10.07.2015 Views

From the Editor's - Foreign Military Studies Office - U.S. Army

From the Editor's - Foreign Military Studies Office - U.S. Army

From the Editor's - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>From</strong> <strong>the</strong> EditorsIn Search of <strong>the</strong> Greater IO PerspectiveWelcome to <strong>the</strong> first-ever Special Edition of IO Sphere.It’s our privilege to bring you, <strong>the</strong> greater informationoperations community, something extra for 2008. You mayask why a quarterly journal would chose to field an “out ofsequence” product? The simplest answer is that we’re offeringsomething different enough to warrant a little extra attention.On <strong>the</strong> facing page you’ll read how representatives from twelvecountries produced something extraordinary, and that <strong>the</strong> J7“futures division” felt you might find worth a closer look.As representatives of IO practices and philosophies, <strong>the</strong>Joint Information Operations Warfare Command, guided by ourUS Strategic Command headquarters, looks at a range of waysto assist DOD and Coalition influence planners. This meanswe’re listening to many voices and world views, across a widerange of cultural and historic perspectives. Understanding <strong>the</strong>complexities of modern influence operations requires both <strong>the</strong>broadest range of knowledge, and <strong>the</strong> most granular detail wecan determine. Sourcing such formidable needs can be tough,yet sometimes all we need to do is ask. Joint and Servicepartners are fortunate to have long-standing relationshipswith a number of graduate, post-graduate and professionalinstitutions—especially those who host sizable internationalfaculty, advisors and students. Similarly, diplomats andmilitary members on <strong>the</strong> ground in current campaigns aredeveloping increasingly greater regional expertise. Combinedwith booming open source database efforts, <strong>the</strong> IO communitycan access knowledge, experience and lessons learned fromalmost anywhere. Notably, this means an even greater numberof voices.The international circulation of this journal continuesto grow, especially among NATO countries, as do articleand editorial contributions by authors outside <strong>the</strong> US. Thisis welcome on many levels: helping build a professionalcommunity; helping educate new and developing IO staffs;and sharing views from outside traditional North Americanboundaries. Sometimes critical flashes of insight come fromthose far<strong>the</strong>st from <strong>the</strong> normal expert’s chair, in <strong>the</strong> same wayhistory enthusiasts may find <strong>the</strong> most interesting observationsfrom non-traditional sources. A writer from south Asia mayprovide a fresh perspective on <strong>the</strong> battlefields of <strong>the</strong> US CivilWar, while a west African soldier may give a US IO plannercause for reflection. Some in <strong>the</strong> IO community would saythat given DOD’s reputation as people of action, a time forreflection is <strong>the</strong> hardest thing to determine.Relationships change, sometimes very rapidly, and mayenhance or harm IO planners’ abilities. Yet in <strong>the</strong> strategiccommunications business, with more frequent talk of dialog—even among traditional adversaries—opportunities aregrowing. Sometimes an invitation is <strong>the</strong> toughest step. The<strong>Foreign</strong> <strong>Military</strong> <strong>Studies</strong> <strong>Office</strong> and <strong>the</strong>ir international gueststook up one such offer, and we hope you’ll find <strong>the</strong> results bothvaluable and enjoyable.-- Col J.R. Roberts, USAFExecutive Editor-- Mr. John W. WhisenhuntEditor2 Special Edition 2008


In 2007 <strong>the</strong> <strong>Foreign</strong> <strong>Military</strong> <strong>Studies</strong><strong>Office</strong> (FMSO), a subordinate unitof <strong>the</strong> US <strong>Army</strong> Training and DoctrineCommand (TRADOC), hosted anInternational Information OperationsSeminar at Fort Leavenworth, Kansas.Twelve countries from six continentsparticipated: India, Russia, Ukraine,Bulgaria, Senegal, Taiwan, Israel,Argentina, Chile, Canada, Australia,and <strong>the</strong> US.The IO perspectives provided aresolely those of <strong>the</strong> authors and notthose of <strong>the</strong> nation he or she represents.All discussions were conducted at <strong>the</strong>“unclassified” level. Chatham Houserules were in effect, meaning thatwhat was said at <strong>the</strong> seminar cannot beattributed to any individual speaker or<strong>the</strong>ir affiliation/organization. This alsomeans <strong>the</strong> seminar discussions will notbe published, only <strong>the</strong> prepared textsfound in this journal.Each representative was askedto answer three questions: How haveinformation operations changed in <strong>the</strong>irrespective countries over <strong>the</strong> past tenyears? How can countries neutralizean extremist’s use of <strong>the</strong> Internet? Andwhat new ideas in regard to informationoperations or o<strong>the</strong>r cyber-related issuesare emerging from <strong>the</strong>ir countriesperspective? In addition to <strong>the</strong> twelvecountries noted, FMSO attempted toanswer <strong>the</strong> same questions based onChinese materials.Some representatives were able toeasily answer all three questions whileo<strong>the</strong>rs, due to o<strong>the</strong>r priorities in <strong>the</strong>irdefense departments or simply due to alack of cyber capabilities and thus cyberexperience, were limited to answeringonly one or more questions in detail.Each country focused on differentaspects of IO according to its particularIO context and perspective. There is noFMSO comment on <strong>the</strong>se . Ra<strong>the</strong>r <strong>the</strong>reader must judge for him or herselfwhe<strong>the</strong>r <strong>the</strong> recommendations and pointsof interest offered by each speaker areworthy of fur<strong>the</strong>r consideration.A few general conclusions canbe drawn from this short summary of<strong>the</strong> country representatives preparedpresentations. First, <strong>the</strong>re are still manydifferent ways to define IO. While some“The Challenge of Information Operations”International IO Seminarof <strong>the</strong> countries’ definitions clearlywere modeled after <strong>the</strong> US definitiondeveloped years ago, <strong>the</strong>re were severalcountries (Ukraine and Australia inparticular) that are moving in differentdirections. Bulgaria is working on aneffects-based frame of reference asmuch as on an IO frame of reference,it appeared, as it strives to work closelywith NATO. Second, several countrieshighlighted (such as India did) <strong>the</strong>economic aspect of IO. This is a point ofconcern to several countries. Accordingto one Chinese author, who was not a partof this seminar, “war with <strong>the</strong> objective ofexpanding territory has already basicallywithdrawn from <strong>the</strong> stage of history, andeven war with <strong>the</strong> objective of fightingfor natural resources is now giving wayto war with <strong>the</strong> objective of controlling<strong>the</strong> flow of financial capital.” It appearsthat <strong>the</strong> integration of civilian andmilitary systems and <strong>the</strong> focus on criticalinfrastructure protection has causedserious concern in <strong>the</strong> future economicperspective of several countries. Third,two items appear to have <strong>the</strong> interestof all participants: first, that criticalinfrastructure protection is of paramountconcern (Chile, Argentina, Taiwan, etc.)and second, that nations have to do moreto control extremist’s use of <strong>the</strong> Web(as highlighted by Canada and Israel inparticular). Fourth, one nation, Russia,called for expanded definitions of <strong>the</strong> terminformation weapon and for expandeduse of <strong>the</strong> United Nations to control <strong>the</strong>se“weapons.” Finally, Senegal highlighted<strong>the</strong> wide gap in complex informationsystem development between nations.That country focuses mainly on <strong>the</strong>psychological operations aspect of IOand not on computer network operationsas o<strong>the</strong>rs are doing.FMSO thanks <strong>the</strong>se authors for <strong>the</strong>iroutstanding support and for <strong>the</strong> thoughtand time put into <strong>the</strong>se presentations.-- Mr. Timothy L. Thomas<strong>Foreign</strong> <strong>Military</strong> <strong>Studies</strong> <strong>Office</strong>L to R: Mr. Tim Thomas, Dr. Todor Tagarev, COL Antoine Wardini, Dr.Georgii Pocheptsovy, MG Tschai Hui-chen, Dr. Vitaliy Tsygichko, BGMark O’Neil (CGSC Commandant), CDR Derek Moss, BG Sapan KumarChatterji, Dr. Javier Ulises Ortiz, Mr. Igor Carrasco Neira , Mr. Tomer Ben-Ari, MAJ James Nicholas. (US <strong>Army</strong> FMSO)3


The Information Revolution and InformationSecurity Problems in RussiaBy Dr. Vitaliy N.TsygichkoEditorial Abstract: Dr. Vitaliy Tsygichko states <strong>the</strong> global community must define “what is an information weapon” and mustdevelop an international convention to limit <strong>the</strong>ir use. This should be done under United Nations (UN) auspices in orderto prevent <strong>the</strong> proliferation of information weapons and effectively resist <strong>the</strong> threats of information warfare, informationterrorism, and information crime. Dr. Tsygichko lays out Russia’s position on this issue in <strong>the</strong> form of recommended elementsof an international convention.IntroductionThe late 20th and early 21st centurieswere marked by <strong>the</strong> next phaseof technological change, notably,<strong>the</strong> introduction of information andtelecommunications technologies (ITT)across nearly all vital activities—and <strong>the</strong>development of <strong>the</strong> World Wide Web.Information and telecommunicationsnetwork technologies and <strong>the</strong> fast spreadof local and global networks provide anew quality of information exchange,shape a new global information space,and impact all facets of public life:politics, economics, culture, internationalrelations, plus national and internationalsecurity.Changes in <strong>the</strong> world informationspace act as a global development factor,and determine <strong>the</strong> key directions ofsocial progress. Most important among<strong>the</strong>se are:• Acceleration of scientific,technological, economic, social, andcultural developments thanks to greatervolume and speed of informationexchange irrespective of distance.• Opportunities for disseminationof new ideas and knowledge plusrapid proliferation of scientific andtechnological achievements.• Creation of a basis for <strong>the</strong> elaborationand spread of a new scientific andphilosophical paradigm for <strong>the</strong> 21stcentury based on understanding <strong>the</strong>many facets of <strong>the</strong> world and on <strong>the</strong>realization of humankind’s commonglobal problems.• Intensification of global integrationtrends, in particular in economic, political,information, technological, educational,cultural, and o<strong>the</strong>r areas.• Creation of premises for <strong>the</strong>development and introduction of newforms and methods of ensuring global,regional, and national security.• Progress in <strong>the</strong> areas of political,economic, production, military control,and international relations.Insignia of <strong>the</strong> Russian FederationArmed Forces. (Wikimedia)At <strong>the</strong> same time, <strong>the</strong> worldcommunity’s “computerization” breedsa whole set of negative geopoliticalimplications. First comes polarization of<strong>the</strong> world (resulting in <strong>the</strong> widening of <strong>the</strong>gap between rich and poor and betweentechnologically backward and advancedcountries) and <strong>the</strong> realization of a growingnumber of marginal countries along<strong>the</strong> roadside developing civilization.These countries are <strong>the</strong> main source ofinstability for current and future conflictsincluding those of a global character.Thus, <strong>the</strong> information revolution notonly accelerates civilization’s progress,but gives rise to new national, regional,and global security threats—primarilyterrorism.The Information Revolution in<strong>Military</strong> AffairsNew IT changes are most radicalin <strong>the</strong> military. Recent developmentsclearly point to <strong>the</strong> fact that militarypower still remains <strong>the</strong> key argumentbehind global and regional policies.Moreover, <strong>the</strong> significance of militaryforce keeps increasing. After <strong>the</strong> ColdWar <strong>the</strong> world entered a period ofregional wars and political instabilityas <strong>the</strong> number of large-scale militaryoperations of a global, regional, andnational character increased sharply.Attempts to curb nuclear proliferationfailed. Under <strong>the</strong>se circumstances,<strong>the</strong> US—<strong>the</strong> recognized leader of <strong>the</strong>Western world—and <strong>the</strong>ir allies set outto cope with <strong>the</strong>se security challengesand defend <strong>the</strong>ir national and groupinterests by establishing and maintaininga “new world order” based largely onthreatening <strong>the</strong> direct use of militaryforce. This US implements this strategyprimarily by building up military power,through reorganization of <strong>the</strong> armedforces in line with <strong>the</strong> tasks and supplyissues associated with a new generationof arms. All of <strong>the</strong>se make wide use ofnew information technologies. DesertStorm operations, actions in <strong>the</strong> formerYugoslavia, and <strong>the</strong> current war in Iraq,illustrate this strategy in practice.The wide introduction of newinformation technologies greatlyi n c r e a s e s c o m b a t c a p a b i l i t i e sof conventional arms and defenserelatedtechnologies. Informationtechnologies foster qualitative changesin reconnaissance and communication,4 Special Edition 2008


will be quite different, when <strong>the</strong>ywill no doubt make sacrifices for <strong>the</strong>sake of retaining <strong>the</strong>ir sovereigntyand independence. But <strong>the</strong> currentgeopolitical situation is such that<strong>the</strong>se nations/alliances dominate<strong>the</strong> world in economic, political,and military respects, and <strong>the</strong>y arefacing no direct military threat.Today’s terrorist threat is quite real,and <strong>the</strong> West may accept certainsacrifices while fighting it. As civilsociety gets entrenched, it becomesmore difficult to use military forcein situations not threatening <strong>the</strong>state’s existence. So, as far asadvanced democratic nations areconcerned, it is <strong>the</strong> civilizationfactor—<strong>the</strong> level of admissiblecasualties in handling foreign policyproblems by military means—that isattaining ever-larger significance. Inrecent decades, experience gainedin military conflicts of a different scalein reveals <strong>the</strong> level of admissible lossesamounts today to only scores of humanlives. This becomes one of <strong>the</strong> majorfactors restraining <strong>the</strong>se nations fromuse of military force.This factor manifested itself mostfully in <strong>the</strong> still smoldering Balkanscrisis. <strong>Military</strong>-political implicationsof <strong>the</strong> former Yugoslavia conflict madeit necessary to radically revise manystrategic assessments linked to <strong>the</strong> use offorce in local conflicts. Notably, NATOoperations in Yugoslavia deadlockedin mid-May 1999, with <strong>the</strong> allianceon <strong>the</strong> brink of a split over two keyissues: continuation of bombing; and <strong>the</strong>possibility of a land operation. NATO airoperations failed to produce <strong>the</strong> desiredresults, and <strong>the</strong> Yugoslav army retainedmost of its combat capability. It wasprepared to put up heavy resistanceagainst NATO use of land forces incase of a ground invasion. Aerialbombing—carefully targeted as it maybe—inevitably resulted in civiliancasualties which sharply undermined <strong>the</strong>operational support of European publicopinion. In fact, Greece was against <strong>the</strong>military operation, and <strong>the</strong> Italian andGerman governments faced problemswithin <strong>the</strong>ir respective parliaments.Even under threat of <strong>the</strong> alliance’sThe Russian Federation. (Univ. of Texas)disintegration, public humiliation, andin effect, revision of <strong>the</strong> outcome of <strong>the</strong>Cold War, NATO was unprepared for aground operation. Such is <strong>the</strong> influence of<strong>the</strong> civilization factor. Though within <strong>the</strong>boundaries of <strong>the</strong> European “province,”NATO operations demonstrated <strong>the</strong>impossibility of realizing military power,even in a small military conflict.The civilization factor is alsobehind <strong>the</strong> deadlock in Iraq, whichis experiencing a civil war with noprospects for an end in sight, despite <strong>the</strong>presence of a big foreign contingent andattempts to regenerate <strong>the</strong> Iraqi <strong>Army</strong>.Deaths of Western alliance soldiers andIraqi civilians keep mounting, reaching alevel where public opinions in Coalitioncountries are more and more persistentlyurging to pull <strong>the</strong>ir units out of Iraq.This in spite of <strong>the</strong> fact it may lead toyet ano<strong>the</strong>r victory of Islamic radicalsover <strong>the</strong> civilized world, and to a fur<strong>the</strong>rescalation of <strong>the</strong>ir activities in o<strong>the</strong>rregions, including Russia.In <strong>the</strong> rest of <strong>the</strong> world, outside<strong>the</strong> club of developed nations, <strong>the</strong>civilization factor does not yet playa significant role. Regional militaryconflicts of a different scale and characterdo not generally take <strong>the</strong> value of humanlife into consideration. The 1980s Iran-Iraq war, practically all wars in Africa,<strong>the</strong> civil war in Afghanistan, <strong>the</strong> China-Vietnam conflict, <strong>the</strong> armed struggle ofKurds for independence from Turkey,—and o<strong>the</strong>r military conflicts associatedwith <strong>the</strong> huge loss of human life—areall examples.Disregard for human life isspecifically characteristic of Islamicextremism, where principles of selfsacrificein <strong>the</strong> struggle with “infidels”provide terrorists with huge advantagesin <strong>the</strong>ir war against Western civilization.The latter is incapable—by its verynature—of sacrificing its citizens, andanswer terror with terror. Effectivecounterterrorism is possible only throughjoint efforts on a global scale. The entireworld community must coordinate itsanti-terrorist activities, to include thosein <strong>the</strong> area of information terrorism.Information TerrorismAs an integral part of technologicalterrorism, <strong>the</strong> spread of information orcybernetic terrorism poses a seriousglobal threat. Though this type ofcriminal activity is not yet a widespread,practical terrorist activity, <strong>the</strong>re is a ra<strong>the</strong>rhigh near term danger. Terrorists makeuse of <strong>the</strong> civilized world’s openness forattaining <strong>the</strong>ir ends. In <strong>the</strong> past, it wasmore difficult to arrange and executeterrorist acts because of <strong>the</strong> associated6 Special Edition 2008


