

Group. Each of these service intelligence organizations are Service Cryptologic

 

Elements, linked to the National Security Agency which, by the National Security Act of

 

1947, was named the executive agent for US cryptologic activities. From these elements

 

must emerge military applications of information power that will give the decisive edge

 

to the US combatant commander in the Information Age.

 

 

Building On Experience

 

       The successes of the air campaign in the gulf rested almost as much on

 

       organizational innovations as on technology. To speak of a revolution in

 

       warfare as a purely technological affair is to miss half the significance of the

 

       war.... The centralized control of airpower made for a much more coherent

 

       campaign than would otherwise have occurred.

 

                                               Eliot Cohen in Foreign Affairs

 

 

    Like Cohen, air power advocates have argued since flight was adapted for military

 

use that centralized control is the most effective way to employ air power.38 This, along

 

with other tested air power doctrine, may be relevant to information power because it

 

may provide insight to the best way for the US armed forces to organize for success in

 

information warfighting. Why? Because as introduced earlier in this paper, air and

 

information power share striking similarities. Also because advances in information

 

technology are blurring the distinction between air, space, and cyberspace. Perhaps the

 

emphasis on joint command of air assets39 is equally compelling when power in the

 

fourth dimension, information, is considered. To demonstrate this, air and information

 

power are examined on the basis of(1) characteristics (2) capabilities, and (3) targetting.

 

    (1) Air and information power share characteristics that do not exist with land or sea

 

power. As the USAF Joint Forces Air Component Commander (JFACC) Primer states,

 

"The air covers everything and is one substance in which movement takes place

 

irrespective of what is under the flying machine, whether land or water."40 Air power,

 

like information power, can be applied rapidly, in a manner far less constrained by time

 

and space than land and sea operations. Information power traverses cyberspace and can

 

potentially attack global targets on a near instantaneous basis, in a manner even less

 

constrained than air by time and space. Until information power, elevation was the

 

unique quality distinguishing aerospace forces from surface forces. USAF Aerospace

 

Doctrine identifies the vantage point of air as its distinguishing factor. "From their

 

elevated positions, aerospace platforms have a broader perspective and, with freedom

 

from surface constraints, they can travel faster, go farther, and move through a broader

 

variety of motions than surface forces."41 But when one considers information power,

 

the nature of aerospace power is no longer unique. Information power raises the

 

characteristics of air power--speed, range, and flexibility--to exponentially higher levels.

 

To be sure, information power stretches the limits of the vertical third dimension.

 

Information power holds the potential for warfighting capabilities that diminish, perhaps

 

eliminate, traditional battlespace boundaries of time, space, and height.

 

    (2) Air and information power also share capabilities. Like air power, information

 

power can "quickly maneuver over and past the front line forces to strike critical targets

 

anywhere in the enemy rear area [and] can often contribute even more to the success of

 

all the components and to theater warfare."42 Neither air nor information power are

 

dependent upon geography. Not so for surface forces, which must divide the overall

 

campaign or operation into geographic areas of control. Air and information power can

 

be applied by "mission, campaign phase, and result."43

 

    (3) Similarities in character and capabilities suggest air power targeting is applicable

 

for information power. Like air power, information power will be necessary to interdict

 

lines of communication (LOC), the definition of which has undergone draconian

 

evolution since the original concept. Consider that "the concept for lines of

 

communication was developed in a time when communications and information traveled

 

along the same land or sea routes as supplies, trade, and military forces."44 Information,

 

however, is no longer bound to these routes. Information LOCs are served by modern

 

telecommunications systems, whose computers automatically route information services

 

over terrestrial and spaceborne links. The optimal LOC for information may be longer in

 

distance, but shorter in time and expense. As the USAF JFACC Primer reminds, "the

 

root to the center(s) of gravity may not be a straight line."45 "Instead of only opposing

 

ground, sea, and air forces, we must now consider the opportunity to interdict

 

information systems."46

 

 

                                  Section II:

 

                            The Electronic Umbrella

 

 

       "...the world is united under this kind of overarching umbrella of almost

 

       instantaneous electronic communication: satellites and satellite dishes, CNN

 

       and all this stuff. But what's happening to the map--everything is Balkanizing

 

       itself as quickly as possible.... Everything is breaking down into smaller and

 

       smaller cohesive units under the electronic umbrella...."47

 

 

                                                          Laurence B. Chollet

 

 

    The United States and the world's modern nations are united and covered by

 

Chollet's electronic umbrella. Construction of the umbrella began in the l970s and has

 

continued unabated, spurring technological advances so numerous and rapid they begin

 

to appear routine. In the early l990s, the Persian Gulf War was the proving ground for

 

computer-based, smart weapons that delivered stunning kill rates and surgical strikes.

 

The Gulf War was immediately recognized as the watershed event for the Information

 

Age--a demonstration of information-age technology weaponized through reliance on

 

computer-based information systems that drive strategy, planning, and operations. After

 

the war, new vocabulary emerged. Information warfare and information dominance

 

sought to explain the importance of information in modern combat. Pentagon planners

 

were left enticed by information power and excited by its possibilities. Section I

 

addressed how US policy makers must define information warfare before they can

 

organize to use it. Section II takes these definitions and explores them within the context

 

of the information revolution, provides specific examples of how this revolution has

 

migrated from civilian to military sectors, and how, once recognized, the opportunities

 

offered by this revolution can be integrated and leveraged for successful military

 

application.

 

 

 

The New Migration

 

Information-age technologies have changed the way Americans live. Use of personal

 

computers, facsimile machines, and even home banking and shopping services are

 

widespread. Figure 3 48 illustrates the skyrocketing growth of computers on Internet, the

 

backbone of the information superhighway. Nearly 30 million households use personal

 

computers today, most of them "three generations more sophisticated than the computer

 

that supported putting a man on the moon."49 Available telecommunications bandwidth

 

doubles every 18 to 24 months, and computer processing power doubles every 24

 

months.50 Why are advances in civilian technology relevant to military operations?

 

Simply because many of the same information technologies that make these modern

 

conveniences possible in the civilian sector are changing how America goes to war.

 

    Just a few decades ago, mention of civilian information technologies in a military

 

warfare paper would have seemed irrelevant, if not ludicrous. Not so now, for several

 

reasons. First, American society has traditionally benefited from spin-off technologies

 

which migrated from military research and development activities. Now however, the

 

American military is the benefactor, able to apply technologies migrating from the civil

 

sector to military operations. In the Information Age technological advances are

 

outpacing our ability to assimilate them. This is especially true in our defense

 

organization, which requires time-consuming coordination for joint warfighting

 

initiatives. Second, "until recently technological innovation was largely limited to

 

combat and logistics; that is, to moving troops to the battlefield and sustaining them."51

 

Now however, modern militaries rely upon information technology to employ nearly

 

every weapons systems in their arsenal--the same kinds of information technology upon

 

Click here to view image

 

which civilian societies also rely. As a result, civilian and military sectors often use like

 

technologies to manage and perform quite different activities.

 

    Applications for information technology in combat portend such change for the

 

American way of war that the outcome may be impossible to predict at this time. In

 

ancient Rome, the Emperor connected far-flung provinces through an elaborate wheel of

 

roads, all spokes joined at the hub of Rome. Across the globe today, the information

 

superhighway unites the world under Chollet's electronic umbrella in a way analogous to

 

Rome's system of roads. In both examples the effects of time, distance, and even

 

geography are diminished. The Roman Empire prospered as a result of the roads, but

 

were ultimately defeated because the same roads lead back to Rome, offering avenues of

 

attack to hostile armies. The view from the threshold of the Information Age is an

 

exciting one, but as we organize to apply information technologies, we must realize that a

 

world made smaller can bring our enemies closer to home.