Some groups attempted to combine<strong>the</strong> two approaches, such as <strong>the</strong>suggestion to call means of informationinfrastructure destruction which use ITT“information weapons.” However, suchcombined approaches fail to alleviateuncertainties in identifying informationweapons.According to <strong>the</strong>se approaches,only software designed exclusively fordisrupting information infrastructure(viruses, etc.) can be unconditionallycalled information weapons. All o<strong>the</strong>rmodern means of armed struggleincorporating ITT are multi-purpose,designed not only for destroyinginformation infrastructure but also foro<strong>the</strong>r combat missions. These meansdiffer from past generation weapons given<strong>the</strong>ir higher selectivity and accuracy.They are in a sense “humane” weapons,and are not classified as weapons of massdestruction.Countries possessing sophisticatedw e a p o n s , r e c o n n a i s s a n c e ,communication, navigation, and controlbased on <strong>the</strong> wide-scale application ofITT, have a decisive military advantage.Naturally, such countries will neverbecome parties to any agreementslimiting this advantage. The currentUS stance clearly illustrates this <strong>the</strong>sis;this nation bluntly refuses to negotiateon issues associated with informationweapons, and resists such discussionsin <strong>the</strong> UN Disarmament Commission.The US is only prepared to considerinformation terrorism and informationcrime-related issues.However, Russia would liketo know if it is possible to developcriteria for identification of informationweapons (apart from software) that areacceptable to all negotiating parties.Could information security problemcriteria only limit multi-purpose weaponsystems used against civilian informationinfrastructure projects, instead of banning<strong>the</strong>m? This raises <strong>the</strong> question ofwhe<strong>the</strong>r <strong>the</strong> very issue of banning orlimiting manufacture, proliferation, anduse of information weapons is feasibleat all.Such negotiations may largelyconcern only single-purpose weaponsdesigned for affecting <strong>the</strong> informationinfrastructure components (weaponsbased on program codes such as differenttypes of viruses and <strong>the</strong>ir means ofdelivery). However, <strong>the</strong> universality,secrecy, surprise application, possiblewide-scale trans-border utilization,efficiency, and high effectiveness notonly make such weapons an extremelydangerous means of destruction, butmay significantly hamper installationof a relevant international controlsystem. Fur<strong>the</strong>r, <strong>the</strong> overwhelmingmajority of modern ITT—usablefor military, terrorist, and criminalends—are developed in civilian sectors,hence control of <strong>the</strong>ir development andproliferation is highly difficult.At <strong>the</strong> same time, <strong>the</strong> threat ofinformation weapons is real for us all,especially developed nations where<strong>the</strong> complex information infrastructuresupports all vital activities. We arewitnessing a situation where onlyconcerted international communityefforts can lower <strong>the</strong> threat. Today,identifying and agreeing on a list ofkey critical information systems (bothpublic and private), whose functions arecritically important for ensuring vitalactivities plus international security,is a necessity. Identification of thisclass of information systems will makeit possible to develop more effectiveprotection measures, including <strong>the</strong> rightto take retaliatory measures. This willalso permit elaboration of internationalemergency threat response mechanisms,as an IW attack will likely affect <strong>the</strong>national security of various countries.Real steps toward pooling globalinformation security efforts wouldseem to be found through internationalelaboration and endorsement ofa convention (treaty) providing <strong>the</strong>following:• Renunciation of informationwarfare and <strong>the</strong> development and useof information weapons designed for<strong>the</strong> destruction of <strong>the</strong> informationinfrastructure, including arms based onprogrammed codes• Harmonization of nationallaws governing information securitycounteractions;• Elaboration of legal, organizational,economic, military, technological,and o<strong>the</strong>r international measures, plusmechanisms for resolving conflictsin <strong>the</strong> information security area, tocounter information warfare, informationterrorism, and information crime;• Development of mechanisms forparties-to-convention interaction incollectively countering informationsecurity threats. This would involve <strong>the</strong>permanent exchange of situation reviews,information on potential adversaries, andemergencies associated with informationinfrastructures, all with a view todesigning adequate countermeasures;• Compiling a list of criticallyimportant national informationinfrastructure projects, whose destructionmay lead to large-scale man-madedisasters and casualties;• International laws for protectionof critical information infrastructureprojects, with attacks on <strong>the</strong>m consideredas a crime against humanity;• Development of convention-relatedinternational control and informationsecurity monitoring systems;• Accountability of conventionviolators.In order to prevent a single countryor group of countries from unfair oradvantageous use of <strong>the</strong> conventionprovisions, it would be reasonable toadopt declarations to refrain from:• Actions leading to dominance andcontrol within information space;• Denying access to <strong>the</strong> mostsophisticated information technologies,(to counter technological dependence incomputerization that could lead to <strong>the</strong>detriment of o<strong>the</strong>r states).S u c h d e c l a r a t i o n s w o u l dd i s p e l d o u b t s i n d e v e l o p i n gcountries as to <strong>the</strong> non-discriminatorynature of <strong>the</strong> convention.The first step toward elaborationand adoption of such an internationalinformation security convention could be<strong>the</strong> establishment—within <strong>the</strong> frameworkof <strong>the</strong> UN—of an international team ofexperts to analyze <strong>the</strong> following:• Scientific elaboration of an agreedframe of reference, including fundamentalnotions such as “information warfare,”8 Special Edition 2008


“information terrorism,” “informationcrime,” “information weapons,” etc.;• Compilation of a list of threats toinformation security, <strong>the</strong>ir classification,and how an adversary might implement<strong>the</strong>m;• Development of informationweapon classification principles andidentification criteria;• Compilation of a list of criticalinformation infrastructure projects, anda description of possible effects of <strong>the</strong>irdisruption;• Compilation of a list of possibleinformation security countermeasures;• Key principles for <strong>the</strong> developmentand functioning of an international systemof ensuring information security;• Compilation of voluntaryobligations assumed by conventionsignatories, and possible measures to betaken against convention violators.The first of <strong>the</strong>se international teamsof experts could develop a method forensuring international informationsecurity, which would determinesubsequent team efforts, and serve asa basis for <strong>the</strong> main provisions of aninformation security convention.The concept of ensuring internationalinformation security should cover:• A common perception of informationsecurity problems;• Uniform terminology and a frameof reference;• An evaluation of <strong>the</strong> currentinformation security situation;• An assessment of current andpotential threats to information security• The international community’sgoals and objectives with respect toensuring information security;• A description of problems associatedwith shaping an international informationsecurity legal control regime;• Measures for countering informationsecurity threats;• Potential information securityinteraction mechanisms;• Recommendations regardingd e v e l o p m e n t a l p r i n c i p l e s a n dkey provisions for an internationalinformation security convention.ConclusionInternational elaboration of aninformation security convention couldbecome an important practical step indealing with <strong>the</strong> complex informationweapons issues. Creation of aninternational legal regime could go along way in governing <strong>the</strong> development,proliferation, and use of informationweapons; preventing information wars;and ensuring an effective counteractionto information terrorism and informationcrimes.Dr. V.N. Tsygichko, Colonel, Russian <strong>Army</strong>, Ret., is a full member of <strong>the</strong> RussianAcademy of Natural Sciences, and since 1985 <strong>the</strong> chief researcher at <strong>the</strong> Instituteof Systems Analysis of <strong>the</strong> Russian Academy of Sciences (ISA RAS). He is currently <strong>the</strong>Russian Federation’s Ministry of <strong>Foreign</strong> Affairs expert on information security problems.Since 1967 he has served <strong>the</strong> Central Research Institute of <strong>the</strong> Ministry of Defense, working onma<strong>the</strong>matical simulations of military operations. <strong>From</strong> 1988 - 1991 he headed an autonomousCenter for Research into National Security Problems. Dr. Tsygichko’s range of scientific interestsembraces methodological and systematic problems of modeling socio-economic processes;decision <strong>the</strong>ory; applied systems analysis; <strong>the</strong> <strong>the</strong>ory and methods of socio-economic forecasting;ensuring national security and strategic stability; information security problems; and geopoliticalproblems. He has authored over 200 papers and 6 books. Dr. Tsygichko is a founder of a newnational school of ma<strong>the</strong>matical simulation and forecasting of complex social processes inmilitary and socio-economic areas. He has developed principles and methods of systems <strong>the</strong>oryapplication, introduced an information <strong>the</strong>ory of statistically unreliable decisions, and developeda scenario approach to researching and forecasting socio-economic processes. Some of his papersinclude: “On Decision Making for Managers” (1992), “Information Challenges to National andInternational Security” (2001); and “Models as Part of <strong>the</strong> Strategic <strong>Military</strong> Decision MakingSystem in <strong>the</strong> USSR” (2005). He is a permanent author of journals such as <strong>Military</strong> Thought,<strong>Military</strong> Bulletin, Independent <strong>Military</strong> Review, and a number of foreign publications. He isa graduate of <strong>the</strong> Ryazan Artillery <strong>Military</strong> School, <strong>the</strong> Dzerzhinsky <strong>Military</strong> Academy, andholds a Doctor of Science (Engineering).9


An Overview of Information Operationsin <strong>the</strong> Indian <strong>Army</strong>By Sapan Kumar Chatterji, Brigadier General, Indian <strong>Army</strong>Editorial Abstract: Brigadier General Chatterji believes India’s IO methods differ only slightly from those used by manyWestern nations. Such distinctions include methods such as economic information warfare, in which one nation couldstrangle ano<strong>the</strong>r’s access to external data, <strong>the</strong>reby removing <strong>the</strong> benefits associated with exchange of information and <strong>the</strong>rebycrippling <strong>the</strong> economy. He believes India has o<strong>the</strong>r independent initiatives that have expanded <strong>the</strong> overall meaning and useof IO, including <strong>the</strong> topic of sub conventional operations.Information operations (IO), as aconcept, are as old as man’s questfor warfare and his dependence oninformation. However, its role hasincreased tremendously due to <strong>the</strong>exceptional growth in technology over<strong>the</strong> past few decades. Indian mythologycirca 5000 BC is replete with examplesof <strong>the</strong> innovative and effective use ofinformation warfare as a war winningeffort. The announcement of <strong>the</strong> death ofAshwathama amidst <strong>the</strong> beating of drums(jamming), and various o<strong>the</strong>r tacticsof Lord Krishna to gain informationsuperiority, are just a few of <strong>the</strong> numerousepic examples.Today, <strong>the</strong> importance of IOduring recent conflicts and <strong>the</strong> ongoingcounter-terrorism operations in Jammu& Kashmir [Indian provinces] haveundisputedly created a new dimensionof battle. IO has become <strong>the</strong> fifthdimension of warfare. This articlecovers <strong>the</strong> concept of informationwarfare in <strong>the</strong> Indian <strong>Army</strong>, as well ascertain counterinsurgency initiativesIndia has taken in <strong>the</strong> past few years.The discussion covers: <strong>the</strong> objective andprinciples of information warfare; <strong>the</strong>terminology of information warfare; <strong>the</strong>forms of IW; <strong>the</strong> necessity to deny use of<strong>the</strong> Internet to terrorists; and <strong>the</strong> role ofinformation warfare in sub-conventionaloperations.Objectives/Principles of IWIW is utilized to achieve all or anyof <strong>the</strong> following objectives:• Develop and maintain a comprehensiveinformation base of an adversary’scapabilities, and forecast <strong>the</strong>ir likelyactions.• Deny information about one’s ownand o<strong>the</strong>r friendly forces, and denyinformation about operations conductedagainst enemies and adversaries.• Influence perceptions, plans, actions,and <strong>the</strong> will of adversaries to opposeour own/friendly forces by <strong>the</strong> use ofoffensive IW.• Influence noncombatant and neutralorganizations to support friendlymissions, or at least not resist friendlyactivities.• Protect friendly decision makingprocesses, information, and informationsystems.• Degrade adversaries’ informationsystems.IW is <strong>the</strong> result of competition broughtabout by <strong>the</strong> convergence of a numberof evolving technologies, includingimaging, remote sensing, precisionguided munitions, stealth, directedenergy weapons, and above all digitalcommunications & computer networks.During conflict, <strong>the</strong>se technologies arein direct confrontation.TerminologyTerms used here include:• Information Operation (IO) - Actionstaken to affect adversary information andinformation systems, while defendingone’s own information and informationsystems;• Information warfare (IW) - Actiontaken during all forms of conflict, toachieve information superiority over<strong>the</strong> adversary by adversely affecting hisinformation and information systemswhile protecting one’s own informationand information systems;• Information Assurance - Informationoperations that protect and defendinformation and information systemsby ensuring <strong>the</strong>ir availability, integrity,au<strong>the</strong>ntication, confidentiality, and nonrepudiation.This includes providingprotection, detection, and reactioncapabilities;• Information Superiority - A stateachieved when a competitive advantageis derived from <strong>the</strong> ability to exploit asuperior information position.Forms of IWIW is not a distinct type of warfarebut exists in different forms. IW can beapplied at every level of war, across allphases of an operation, and encompasses<strong>the</strong> entire range of military operations.The Indian <strong>Army</strong> defines seven formsof IW:• Command & Control Warfare(C2W)• Electronic Warfare (EW)• Cyber Warfare (Cyber W)• Network Centric Warfare ( NCW)• Intelligence Based Warfare (IBW)• Psychological Warfare (PSYWAR)• Economic Information Warfare(EIW)C2WC2W implements informationwarfare on <strong>the</strong> battlefield, and integratesit with physical destruction. Itsobjective is to decapitate <strong>the</strong> enemy’scommand structure from <strong>the</strong> body offorces. C2W aims to influence, denyinformation, degrade, or destroy enemyC2 capabilities, while protecting one’sown C2 systems against such actions.C2W is <strong>the</strong> war fighting application ofIW in military operations.The foundation of C2Wlies in efficient command, control,communications, and computer (C4)systems, coupled with seamlessinformation and intelligence support.C2W consists of <strong>the</strong> following:10 Special Edition 2008