 

 

Technological Revolution in the US Military

 

    The form of any war--and it is the form which is of primary interest to men and

 

   war--depends upon the technical means of war available.52

 

 

                                                          Guilio Douhet, 1921

 

 

    What we set in motion is an entirely new era in warfare.... What is changing is

 

    the very nature of modern battle.53

                                                   Gen John M. Shalikashvili

                                                Chairman, Joint Chiefs of Staff

 

    Is the US military ready to leverage information power? In The Washington Post,

 

Bradley Graham reported that "With growing emphasis, the [Defense] Department's top

 

civilian and military officials are championing the notion that the United States is in one

 

of those rare historical periods when revolutions happen in how wars are fought and how

 

branches of the military are organized."54 The impact of information-age technology on

 

military operations has been alternately referred to as the RMA or the Military

 

Technological Revolution. The character of this revolution is evident in US military

 

weaponry and doctrine. For example, the ability of combat forces to maneuver was once

 

constrained by the limits of the human eye. Now, technological electronic eyes enable

 

US commanders to plan and coordinate over-the-horizon operations. In the following

 

excerpt, Alan Campen of the Armed Forces Communications and Electronics

 

Association illustrates how relatively inexpensive information technology provided

 

leverage to US combat forces in the Gulf War:

 

       Using a hand-held [Global Positioning System] receiver, a ground soldier

 

       could locate his position. Using a laser range finder he was able to obtain

 

       the range and bearing of the target for relay to an air control officer to

 

       provide precise target information for ground support aircraft. These, in

 

       turn, using their own GPS equipment, were able to offset their bombing

 

       instruments and attack with devastating surprise and lethal precision. Thus

 

       the effectiveness and safety of an $18 million aircraft could be enormously

 

       enhanced with a $3,000 hand-held instrument.55

 

 

 

    Many US officials and military strategists, including Secretary of Defense William

 

Perry, cite the Gulf War as proof that a revolution has already begun.56 Others provide

 

compelling arguments to the contrary. Andrew Krepinevich points out that "the Gulf

 

War [provided] a glimpse of the revolutionary potential of emerging technologies and

 

military systems",57 but argues the revolution has not yet occurred. As proof, he notes

 

the war was essentially fought with forces trained and organized to fight the Soviets in

 

Europe. "Neither dramatic doctrinal changes nor major new force structures or

 

organizational innovations were demonstrated."58 Historical perspectives underscore

 

Krepinevich's views.

 

 

Integrating New Ideas

 

The WWI Battle of Cambrai on the western front, 1917, offers similarities to both WWII

 

blitzkrieg and the allies' unexpectedly rapid victory in the Gulf War. Using wireless

 

communications to coordinate air and land maneuver elements, the British "overcame the

 

quagmire of trench warfare and broke through the German lines on a 12-kilometer front

 

within hours."59 The idea to integrate the enabling technologies of aircraft, tanks, and

 

radio resulted in a mini-RMA of sorts, and undoubtedly influenced German development

 

of strategies and tactics after WWI, which later became blitzkrieg in WWII. Regrettably,

 

the British Army "squandered" the advantage offered by their "cutting-edge

 

technologies," failing to exploit them with equally brilliant innovative concepts necessary

 

to create their own blitzkrieg capability."60

 

    Though the term RMA was only recently coined, German blitzkrieg provides a

 

striking example of what it embodies. Blitzkrieg would certainly not have been possible

 

without its enabling technologies--the internal combustion engines, aircraft, tanks, and

 

radios. Each of these technologies were available in WWI, and all major military powers

 

had access to them. "...[O]nly the Germans used them to initiate new operational

 

concepts and innovate organizationally."61 Therefore, the crucial ingredient in blitzkrieg

 

was the idea to integrate them, to combine and apply these technologies to coordinate

 

close air support and maneuver units.

 

    Ideas were similarly at the root of the most dramatic military-technological

 

applications in the Gulf War. By interoperating US Space Command's (USSPACECOM)

 

spaceborne information sensors with the US Army's PATRIOT system, US forces

 

minimized the effects, physical and psychological, of the Iraqi SCUD missile system.

 

The Global Positioning System (GPS) enhanced operations on land, sea, and in the air.

 

But clearly, US and coalition strategy against Iraq was not built on a conscious

 

recognition of how information power could be applied. In fact, US political and

 

military leadership were surprised by the lopsidedness and short duration of the war.

 

"Their surprise was due, in part, to the fact that they had greatly underestimated the

 

military potential of these new tools of war"62 made possible with information power.

 

Likewise, the equally surprising clumsiness and missteps of Iraqi forces was due less to

 

their lack of military power and more to their inability to access or even think in terms of

 

information power.

 

    This hindsight perspective of blitzkrieg is useful in determining the current state of

 

the RMA. The Information Age has provided the US military with enabling technologies

 

of GPS, stealth, and Joint Surveillance Target Attack Radar System (JSTARS), just as the

 

Germans developing blitzkheg doctrine relied on crucial enabling technologies. Yet the

 

ideas to integrate these technologies came later or not at all, as did our ability to detect

 

and kill Iraq's mobile SCUD missile systems. An information revolution has indeed

 

begun. Like the British in WWI, the US has developed a dazzling array of technological

 

wonders to be shared by the civil and military sectors. But also like the British, the US

 

has not developed the new organization needed to truly revolutionize information power-

 

-really fuel the RMA. Many Pentagon staff officers contend that information warfare is

 

merely a new name for military activities performed for quite some time. Perhaps some

 

on the German General Staff felt the same way about the enabling technologies of

 

blitzkrieg.

 

 

Obstacles to Integration

 

   The one thing harder than getting a new idea into the military is to get an old

         

   one out.63

                                                   Basil Henry Liddell Hart

 

 

    If ideas or the way we think is critical to revolutionizing the military, then the US

 

armed forces may be facing a formidable challenge. Given Liddell Hart's observation

 

about the tendency for status quo in the military, this factor can only add to a number of

 

others that work against widespread acceptance of information warfare at a most crucial

 

time. First, military service chiefs are already trying to adjust to smaller budgets, fewer

 

personnel, and an increased operations tempo around the globe. Operations in Bosnia-

 

Herzogovina, Iraq, and Haiti have highlighted shortcomings in force structure and

 

combat service support. Recall the national debate on whether the US could respond to

 

Iraq's redeployment to the Kuwaiti border in late 1994 while simultaneously engaged in

 

Haiti. As Graham of The Washington Post points out, "While the service chiefs have

 

expressed interest in studying the implications of the new technologies, they have

 

sounded cautious about the pace and prospects for change and often argue for not losing

 

sight of more immediate demands, such as coping with decidedly low-tech players in

 

Haiti and Bosnia."64

 

    A second factor operating against harnessing the RMA is an attitude questioning the

 

prudence of tinkering with a military that is currently considered second-to-none. Gen

 

Richard D. Hearney, Assistant Commandant of the Marine Corps, expresses concern

 

about the Pentagon's emphasis on high-technology warfare. "Sometimes we get so

 

wrapped up in this RMA technology discussion that we forget the basics like leadership

 

development."65 Many at the senior level share this opinion, remaining skeptical that

 

new technologies offer a silver bullet for likely threat scenarios facing US armed forces.

 

In combat, warriors' lives depend on the capability of their weapons systems. So it is not

 

surprising that most warriors probably have difficulty seeing how information power, in

 

its embryonic stage, can contribute to combat success. A conversation with a US Marine

 

Corps major, an infantry officer and combat veteran, illustrates:

 

    There's not an extra pound on a ground infantryman's load to spare for this new

 

    gear. People who talk about hanging hi-tech things on an infantryman's helmet

 

    have just never operated as an infantryman on the ground. A sustainment and

 

    combat load already constitute minimum requirements, and you can't take away

 

    from that. In fact, we really need a reduction in load weight. Technology hasn't

 

    lightened our load. When I see a picture of the infantryman of the Future...great

 

    concept but its got a long way to go. A lights equipped combat soldier...face in

 

    the mud and gun barrel smoking...that's what makes a difference for me. My

 

    marines must be concerned with the sector in front of me. I don't see how

 

    information power as it is today will help me.66

 

    Though compelling, these arguments cannot slow the information revolution

 

transforming societies and their militaries. Since the United States is arguably the most

 

reliant on information technology for all aspects our society, we have the most to lose if

 

we fail to harness the RMA. Electing to ignore the RMA is dangerous on two counts.

 

First, other nations are pursuing their own versions of the RMA. The US armed forces,

 

currently second-to-none, would have to step back in the line. Secondly, the nature of

 

information-age technology places substantial power in the hands of individuals with the

 

right skills and access to threaten our national security by interfering with both defense

 

and non-defense information-based systems.

 

    Krepinevich counts as many as ten military revolutions since the fourteenth century.

 

Each of these holds historical lessons for nations who elect to ignore the impact of

 

technology on warfare. Consider how many national powers clung to the cavalry long

 

after it was evident that new, rapid-fire weapons had made the horse a terrifyingly

 

susceptible target.67 Yet despite the impact of technology, most of what Sun Tzu and Carl

 

von Clausewitz wrote is still valid today. As Brig Gen Robert Stewart emphasizes, "It is

 

the task of the commander to apply the principles in the face of technologies so advanced

 

that Sun Tzu would have considered them magic."68 The dictum is clear. Information-

 

age technologies will allow us to revolutionize warfare, but one if we are able to

 

revolutionize our thinking. The nature of information warfare, overlapping the military

 

and civilian spheres, at once provides the US with potential for powerful new weapons

 

and significant vulnerabilities (Figure 4).69

 

Click here to view image

 

 

                                Section III:

 

                     Making the Most of Information Power

 

 

    We should have an Information Warfare Summit.... Question: Who is doing what

 

    in Info War?