• OPSEC - A process of identifyingcritical information and one’s ownactions that can be observed by enemyintelligence systems, determiningindicators an enemy could interpretto derive critical information on one’sown forces; and selecting and executingmeasures that eliminate <strong>the</strong> vulnerabilitiesof one’s actions to enemy exploitation;• <strong>Military</strong> Deception - Actionsexecuted to mislead enemy commandersas to one’s capabilities, intentions, andoperations;• Psychological Operations - Thepurpose of PSYOP is to induce enemyattitudes and behavior favorably to one’sobjectives;• EW - <strong>Military</strong> action involving <strong>the</strong>use of <strong>the</strong> electromagnetic and directedenergy spectrums in order to control <strong>the</strong>electromagnetic spectrum;• Physical Destruction - Theapplication of combat power todestroy or neutralize hostile C2targets.EWEW is a set of militaryactions taken to deny <strong>the</strong> use of<strong>the</strong> electromagnetic spectrum tohostile forces while retaining <strong>the</strong>ability to use it. The endeavor isto deny, degrade, delay, or disruptinformation in order to create afalse picture so that incorrect actionresults. Major components of EW:• Electronic Support Measures(ESM)• Electronic Counter Measures(ECM)• Electronic Counter-CounterMeasures (ECCM)Cyber WarfareCyber warfare entails techniques todestroy, degrade, exploit, or compromise<strong>the</strong> enemy’s computer based systems—including attacks on computer networks.In contrast to physical combat, <strong>the</strong>seattacks exploit known lapses in a systemssecurity structure. Cyber warfareincludes <strong>the</strong> following actions:• Techniques to destroy, degrade,exploit, or compromise <strong>the</strong> enemy’scomputer based systems;• Attacks on computer networks;• Hacking/breaking into computernetworks to include defacing websites;• Intercepting and monitoringclassified information on networks,corrupting and manipulating stored data,and injecting viruses likely to causeirreparable losses;• Cyber security, includingencryption.Network Centric Warfare (NCW)NCW focuses on <strong>the</strong> combat powerthat can be generated from <strong>the</strong> effectivelinking or networking of war fightingmachinery/organizations. The basicelements necessary to generate <strong>the</strong>required shared battle space awareness toachieve <strong>the</strong> Commander’s intent are:Indian soldiers raise <strong>the</strong>ir national colors.(MOD India)• A virtual sensor or “surveillance”grid that would provide a “grid ofcapabilities” overlaying <strong>the</strong> battle spaceinstead of a series of independent singlesensors;• A communications grid that wouldleverage <strong>the</strong> strength of <strong>the</strong> worldwidetelecommunications infrastructure. Thiswould enable communications to beconsidered as virtual grids overlaying<strong>the</strong> tactical, operational, and strategicareas;•An abstract grid of weapons or“tactical grid” available to commanders,sorted by suitability and availabilityagainst a hostile order of battle.Intelligence Based Warfare (IBW)IBW occurs when intelligence is feddirectly into operations, instead of beingused as input for overall command andcontrol. As sensors grow more accurateand reliable, proliferate in type andnumber, and as <strong>the</strong>y become capableof feeding fire control systems in realtimeand near-real-time, <strong>the</strong> task ofdeveloping, maintaining, and exploitingsystems that sense <strong>the</strong> battlefield, assessits composition, and send results toshooters assumes greater importance fortomorrows militaries.IBW is about conducting warfarein a transparent battlefield environment.However, while increasing <strong>the</strong>transparency for one’s own functioning,an important consideration shouldbe to decrease it for <strong>the</strong> enemy. Theneed is to create an asymmetryin <strong>the</strong> level of transparency orsituational awareness, in relationto <strong>the</strong> enemy.Psychological WarfareP s y c h o l o g i c a l Wa r f a r eencompasses <strong>the</strong> use of informationto influence <strong>the</strong> human mind. It isalso defined as actions carried outduring peace, crisis, or wartimesituations, so as to influence <strong>the</strong>attitudes and behavior of enemy,friendly, or neutral audiences,towards fulfillment of political andmilitary objectives.Psychological operations canbe used over <strong>the</strong> entire supportspectrum of military operations,wherein all agencies work in synergyto achieve <strong>the</strong> desired end state. Theaims of psychological operations froma military point of view are:• Create of doubt, dissidence, anddissatisfaction within <strong>the</strong> ranks and<strong>the</strong>reby lowering <strong>the</strong> morale and reducing<strong>the</strong> efficiency of adversary forces;• Reinforce <strong>the</strong> feeling of friendlytarget audiences and influence opinionmakers;• Gain support and cooperation ofuncommitted or undecided audiences;• Help achieve conflict prevention,resolution, and achieve a desired endstate.11


Psychological operations aredivided into four distinct but overlappingcategories:• Strategic Psychological Operations- This is PSYOP at <strong>the</strong> national level,conducted predominately outside <strong>the</strong>military arena. It utilizes all nationalassets and is directed at all types ofaudiences. Objectives are long term. Theprimary aim is to reduce <strong>the</strong> war makingcapability of <strong>the</strong> adversary;• Operational PsychologicalOperations - This type is conductedduring both war and peace time in<strong>the</strong> operational area to promote <strong>the</strong>operational commanders aims andobjectives. These operations are launchedin consonance with military operations,throughout <strong>the</strong> military operationalarea. All assets in <strong>the</strong> operational areaare utilized;• Tactical Psychological Operations- These are conducted in <strong>the</strong> tacticalarena, in consonance with tacticalmissions and objectives;• Counter Psychological Operations- The aim of this type of PSYOP isto safeguard one’s own forces andfriendly population from an adversary’spsychological operations. One mustsimultaneously carry out counterpsychological operations, identifying anadversary’s broad pattern of operations, toinclude <strong>the</strong> technical means and mediumof dissemination. Countermeasures are<strong>the</strong>n instituted, including informing <strong>the</strong>audience about <strong>the</strong> adversary’s maliciousagenda.The most popular non-militaryand military mediums used for <strong>the</strong>dissemination of psychologicaloperations are print, television, radio, andcyber. Print is one of <strong>the</strong> most effectiveand widely used media, which has beenused extensively in all psychologicalcampaigns to target educated targetaudiences. Newspaper, magazines,leaflets, posters, pamphlets, and booksare associated with this medium.Television, with its ever-increasingpopularity, is one of <strong>the</strong> most powerful,flexible, and immediate means ofinfluence. It has become a very importantpsychological tool, as effectivelydemonstrated during <strong>the</strong> Gulf Wars and<strong>the</strong> 1999 Kargil operations. Televisionwas an extensive part of <strong>the</strong> psychologicalcampaign, and instrumental in achieving<strong>the</strong> final military objective.Radio has been used as an importantpsychological operations tool sinceWorld War I, due to its reach andcapability to affect target audiences.It can penetrate inaccessible areas totarget insurgents, enemy soldiers, and at<strong>the</strong> same time help in <strong>the</strong> psychologicalconditioning of one’s own forces.Finally, <strong>the</strong>re is <strong>the</strong> cyber dimension.The Internet has become a very importantmedia tool. The numbers of Internetusers are increasing rapidly, and intime will be one of <strong>the</strong> most powerfulmeans of dissemination for one’s ownpsychological operations. At <strong>the</strong> sametime, this medium is also available toIndian Armed Forces Emblem(Wikipedia.org)adversaries and terrorists, hence <strong>the</strong>re isa need to monitor and counter maliciouspropaganda.Economic Information WarfareThis form of warfare is onlyconducted at <strong>the</strong> national level, asa combination of IW and economicwarfare. It can also be understood as avariant of an economic blockade, wherein<strong>the</strong> well being of societies will be affectedby information flows of economic data,instead of <strong>the</strong> flow of material suppliesas <strong>the</strong>y are today. In this form of warfarenations would strangle ano<strong>the</strong>r nation’saccess to external data, removing <strong>the</strong>benefits associated with <strong>the</strong> exchangeof information, and <strong>the</strong>reby crippling <strong>the</strong>economy. Nations would also strugglewith one ano<strong>the</strong>r to dominate strategiceconomic industries.Denying <strong>the</strong> Internet toTerroristsWith terrorists using cyberspaceto communicate and coordinate <strong>the</strong>iractivities, denying <strong>the</strong>m this medium iscertainly an important issue. However,<strong>the</strong>re are a large number of factors thatimpede nations from undertaking seriousand immediate steps, since <strong>the</strong>se couldeasily violate individual privacy—andaffect <strong>the</strong> performance of knowledgebasedindustries.Monitoring of DataIt is impossible to monitor everybyte transaction on <strong>the</strong> Internet because<strong>the</strong> volumes are simply too huge. Unlessexplicitly warranted, democracies shouldnot resort to monitoring. However, mostnations need to consider or implementselective monitoring. This is achievablethrough liaising with Internet serviceproviders on explicit state orders. Suchmonitoring can be done at gatewaysand routers, or <strong>the</strong> “last mile” stubs(i.e. switches / routers) where specificintelligence is available.Who to monitor, where to filter, orwhich switch/router to monitor can onlybe determined through hard intelligence.Therefore, it is extremely important toestablish coordination between variousintelligence agencies for this specificpurpose. Methods include using certainkeywords for <strong>the</strong> purpose of filtering/identifying intelligence data.Cyberspace monitoring can reaprich dividends if a state obtains hardintelligence. Fur<strong>the</strong>r, <strong>the</strong> threat arisingfrom cyberspace needs analysis andplanning. For this purpose, RiskMitigation Plan / Disaster RecoveryPlan (DRP) development are <strong>the</strong> bestrecommendations. At <strong>the</strong> national levelsuch a contingency plan helps ensure thatshould critical resources be damaged,emergency measures and services arein place. India needs to put <strong>the</strong> DRP inaction, and exercise it periodically.12 Special Edition 2008


Cyber Laws Dealing with Mail /Blog / Portal Service ProvidersCommunications between terroristswould usually take place throughstandard mail portals, chat rooms, etc.States need laws need to enact andduly amalgamate international laws, toprovide understanding and cooperation,so that should a nation request transactiondetails or trace back details for any user,ISPs will provide answers. Such actionsmust be transparent through internationalboundaries, based on <strong>the</strong> need to fightthis menace jointly at <strong>the</strong> internationallevel. In addition, since terrorists use<strong>the</strong> Internet for recruitment throughmisinformation, some of <strong>the</strong> steps wecould take in this direction are:• Exchange information pertainingto websites, blogs, chat rooms, etc.between nations that might containoffensive material;• Block such websites in our nationalinterest;• Host websites (as a part ofPsychological Operations) containingactual, factual information that mightbe used to influence, and sway awaypotential targets, or from embracingterror activities;• Track down offensive websites andclose <strong>the</strong>m if hosted in our countries.An international treaty of this kind,enacted and enforced, can help ensurewe deny terrorists space for hostingsuch sites.Cyber PolicingTo detect and annihilate <strong>the</strong> terrorists’Internet attack planning and coordinatingmedium, we need to develop CyberPolicing Organizations. Hard intelligencemust be ga<strong>the</strong>red from cyberspace toprovide enough clues to allow for <strong>the</strong>tracking of criminals and terrorists. Thecapabilities to handle multiple protocols,encrypted algorithms, code breaking, andso on should be incorporated into ourmonitoring agencies.Building a Cyber ForensicCapabilityIndia needs to establish a NetworkCyber Forensic capability to enable traceIndia in its south Asian context. (Wikimedia)back of messages, attacks, and o<strong>the</strong>rmalicious activities. The internationalcommunity needs to develop IT lawsthat support state sponsored cyberforensics, not only for <strong>the</strong> purpose oftracking down terrorists, but for use aslegal exhibits in a court of law. PC-basedforensics designed for data recovery canhelp to wean out intelligence capturedfrom terrorists. Similarly, India needs tocompile a cryptology analysis capability,so we can crack encrypted traffic andbreak passwords. This requires longterm government-sponsored initiatives,say at academic institutes or at researchinstitutions. However, this too is aexpensive and longer range activity.Sub Conventional OperationsSub conventional warfare is ageneric term encompassing all armedconflicts above <strong>the</strong> level of peacefulcoexistence amongst states, and below<strong>the</strong> threshold of war. This includesmilitancy, insurgency, proxy war, andterrorism when employed as a means in aninsurrectionist movement, or undertakenindependently. Border skirmishesalso fall within this category. Subconventional warfare entails protractedstruggle. It could also be characterizedby asymmetry of force levels betweenregular forces and irregulars, wherein <strong>the</strong>force applied and <strong>the</strong> violence generateddepends on <strong>the</strong> modus operandi of<strong>the</strong> weaker side—and <strong>the</strong> laws of <strong>the</strong>land which bind <strong>the</strong> actions of <strong>the</strong>Armed Forces. For this discussion we’llconsider counterterrorist operations,and public information and perceptionbuilding operations.Counter Terrorist OperationsInformation operations in <strong>the</strong> contextof <strong>the</strong> sub conventional spectrum address<strong>the</strong> following:• Countering adverse effects ofcounterterrorist (CT) operations;• Supporting <strong>the</strong> goals and operationsof one’s own forces;• Defeating malicious propaganda;• Eroding <strong>the</strong> terrorists’ supportbase;• Helping justify one’s ownoperations and projecting <strong>the</strong> “humanface” of <strong>the</strong> Armed forces13


information installations, and equipment,along with <strong>the</strong> overall planning forand integration of communicationsresources. We will streng<strong>the</strong>n integrationof <strong>the</strong> operational environment andplatforms for communications andinformation systems. We will construct ajoint operations communications systemfeaturing operational compatibility,with <strong>the</strong> goal of integrating <strong>the</strong> differentmilitary services and joint warfarenetworks.(4) Integrating command, control,c o m m u n i c a t i o n s , i n f o r m a t i o n ,intelligence, surveillance, andreconnaissance systems: As a means ofexploiting Taiwan’s new generation offighting power, <strong>the</strong> nation is concentratingits efforts on construction of an integratedcommand, control, communications,information, intelligence, surveillance,and reconnaissance system (C4ISR) tolink up <strong>the</strong> joint operations command andcontrol system with weapons platforms.This will enable prompt synchronizedexchange of intelligence and information,improve transparency on <strong>the</strong> battlefield,eliminate <strong>the</strong> fog of battle, and initiate <strong>the</strong>buildup of an instantaneous commandand control system which can see, hear,and command. This will be a key goalin establishing information superiorityin Taiwan and exploiting <strong>the</strong> nation’sinformation operations capabilities.(5) Streng<strong>the</strong>ning electronic warfareoperations capabilities: In response tofuture forms of war and <strong>the</strong> demandfor joint operations, Taiwan is puttingall of its efforts into reorganizationof defensive equipment for electronicwarfare. This includes EW combatcapabilities, and frequency spectrummanagement capabilities for bothattacking and defending. We mustensure communications discipline andinformation security protection as ameans of enhancing IO combat power.Guided by <strong>the</strong>se policies, Taiwan willformulate a three-phase developmentalplan for information warfare:(1) First phase: Establish informationresearch organizations and formulateinformation warfare educationalprograms. Plan for <strong>the</strong> buildup ofinfrastructure for national defenseinformation. Draw up an outline forinformation warfare.(2) Second phase: Build up <strong>the</strong>infrastructure for national defenseinformation and set up an informationstrategy research center. Integrateresources at <strong>the</strong> Chung-shan Instituteof Science and Technology to researchand develop IW technology. Establishan information warfare research unitat National Defense University and setup an information warfare team andcommand mechanism.(3) Third phase: Integrate nationalresources and finish planning for amobilization mechanism for informationwarfare. Concentrate informationcombat power in <strong>the</strong> military, and supportTaiwan-Penghu defensive operations.The Evolution of an InformationSecurity Strategy in TaiwanThe Executive Yuan [Republic ofChina executive branch of government]passed <strong>the</strong> “National Communicationand Information Infrastructure SecurityMechanism Plan” in January 2001, andestablished <strong>the</strong> National Informationand Communication Security TaskForce (organizational structure givenin Figure 1) as a means of aggressivelypromoting its national informationand communications security policies.The group integrates, coordinates, andeffectively utilizes <strong>the</strong> resources ofrelevant government agencies, in orderto accelerate construction of a nationalsecurity environment and enhancenational competitiveness. In addition,<strong>the</strong>se act establish of an informationsecurity protection system, providefor inspection of information securitycontingency capabilities, and <strong>the</strong> establisha sound developmental environment forinformation security. The followingsummary of current information andcommunications security actions showshow Taiwan is meeting swift-growingtrends in science and technology, as wellas dealing with developments on bothsides of <strong>the</strong> Taiwan Strait:1. Promotion of Awareness ofInformation and CommunicationsSecurity, Personnel Training,and International Collaboration.Considering international developmentsand <strong>the</strong> current domestic environment,p r o m o t i n g i n f o r m a t i o n a n dcommunications security awareness (andtraining personnel) joins internationalcollaboration as a necessary futuretrend. Streng<strong>the</strong>ning participationin international information securityactivities will help establish regionaland global joint defense mechanisms forinformation security. Working toge<strong>the</strong>rto attack network crime and aggressivelypromoting global information securityare especially important.2. Aggressive Promotion ofInformation and CommunicationsSecurity Operations for Key NationalInfrastructure Institutions. Electronicinformation and technologies affordus <strong>the</strong> ability to closely link criticalinternal infrastructure and administrationin <strong>the</strong> Taiwanese government,including security, financial services,energy facilities, <strong>the</strong> water supply,telecommunications, postal services,transportation, shipping, medical care,and o<strong>the</strong>r important national economicand security activities. This exposesmore potential weak points, presentingopportunities to those with maliciousintent, or those not be averse to attackingTaiwan with armed force. As such, Taiwanmust build on <strong>the</strong> foundation of existingnational information and communicationssecurity efforts by streng<strong>the</strong>ning criticalnational infrastructure and institutions.This will include <strong>the</strong> establishment ofinformation security notifications andcontingency mechanisms, informationsharing mechanisms, establishinginformation security technology andinspection service teams, providingtechnology and inspection services,managing <strong>the</strong> critical infrastructurebuildup of information security systems,promoting widespread security educationand training, and promoting informationsecurity management system verification.This will be effective in providing <strong>the</strong>best security safeguards during <strong>the</strong> buildupof infrastructure3. Widespread Applicationof Wireless Networking and <strong>the</strong>Flourishing Development of ISPProviders. Wireless communicationshave developed rapidly ever since <strong>the</strong>discovery of electromagnetic waves at <strong>the</strong>end of <strong>the</strong> nineteenth century. Wirelesscommunications are an inescapable part17


Figure 2. Structural organization of <strong>the</strong> National Information and Communications Security Contingency Center(National Information and Communication Secuirity Task Force, Taiwan)terrorism, we need to understand howterrorists make use of information toachieve <strong>the</strong>ir goals:7. Methods of InformationWarfare Used by Terrorists. Only byunderstanding <strong>the</strong> IW methods availableto terrorists, and knowing <strong>the</strong> e nemyas you know yourself, can we achievevictory. Terrorist tactics are mostlysimilar to those used by <strong>the</strong> averagecomputer criminal, but <strong>the</strong>re are notabledifferences:(1) Most computer criminalswill attempt to erase <strong>the</strong>ir tracks aftercommitting crimes, so that <strong>the</strong>y canescape scot-free. By contrast, if <strong>the</strong>terrorist’s objective is shock effect, hewill typically attempt to create as largea public impact as possible when heparalyzes a system;(2) Most computer criminals arein it for <strong>the</strong>ir own pecuniary benefit.Alternately, terrorist attackers typicallyconsider <strong>the</strong>mselves to be righteous,and very few act for pecuniary benefitfor fear of getting involved in disputes.Never<strong>the</strong>less, terrorists often make useof networks to launder money;(3) Unless <strong>the</strong>y are engaged inretribution, very few computer criminalsaim to destroy computers and o<strong>the</strong>rsupport equipment. Informationterrorists may attack and destroy physicalequipment.8. Methods of Information TerrorAttacks. Having reviewed <strong>the</strong> differingmodes of attack, one can imagine that<strong>the</strong> terrorists’ methods of attack wouldinclude <strong>the</strong> following:(1) Stealing confidential information:Terrorists make use of network attacks,social engineering, and human contactto steal important classified or sensitiveinformation;(2) Paralyzing systems: Terroristsmake use of malicious code such asviruses, Trojan horses, and worms. Theyalso paralyze systems, make informationdisappear, and engage in denial of serviceattacks;(3) Physical destruction: Terroristsengage in <strong>the</strong> sabotage, especiallygovernment information systems(military, economic, defense, diplomatic,etc.) as a means of paralyzing governmentoperations.9. The Contribution Taiwan CanMake in <strong>the</strong> Fight Against Terror.Once we understand terrorist informationwarfare tactics and methods, what kindof contribution can Taiwan make in <strong>the</strong>war against terror using our existinginformation technology?(1) Taiwan’s legal efforts in <strong>the</strong> WarAgainst Terror have produced its Anti-Terror Activities Act;(2) Taiwan has formed anti-terrororganizational structure that combinesvarious national security systems and<strong>the</strong> Executive Yuan;(3) Taiwan’s potential contributionsinclude:1. Taiwan has never had anyterrorist activity nor <strong>the</strong> conditions forits presence. However, terrorism as aform of organized crime crosses bordersto obtain funding. These criminalactivities include smuggling drugs,human trafficking, money laundering,and o<strong>the</strong>r inappropriate financialoperations. These are important securityissues for Taiwan. With ample evidenceof terrorist crimes, plus clues for tracking<strong>the</strong>ir activities, we could pursue <strong>the</strong>secriminals. Taiwan could also establishcooperative mechanisms, and streng<strong>the</strong>nexisting ones, to help o<strong>the</strong>r countriesprevent terrorist activities.2. In <strong>the</strong> future, regional terroristgroups might wish to use Taiwan as agateway for <strong>the</strong>ir support or planningactivities, in order to streng<strong>the</strong>n <strong>the</strong>irdisruptive activities in o<strong>the</strong>r Asiancountries. Taiwan can effectivelyprevent terrorist elements from entering20 Special Edition 2008


and leaving <strong>the</strong> country by streng<strong>the</strong>ningits overall security control capabilities.Rigorous surveillance actions can showevidence of terrorist activities, andprovide early warning.10. Opportunities are TurningPoints. Taiwan ranked sixth among 64countries surveyed in <strong>the</strong> “IT IndustryCompetitiveness Index” released by <strong>the</strong>Economist Intelligence Unit in 2007.However, Taiwan is first in <strong>the</strong> area ofIT labor productivity and third in <strong>the</strong>area of environment for research. Thisillustrates Taiwan’s notable informationand network technology strengths.In his book The World is Flat,Thomas L. Friedman describes “<strong>the</strong> riseof Netscape and <strong>the</strong> dotcom boom thatled to a trillion dollar investment in fiberoptic cable; <strong>the</strong> emergence of commonsoftware platforms and open source codesoftware enabling global collaboration;and <strong>the</strong> rise of outsourcing, offshoring,supply chain planning, and insourcing(also known as insourcing where internalbusiness is taken on).” Friedman heldthat <strong>the</strong>se flatteners converged in 2000and “created a flat world: a global,web-enabled platform for multipleforms of sharing knowledge and work,irrespective of time, distance, geography,and, increasingly, language.” This is whywe believe that even though <strong>the</strong> Internetworld is full of dangers, it containsopportunities and turning points.(1) OpportunitiesEven though every corner of <strong>the</strong>world is different, due to geography,culture, religion, and economics, <strong>the</strong> riseof <strong>the</strong> Internet has shortened <strong>the</strong> gapsbetween people. Every second that <strong>the</strong>clock ticks, various types of informationspeed along fiber-optical cables andvia microwaves to every corner of <strong>the</strong>Earth. The concept of <strong>the</strong> global villagehas taken shape, so every country inthis new century has an opportunityfor collaboration. Taiwan holds animportant strategic position which ispivotal in <strong>the</strong> Asia-Pacific region. Wehave already constructed a ContingencyMechanism for National Informationand Communications Security, allowingour nation to share information, andcollaborate with any country in <strong>the</strong> areaof network security.(2) Turning PointsIn <strong>the</strong> future, <strong>the</strong> world will be highlyinformation-based. Rapid and instantinformation will be <strong>the</strong> key to survival.“The Earth is round, but <strong>the</strong> worldhas been flattened by <strong>the</strong> informationhighway.” Taiwan is situated withinthis torrent of information. Based on itsefforts and guided by <strong>the</strong> right policiesit will emerge as a major informationpower.1. We have excellent and indispensabletechnical human resources—we were <strong>the</strong>first to discover <strong>the</strong> method behind <strong>the</strong>zero-day attack.2. We are open and willing to shareour practical experience with friends.3. We never fail to do <strong>the</strong> rightthing.Taiwan can make use of <strong>the</strong>incredible reach of <strong>the</strong> Internet to makeits contributions in <strong>the</strong> eliminationof global extremism. The distancebetween countries has been shortened byinformation networks, and utilization of<strong>the</strong> Internet to eliminate terrorism willbe <strong>the</strong> turning point in <strong>the</strong> struggle forworld peace.ConclusionWorld trends are even harder tofathom now that we have entered <strong>the</strong> eraof information networks. Their gradualapplication throughout <strong>the</strong> world bringsa new kind of international influence. At<strong>the</strong> end of 1999, a United Nations appealrecommended <strong>the</strong> Internet be seen asan effective tool for global justice, andas <strong>the</strong> communal wealth of humanity.However, in <strong>the</strong> “New Economy” whereinformation technology and knowledgeinnovation are used to create value, is still<strong>the</strong> privilege of wealthy countries. Mostdeveloping nations are still “informationpoor, left behind by <strong>the</strong> “digital divide,”and may be cast fur<strong>the</strong>r to <strong>the</strong> marginsof <strong>the</strong> global economy. The War onTerror is a struggle which never ceases,and nobody knows when <strong>the</strong> nextdisaster is going to happen. As such,we will rely upon government policy,buildup of network infrastructure, andimprovements to information securityto minimize damage—or even preventterrorist attacks from happening again.Future wars will tend to bemultifaceted. Rapid and instantinformation will be <strong>the</strong> key to overallvictory or defeat. Information warfareis a new pattern of conflict which hasdeveloped against <strong>the</strong> backdrop of thistrend. Recent terrorist incidents haveoccurred in major cities in severalcountries, turning terrorism into <strong>the</strong>major focus of attention, and making itvery apparent that our anti-terror actionscannot be delayed.Major General Tschai “Jane” Hui-Chen currentlyserves as <strong>the</strong> Director, Information Assurance (IA) Division,Deputy Chief of <strong>the</strong> General Staff for Communications, Electronics,and Information (J6), Taiwan Ministry of National Defense. Sheis responsible for directing and overseeing <strong>the</strong> strategy, policy,and program development of MND’s information assurance andinformation warfare programs. Since 2000, she has served as <strong>the</strong>Deputy Director of <strong>the</strong> Information and Communications SecurityTechnology Center (ICST). While serving as <strong>the</strong> Director of <strong>the</strong>Training Institute for <strong>the</strong> Joint Information Operations Command,she was also assigned to organize, equip, and operate <strong>the</strong> InformationWarfare Center (IWC), <strong>the</strong> first such IO task force in Taiwan. MGTschai holds a Ph.D in Computer and Information Science fromSyracuse University, New York.21


China’s Comprehensive IW-Strategy LinkBy Timothy L. ThomasEditorial Abstract: Mr. Thomas describes how China’s Internet reconnaissance capability is central of establishing <strong>the</strong> strategyof “winning victory before <strong>the</strong> first battle.” Associated actions include China’s focus on collecting technical parameters ofo<strong>the</strong>r systems from which Chinese specialists develop countermeasures. A review of current Chinese IO <strong>the</strong>ory reinforces<strong>the</strong>ir preemptive cyber strategy policy.IntroductionInformation operations offer <strong>the</strong> PeoplesLiberation <strong>Army</strong> (PLA) a new vectorfor <strong>the</strong> Chinese military’s transformationfrom an industrial to a modern dayforce. Recent Chinese White Paperson national defense describe this vectoras <strong>the</strong> requirement to informationize<strong>the</strong> armed forces. The 2006 WhitePaper, for example, states <strong>the</strong> RMA isdeveloping worldwide and, based oninformationization, military competitionis intensifying. This document addsthat informationization will be usedas <strong>the</strong> main criteria to measure <strong>the</strong>qualitative improvement of <strong>the</strong> PLA;that for China to build a strong defense,it must build informatized armed forcesand be capable of winning informatizedwars by <strong>the</strong> middle of <strong>the</strong> twenty-firstcentury; and that <strong>the</strong> PLA has builtvirtual laboratories, digital libraries,and digital campuses to support <strong>the</strong>training and teaching needed to field thisinformatized force.How IO Has Changed in Chinaover <strong>the</strong> Past Few YearsThe basic definition of informationoperations has evolved slowly over<strong>the</strong> past ten years. Only two of scoresof definitions will be discussed here,albeit two proposed by very influentialpeople in <strong>the</strong> Chinese IO arena. In1999, IO specialist Yuan Banggenstated that information operations arespecific information warfare (IW)operations. He added that IW is <strong>the</strong>core of informationized warfare,whereas information operations are <strong>the</strong>manifestation of information warfareon <strong>the</strong> battlefield; that IO meansinformation wars in <strong>the</strong> narrow sense,that is <strong>the</strong> military field; and that IOincludes integrated, high technologycountermeasures. According to Yuan,People’s Liberation <strong>Army</strong> flag.(Wikimedia)IO’s <strong>the</strong>oretical system is formedfrom two levels, basic and applied.Basic <strong>the</strong>ories consist of conceptssuch as its organizational structure andtechnological equipment, command andcontrol for IO, and so on. He categorizesapplied <strong>the</strong>ories into offensive IO anddefensive IO; strategic, operational,campaign, and tactical levels; and intopeacetime, wartime, and crisis-periodIO. IO’s two missions are preparationand implementation. Yuan notes thatprinciples are centralized command,multi-level power delegation, multidimensionalinspection and testing, timelydecision-making, and <strong>the</strong> integration ofmilitary and civilian actions with a focuson key links. Overall, Yuan states thatall activities of IO focus attention oncommand and control.A 2005 book, Study Guide forInformation Operations Theory, offersseveral definitions of IO, and <strong>the</strong>se haveprogressed over time. Dai Qingmin,an IO specialist and former chief of aGeneral Staff Directorate, and his coworkersnote:At present <strong>the</strong>re are three maindefinitions for information operations.The first is as follows: ‘Informationoperations refer to operations usedto gain and maintain control overinformation.’ This definition expands<strong>the</strong> domain of information operations,as <strong>the</strong>re are quite a few ways to gainand maintain control over information.Second, ‘Information operations refer toa series of operational actions employedby two sides in a conflict in which <strong>the</strong>enemy’s information systems are usedor destroyed and one’s own informationsystems are protected as a means ofgaining <strong>the</strong> power to acquire, control,and use information.’ Third, ‘Informationoperations refer to a series of operationalactions undertaken to gain and maintaininformation superiority on <strong>the</strong> battlefieldor control over information. The twosides in a conflict use electronic warfareor computer network warfare to use ordestroy <strong>the</strong> information and informationnetworks of <strong>the</strong> enemy and protect one’sown information networks as a meansof acquiring, controlling, and usinginformation.Clearly, <strong>the</strong> targets of informationoperations are information itself,information systems, as well as peoples’cognition and beliefs. IO meansemployed include information (bothinformation media and informationcontent) and weapons and equipmentdedicated for attacks on informationsystems. Information operations involveboth attacking and defending.Dai and his co-workers added onemore definition of IO in this book. Thedescription lists <strong>the</strong> targets of IO and <strong>the</strong>means employed, stating:Information operations are definedas a series of countermeasures employedby two sides in a conflict in whichinformation or weapons and equipmentcontrolled by information and dedicatedto <strong>the</strong> destruction of information systemsare used in order to influence and destroy<strong>the</strong> enemy’s information, informationsystems, and cognition and beliefs,along with preventing <strong>the</strong> influence anddestruction of one’s own information,22 Special Edition 2008