                                                            Merill A. McPeak

                                                          USAF Chief of Staff

                                                               18 April 1994

 

 

    Many senior Pentagon officials voiced surprise when Gen McPeak, former chief of

 

staff, USAF, established the first Service Information Warfare Center in September

 

1993.70 His question, "Who is doing what in Info War?," was penned to Air Staff seniors

 

in April 1994 and resulted in a USAF Summit that outlined his service's information

 

warfare strategy. Posed nearly eight months after the USAF Information Warfare Center

 

was established, the general's seemingly vague question is symptomatic of the difficulties

 

in retooling a large, complex organization. His question echoes throughout DoD as the

 

debate on information power narrows to make the most of existing technologies for

 

information warfare.

 

 

 

The Mandate to Pursue Information Warfare

 

C2W is the military strategy that implements information warfare....

                                  DoD Directive 3600.1 (Cited in CJCS MOP 30)

 

 

 

 

   [Command and Control Warfare is] the integrated use of operations security

 

   (OPSEC), military deception, psychological operations (PSYOP), electronic

 

   warfare (EW) and physical destruction, mutually supported by intelligence, to deny

 

   information to, influence, degrade or destroy adversary C2 capabilities, while

 

   protecting friendly C2 capabilities against such actions....[apply] across the

 

   operational continuum and all levels of conflict. (See Figure 5)

 

                                                                     CJCSMOP 30

 

 

    Information warfare is arguably larger than DoD, more than a military issue.71 A

 

national review currently underway is preparing a Presidential Review Document for the

 

Clinton Administration, underscoring that nearly all participants in the information

 

warfare debate agree on this point.72 The lack of a national policy on information warfare

 

has not suppressed the Pentagon's appetite. In December 1992, the OSD directed

 

services to develop information warfare capabilities in a regulation entitled DoD

 

3600.1.73 Three months later, the Joint Staff's Memorandum of Policy No. 30 (MOP 30)

 

provided policy and guidance for integrating information warfare into military strategy,

 

planning, and operations.74 A new Joint Staff directive now being coordinated, JCS Pub

 

3-13 (Draft), provides guidelines to integrate C2W into joint operations and exercises.

 

To the military services, these documents were like a starter's gun signaling the

 

beginning of the information warfare race. Encouraged by the lopsided victory of US

 

and coalition forces, the services seek to capitalize on Gulf "lessons learned." It is

 

natural, even laudable, that the military services would so aggressively pursue combat

 

initiatives that had proven successful. So it should not be surprising that each service

 

views information warfare somewhat differently and has structured budgetary programs

 

that reflect their distinctive cultures.

 

    Unique service visions, lacking consensus of basic issues like joint terminology,

 

does not bode well for the combatant commander, the ultimate benefactor of information

 

warfare systems produced for military forces. As a term, information warfare is new: a

 

new focus and new adaptation of warfighting doctrines and technologies. As already

 

noted, the current DoD Dictionary of Military and Associated Terms, 1994, does not

 

Click here to view image

 

contain a definition of information warfare. The differences among the services "are

 

great enough to seriously impair development of policy strategy, tactics, and program

 

plans."75 Goldwater-Nichols Department of Defense Reorganization Act of 1986 gives

 

combatant command, defined as authority for warfighting, to the unified commands.

 

The services in turn organize, train, and equip the forces for combat. As further codified

 

by the UNAAF, JCS Pub. 0-2, the commanders-in-chief (CINCs) of the unified

 

commands will be the ultimate benefactors of the services information warfare activities.

 

At stake then is whether CINCs will be able to forge a coherent information warfare

 

strategy from the individual service visions. It is useful to categorize information

 

warfare by its major components in order to examine this aspect of military preparedness.

 

 

The Road Most Travelled

 

The GII is the information superhighway, the vast system supported by the world's

 

commercial grids and telecommunications infrastructure. It comprises the web of

 

electronic thoroughfares over which more than 95 percent of military communications

 

travel (Figure 6 76). Tens of thousands of computers are connected to other computers,

 

offering appealing opportunities and frightening vulnerabilities (Figure 7 77). GII is as

 

vital to US military operations as it is to nearly every aspect of modern life in America

 

including finance, mass media, communications, even power systems. The Internet,

 

which has grown in popularity since the Pentagon built it in 1969, is a major information

 

throughway. Interestingly, the Internet was designed not by high-technology visionaries,

 

but by Cold War-Warriors concerned about communications redundancy in a thermo-

 

nuclear environment. With the Internet as a foundation, the Clinton Administration is

 

building the national information infrastructure, the network of tomorrow.  As Business

 

Week reports, "phone lines, cable systems, and high-speed data networks...would link

 

CEOs and couch potatoes alike to one another."78 Now add the joint warfighting

 

commander to this cyber-chain. Enormous implications become apparent.

 

Click here to view image

 

    The crucial communications zone or reachback, the umbilical cord that nourishes

 

America's force projection capability, is recognized immediately as a lucrative target by

 

the information-age warriors described by Steele. What was once the rear area becomes

 

suddenly and globally exposed. As Steele describes, "The battlefield has flipped--the

 

traditional front line is now a sideshow, and the rear area knowledge terrain has become

 

both the Achilles' heel and the center of gravity for what Alvin and Heidi Toffier call

 

'war and anti-war'."79 As the strength of any chain is limited by its weakest link, so will

 

the protection of the joint warfighting commander's rear area be limited by others linked

 

to the GII. Now every major government and private organization occupies the role that

 

major subordinate components (MSCs) have traditionally occupied. Only these MSCs

 

are not operationally subordinate to the warfighter.

 

    Lack of a national policy on information warfare inhibits US ability to harness the

 

information revolution for military success. This means the disparate group of US

 

players that should be cooperating on information warfare--the departments of State,

 

Treasury, Commerce; the Federal Emergency Management Agency; the intelligence

 

agencies; and now private industry--are not working together. Despite this major

 

shortcoming, the military services are aggressively pursuing their respective visions of

 

information warfighting.

 

 

Redefining Presence

 

Information power impacts the traditional concept of US military presence in the post-

 

Cold War. During the Bottom-Up Review, the Navy argued that it needed two additional

 

aircraft carriers to maintain a deterrent US military peacetime presence, convincing a

 

President whose agenda included a reduction in the carrier force. More recently, the US

 

Air Force offered up its aircraft, satellites, and other reconnaissance capabilities as a way

 

of "providing both real and 'virtual' presence."80 Many warfighters, like Admiral Jeremy

 

Boorda, chief of the Navy, scoff at this idea. "I don't know what that means.... I guess

 

we're never going to have a "virtual Navy."'81 At first glance, the admiral's side appears

 

most defensible and adds virtual to the list of techno-babble despised by many warriors.

 

Clearly a battle carrier task force deployed to a potential adversary's coast constitutes

 

serious presence. But the admiral's position illustrates the over-reliance by the entire US

 

military on sunset systems and a reluctance to allocate dwindling resources to sunrise

 

systems that confront non-traditional Information Age enemies.

 

    Today the US armed forces must prepare for an exhaustive list of all-the-world

 

adversaries. A careful mix of actual and virtual presence may offer the only route to

 

maintaining cognizance of global US interests given the downward trend of the US

 

defense budget. Further, putting all of our eggs in the actual presence basket does not

 

address the information-age trend toward new classes of enemies and threats. Just as the

 

US developed maneuver warfare to triumph over a numerically superior Soviet enemy

 

during the Cold War, so could nations lacking traditional military and power projection

 

instruments use information power and the GII to maneuver around US military

 

concentrations and strike at the US homeland. When the Information Age was ushered

 

in, conventional military power did not leave. So while we cannot discard elements of

 

traditional US military power, we must harness information power and virtual presence if

 

we are to remain the single global military power.

 

    Information power is redefining presence. The US Navy (USN) recently unveiled a

 

new system called Cooperative Engagement Capability, which links airborne and

 

shipborne radar and sensing assets of a carrier task force. The system permits every

 

ship's commander to see instantly what every other ship and plane can see.82 In its first

 

test in Summer 1994, "the system enabled the Marine amphibious assault ship USS Wasp

 

to shoot down an 'enemy' cruise missile skimming toward it across the water long before

 

the ship's own radar could spot it."83 Of course existing technology already offers link-

 

up with sensors that include the Airborne Warning and Control System (AWACS),

 

JSTARS, RC-135 RIVET JOINT, and even national systems, all far from the carrier

 

force's location. We have already come to rely on virtual presence to conduct modern

 

warfare. Clearly our vision of presence, actual or virtual, is still at the mechanical level,

 

as discussed in the Gutenberg analogy. As Vice Admiral Arthur Cebrowski, Director of

 

Command, Control, Communications, Computers, and Intelligence (C4I) at the

 

Pentagon, says, "these are things you must do if you're going to get smaller."84 But the

 

Information Age offers more: the opportunity to project power to distant points without

 

physically moving instruments of warfare. The only remaining obstacle may be our

 

reluctance to change the way we think about warfare.