information systems, and cognitionand beliefs in <strong>the</strong> same manner by anenemy.C h i n a ’ s e m p h a s i s o ncountermeasures is a significant deviationfrom Western definitions. When <strong>the</strong> PRCcollects technical parameters of o<strong>the</strong>rsystems, <strong>the</strong>y develop countermeasuresas a sort of asymmetric response. China’s2006 White Paper, when discussingarmy projects, noted informationcountermeasure units were one ofthree organizations requiring prioritydevelopment. The primary reasonbehind this force may be to construct IWcountermeasures.Neutralizing <strong>the</strong> Internet AgainstExtremismChina’s police are starting to usecartoon police characters on domesticInternet sites to warn usersagainst using illegal content.At <strong>the</strong> moment <strong>the</strong>se friendlylooking male and female cartooncharacter alerts walk, bike, ordrive across <strong>the</strong> screen at halfhour intervals on 13 of China’smost popular portals. Accordingto <strong>the</strong> Beijing Public SecurityMinistry, <strong>the</strong>se virtual policeare expected to populate allregistered websites in Chinain 2008.While <strong>the</strong>se animationswarn users that someone iswatching, such warnings are a far cryfrom neutralizing an extremist’s use of<strong>the</strong> Internet. With 137 million usersat present, and an Internet populationexpected to surpass <strong>the</strong> US in two years,<strong>the</strong> challenge could be a stiff one. Thecommon tactic is to simply close downdomestic websites deemed extremist orsubversive or to intercept emails withwords like “Falun Gong” or <strong>the</strong> “DalaiLama.” Email services in China areobligated to hand over user data andcommunications to Chinese securityofficials if asked for such material,which is ano<strong>the</strong>r way to help neutralizean extremist’s use of <strong>the</strong> Web.In order to stem <strong>the</strong> tide of Internetcrime, China reportedly increased <strong>the</strong>size of its Internet police force in 2000to some 300,000 personnel. While thisfigure is difficult to comprehend, <strong>the</strong>secrime fighters are part of <strong>the</strong> Ministry ofPublic Security and, thus, may have jobso<strong>the</strong>r than fighting crime (espionage,etc.). The Internet police are mainlyresponsible for carrying out supervision,analyzing information content flowingthrough local communication systemsor <strong>the</strong> Internet, fighting computerviruses, cracking down on Internetcrimes, and stopping <strong>the</strong> spread of“harmful information.” It is <strong>the</strong> influenceof <strong>the</strong> latter, of—<strong>the</strong> extremists andnationalists—that China wants to limitinside its borders. However, verylittle has been written in China on <strong>the</strong>Internet war in Iraq, and <strong>the</strong> fight againstextremism worldwide.China wants to make this a jointeffort. Reserve, militia, PLA, andcivilian forces are conducting jointThe People’s Republic of China in its Asian context.(Wikimedia)operations against notional interveningIW forces. This integration is underwayin <strong>the</strong> form of a proposed a ‘cyber securityforce’ (CSF). Qu Yanwen, a securityspecialist, proposes a unit composed ofmembers of <strong>the</strong> PLA, <strong>the</strong> Ministries ofState Security and Public Security, andtechnical specialists. Local authoritiesstate Chinese political, economic, andmilitary security is in danger due to <strong>the</strong>nascent stage of development of China’snetworks. Weaknesses exist in financialsecurity; in defending against cyberattacks against information networks ofkey organizations and computer-basedfund raising operations and scams; ininformation control over data that canaffect <strong>the</strong> stability of public order; and inmilitary information security. Within <strong>the</strong>PLA, <strong>the</strong> Shijiazhuang <strong>Army</strong> CommandCollege, <strong>the</strong> Navy Command Academy,<strong>the</strong> Air Force Command Academy, and<strong>the</strong> Second Artillery Corps CommandAcademy met in July 2007 to work outan overall joint teaching program for<strong>the</strong> three armed forces. They are tryingto share information resources andexchange experiences via <strong>the</strong> Internet,among o<strong>the</strong>r issues.According to one report, arrestsand prosecutions for endangering statesecurity have risen sharply overall since11 September 2001. In <strong>the</strong> two-yearperiod ending 31 December 2002, morethan 1,600 people were prosecuted forendangering state security, most after<strong>the</strong> terror attacks on <strong>the</strong> US. Manyof those arrested and prosecuted hailfrom Xinjiang, which Chinese sourcescharacterize as an autonomous regionin <strong>the</strong> northwest of <strong>the</strong> country, that ishome to a large and restiveMuslim population. China’sgovernment has used <strong>the</strong>war on terror to crack downon those seeking greaterautonomy, including thosewho do so by peacefulmeans.What we do know about<strong>the</strong> domestic populationarrested for politicalcrimes is of interest. JohnKamm, President of <strong>the</strong>Dui Hua Foundation (“duihua “means “dialogue” inMandarin Chinese, and is a non-profit,human rights organization), wrote thatabout one-quarter of those arrested arenon-Han Chinese, principally Tibetansand Uyghurs. Since China is more than90% Han, <strong>the</strong> number of non-Han arrestsis well out of proportion to <strong>the</strong> rest of <strong>the</strong>population. Kamm writes that sentencesfor non-Han Chinese are typically longerthan those imposed on Han Chinese.With some candor, China’s governmentrecently released statistics on peoplearrested and prosecuted for endangeringstate security, <strong>the</strong> most serious politicaloffence in <strong>the</strong> criminal code. China’s topprosecutor, Han Zhubin, revealed thatmore than 3,400 people were arrestedfrom 1998 to 2002 for such crimes assubversion, incitement to subversion,espionage, and trafficking in state23


secrets. Kamm adds that “Internetdissidents” make up <strong>the</strong> fastest-growinggroup of political prisoners.China has been concerned aboutInternet political movement activitiessince at least 1996. In that year <strong>the</strong> EastTurkistan information Center (ETIC)was formed, operating out of Munich,Germany. This site now delivers newsto 114 countries in seven languages,and focuses on news, both positiveand negative, about <strong>the</strong> Uyghur cause.Calling Chinese Communists “fascistauthorities,” <strong>the</strong> website covers incidentsreportedly aimed at robbing <strong>the</strong> Uyghurculture of its ideological roots, via amassive reeducation campaign. In 2004ETIC also established a Uyghur InternetTV station.In response to <strong>the</strong>se events, on 15December 2003 <strong>the</strong> BeijingXinhua news service reportedthat China’s Ministry of PublicSecurity identified <strong>the</strong> EastTurkistan Information Centeras a terrorist organization and itsdirector, Abudujelili Kalakash,as a terrorist. A week later,<strong>the</strong> East Turkistan InformationCenter offered to disband, if <strong>the</strong>communist state offered freedomof expression and Internet accessto Uyghur Muslim minorities.In 2005, a Beijing CommunistYouth newspaper, ZhongguoQingnian Bao, identified EastTurkistan terrorist forces as <strong>the</strong>main terrorist threat to China.The battle for control of <strong>the</strong> newshas not stopped. China reported on anincident in January 2007 and providedits version of a scuffle between <strong>the</strong>PLA and “ethnic militants.” ETIC’swebsite reported <strong>the</strong> conflict occurredin a different area than that reportedby Chinese TV, and that more PLAservicemen died than was reported byChinese authorities.What is Special About ChineseIO?The key to understanding <strong>the</strong>Chinese approach to IO consists of twounique and noteworthy issues. The first is<strong>the</strong> extent to which <strong>the</strong> Chinese integratestrategy with IO. The second relatedissue is <strong>the</strong> focus on countermeasuresand reconnaissance.Peng Guangqian and Yao Youzhi,editors of <strong>the</strong> popular Chinese book TheScience of <strong>Military</strong> Strategy, note that <strong>the</strong>PLA must be “guided by <strong>the</strong> principlesof military strategy in <strong>the</strong> new era tobring forth new ideas to push ahead <strong>the</strong>principles of strategic actions for localwar under high-tech conditions…”This strategy-IO or strategy-technologyintegration was also highlighted byo<strong>the</strong>r authors. Perhaps <strong>the</strong> most notablecomments were made by IW specialistsShen Weiguang and Dai Qingmin. Shen,<strong>the</strong> reputed fa<strong>the</strong>r of information warfarein China, notes “The issue of informationand network security, which accompanies<strong>the</strong> development of informationization,and <strong>the</strong> rise and increasing prominencePeople’s Liberation <strong>Army</strong> colonel points <strong>the</strong> way.(Defense Link)of information warfare, <strong>the</strong> form ofwarfare that is invisible and non-violent,is an issue of technology, but above allelse it is an issue of strategy.”Major General Dai Qingmin, <strong>the</strong>former head of <strong>the</strong> information warfaredirectorate of <strong>the</strong> Chinese General Staff,offered a similar statement about <strong>the</strong>importance and probability of an IW/IO-strategic integration. He notes:Laying all one’s hopes on technologyis dangerous. The road to future lossesmay not be from a fall in technology,it may be primarily poor strategy. Inreality <strong>the</strong> informationization of <strong>the</strong>forms of warfare has opened up an evenbroader space for playing tricks andusing strategy and for using <strong>the</strong> indirectto gain <strong>the</strong> upper hand.According to Shen and Dai, evenconditions of technological superioritywill not allow for success in all cases, ifone overlooks strategy.IO provides <strong>the</strong> PLA with a newmeans for applying strategy, one thatenables a new information-based useof manipulation, deception, and soft(computer) destruction as much as hard(physical) destruction. Noted Chinesestrategist Li Bingyan offered threeobservations: first, that collecting toomuch information can be blinding andcan prohibit or stilt strategy; second, thatweak information technology nations cansuccessfully attack strong informationtechnology nations with <strong>the</strong> use ofstratagems; and third, that informationtechnology can serve strategy as aneffective deterrent and prevent war fromever breaking out (<strong>the</strong> Chinesethink <strong>the</strong> use of informationtechnology at <strong>the</strong> Dayton talksto end <strong>the</strong> war in <strong>the</strong> formerYugoslavia is a prime exampleof winning without fighting).These are direct examplesof how IO and strategy arebeing integrated into Chinesethinking.P e n g a n d Ya o o ff e ro<strong>the</strong>r strategy-IO paradigmsin The Science of <strong>Military</strong>Strategy. They write about<strong>the</strong> strategic maneuver aspectof strategy’s applied <strong>the</strong>ory,and stating <strong>the</strong> struggle in <strong>the</strong>information field may lead to changesin strategic maneuver. In particular, a“strategic information operations forcemay become a new form of strategicmaneuver in future wars.” If such a typeof maneuver actually does develop, <strong>the</strong>nIO experts must also explore questionsin <strong>the</strong> applied <strong>the</strong>ory arena. Will <strong>the</strong>rebe cyberflanking, cyberpenetration, ando<strong>the</strong>r cyber activities? One would thinkso, based articles that have appeared inauthoritative Chinese military journals.The second special issue after <strong>the</strong>strategy-IO link is China’s focus oncountermeasures and reconnaissance.By collecting technical parameters ofo<strong>the</strong>r systems, China can use <strong>the</strong>m toconstruct countermeasures, as a sort ofasymmetric response.24 Special Edition 2008