 

 

                                  Section IV:

 

             Leveraging Information Power in the Post-Cold War Era

 

 

The Crossroads

 

As the predominant global military power, the United States is at a crossroads. Two

 

revolutions--one caused by dramatic geo-political events in the post-Cold War era, and

 

the second by awesome advances in information technology--form the junction. The two

 

conspire to fundamentally challenge the American way of war, as recent American

 

military experiences illustrate.

 

    Twice since 1990, the US, with overwhelming military superiority and cooperative

 

international relations, forced the legitimate government of Iraq to recapitulate. The US

 

was not similarly successful in Somalia and is continually daunted by events in Bosnia.

 

In the latter cases, Balkanization, a visible trend in international politics, complicated US

 

efforts. The US did not have the luxury of dealing with a single legitimate government

 

or power broker; instead, power was diffused among rival clans and ethnic groups. Now

 

consider the synergy that occurs at the crossroads of geo-political trends and information

 

power. Open access to information, traditionally protected within the confines of

 

governments, is now available to anyone with access, regardless of societal position. The

 

Internet does not recognize position or borders. As Balkanization diffuses political

 

power, information technology can simultaneously place a volume of destructive power--

 

previously controlled only by legitimate states--into the hands of potential enemies. The

 

US armed forces must understand how information power conspires with political events

 

and organize appropriately for information-age threats.

 

 

Contrasting Nuclear and Information Power

 

The United States exploits modern information technology more than any other nation.

 

Information technology, translated into military power during the Gulf War, possesses

 

unique characteristics that challenge the traditional concept of balance of power between

 

states. The US can draw lessons by exploring how new sources of military power were

 

assimilated in the past. Comparing air and information power in Section 1 offered

 

insight into how the US armed forces can understand new technologies. Contrasting

 

information and nuclear power underscores the responsibility of the US to re-think its

 

military organization in this new age (Figure 8 85).

 

     "IW technologies and capabilities are largely being developed in an open

 

commercial market and are outside of direct Government control."86 This means new

 

players can buy into the latest technology without incurring tremendous research and

 

development costs. Unlike nuclear weapons, which were developed in relative

 

government secrecy, information power is out in the open. Indeed information

 

technologies are being developed in the civil sector and are more likely to migrate to the

 

military. As a result, information power can be developed rapidly and discreetly, and

 

does not require rare assets which, when a nation seeks to procure them on the

 

international market, offers insight into their capability and intent. Thus, even a

 

developing state that lacks credible, traditional military power could have information

 

power capable of inflicting damage on the information-dependent United States.

 

     Distinguishing between civilian uses of nuclear power--like power generation--from

 

military applications has traditionally vexed the US in countering proliferation of nuclear

 

weapons. When we consider the co-mingled nature of civilian-military information

 

technologies, this distinction becomes exponentially difficult. An ever-blurring

 

distinction greatly magnifies the difficulty of identifying and tracking the intent of states

 

to build information warfare capabilities. Information-age technologies challenge

 

Click here to view image

 

traditional military concepts and raise important questions. It is easy to envision US

 

military response to a nation that fires a missile at Wall Street. In contrast, try to imagine

 

US response to a trans-national actor who targets the New York Stock Exchange with an

 

information bomb through the GII. This is more difficult perhaps because the US armed

 

forces are not organized to respond to information-age warriors like Steele describes.

 

 

Meeting New Organizational Challenges

 

The US is challenged to react to new demands of a post-Cold War world while

 

substantially modifying the way the armed forces is conditioned to do business. In the

 

latest National Security Strategy, President Clinton described the nature of the threat.

 

"Worldwide, there is a resurgence of militant nationalism as well as ethnic and religious

 

conflict." Thus far, this paper is consistent with the President's theme, echoing concerns

 

by Chollet, Steele, and others. In considering the post-Cold War world and information

 

power, OSD underscores the major challenge facing the US armed forces. During the

 

Cold War, the US sought to avoid global conflict, particularly nuclear war. The

 

information customer was the National Command Authority, and information flowed

 

from top to bottom in order to minimize risk of inappropriate military action. While our

 

defensive posture must still address nuclear war, the likelihood we will employ these

 

weapons is minimal. Our new focus is conventional operations oriented on regional

 

scales, as highlighted in the National Security Strategy. The new information customer

 

is the CINC/JTF commander. And the information needs in this case are radically

 

different (Figure 9 87) In the regional scenario, the CINC/JTF commander "controls and

 

directs events, carrying out the NCA mandate, with the implied understanding that no

 

nuclear operations are envisioned and these remain the purview of the NCA."88

 

Click here to view image

 

 

                                  Section V:

 

                        Recommendations and Conclusions

 

 

   It is clear...that neither the US military as a whole, nor its allies, have established

 

   even the most rudimentary agreement with respect to concepts, doctrine, training,

 

   equipping, and organizing for information warfare.89

 

                                                            Robert D. Steele

                                              President, Open Source Solutions

 

 

   Those who will employ our forces will plan for and execute deployment of our

   forces.                                          

                                                              General Al Gray90

                                                         Former Commandant, USMC

 

 

    Growing evidence suggests new military organizations and far more capable means

 

and methods of warfare will supersede the military systems, operations, organizations,

 

and force structures that dominated the Cold War.91 To maintain its lead in the

 

Information Age, the US must truly revolutionize its military structure. Piecemeal

 

infusion of information-age technologies is insufficient. Such infusions certainly

 

provided an overwhelming edge to the US during the Gulf War, but now the genie is out

 

of the bottle. Others, nations and individuals, are pursuing information power. To

 

revolutionize military operations, the US must radically change its organizational,

 

operational, and doctrinal approaches. If the US military does this methodically, it will

 

emerge from the revolution prepared to confront the formidable information-age threats

 

posed by an expanded battlespace and non-traditional classes of warriors.

 

 

Innovating Organizationally

 

Information power presents attractive opportunities to US joint warfighting. The nature

 

of information power is to gather, process, and disseminate data for informed decision

 

making and execution--the role that rigid organizational hierarchies have traditionally

 

performed. Just as information power is flattening business organizations, it can

 

consolidate the staggering number of players required for the US to succeed in

 

information warfare. To start, the nature of information power means its role in national

 

defense is bigger than just DoD. This discussion recognizes that national defense in the

 

Information Age includes nearly every major player in US government, business, and

 

science. Moreover, the pervasive nature of information technology, demonstrated by the

 

GII, includes players that have not traditionally been associated with defense. The focus

 

here, however, must be limited to revolutionizing US military affairs. So while the

 

import of other participants is recognized, this paper examines changes necessary for the

 

US to succeed in joint warfighting. To integrate and synchronize information power

 

with joint warfighting, the US must innovate organizationally at the theater level by (1)

 

establishing a combatant commander with responsibility for information warfare, and (2)

 

establishing the process for joint wartime employment of information warfare.

 

    (1) Since the Gulf War, the Pentagon has substantially advanced its vision for

 

information warfare. The debate on information warfare has centered within the Capital

 

Beltway, predominantly in the Joint Staffs OSD, and service headquarters. Though

 

sometimes acrimonious, each of these participants understands that information warfare

 

must be planned and executed jointly. Meanwhile, to carry out their respective charters

 

for organizing, training, and equipping forces for joint warfare, the services have

 

aggressively pursued individual information warfare centers and visions for employment

 

of information power.

 

    The nature of organizations to resist change is well documented.92 For this reason,

 

it is fortunate that the seeds of information warfare have been nurtured at the highest

 

levels of the DoD. Now DoD's concept of information warfare has matured sufficiently

 

and must be consolidated at the combatant command level. The US must assign

 

responsibility for cyberspace to a combatant commander with singular, functional

 

responsibility for command, control, communications, computers, and intelligence (C4I)

 

to revolutionize joint warfighting around information power. This is consistent with the

 

Goldwater-Nichols Act and the UNAAF, which govern how the US will fight and

 

capitalize on the nation's military experience that joint application of military power

 

delivers the most lethal combat punch.

 

    While the current fiscal and political environment seeks to reduce the numbers of

 

commanders and staffs at the unified level, organizational changes to the existing

 

USSPACECOM, headquartered in Colorado Springs, Colorado, makes sense for

 

numerous reasons. Foremost, it assigns responsibility for information power--a fourth

 

dimension--to the appropriate warfighting command, thereby permitting DoD and the

 

Joint Staff to focus on policy making, and the senior service headquarters on organizing,

 

training, and equipping forces for the combatant commander. This places the combatant

 

commander in a position to establish requirements for information warfighting and to

 

influence service acquisition programs, oversight of which now occurs by those with

 

primarily policy making functions. Further, this organizational change responds to the

 

impact of information technology on military operations. As its name implies,

 

USSPACECOM focuses only on space. Though important, space is only one element of

 

cyberspace. Like other sources of military power, information power is diminished when

 

compartmented and penny-packeted. The combatant commander charged with C4I will

 

be the focal point for critical interaction between US warfighters and non-defense

 

organizations and will drive service acquisition processes through the integrated priority

 

list as the combatant commander currently does with other warfighting programs.

 

In the meantime, CJCS' latest MOP 30 provides definitive guidance for DoD to

 

proceed with C2W, the military application of information warfare. MOP 30 would

 

appear to be the best work-around for revolutionizing information power, given the

 

absence of a combatant commander tasked with the cyberspace mission. Yet several

 

shortcomings are immediately evident in these MOP 30 excerpts:

 

   The Chairman of the Joint Chiefs of Staff is responsible to the NCA for providing

 

   recommendations concerning the joint and combined employment ofC2W...93

 

 

   The Combatant Commanders will designate a single staff component to be

 

   responsible for C2W designate specific points of contact for counter C-2 and C-2

 

   protection where feasible, and ensure that subordinate commands assign

 

   responsibilities for C2W as necessary.94

 

By compartmenting the information warfare mission within the Pentagon, MOP 30

 

ignores this nation's military experience that joint application of combined arms--and

 

information power must be included--provides the most lethal combat punch. Further,

 

diffusing responsibility for information power in this manner poses obstacles for the

 

combatant commander in planning, exercising, and executing combined arms

 

employment. As a result, the combatant commander is challenged to design operational

 

art and orchestrate a truly combined arms campaign.

 

    (2) To revolutionize military affairs in the Information Age, information power must

 

be completely integrated and synchronized with traditional combat power. The rationale

 

to elevate C4I to the combatant commander's level also mandates a joint organization to

 

command and control information power during wartime. Similarities between air and

 

information power have already been discussed. Information, like air power, offers

 

unique capability, inherent flexibility, and support to multi-service operations. The

 

JFACC concept, proven during the Gulf War, provides an existing organizational model

 

for wartime employment of information power.

 

 

Innovating Operationally

 

   The past had its inventions and when they coincided with a man who staked his

 

   shirt on them the face of the world changed. Scythes fixed to the axles of the war

 

   chariots; the moving towers which overthrew Babylon; Greek fire; the short bow,

 

   the cross-bow, the Welsh long bow and the ballista; plate armour; the Prussian

 

   needle gun; the Merrimac and Ericsson's marvelous coincidental reply. The future

 

   is pregnant with inventions....95

 

 

                        General Sir Ian Hamilton, Soul and Body of an Army, 1921

 

 

 

    The Information Age brings an abundance of inventions, the likes of which Sir Ian

 

Hamilton wrote. However, the entirety of the US military services must invest in them if

 

the US hopes to revolutionize military affairs around information power. Though each

 

possess distinctive traditions and warfighting doctrine, the services contribute to some

 

operational approaches which merely impede progress. Before information technology

 

can be the fuel for a revolution in military operations, the services must transform

 

operational approaches that would otherwise contaminate the mixture. Specifically, the

 

military services must recognize (1) cyberspace as a fourth dimension of battlespace, (2)

 

the primacy of intelligence in information warfare, (3) information power as applicable

 

at the operational level of war, and (4) the criticality of a streamlined operations-

 

acquisition interface.

 

    (1) Blitzkrieg best illustrates that operational advantage in warfare goes to the nation

 

that can use new technology. Faced with a new menu of non-traditional missions,

 

evolving classes of elusive warriors, and a reduced operating budget, the US military

 

must seek new operational approaches. Information power can help. An example is the

 

use of USN cooperative multi-mode sensors to provide dispersed warfighting elements

 

with a comprehensive battlespace picture. With certainty of Commander's Intent, these

 

elements can contribute more to achieving the theater goal, thereby compensating for

 

reduced forces. But far more is possible. Information power must be synchronized with

 

traditional military power--air, land, and sea--to strike adversary strategic and operational

 

centers-of-gravity at the onset of hostilities, achieving the maximum, combined arms

 

effect. To achieve this, the US military must recognize the importance of battlespace's

 

information dimension. Most warriors readily agree on the importance of space in

 

military operations, especially in force projection. However, they are often reticent to

 

recognize the larger domain, cyberspace, of which space is merely a segment. Instead of

 

being dismissed as techno-babble, cyberspace must be viewed as an operational rear

 

area, a soft-spot upon which modern US military power relies for information-based

 

systems, but which conversely becomes a lucrative target for hostile actions.

 

    The services must also recognize the inherent and appealing operational flexibility of

 

information power to deliver a moderated blow or knock-out punch. Information power

 

holds the same potential for the joint warfighting commander as non-lethal technologies

 

used by the US joint task force commander who presided over the final withdrawal of

 

United Nations forces from Somalia in March 1995. Information power also offers

 

operational flexibility that reaches beyond traditional kill weapons for use in the non-

 

traditional missions that are becoming more prevalent. This discussion has repeatedly

 

focused on the non-traditional enemy, the trans-national actor or individual with the skill

 

and access to hurt US military capability. As information power proliferates, the US

 

must be able to project discriminate power against such an enemy, whose operations base

 

may be in a nation like Iran or Korea, and which is unlikely to cooperate with the US.

 

How would the US respond to an information attack by a trans-national actor against the

 

New York Stock Exchange? We must prepare for such eventualities now.

 

    (2) US military services must recognize the primacy of intelligence in information

 

warfare, of effectively melding operations and intelligence. Information is the fuel of

 

information-based systems, and modern warfare requires a higher volume of precise

 

intelligence than conventional weaponry. During the last few decades the US

 

Intelligence Community allocated the bulk of its resources to the monolithic Soviet

 

Union. Now, the enemy has shrunk in size and capability, but has become more

 

numerous and dispersed. The US Intelligence Community must be prepared to provide

 

intelligence on virtually any nation, group, and even individuals. The potential target list

 

is exploding while the budget to conduct intelligence operations is imploding. "The top

 

targets...include countries such as Iraq, Iran, and North Korea; subjects such as weapons

 

of mass destruction and counterterrorism; and 'trans-national' issues such as Muslim

 

fundamentalism and 'over-the-horizon' problems that might arise in the future."96 The

 

trans-national actor, perhaps even an individual whose ideology is contrary to that of the

 

US, could use information power to inflict great damage against a US military operation.

 

Perhaps the implications are most pressing for the joint warfighter, whose battlespace,

 

particularly reachback or communications zone, has been expanded.

 

    Several countervailing events interact to challenge the intelligence community at a

 

time when the services are looking for higher volumes of more precise intelligence to

 

compensate for force reductions and decreases in service O&M. First, the complexity

 

and breadth of the intelligence mission has expanded greatly. The old Soviet focus is

 

replaced with what intelligence professionals call all-the-world. In the aftermath of the

 

Gulf War, when the opportunity in Somalia seemed tailored for the new US role, military

 

planners were dismayed with the paucity of information available. This, too, was the

 

case in the former Yugoslavia and Rwanda. But information warfare places even greater

 

demands on the intelligence community, demanding a high volume of precise

 

intelligence which the community is currently ill-suited to provide. Consider the type of

 

intelligence required by modern weaponry. During the Vietnam era, precise geo-

 

coordinates would get fire and steel on target. In the expanded battlespace of the

 

Information Age, this task is exponentially more difficult. If the US is to win an

 

information war, the intelligence community must provide traditional intelligence, like

 

an enemy's force disposition and doctrine. Additionally, information warfare must probe

 

more deeply into an enemy's C4I infrastructure and the systems that support it. Probing

 

the information infrastructure of potential adversaries--their hardware, software, and

 

firmware--for offensive and defense ends brings new meaning to traditional

 

reconnaissance missions.

 

    Now more than ever, a high premium must be placed on all-source intelligence to

 

succeed in information warfare. Von Clausewitz believed war was man's most complex

 

endeavor. His thoughts are particularly prescient given information-age weaponry. Just

 

as traditional combat systems require logistics support, information weapons systems

 

need substantial information support. Information power requires a volume of precise

 

technical intelligence that the US Intelligence Community is not currently postured to

 

provide well.