The Chinese note that <strong>the</strong> USlaunched reconnaissance in <strong>the</strong> formof electronic warfare and intelligencewarfare more than six months before <strong>the</strong>First Gulf War began. Such US actionsare in line with Sun Tzu’s concept that“<strong>the</strong> clever combatant seeks battle after<strong>the</strong> victory has been won.” Chinese<strong>the</strong>orists have certainly bought intothis concept of reconnaissance andintelligence warfare well before abattle begins. According to GeneralDai, China’s vision of future war firstinvolves information reconnaissance, tocollect technical parameters. This willensure victory before <strong>the</strong> first battle.Reconnaissance (consisting of electronicwarfare, radar, radio technology, andnetwork reconnaissance) fits perfectlywith Dai’s and Sun Tzu’s concepts andstratagem.Dai’s writings focus not only oncollecting technical parameters, specificproperties of information weaponsystems and electronic informationproducts, but also on information attacks.This implies that collecting parametersand performing reconnaissance are twoprerequisites for preemptive attacks.Computer network reconnaissance helpschoose which opportune moments, whichplaces, and which attack measures willresult in maximum success—if war everbreaks out. Peng and Yao seconded thisconcept, stating that IO is directly linkedto <strong>the</strong> gain or loss of <strong>the</strong> initiative in warand thus “priority should be given to <strong>the</strong>attack and combining <strong>the</strong> attack with <strong>the</strong>defense.” Thus it appears informationtechnology has enhanced Chinesethinking with regard to preemption.Chinese military academics state thatthose who do not preempt lose <strong>the</strong>initiative, in what may be a very shortlivedIO war.ConclusionCombatants in present day conflictsmay find it easier than at any o<strong>the</strong>rtime in history to obtain <strong>the</strong>ir wartimeobjectives through one campaign, orone battle in <strong>the</strong> IO age. The idea ofsudden attack has changed, especiallyif one side possesses high-technologyequipment and <strong>the</strong> o<strong>the</strong>r side onlylow-technology means, which allowsfor better reconnaissance and insertionof preemptive mechanisms (back doorsin computer programs, etc.). “Attack”doesn’t mean “surprise” in <strong>the</strong> oldsense, but ra<strong>the</strong>r that one side can’tcorrespondingly react if <strong>the</strong>y’re awareof <strong>the</strong> enemy situation. You may knowwhere all of <strong>the</strong> forces are on <strong>the</strong> enemyside, yet your systems can’t responddue to preemptive computer measuresan enemy has taken in peacetime. Ifwar does break out, <strong>the</strong>n preemptiveattacks focus on “striking <strong>the</strong> enemy’sinformation center of gravity andweakening <strong>the</strong> combat efficiency ofhis information systems and cyberizedweapons.” This allows one to weaken<strong>the</strong> enemy’s information superiority andreduce his holistic combat efficiency.Perhaps <strong>the</strong> current emphasis ongaining <strong>the</strong> initiative, and on shortwars that are over quickly, are <strong>the</strong> mainreasons that Dai gives <strong>the</strong> impression thatpreemption is a necessity, noting:Actions such as intelligence warfare,psychological warfare, and campaigndeception in advance of combat seem tobe even more important to <strong>the</strong> unimpededimplementation of planning and ensuringwar. For this reason, information warfaremust be started in advance of o<strong>the</strong>rcombat actions before making war plansand while making war plans.In a sense, it is <strong>the</strong> special featuresof IO tactics and techniques that enable<strong>the</strong> increased emphasis on cyber attacksmore than traditional ground, sea, or airwarfare. For example, a weaker forcecan inflict much damage on a superiorforce with a properly timed and preciselydefined asymmetric information attack.Such an offensive may be impossible bytraditional means. Multiple informationattack actions can be developed, <strong>the</strong>offense considered as defense, andinformation barrier methods developed—by both strong and weak opponents.Attack tactics include informationdeterrence, information blockade,information power creation (electroniccamouflage, network deception, etc.),information contamination, informationharassment, nodal destruction, systemparalysis, and entity destruction.China’s specific understandingof <strong>the</strong> intersection of strategy andinformation technology, especially asit relates to conflict, is not based on awartime scenario in a practical sense;China lacks recent combat experience.However, from a <strong>the</strong>oretical perspectiveand use of IO techniques in peacetime,China has written extensively on <strong>the</strong>use of information technology andpreemption. Based on <strong>the</strong> number ofattacks worldwide attributed to China,<strong>the</strong>y have given much thought to <strong>the</strong>seissues, and apparently have some recentpractical experience.Timothy L. Thomas is a senior analyst at <strong>the</strong> <strong>Foreign</strong><strong>Military</strong> <strong>Studies</strong> <strong>Office</strong> (FMSO) at Fort Leavenworth, Kansas.Mr. Thomas received a BS from West Point and an MA from <strong>the</strong>University of Sou<strong>the</strong>rn California. He was a US <strong>Army</strong> <strong>Foreign</strong>Area <strong>Office</strong>r who specialized in Soviet/Russian studies. Hismilitary assignments included serving as <strong>the</strong> Director of Soviet<strong>Studies</strong> at <strong>the</strong> United States <strong>Army</strong> Russian Institute (USARI) inGarmisch, Germany; as an inspector of Soviet tactical operationsunder CSCE; and as a Brigade S-2 and company commander in<strong>the</strong> 82nd Airborne Division. He is an adjunct professor at <strong>the</strong> US<strong>Army</strong>’s Eurasian Institute; an adjunct lecturer at <strong>the</strong> USAF SpecialOperations School; and a member of two Russian organizations,<strong>the</strong> Academy of International Information, and <strong>the</strong> Academy ofNatural Sciences.25


Bulgaria: The Rise And Decline Of Bulgaria’sInterest In Information OperationsBy Dr. Todor TagarevEditorial Abstract: Dr. Todor Tagarev described Bulgaria’s need to build selective IO capabilities that assist in <strong>the</strong> conduct ofNATO’s effects-based operations. In particular he recommends Bulgaria should work to define generic units that are relativelyself-sustained and can bring useful capabilities to a multinational operation. Bulgaria is also exploring what specialties itcan contribute to <strong>the</strong> European Union with regard to critical infrastructure protection, where it hopes to remain competitiveand capable of providing useful contributions.Opinions expressed are solely thoseof <strong>the</strong> author and do not reflect officialpositions of <strong>the</strong> G.S. Rakovski Defenseand Staff College, <strong>the</strong> Ministry ofDefense of <strong>the</strong> Republic of Bulgaria, orany o<strong>the</strong>r governmental institution.IntroductionAt <strong>the</strong> beginning of <strong>the</strong> 1990s <strong>the</strong>Bulgarian military found itself in a void.The country had no paradigm that wouldfacilitate <strong>the</strong> post-Cold war transition,and no one in <strong>the</strong> old or emergingleadership had experience in devisingnational security and defense policies.The armed forces enjoyed very highprestige in <strong>the</strong> eyes of <strong>the</strong> people, whowere—and still are—proud of Bulgaria’smilitary traditions.While a member of <strong>the</strong> WarsawPact, Bulgaria was part of a very highlycentralized system of force planning andconceptualization. The officer corpswas well trained and very efficient infollowing Warsaw Pact (i.e. Soviet)doctrine, operational concepts, andtactics, but had minor (if any) contributionto force planning and <strong>the</strong> developmentof innovative concepts of operations.Thus, Bulgaria lacked officers wi<strong>the</strong>xperience to generate doctrine, forcestructure, and concepts of operations tofit <strong>the</strong> requirements of <strong>the</strong> new securityenvironment. In addition, until <strong>the</strong>end of <strong>the</strong> 1990s <strong>the</strong>re was no civilianexpertise on defense matters, nei<strong>the</strong>r in<strong>the</strong> executive branch nor in parliament.Not surprisingly, from 1990 until 1998Bulgaria adhered to its “inherited” forcestructure, while its military organizationevolved primarily under <strong>the</strong> pressures ofrapidly declining defense budgets.In such a situation <strong>the</strong> instituteswithin <strong>the</strong> Ministry of Defense thatmay have o<strong>the</strong>rwise been instrumentalin devising operational concepts,adequate to meet <strong>the</strong> changing threat,technological, and business environment,did not respond to <strong>the</strong> challenge. On <strong>the</strong>contrary, research organizations wereBulgarian soldier raises his nationalcolors during a NATO exercise.(Defense Link)among <strong>the</strong> first to suffer from budget cutsresulting in a brain drain. Never<strong>the</strong>less,around <strong>the</strong> mid-1990s a few curiousBulgarian officers, on <strong>the</strong>ir own initiative,decided to study information warfare andinformation operations developmentsand were able to attract <strong>the</strong> attention of<strong>the</strong> senior military leadership. Based onthis, Bulgaria adopted a comprehensiveset of new doctrinal documents from1999 through 2002. The first part ofthis essay examines <strong>the</strong> respectivedevelopments and outlines <strong>the</strong> country’sunderstanding of information operationsand its component parts. The second partbriefly addresses Bulgaria’s approachto <strong>the</strong> neutralization of <strong>the</strong> extremist’suse of <strong>the</strong> Internet. The final part of <strong>the</strong>essay examines <strong>the</strong> need to incorporateinnovative operational thinking in <strong>the</strong>force planning process, and explains <strong>the</strong>reasons behind <strong>the</strong> decline of Bulgaria’sinterest in information operations.The essay concludes with a reiterationof <strong>the</strong> necessity to build selectivecapabilities for conducting informationoperations as a component of <strong>the</strong> NATOEffects-Based Approach to Operations(EBAO) and related developmentswithin <strong>the</strong> European Security andDefense Policy—a necessity that maybe met through a more realistic policyand efficient capability management. Itis possible (and appropriate) to examineo<strong>the</strong>r component parts of informationoperations such as <strong>the</strong> security ofinformation and command and controlsystems (for <strong>the</strong> military) and criticalinformation infrastructure protectionmeasures for <strong>the</strong> civilian sector.Bulgaria’s View of IOThe impressive utilization ofadvanced communications, information,sensors, and navigation technologies by<strong>the</strong> US military during <strong>the</strong> First Gulf War,1990-1991, allowed <strong>the</strong> US-led coalitionto achieve quick and decisive victoryover Iraq. This placed informationwarfare among <strong>the</strong> top research topicsfor defense establishments around<strong>the</strong> world. But in Bulgaria, given <strong>the</strong>26 Special Edition 2008


overwhelming problems in dealingwith a Cold War force structure and sizeunder declining budgets, <strong>the</strong> officialdefense establishment was not able toreact properly.Fortunately, as early as 1992Bulgarian officers got <strong>the</strong> chance tostudy in Western military colleges, andrapid access to Internet sources providedinformation at previously unthinkableease and speed. The combination of<strong>the</strong>se two factors, plus <strong>the</strong> process ofdemocratization of Bulgarian societyenhanced <strong>the</strong> opportunities for curiousindividuals to collect information,analyze, syn<strong>the</strong>size, and reach broadaudiences. Thus, in <strong>the</strong> mid-1990s, aventure of individual researchers withprofessional interests in military affairsand in particular <strong>the</strong> link betweenadvances in IT and warfare, culminatedin <strong>the</strong> publication of <strong>the</strong> book InformationAspects of Security.The authors of this book examineda series of issues: <strong>the</strong> relationshipbetween security and IT developments;conflicts related to <strong>the</strong> emergenceof an information society; <strong>the</strong> maintechnologies providing for a competitiveedge in information age conflicts; andmain issues in managing <strong>the</strong> informationenvironment. Of particular importancefor this essay is <strong>the</strong> examination ofinformation warfare—its principles,levels, domains, and components. In<strong>the</strong> book, Velizar Shalamanov and thisauthor define information warfare as: asystem of actions undertaken in orderto create information space, in whichone side has superior understanding anduse of strong and weak points in <strong>the</strong>political, economic, military, social, andcultural domains of activity of a potentialenemy and its dependence on friendlysources of power, and at <strong>the</strong> same timedoes not allow effective enemy actions.The authors identified information asa distinct domain, powerful weapon,and lucrative target in <strong>the</strong> evolutionof conflict. They defined <strong>the</strong> term“information power” as <strong>the</strong> capacitycreated by advanced technologies,procedures, and organization. Fur<strong>the</strong>r,<strong>the</strong>y define <strong>the</strong> information campaignas <strong>the</strong> main tool, used in combinationwith traditional military means andapproaches, to achieve informationsuperiority, and distinguished two levelsof this campaign:• A strategic information campaignwhich ideally tried to achieve paralysisof <strong>the</strong> OODA-loop of <strong>the</strong> opponent;• Command and control warfarecampaign which supported strategicobjectives through effects against <strong>the</strong>ability of <strong>the</strong> enemy to make timelyand effective decisions on <strong>the</strong> use of itsarmed forces.According to Shalamanov andTagarev, <strong>the</strong> operation for achievinginformation superiority has sixelements:1. Security of operations—not allowing<strong>the</strong> enemy to receive adequate informationon us; includes communications security,computer security, emission control,etc.;2. Deception;3. Psychological operations;4. Electronic Warfare;5. Physical effects on enemy C4ISRsystems;6. Superior situational awarenessthrough <strong>the</strong> fusion of all-sourceintelligenceIn addition, <strong>the</strong> authors examined<strong>the</strong> offensive and defensive aspectsof information operations, <strong>the</strong> role of<strong>the</strong> media, and information aspects ofoperations o<strong>the</strong>r than war. Importantly,in a forward to that book GeneralMiho Mihov—at <strong>the</strong> time a three-starequivalent and Chief of Staff of <strong>the</strong> AirForce and later (1997-2002) Chief of <strong>the</strong>General Staff of <strong>the</strong> Bulgarian ArmedForces—presented his views on <strong>the</strong> roleof information in modern conflict. Thefollowing is a brief summary of his mainpoints:• Warfare has moved out of traditionaldomains and into <strong>the</strong> informationdomain;• Information superiority is <strong>the</strong> meansthat may dissuade an opponent, postponeaggression, and even prevent a war;• Winning <strong>the</strong> information warpredefines <strong>the</strong> outcome of “classic”military activities;• A new balance must be foundbetween information power andfirepower;• The country has no alternative, butto prepare for information war.A series of articles by <strong>the</strong> InformationAspects of Security authors, in <strong>the</strong>Bulgarian Ministry of Defense/BulgarianArmed Forces official <strong>the</strong>oreticalpublication Voenen Journal, raised IWsawareness among Bulgarian security anddefense experts. Fur<strong>the</strong>r, it facilitated<strong>the</strong> debate on possible objectives in <strong>the</strong>utilization of advanced IT under newoperational concepts, and <strong>the</strong> balanceof priorities in <strong>the</strong> development of <strong>the</strong>armed forces.In 1998, on <strong>the</strong> wave of risinginterest in <strong>the</strong> relationships amongsecurity, warfare, and technology, <strong>the</strong>authors began publication of Information& Security: An International Journalwith <strong>the</strong> intention to cover “scientific,technical, and policy issues related tonational and international security in <strong>the</strong>Information Age, C4ISR technologiesand systems, information operations,command and control warfare, andinformation assurance.” The journal’sstated objective is “to bridge <strong>the</strong> IT and<strong>the</strong> security communities, presentingstate of <strong>the</strong> art, new findings, ideas, andneeds of one community versus <strong>the</strong> o<strong>the</strong>r,as well as to present <strong>the</strong> latest researchconducted ‘on <strong>the</strong> bridge’ between <strong>the</strong>two communities.”General Mihov—already Chiefof <strong>the</strong> General Staff of <strong>the</strong> BulgarianArmed Forces—contributed an articleto <strong>the</strong> Information & Security pilot issue,conceptualizing in <strong>the</strong> context of <strong>the</strong>reform of <strong>the</strong> Bulgarian Armed Forces,and examining information warfareon <strong>the</strong> strategic and operational levels.He fur<strong>the</strong>r reasoned that informationoperations were turning into a mainsupporting operation, and in <strong>the</strong> future,would be a distinct operation of <strong>the</strong> armedforces, to be conducted jointly with o<strong>the</strong>rgovernmental and public organizations.Paraphrasing <strong>the</strong> definition proposed byShalamanov and Tagarev, General Mihovdefined <strong>the</strong> term information operationas: a system of actions for <strong>the</strong> creationof an information space, in which oneside has superiority in understanding andusing <strong>the</strong> strong and weak aspects in <strong>the</strong>political, economic, military, ecological,social, and cultural areas of activity of27