 

    (3) Similarities between aerospace power and information power previously

 

discussed suggest that successful aerospace employment schemes may also be

 

appropriate for information warfare. Joint and service information warfighting doctrine

 

is only now being crafted and will surely undergo much evolution as it matures. Joint

 

warfighting doctrine recognizes that once air superiority is achieved, aerospace power

 

supports theater-level, operational objectives. "Air operations seek to gain control of the

 

air and then to allow all friendly forces to exploit this control for military and non-

 

military purposes."97 The desired end-state is one in which naval and land component

 

commanders prosecute the Joint Force Commander's battle plan unimpeded by enemy air

 

activities. While the maritime and land components deliver distinct contributions for

 

joint warfighting, the nature of the aerospace component--capable of combat elevated

 

from surface-level activities--marks it as unique. "Land forces can, for example, seize

 

and secure air bases and sea ports to facilitate air and maritime component operations in

 

theater."98 But control of a surface area is different. In war, aerospace superiority is a

 

necessity. "Since the German attack on Poland in 1939, no country has won a war in the

 

face of enemy air superiority, no major offensive has succeeded against an opponent who

 

controlled the air, and no defense has sustained itself against an enemy who had

 

superiority. Conversely, no state has lost a war while it maintained air superiority...."99

 

    Like aerospace power, information power may be most appropriately applied at the

 

operational level. Finally, Cholletts description of the electronic umbrella should raise

 

serious concerns about fratricide in information warfare. Orchestrating information

 

warfare at the combatant command level should reduce the risk of friendly fire.

 

    (4) A streamlined operations-acquisition interface that will keep pace with critical

 

military technologies is required. We cannot hope to maneuver within the decision-

 

making cycle (OODA loop) of our adversaries when we cannot maneuver within our

 

own acquisition cycle. This point is already widely recognized, though broadly based

 

solutions have not been forthcoming. During the last year, the Undersecretary of

 

Defense for Acquisition introduced Advanced Concept Technology Demonstrations

 

(ACTDs), which if successful, will serve as a model for the acquisition process at large.

 

ACTDs seek to shorten the acquisition time between designing a weapon in the

 

laboratory and delivering it to the warfighter, especially important to the complex nature

 

of information warfare, and the security classification systems required to protect

 

sensitive offensive and defensive capabilities. Additionally, information warfare

 

capabilities should tend to be unlike those of traditional weapons systems. In both

 

offensive and defensive systems, software munitions, once developed, can be copied

 

without the expense of producing additional copies of, say, an aircraft.

 

 

Innovating Doctrinally

 

   In itself the danger of a doctrine is that it is apt to ossify into a dogma, and to be

 

   seized upon by mental emasculates who lack virility of judgment, and who are

 

   only too grateful to rest assured that their actions, however inept, find

 

   justification in a book, which, if they think at all, is in their opinion, written in

 

   order to exonerate them from doing so. In the past many armies have been

 

   destroyed by internal discord, and some have been destroyed by the weapons of

 

   their antagonists, but the majority have perished through adhering to dogmas

 

   springing from their past successes--that is, self-destruction or suicide through

 

   inertia of mind.100

 

 

                           Major General J.C.F. Fuller, The Reformation of War, 1923

 

 

    Doctrine is the set of fundamental principles guiding military actions in support of

 

objectives.101 Outmoded doctrine typically yields disaster. Military history provides

 

tragic illustrations: the French at the Maginot Line, the British at Gallipoli. Technology

 

is setting the pace, and US military doctrine must keep up. Personal experiences at the

 

USMC Command and Staff College are germane. One need look no further than this

 

intermediate service school for evidence the US military needs to do more to support

 

understanding of information power. The fact that few officers have been exposed to

 

RMA discussions was illustrated when a navy officer in the audience requested that a

 

guest lecturer, a general officer, explain the acronym RMA which appeared on the visual

 

aid. The general, unprepared for the query, responded he knew little of the topic.

 

Krepinevich is right. It is hard to conceive that RMA has occurred if our leadership,

 

current and future, cannot recognize it.

 

    All of our nation's fighting forces need information. Streamlined, organized, and

 

smart economics mandate information warfare be a joint game. But again, the

 

characteristics of the GII intervene to strengthen the case. Employment of information

 

power must be considered in light of potential fratricidal effects. Remember, in the GII

 

if you are connected to any node, you are connected to all of them. This holds important

 

implications for both offensive and defensive information warfare, and the key to

 

crafting appropriate doctrine. Service doctrine must consider all potential participants,

 

defense and non-defense. Information power presents vulnerabilities that the battlefield

 

commander did not have to consider previously. Greater emphasis on doctrine will help

 

burn through the inevitable fog and lessen the friction.

 

 

 

 

 

A Concluding Parable

 

History may well record this time as the dawn of opportunity for the US armed forces. A

 

time when US military leaders chose to take brave new steps to prepare for a new era of

 

warfare. The mandate is clear. The US military must develop a better understanding of

 

information power and organize for joint information warfighting at the combatant

 

command level. We must shift our perspective on warfare, focusing on a new threats and

 

enemies. In Proceedings, Frank Koch offers a parable that shows how events forced an

 

unsuspecting navy captain to shift his perspective.102

 

        Two battleships assigned to the training squadron had been at sea on

 

   maneuvers in heavy weather for several days. I was serving on the lead battleship

 

   and was on watch on the bridge as night fell. The visibility was poor with patchy

 

   fog, so the captain remained on the bridge keeping a eye on all activities.

 

        Shortly after dark, the lookout on the wing of the bridge reported, "Light,

 

   bearing on the starboard bow."

 

        "Is it steady or moving astern?" the captain called out.

 

        Lookout replied, "Steady, captain," which meant we were on a dangerous

 

   collision course with that ship.

 

        The captain then called the signalman, "Signal that ship: We are on a

 

   collision course, advise you change course 20 degrees."

 

        Back came a signal, "Advisable for you to change course 20 degrees."

 

        The captain said, "Send, I'm a captain, change course 20 degrees."

 

        "I'm a seaman second class," came the reply. "You had better change course

 

   20 degrees."

 

        By that time, the captain was furious. He spat out, "Send, I'm a battleship.

 

   Change course 20 degrees."

 

        Back came the flashing light, "I'm a lighthouse."

 

        We changed course.

 

 

    The captain and reader are struck at once by an understanding that makes all the

 

difference. So it should be as we contemplate information power. In an information

 

war, the fog will be thick, the stakes will be high, and the chances of collision, great. By

 

understanding information power and organizing for joint information warfighting at the

 

combatant command level, the US can prepare for the challenges and opportunities of the

 

Information Age.

 

 

 

                                 Bibliography

 

 

 

Aderhold, David J., Lt Col. "Space Campaign for the Warfighting CINCs." Research

  Paper. Naval War College, 21 June 1991.

 

Air Force Manual 1-1, Volume II: Basic Aerospace Doctrine of the United States Air

  Force. March 1992.

 

Army Focus 94, Force XXI. September 1994.

 

Auster, Bruce B., "Info Wars: When Knowledge Is Military Power." US News & World

  Report, 24 October 1994.

 

Berkowitz, Bruce D., "Paradigms and Policy: Observations on Assumptions Underlying

  US National Security Strategy After the Cold War." December 1993 [photocopy].

 

Boyd, Morris J., Maj Gen, "Force XXI Operations." Military Review, November 1994.

 

Busey, James B. IV, Adm, "Information Warfare Calculus Mandates Protective

  Actions." Signal, October 1994, 15.

 

Butler, Robert J., Lt Col et al., "Information Warfare and the Joint Forces Air

  Component Commander." Research Paper. Air Command and Staff College: Maxwell

  AFB, Alabama, June 1994.

 

Campen, Alan D., The First Information War. Fairfax, Virginia: AFCEA International

  Press, October 1992.

 

Campen, Alan D., "Intelligence Leads Renaissance In Military Thinking." Signal, August

  1994.

 

Carey, John, "From Internet To Infobahn." Business Week, The Information Revolution,

  1994.

 

Chairman of the Joint Chiefs of Staff; Command and Control Warfare: Memorandum of

  Policy No. 30. 1st Revision. 8 March 1993.

 

Chollet, Laurence B., "William Gibson's Second Sight." Los Angeles Times Magazine, 12

  September 1993.

 

Clapper, James R., Lt Gen, and E.H. Trevino, Lt Col, "Critical Security Dominates

  Information Warfare Moves." Signal, March 1995.

 

Cohen, Frederick B., "Information Warfare--Concepts and Concerns: The First

  Information Warfare War Game." Presented by Science Applications International

  Corporation for Office of the Secretary of Defense, December 1993 [photocopy].

 

Command and Control Warfare. AFPD 10-7. Headquarters USAF, 12 August 1993.

 

Cook, Wyatt C., "Information Warfare: A New Dimension in the Application of Air and

  Space Power." Research Paper. Air War College, Air University, April 1994.

 

Corum, James S., The Roots of Blitzkrieg. University Press of Kansas, 1992.

 

Covey, Stephen R., The Seven Habits of Highly Effective People. New York: Simon &

  Schuster, 1990.

 

De Caro, Chuck, "Sats, Lies, and Video-Rape: The Soft War Handbook." Collective

  Work. Aerobureau Corporation for OSD/Net Assessment, circa December 1993

  [photocopy].

 

Fitzgerald, Mary C., "The Soviet Image of Future War: Through the Prism of the Persian

  Gulf." Alexandria, Va: The Hudson Institute, May 1991.

 

FM 100-6: Information Operation. Coordinating Draft. Headquarters USA, 22 July 1994.

 

Global Presence. USAF White Paper. March 1994.

 

Graham, Bradley, "Battle Plans for a New Century." The Washington Post, 21 February

  1995.

 

Handel, Michael, J. "Technological Surprise in War." Intelligence and National

  Security, January 1987.

 

Horizon: Air Force C4I Strategy for the 21st Century. USAF Deputy Chief of Staff;

  Command, Control, Communications and Computers, Plans and Policy Division,

  Pentagon [undated].

 

Hust, Gerald R., Maj, "Taking Down Communications." Research Paper, The School of

  Advanced Airpower Studies: Maxwell AFB, Alabama, September 1994.

 

Information Architecture for the Battlefield. Report of the Defense Science Board

  Summer Study Task Force. Office of the Under Secretary of Defense for Acquisition &

  Technology, October 1994.

 

Information Power: A Framework for Action. Headquarters USAF, circa July 1994

  [photocopy].

 

Information Warfare: Pouring the Foundation. Draft. Headquarters USAF, Deputy Chief

  of Staff; Plans and Operations, 10 November 1994 [photocopy].

 

Jerskovitz, Don, SIGINT/DF Systems of the Next Century, Journal of Electronic

  Defense, October 1994, 39.

 

Joint Forces Air Component Commander (JFACC) Primer. Second Edition.

  Headquarters United States Air Force, Deputy Chief of Staff; Plans and Operations,

  February 1994.

 

Joint Pub. 3-13, 2nd Draft: Joint Doctrine for Command and Control Warfare (C2W)

  Operations. 1 September 1994.

 

Joint Pub. 3-0: Doctrine for Joint Operations. Proposed Final Pub, B-1.

 

Krepinevich, Andrew F., Jr., "Keeping Pace with the Military-Technological

  Revolution." Issues in Science and Technology, Summer 1994.

 

Krepinevich, Andrew F., Jr., "The Emerging Military Revolution: The Lessons of

  History." The National Interest, Fall 1994.

 

McConnell, J.M.,Vice Adm, "New World, New Challenges: NSA Into the 21st Century."

  American Intelligence Journal, Spring/Summer 1994.

 

A National Security Strategy of Engagement and Enlargement, The White House,

  Washington DC, July 1994.

 

Neilson, Robert E., "The Role of Information Technology in National Security Policy."

  Acquisition Review Quarterly, Defense Acquisition University, Summer 1994.

 

OSS Notices. Volume 3 Issue 1, 31 January 1995.

 

Parker, Geoffrey, The Military Revolution. Cambridge: Cambridge University Press,

  1988.

 

Perry, William J., Annual Report to the President and the Congress. February 1995.

 

Pincus,Walter, "Control Tightened At Spy Agencies." The Washington Post, 10 March

  1995.

 

Powell, Colin L., Gen, "Information-Age Warriors." Byte, July 1992.

 

Ricks, Thomas E. "Air Force Says It Can Offer 'Presence' In Peacetime at Lower Cost

  Than Navy." Wall Street Journal, 28 February 1995.

 

Rosen, Stephen Peter, Winning the Next War. Ithaca, N.Y.: Cornell University Press,

  1992.

 

Ryan, Donald E., "Implications of Information-Based Warfare." Joint Forces Quarterly

  Autumn/Winter 1994-95, November 1994.

 

Ryan, Julie, Tom Thorley, and Gary Federici, "Security Implications of Support to

  Military Operations in the Year 2000 and Beyond." Research Paper. 20 October 1993

  [photocopy].

 

Schwartau, Winn, Information Warfare: Chaos on the Electronic Superhighway. [City

  Unknown]:Thunder's Mouth Press, 1994.

 

Steele, Robert D., "The Military Perspective on Information Warfare: Apocalypse Now."

  Speech to the Second International Conference on Information Warfare: Chaos on the

  Electronic Superhighway," Open Source Solutions, Inc., 19 January 1995.

 

Sterling, Bruce, The Hacker Crackdown: Law and Disorder on the Electronic Frontier.

  New York: Bantam Books, 1992.

 

Stewart, Robert L., Brig Gen, "New Technology: Another Way to Get Oats to the

  Horses?" Army, January 1995.

 

Sussman, Vic, "Gotcha! A Hard-Core Hacker is Nabbed." US News & World Report,

  27 February 1995.

 

Szafranski, Richard, Col, "Neocortical Warfare?," Military Review, November 19, 1994.

 

Toffler, Alvin and Heidi, War and Anti-War: Survival at the Dawn of the 21st Century.

  Boston: Little, Brown and Co., 1993.

 

"Outlook." US New & World Report, February 27, 1995.

 

"USAF Information Warfare Summit." Presentation Slides. Washington, DC, 9 August

  1994.

 

"USAF and IW for Warfighting." Presentation Slides for Unified Commanders.

  Washington, DC, circa January 1995.

 

Van Creveld, Martin, Command in War. Cambridge: Harvard University Press, 1985.

 

Warden, John A. III, The Air Campaign, Planning for Combat. Washington, DC:

  National Defense University Press, 1988.

 

Watts, Barry D., Lt Col, The Foundations of US Air Doctrine: The Problem of Friction

  in War. Maxwell AFB, Alabama: Air University Press, 1984.

 

Whitlow, J.L., "JFACC: Who's in Charge? 'It's Not All That Hard!." Undated

  [photocopy].

 

                                 Abbreviations

 

 

ACTD            Advanced Concept Technical Demonstration

 

ASD/C3I         Assistant Secretary of Defense/Command, Control, Communications,

                and Intelligence

 

AWACS    E-3 Airborne Warning and Control System

 

C2              Command and Control

 

C2W             Command and Control Warfare

 

C4I             Command, Control, Communications, Computers, and Intelligence

 

CINC            Commander-in-Chief

 

DoD             Department of Defense

 

GII             Global Information Infrastructure

 

GPS             Global Positioning System

 

JFACC           Joint Forces Air Component Commander

 

JFC             Joint Forces Commander

 

JSTARS          Joint Surveillance Target Attack Radar System

 

MSC             Major Subordinate Component

 

OODA            Observe-Orient-Decide-Act

 

OOTW            Operations Other Than War

 

OSD             Office of the Secretary of Defense

 

RIVET JOINT     RC-135, USAF Airborne Reconnaissance Platform

 

RMA             Revolution in Military Affairs

 

UNAAF           Unified Action Armed Forces

 

USAF            United States Air Force

 

WMD             Weapons of Mass Destruction

 

 

                                   Endnotes

 

    1Dr William Perry, Presentation to Global Air and Space 1994 International Forum,

Hyatt Regency Hotel, Crystal City, Virginia, 5 May 1994.

 

    2Lt Gen James R. Clapper, Jr, and Lt Col Eben H. Trevino, Jr, "Critical Security

Dominates Information Warfare Moves," Signal, March 1995, 71.

 

    3Bradley Graham, "Battle Plans for a New Century, The Washington Post, No. 78,

21 February 1995, 1.

 

    4USAF White Paper, Global Presence, February 1995, 1.

 

    5Clapper and Trevino, 71.

 

    6Ibid.

 

    7Col Douglas P. Hotard, Director of Information Warfare, Assistant Secretary of

Defense/C3l, Pentagon, in interview by author, 28 December 1994.

 

    8Lt Col Wyatt C. Cook, "Information Warfare: A New Dimension in the

Application of Air and Space Power," Research Paper, Air War College, Maxwell AFB,

Alabama, April 1994, 4.

 

    9Perry, Global Air and Space Presentation 1994.