a potential enemy and its dependenceon friendly sources of power, while at<strong>the</strong> same time not allowing identicalactivities on its side.He saw <strong>the</strong> objective of <strong>the</strong>information operation as “changing <strong>the</strong>way of reasoning and decision makingof <strong>the</strong> enemy in <strong>the</strong> direction of ourinterests.” General Mihov defined <strong>the</strong>term “information superiority” andlinked information operations with o<strong>the</strong>ractivities of <strong>the</strong> armed forces.Coincidentally, all three Bulgarianauthors mentioned so far played keyroles in <strong>the</strong> development of <strong>the</strong> firstnational military doctrine: GeneralMihov as Chief of <strong>the</strong> General Staff;Dr. Shalamanov as Deputy Minister ofDefense for defense policy and planning;and this author as a civilian Directorfor Defense Planning in <strong>the</strong> Ministryof Defense. The <strong>Military</strong> Doctrine was<strong>the</strong> first official document treating <strong>the</strong>issue of information operations ando<strong>the</strong>r information aspects of security. Forexample, <strong>the</strong> doctrine lists “informationwar/warfare” among <strong>the</strong> modern risksto security (articles 9, 11), and states<strong>the</strong> military threat to <strong>the</strong> country maybe expressed, inter alia, via informationattacks of ano<strong>the</strong>r state against ‘nationalstrategic systems’ (article 16). For <strong>the</strong> firsttime, it set achievement of informationsuperiority as a military task. Accordingto article 62, “<strong>the</strong> armed forces protect<strong>the</strong> country through <strong>the</strong> application ofa military-strategic concept for defenseof <strong>the</strong> national territory, a struggle forinformation superiority, control of <strong>the</strong>air and sea space, and defense of athreatened <strong>the</strong>ater of military activities.”Respectively, <strong>the</strong> doctrine defined as<strong>the</strong> priorities in <strong>the</strong> [technological]modernization of <strong>the</strong> armed forces “<strong>the</strong>C4ISR, identification and navigation …systems, <strong>the</strong> means and technologiesto provide for interoperability with <strong>the</strong>armed forces of NATO countries, and<strong>the</strong> transition to an information society”(article 97).The <strong>Military</strong> Strategy—a followupdocument—reiterated many of<strong>the</strong> postulates of <strong>the</strong> militarydoctrine, including its Article 62.Additionally, it listed <strong>the</strong> “reliableprovision of information” among <strong>the</strong>main requirements towards <strong>the</strong> reformof <strong>the</strong> armed forces and defined <strong>the</strong>“strategic defensive operation” as a jointoperation of <strong>the</strong> country’s armed forcesthat includes, inter alia, informationoperations.Bulgaria produced a number ofadditional doctrinal documents between1999 and 2002. The 2001 JointOperations Doctrine shed fur<strong>the</strong>r light onofficial views of information operations.For example, <strong>the</strong> title of Section 5 in<strong>the</strong> chapter “Joint Operations in ArmedConflict” is “Information Operations”with <strong>the</strong> subtitle “Operations againstC4I systems.” It defined informationoperations as “a set of informationeffects, attacks, and battles, withcoordinated objectives, tasks, placeand time, conducted according to adistinct design and plan for solving <strong>the</strong>tasks of an information battle in <strong>the</strong><strong>the</strong>ater of military activities or on anoperational direction.” It states that IOssupport strategic objectives through <strong>the</strong>irinfluence on <strong>the</strong> ability of an enemy tomake timely and effective decisions on<strong>the</strong> use of its armed forces. The doctrinedefines two component parts of IO aswell as o<strong>the</strong>r realms:• Defensive—protecting <strong>the</strong>effectiveness of our own C2 system;• Effecting – influencing, damaging,and destroying <strong>the</strong> enemy’s C2;• O<strong>the</strong>r IO realms;• Security operations;• Disinformation (with a set ofmeasures on <strong>the</strong> strategic, operational,and tactical levels);• Psychological operations;• Electronic Warfare.Fur<strong>the</strong>r, <strong>the</strong> doctrine designates <strong>the</strong>J3 staff as responsible for planning andcoordinating <strong>the</strong> conduct of securityoperations, disinformation, psychologicaloperations, and operations against<strong>the</strong> enemy’s C2 systems, and <strong>the</strong> J6staff for organizing <strong>the</strong> protection ofinformation.The 2002 Air Force Doctrinedelineates between ‘subordinated’ and‘supporting’ operations, with specialoperations and operations against C2systems being part of <strong>the</strong> latter. Ascomponents of operations against C2systems it lists security operations,psychological operations, disinformation,and electronic warfare. It assigns <strong>the</strong>air force a number of tasks, includingcountering an enemy’s command andcontrol, aerial intelligence, and ‘specialactivities in <strong>the</strong> interest of informationsuperiority.’The 2002 Land Forces Doctrineincludes a requirement that <strong>the</strong> SpecialOperations Forces are trained toparticipate in psychological operationsand to support information operations.The Main Guidance to OperationsPlanning, issued in 2000, followed<strong>the</strong> respective NATO documentsand included requirements for twoannexes to plans of operations (inaddition to <strong>the</strong> more traditional ones)—on Psychological Operations and onInformation Operations.The publications of three additionalBulgarian authors are appropriate toour discourse. The first, Prof. TzvetanSemerdjiev, published Information Warin 2000. In a comprehensive manner heexamined risks and threats to nationalsecurity at <strong>the</strong> doorsteps of <strong>the</strong> 21stcentury, emphasizing those resultingfrom <strong>the</strong> proliferation of informationtechnologies and communicationchannels. He introduced <strong>the</strong> conceptof “national information space” andreasoned that defense should beorganized in a number of echelons.Prof. Semerdjiev made detailed studiesof <strong>the</strong> concept of information power,and applied <strong>the</strong> classic principles ofwarfare to elaborate on <strong>the</strong> principles ofinformation warfare and <strong>the</strong> utilizationof advanced IT.The second author is Colonel MitkoStoykov, who in 2003 published a bookon <strong>the</strong> meaning of <strong>the</strong> informationrevolution for terrorism, and <strong>the</strong> way inwhich we organize our security system.Colonel Stoykov—<strong>the</strong>n assigned to<strong>the</strong> Situation Center of <strong>the</strong> Ministryof Defense—examined three recentconcepts: cyberwar, information war,and netwar in a comparative study ofprimarily US sources. His chapteron information operations was basedalmost exclusively on US doctrine:28 Special Edition 2008


Joint Pub 3-13, Joint Doctrine forInformation Operations; FM 100-6;and Joint Publication 6-0, Doctrine forCommunications System Support to JointOperations.This was probably <strong>the</strong> lastcomprehensive treatment of <strong>the</strong> issue ofinformation operations by a Bulgarianauthor, to date. The main reason is thatwhile downsizing of <strong>the</strong> Bulgarian ArmedForces continued, Bulgaria became aMembership Action Plan (MAP) countryafter <strong>the</strong> NATO Washington Summit and<strong>the</strong>n, at <strong>the</strong> 2002 NATO Prague summit,was invited to join NATO. On its pathto NATO membership, Bulgaria had tocope with a variety of requirements;interoperability and <strong>the</strong> protection ofclassified information had <strong>the</strong> strongestimpact on all information-related issues.In combination with o<strong>the</strong>r constraints,<strong>the</strong>se requirements overwhelmed <strong>the</strong>force planning and management capacityof Bulgaria’s defense establishment.Just one example is that all cited authorscontinued to work and publish intenselyon defense issues, but with no onefocused specifically on informationoperations.Most recently, Brigadier GeneralBoyko Simitchiev—Chief of <strong>the</strong>Communications and InformationSystems Directorate (J6) of <strong>the</strong> GeneralStaff of <strong>the</strong> Bulgarian Armed Forcesand Chief Information <strong>Office</strong>r for <strong>the</strong>defense establishment—contributeda paper to <strong>the</strong> journal CIO.bg thatagain raises interest in IO. In hisopening statement he emphasized that<strong>the</strong> challenges of future war—andinformation operations in particular—will have a very important impact on<strong>the</strong> generation of requisite capabilitiesof <strong>the</strong> Bulgarian Armed Forces forparticipation in NATO and EuropeanUnion missions. Without referringexplicitly to <strong>the</strong> evolving concept ofeffects-based operations, he underlined<strong>the</strong> importance of achieving informationsuperiority, and psychological operations’place in gaining <strong>the</strong> support of <strong>the</strong>local population. While developingcapabilities to conduct informationoperations, we need to study <strong>the</strong> stabilityof our own systems performance againstinformation attacks. In his conclusions,he emphasizes that in <strong>the</strong> near future<strong>the</strong> Bulgarian military must be able toplan and to participate in <strong>the</strong> conduct ofinformation operations.A novel element in GeneralSimitchiev’s paper was recognition ofcyberspace as not only <strong>the</strong> place formilitary and governmental informationoperations, but also by terroristorganizations. Extremists aim to recruitmembers, disseminate propaganda,videos, brochures, and training materials,as well as to coordinate terrorist actsin an anonymous and interactive form.Echoing General Mihov, SimitchievGeneral Zlatan Stoykov, BulgarianChief of Defence with LieutenantGeneral Atanas Zaprianov, Bulgarian<strong>Military</strong> Representative to <strong>the</strong> NATO<strong>Military</strong> Committee (NATO)stated that cyberspace createsopportunities for spying, asymmetricimpact, and propaganda that may leadto winning wars. Therefore, <strong>the</strong> nextpart examines approaches to counteringuse of cyberspace, and <strong>the</strong> Internetin particular, by terrorist and o<strong>the</strong>rextremist organizations.Bulgaria’s Approach toCountering Extremists’ Use of<strong>the</strong> InternetWith <strong>the</strong> amendment of militarydoctrine in <strong>the</strong> aftermath of September11th, <strong>the</strong> Bulgarian Armed Forces weretasked by <strong>the</strong> legislature to contributeto anti- and counter-terrorism activities.However, an examination of Bulgaria’slegislative framework on terrorismshows, by and large, this is a breach oflaw. Law enforcement organizationshave <strong>the</strong> primary role in counteringterrorism. This also applies to terroristand extremist used of Internet, for avariety of purposes.The Ministry of Interior in Bulgaria’sexecutive branch is responsible forlaw enforcement. It includes threenational services: Police, Security(counterintelligence), and Fire Safetyand Protection of <strong>the</strong> Population.The first organization that playsa role in countering extremist use of<strong>the</strong> Internet is <strong>the</strong> one dealing withorganized crime. The National ServicePolice are tasked to counter criminalactivities of local and cross-bordercriminal groups or organizations, toprevent terrorist acts, and to neutralizeterrorist and diversion groups. Its ChiefDirectorate for Combating OrganizedCrime (CDCOC), with units in <strong>the</strong>Regional Police Directorates, “carriesout independently or jointly witho<strong>the</strong>r specialized bodies operation andsearch activities of an informationaland organizational nature to combatorganized crime” related, among o<strong>the</strong>rthings, to:• Monetary, crediting, and financialsystems• Terrorist activities• Computer (or cyber) crime• Intellectual property rightsSecond, fighting terrorism andextremism is among <strong>the</strong> main tasks of <strong>the</strong>National Security Service. This civiliancounterintelligence activity identifiesand neutralizes destructive processesthat threaten constitutional order, <strong>the</strong>unity of <strong>the</strong> nation, and its sovereigntyand territorial integrity. It also countersinternational terrorism and extremism.Recently <strong>the</strong> Bulgarian Governmenta n n o u n c e d p l a n s f o r a m a j o rreorganization of its security agenciesthrough <strong>the</strong> creation of a “NationalAgency for Security.” The new agencyunites three organizations: <strong>the</strong> NationalSecurity Service (currently under <strong>the</strong>29


Ministry of <strong>the</strong> Interior); <strong>the</strong> SecurityService (<strong>Military</strong> Counterintelligence)under <strong>the</strong> Ministry of Defense; and <strong>the</strong>Financial Intelligence Service (currentlyunder <strong>the</strong> Ministry of Finance), and toplace <strong>the</strong>m under direct control of <strong>the</strong>Council of Ministers. This measure willraise <strong>the</strong> effectiveness and <strong>the</strong> efficiencyof <strong>the</strong> fight against terrorism, organizedcrime, and crime at <strong>the</strong> ‘high floors ofpower,’ e.g. high-profile corruption.A third realm of IO-related activitiesis protection of critical infrastructure,and in particular critical informationinfrastructure. Organizationaldevelopments in that respect are ra<strong>the</strong>rcomplex, and will not be examined indetail here. We only note that Bulgaria,as a member of <strong>the</strong> European Union sinceJanuary 2007, adheres to EU CriticalInfrastructure Protection (CIP) policiesin particular as related to <strong>the</strong> fight againstterrorism.Accounting for <strong>the</strong> trans-bordernature of crimes, aimed at or facilitatedby <strong>the</strong> Internet, Bulgarian documentsconsistently express <strong>the</strong> readiness of <strong>the</strong>country for international cooperation,in particular in <strong>the</strong> framework of NATOand <strong>the</strong> European Union, but also in <strong>the</strong>expanding network of partnerships of<strong>the</strong>se alliances and on a bilateral basis.<strong>From</strong> a legislative point of view,a decree issued in <strong>the</strong> aftermath ofSeptember 11th prohibited any formof assistance—active or passive—toorganizations and persons involved interrorist acts, including efforts to recruitmembers of terrorist organizations.Curiously however, <strong>the</strong> first casesagainst cyber crime involved breachesof intellectual property rights, and <strong>the</strong>illegal dissemination of software through<strong>the</strong> Internet. In those efforts, CDCOCjoined forces with <strong>the</strong> Bulgarian <strong>Office</strong>of Business Software Alliance (BSA)that protects copyrights of softwareproducers. BSA’s influence was sostrong that, according to a recent articlein <strong>the</strong> newspaper Capital, <strong>the</strong> CDCOCunit tasked to fight cybercrime is “to aconsiderable degree modeled after <strong>the</strong>BSA views.” The same article claimsthat <strong>the</strong> Ministry of <strong>the</strong> Interior ordersInternet providers to block access toBulgaria in its sou<strong>the</strong>astern European context. (www.info.bg)certain websites, i.e., to filter access toinformation.The respective articles in Bulgaria’sPenal Code form <strong>the</strong> legislative basisfor such actions. Finally, <strong>the</strong> law onprotection of classified information andrelated additional regulations prescribeprinciples and a complex set of measuresfor <strong>the</strong> prevention of unauthorizedaccess to classified information created,processed, stored, and transported inautomated information systems andnetworks.Capability ManagementChallenges & PossibleDevelopmentsAny novel concept of operationsis of practical importance onlyif incorporated in defense planningand force development processes.Fur<strong>the</strong>rmore, implementation of anyinformation operations approach hangson proper definition and development ofrespective capabilities.Briefly summarized, in capabilitiesbasedplanning, required capabilitiesare defined against tasks to beperformed under specified conditions,and requirements to produce conceptdriveneffects. For this purposerequired effects are decomposed andmatched with component capabilities.Then capabilities, at levels definedduring <strong>the</strong> force planning process, aredeveloped through <strong>the</strong> introductionof adequate procedures (or doctrine),organization, personnel policy, training,and technologies.The implementation of this planningapproach is extremely challenging,especially in <strong>the</strong> period after <strong>the</strong> year2000, when <strong>the</strong> Bulgarian Armed Forceswere downsized, and at <strong>the</strong> same timehad to meet diverse interoperabilityrequirements while sustaining itsparticipation in Iraq, Afghanistan,Bosnia, and Kosovo operations. Bulgariawas even called upon to expand suchparticipation in both its number ofoperations, and <strong>the</strong> numbers of soldiersdeployed.This combination of factors caused<strong>the</strong> relative decline of Bulgaria’sefforts to fur<strong>the</strong>r develop conceptsof information operations and, moreimportantly, capabilities to participatein such operations. Never<strong>the</strong>less, during<strong>the</strong> past decade <strong>the</strong> Bulgarian defenseestablishment reached a certain levelof conceptual and doctrinal maturity,assigning main IO responsibilities tomilitary organizations, launching anambitious program for <strong>the</strong> introductionof advanced communications andinformation technologies and, mostimportantly, gaining operationalexperience.The main challenge at this stageis to promote information operations30 Special Edition 2008