 

    10Report of the Defense Science Board, Summer Task Force on Information

Architecture for the Battlefield, Office of the Under Secretary of Defense for

Acquisition and Technology, October 1994, 27.

 

    11Joint Pub 1-02: Department of Defense Dictionary of Military and Associated

Terms, 23 March 1994.

 

    12Joint Pub 3-13: Joint Doctrine for Command and Control Warfare (C2W)

Operations, 2nd Draft, 1 September 1994, GL-17.

 

    13Based on personal accounts of HQ USAF staff observed by author, June 1992-June

1994.

 

    14DoD TS-3600.1, quoted in CJCS MOP 30.

 

    15Cook, 4.

 

    16Col John R. Boyd, "A Discourse on Winning and Losing," August 1987, 5-7, 141, as

adapted by Lt Col Bill Riskii, OSD ASD/C3I.

 

    17Clapper and Trevino, 72.

 

    18Robert D. Steele, Presentation to National Computer Security Association,

Second International Conference on Information Warfare, 18-19 January 1995,

Montreal Airport Hilton, Canada, quoted in OSS Notices, Volume 3, Issue 1, 31 January

1995, 10.

 

    19Congressman Newt Gingrich, Presentation to Armed Forces Communications

and Electronics Association Conference, National Defense University, May 1994.

 

    20 Hotard.

 

    21Dr Frederick B. Cohen, "Information Warfare-Concepts and Concerns, The First

Information Warfare War Game," briefing by Science Applications International

Corporation for presentation to OSD/Net Assessment's Study on Information Warfare,

December 1993,23.

 

    22Ibid.

 

    23Dr Michel E. Kabay, Presentation to National Computer Security Association,

Second International Conference on Information Warfare, 18-19 January 1995,

Montreal Airport Hilton, Canada, quoted in OSS Notices, ed. Zhi M. Hamby, Volume

3, Issue 1,31 January 1995.

 

    24Maj Gen Alan Pickering, Presentation to National Computer Security Association,

Second International Conference on Information Warfare, 18- 19 January 1995,

Montreal Airport Hilton, Canada, Ibid.

 

    25Robert D. Steele, Presentation to the Second International Conference on

Information Warfare: Chaos on the Electronic Superhighway, Montreal, Canada, 19

January 1995, 7.

 

    26Steele, Presentation to the Second International Conference on Information

Warfare: Chaos on the Electronic Superhighway, 10.

 

    27Report of the Defense Science Board Summer Study Task Force, 7.

 

    28Ibid., reproduced, 5.

 

    29Michael Meyer, "When Words Are The Best Weapon," Newsweek, 27 February

1995.

 

    30Ibid., 37.

 

    31Chairman of the Joint Chiefs of Staff, Memorandum of Policy No. 30, Command

and Control Warfare, issued 1990, first revised 1993, 5.

 

    32Robert J. Butler et al., "Information Warfare and the Joint Forces Air Component

Commander," Research Paper, Air Command and Staff College, Maxwell AFB, Alabama,

June 1994, 8.

 

    33Report of the Defense Science Board Summer Study Task Force, 28.

 

    34Butler et al., 2.

 

    35Ibid.

 

    36Report of the Defense Science Board Summer Study Task Force, 30.

 

    37Butler et al., l4.

 

    38Joint Forces Air Component Commander (JFACC) Primer, Second Edition,

Headquarters USAF/XO, February 1994, 1.

 

    39Joint Pub 0-2: Unified Action Armed Forces (UNAAF).

 

    40JFACC Primer, Foreword.

 

    41Air Force Manual I-I, Volume II: Basic Aerospace Doctrine of the United States

Air Force, March 1992, 79.

 

    42JFACC Primer, 8.

 

    43Ibid.

 

    44Cook, 3.

 

    45JFACC Primer, 23.

 

    46Ibid.

 

    47Laurence B. Chollet, "William Gibson's Second Sight," Los Angeles Times

Magazine, 12 September 1993.

 

    48,"Outlook," US News & World Report, reproduced from Basic Data: Internet

Society, Win Treese's Internet Index, 27 February 1995.

 

    49Cook, 3.

 

    50Col Gregg A. Wheeler, "US Air Force Information Warfare," Headquarters

USAF/INXY briefing, undated, circa July 1993.

 

    51Lt Col Donald E. Ryan, "Implications of Information-Based Warfare," Joint Force

Quarterly, Autumn/Winter 1994-95/Number 6, November 1994.

 

    52Giulio Douhet, 1921, quoted by Lt Col Barry D. Watts, The Foundations of US

Air Doctrine: The Problem of Friction in War (Maxwell AFB, Alabama: Air University

Press, 1984), 6.

 

    53Bradley Graham, "Battle Plans for a New Century, The Washington Post, 118th

Year, No. 78, 21 February 1995, 1.

 

    54Ibid.

 

    55Sir Peter Anion and Dennis Cummings, "The First Space War: the Contribution of

Satellites to the Gulf War," The First Information War, ed Alan D. Campen, AFCEA

International Press, 1992, 127.

 

    56Andrew F. Krepinevich, Jr., "Keeping Pace with the Military-Technological

Revolution," Issues in Science and Technology, Summer 94, 22.

 

    57Ibid., 23.

 

    58Ibid., 24.

 

    59Ibid., 24.

 

    60Ibid., 25.

 

    61Ibid., 25.

 

    62Ibid., 25.

 

    63Captain Sir Basil Liddell Hart, "Thoughts on War," quoted by Peter G. Tsouras,

Warriors' Words, (Arms and Armour Press, 1992), 63.

 

    64Graham.

 

    65Ibid.

 

    66Maj Mark Bean, US Marine Corps Command and Staff College, Quantico MCB,

Virginia, in interview by author, 8 February 1995.

 

    67Graham.

 

    6Brig Gen Robert L Stewart, Army, Vol. 45, No. 1, January 1995, 24.

 

    69Reproduced from the Report of the Defense Science Board Summer Study Task

Force, 23.

 

    70Based on personal accounts of HQ USAF staff observed by author, June 1992-June

1994.

 

    71Report of the Defense Science Board Summer Study Task Force, 34.

 

    72Ibid.

 

    73Presentation for USAF IW Summit, Headquarters USAF, 9 August 1994, 7.

 

    74Ibid.

 

    75Report of the Defense Science Board Summer Study Task Force, 27.

 

    76Ibid., 25.

 

    77Ibid., 24.

 

    78John Carey, "From Internet to Infobahn," Business Week, 32.

 

    79Steele, Chaos on the Electronic Superhighway, 7.

 

    80Thomas L Ricks, "Air Force Says It Can Offer 'Presence' In Peacetime at Lower

Cost Than Navy," Wall Street Journal, 28 February 1995.

 

    81Ibid.

 

    82Bruce B. Auster, "Info Wars: When Knowledge Is Military Power," US News &

World Report, 24 October 1994.

 

    83Ibid.

 

    84Ibid.

 

    85Adapted from Report of the Defense Science Board Summer Study Task Force,

Appendix B-2.

 

    86Report of the Defense Science Board Summer Study Task Force, ES-5.

 

    87Reproduced from the Report of the Defense Science Board Summer Study Task

Force, 6.

 

    88Report of the Defense Science Board Summer Study Task Force, A-5.

 

    89Steele, Chaos on the Electronic Superhighway.

 

    90Joint Operations Force Sustainment, quoted in US Marine Corps Command and

Staff College Student Handout, 10 March 1995.

 

    91Krepinevich, "Keeping Pace with the Military-Technological Revolution," 23.

 

    92Peter Allan and Stephen Rosenberg, Public Personnel and Administrative Behavior,

Duxbury Press, 1981, 135-150.

 

    93CJCS MOP 30, 19.

 

    94Ibid., 19.

 

    95Tsouras, Warriors' Words, 223.

 

    96Walter Pincus, "Control Tightened on Spy Agencies," The Washington Post, 10

March 1995.

 

    97Joint Pub 3-0: Doctrine for Joint Operations, Proposed Final Pub, B-1.

 

    98Ibid., B-3 to B-4.

 

    99Col John A. Warden III, The Air Campaign, Planning for Combat, Washington,

DC: National Defense University Press) 1988, 13.

 

    100Tsouras, Warriors' Words, 148-9.

 

    101JCS Pub 1: Department of Defense Dictionary of Military and Associated Terms,

1 June 1987,118.

 

    102Koch, Frank, in Proceedings (date unknown), as quoted in Covey, Stephen R., The

Seven Habits of Highly Effective People (New York: Simon & Schuster, 1990) 33.

 



NEWSLETTER
Join the GlobalSecurity.org mailing list