equirements among all competingrequirements, and to elaborate realisticIO policies and an efficient capabilitydevelopment plan. These must alsoaccount for NATO and EU policies andburden sharing arrangements, as well asfor developments in <strong>the</strong> national securitysector. It is fairly safe to make severalpredictions in that respect:First, <strong>the</strong> development of unique IOconcepts as a result of original thinking,and in particular <strong>the</strong> implementationof such concepts, would hardly beencouraged. Instead, <strong>the</strong> Bulgarianmilitary will adhere to <strong>the</strong> NATO militarypolicy on information operations andinformation operations doctrine, aswell as <strong>the</strong> EU concept for military IO.Never<strong>the</strong>less, it is important to underlinethat Bulgaria has <strong>the</strong> potential andwillingness to contribute to NATO andEU IO-related research efforts, conceptdevelopment and experimentation,or innovative developments in o<strong>the</strong>rbilateral or multinational forums.Second, when it comes to <strong>the</strong>contribution to allied or coalitionoperations, one should not expectBulgaria will develop and provide abroad spectrum of IOcapabilities. Possibly<strong>the</strong> country will selecta subset of capabilities,and will specialize in<strong>the</strong>ir development andutilization. In this respect,define generic unitsthat are relatively selfsustainedand can bringuseful capabilities into amultinational operationis a topic of particularresearch interest.Third, <strong>the</strong> IO attackaspect will most probablybe subordinated to <strong>the</strong>evolving effects-basedapproach to operations( E B A O ) . B u l g a r i awill contribute to <strong>the</strong>development of thisconcept in <strong>the</strong> frameworkof NATO.Finally, while protection of one’sown command and control is part ofdefensive information operations, o<strong>the</strong>relements of <strong>the</strong> information infrastructuremay also be of considerable importancefor <strong>the</strong> security of <strong>the</strong> state and society.As mentioned above, Bulgaria adheres to<strong>the</strong> EU policy on critical infrastructureprotection and <strong>the</strong> major efforts will beon its implementation. At this stage <strong>the</strong>EU policy covers <strong>the</strong> Internet, but doesnot explicitly include defense or lawenforcement infrastructure. It is still tobe seen whe<strong>the</strong>r and how <strong>the</strong> militarywill cooperate with o<strong>the</strong>r governmentalorganizations and private actors inprotecting critical national informationinfrastructure.Conclusion<strong>From</strong> 1995 till 2002, Bulgaria’sinterest in information operations was on<strong>the</strong> rise, but it has not been so prominentin <strong>the</strong> last five years. The decline in IOeffort is relative—proponents find it verydifficult to receive adequate financingamong all competing requirements.The country still struggles to defineareas of specialization within NATOand <strong>the</strong> EU in which Bulgaria wants tobe competitive, and provide useful andefficient contributions. Never<strong>the</strong>less,it is possible to predict that Bulgariawill develop selective capabilities forconducting information operations asits contribution to <strong>the</strong> EBAO. Theparticipation of <strong>the</strong> Bulgarian militaryin critical information infrastructureprotection (CIIP) is less clear at this stage.The CIIP policy will reflect <strong>the</strong> policyof <strong>the</strong> European Union, with civilianorganizations and <strong>the</strong> private sector in<strong>the</strong> lead. Whatever <strong>the</strong> decision, Bulgariastill needs a more realistic policy,and efficient capability managementaccounting, to meet developments inNATO, <strong>the</strong> European Union, and <strong>the</strong>national security sector.Todor Tagarev is Chair of <strong>the</strong> Defense and Force ManagementDepartment of “G.S. Rakovski” Defense and Staff College, Sofia,Bulgaria. He was <strong>the</strong> first Director of <strong>the</strong> Defense Planning Directorate in <strong>the</strong>Bulgarian Ministry of Defense since its establishment in early 1999. <strong>From</strong> Mayuntil October 2001, he served as Director for Armaments Policy. He is a 1982Graduate of <strong>the</strong> Bulgarian Air Force Academy; received a PhD degree in systemsand control from <strong>the</strong> N.E. Zhukovsky Air Force Engineering Academy, Moscowin 1989; and is a 1994 Distinguished Graduate of <strong>the</strong> US Air Command and StaffCollege at Maxwell Air Force Base, Alabama. Dr. Tagarev has authored or coauthoredsix books, including Information Aspects of Security, and more than40 papers published in refereed journals. Since <strong>the</strong> early 1990s he is conductingresearch on chaos <strong>the</strong>ory and complex systems as related to military issues, witha focus on information technology developments and <strong>the</strong>ir impact. His currentresearch is concentrated on defense and force planning and on novel operationalconcepts. Dr. Tagarev is a member of <strong>the</strong> NATO Research and Technology Boardand is a national representative on <strong>the</strong> RTO System Analysis and <strong>Studies</strong> panel. Heis Managing Editor of Information & Security: An International Journal, , and a member of <strong>the</strong> Editorial Board of Connections: TheQuarterly Journal, . -mail: tagarev@bas.bg.31


Ukraine: Information Operations In Countriesof <strong>the</strong> Former Soviet UnionBy Dr. Georgii PocheptsovEditorial Abstract: Dr. Pocheptsov offers a very different definition of IO than <strong>the</strong> o<strong>the</strong>r contributors. He notes informationoperations are <strong>the</strong> achievement of non-information goals (social, economic, military, political) using information technologies.He offers some mass communication means for changing public opinion, and recommends altering channels of masscommunications and mass meaning if one desires to change a target group’s conscience. For fighting extremists, herecommends finding ways to disagree with reality in more “soft” ways; and work toward new ways of “interpreting events,”instead of only working toward targeting <strong>the</strong> “user-website” relationship.The Development of InformationOperations in UkraineUkraine, as well as o<strong>the</strong>r formerSoviet Republics, has limited experiencein using public communications toinfluence <strong>the</strong> mass consciousness. Theprocess for creating one’s own identityis slowed primarily due to a lack ofexperience as an independent massculture. At <strong>the</strong> same time, however,Russia was able to “turn on” its massculture, which created <strong>the</strong> necessaryprerequisites to produce, for example,TV shows and soap operas on a varietyof <strong>the</strong>mes from romantic to patriotic.Such a primary flow of informationallows for <strong>the</strong> crystallization of <strong>the</strong>required configurations of virtualobjects. Mass consciousness can onlybe altered using <strong>the</strong> channels of masscommunications and mass meaning (forexample, a bestselling novel or soapopera). The latter allows for creationof a parallel virtual world, where <strong>the</strong>configuration of <strong>the</strong> content is presented“as is,” in <strong>the</strong> case of religion forexample.Information operations can bedefined as <strong>the</strong> achievement of noninformationgoals (social, economic,military, political) using informationtechnologies. Among informationtechnologies we are currently seeing anincreasing role for non-mass producedmessages, such as rumors and directcontacts. This shift is driven by <strong>the</strong>inherent higher level of trust in directcontact communication as compared tomass communication.As such we can emphasize twoimportant characteristics of informationtechnologies:• They are directed towards <strong>the</strong>successful transition from information toano<strong>the</strong>r level (social, economic, military,political)• They mimic natural communicationflows. The opposite case would be <strong>the</strong>use of political advertising, or any type ofadvertisement, where <strong>the</strong> artificial natureof such communication flow is clear.Information operations can also bedivided into defensive and offensive,Republic of <strong>the</strong> Ukraine Coat of Arms.(Wikimedia)although recent research underlines <strong>the</strong>connectedness of <strong>the</strong>se processes. Ifwe talk about offense versus defense in<strong>the</strong> former Soviet block countries (with<strong>the</strong> exception of Russia), <strong>the</strong>y haveonly defensive information operationsexperience. For example, governmentinstitutions of <strong>the</strong> Ukraine gainedexperience in defensive IO in <strong>the</strong>following situations:• A scandal involving tapes of <strong>the</strong>former guard of <strong>the</strong> President, that had aneffect on both <strong>the</strong> local and internationallevels;• Western accusations of <strong>the</strong> trade of<strong>the</strong> Ukrainian “Kolchugi” radar systemto Iraq, which produced pressure on both<strong>the</strong> information and political levels;• The natural gas conflict betweenUkraine and Russia,; a conflict over meatand milk products trade; as well as o<strong>the</strong>rsimilar trade-related conflicts;• Local conflicts of smaller intensityand duration (between Ukraine andRomania, Ukraine and Poland, Ukraineand Bulgaria);• The Orange Revolution of 2004;• The emergence of totalitarianreligious cults, such as “WhiteBro<strong>the</strong>rhood.”The press-secretary of <strong>the</strong> UkrainianPresident at <strong>the</strong> time of <strong>the</strong> ‘tape scandal’noted: “I was long affected by <strong>the</strong> tapescandal. It was <strong>the</strong> hardest time forPresident Kuchma, no o<strong>the</strong>r Presidentwas in a worse situation. I rememberwe had consultants who worked withPresident Clinton during his troubles.God, I thought, I wish I was faced with<strong>the</strong>ir problems instead of this!”The gas conflict between Ukraineand Russia, which emerged around<strong>the</strong> particulars of <strong>the</strong> gas trade treaty,was interesting as both Russian andUkrainian media attempted to createparallel interpretations of <strong>the</strong> sameevents for <strong>the</strong> Ukrainian audience. Aconsensus among experts was thatUkraine lost that battle.We can also view <strong>the</strong> OrangeRevolution of 2004 as a war ofinterpretation—one also lost by <strong>the</strong>government—despite <strong>the</strong> fact a largeproportion of <strong>the</strong> media outlets wereunder government control. At <strong>the</strong> time,<strong>the</strong> opposition created a more compellingnarrative, which engaged key audiences.The government was seen as slowingdown <strong>the</strong> country’s progress, and it32 Special Edition 2008


could not get rid of such an image. Itis well known in <strong>the</strong> history of religionthat faiths under pressure become morecreative. Similarly, <strong>the</strong> opposition during<strong>the</strong> Orange Revolution was more creativethan <strong>the</strong> government.During <strong>the</strong> war of re-interpretations,especially during “colorful” revolutions,<strong>the</strong> same events achieve differentmeanings. Such wars display <strong>the</strong>following patterns:• The more successful <strong>the</strong> narrative,<strong>the</strong> more favorable <strong>the</strong> interpretationof new events in accordance with thisnarrative;• Good narrative submergesambivalent facts;• “Mobilizing narrative” is writtenfrom <strong>the</strong> citizens’ perspective, whichmakes it that much harder for <strong>the</strong>government to create a similarnarrative.Ukraine also witnessed newdevelopmental means among totalitarianreligious cults, such as “WhiteBro<strong>the</strong>rhood,” which successfully tookover a church building and made a callfor <strong>the</strong> mass suicide of its members. Noo<strong>the</strong>r former Soviet country experiencedthis. Investigations into <strong>the</strong> cult leftunanswered questions:• An organization of such magnitudecould not have survived only throughdonations from its followers;• The leader of <strong>the</strong> sect did not usehypnoses to influence followers, yet alarge number of followers had some sortof psychological deficiency;• It was difficult to define <strong>the</strong> natureof <strong>the</strong>se psychological deficiencies, aswell as <strong>the</strong> large number of followersand <strong>the</strong>ir geographical spread;• One of <strong>the</strong> leaders of <strong>the</strong> cult wasrumored to work for a special agency(KGB) [former Soviet intelligence].The Ukraine was also used asa test-tube for several large-scaleinformation operations that affected <strong>the</strong>whole population of <strong>the</strong> country. Localspecialists in <strong>the</strong> Ukraine participated inpolitical technologies and spin-doctoring.During <strong>the</strong> last decade, <strong>the</strong> practice ofdiscrediting was always ahead of <strong>the</strong>practice of refuting negative information,which allowed some organizations toUkrainian officer demonstrates IT monitoringto NATO colleagues. (Defense Link)“build up muscle” in this area. Thisoffensively-oriented information sphereis characterized by:• What is seen as information factby one side, is seen as disinformationby ano<strong>the</strong>r;• Information conflicts are anextension of economical ones;• A more powerful economical orpolitical player is also a more powerfulinformation player, as he has <strong>the</strong>necessary resources.A l l U k r a i n e c i t i z e n s h a v eexperienced a drastic environmentalchange—one that led to a life in adifferent civilization (from a Soviet toa post-Soviet one).. Both “Perestroika”and <strong>the</strong> Orange Revolution have similarcharacteristics, mainly a rapid change in‘who is <strong>the</strong> enemy.’ The enemy playedan important role in <strong>the</strong> Soviet model,as it defined everything. “Perestroika”followed this model:• First Stage: The Change: an outsideenemy is substituted by an inside one: agovernmental system;• Second Stage: Use Of An InternalResource: all types of propagandamechanisms are used in <strong>the</strong> internalattack;• Third Stage: Delegitimization: <strong>the</strong>population refuses <strong>the</strong> power’s right torule.The Orange Revolution was alsocrafted by creating an enemy inside<strong>the</strong> government, not post factum asin previous examples, but during <strong>the</strong>process of its formation.Overall <strong>the</strong> population of <strong>the</strong> formerSoviet block countries have moreexperience with information operationsthan any o<strong>the</strong>r country in <strong>the</strong> world.During <strong>the</strong> Soviet era people learned toread between <strong>the</strong> lines of mass producedmessages, thus intuitively stumblingupon <strong>the</strong> opposite meaning.In order to speak about IO <strong>the</strong>ory,we have to separate <strong>the</strong> players with<strong>the</strong>oretical and practical experience.They rarely intersect, which complicates<strong>the</strong> transition of <strong>the</strong> experience between<strong>the</strong> two. The practitioners fill <strong>the</strong> lackof <strong>the</strong>oretical knowledge with creativeapproaches, teamwork to generate ideas,and actual execution.Ukrainian experience in <strong>the</strong> <strong>the</strong>ory ofinformation technologies is significantlyslowed, since <strong>the</strong>orists do not participatein practice and practitioners do notwrite <strong>the</strong>ory. Where common sensepredominates, both substitute this for<strong>the</strong>ir lack of <strong>the</strong>ory or practice.The Ukrainian military position, atleast that published in <strong>the</strong> mass media,has two characteristics: first, <strong>the</strong> levelof novelty of ideas lies only in <strong>the</strong> verydetailed aspects of <strong>the</strong> offense; second,<strong>the</strong>re is a transition to a psychologicalsphere, which is where <strong>the</strong> terminology“ i n f o r m a t i o n a l — p s y c h o l o g i c a linfluence” originates.Academic research (such as doctoraldissertations) is an active area of <strong>the</strong>information sphere, as are informationpolicy, and Ukraine’s internationalimage. O. V. Litvinenko proposed what33


can be called a ‘culture-oriented modelof IO,’ in which <strong>the</strong> narrative introducedis taken from some local mythologicalstructure. Additionally, Ya. Varyvodaanalyzed Russian financial groups’information activities in <strong>the</strong> Caucasusregion, focusing on those connected wi<strong>the</strong>conomical and political interests. Thisauthor is creating what can be called a‘semiotic model of IO,’ in which massculture plays a crucial role.As to Ukraine’s international image,a powerful political player such as Russialooks at Ukraine as an object, and notas a player in information wars. TheUkraine is seen ei<strong>the</strong>r at <strong>the</strong> intersectionof <strong>the</strong> interests of Russia and US, or <strong>the</strong>US and Europe.There are several agencies in Ukrainespecializing in information warfarewithin <strong>the</strong> economic sphere. In 2006<strong>the</strong>se agencies held correspondingtraining to attract attention to <strong>the</strong>irwork, under <strong>the</strong> title “Ukraine:The Art of Future InformationWarfare.”Conflicts in post-Soviet blockterritory frequently have underlyingeconomic tension, although <strong>the</strong>yare also frequently tied to politicaltensions. Apart from Russia,most countries have very limitedaccess to TV broadcasting outside<strong>the</strong>ir own territory. Thus <strong>the</strong>yfrequently become <strong>the</strong> source ofRussian attacks, as in recent actionsagainst Lithuania, Ukraine, Georgia,Estonia, and Latvia. Just looking atthis list, it is clear that <strong>the</strong> politicalcomponent is present in <strong>the</strong>seactions. However, it is possible thatan economic war (using informationwarfare as a tool) also took place, dueto two factors:• There are fewer political restrictionsover actions;• There is a need to cut offeconomical ties due to political ormilitary concerns.More generally, information conflictusually develops through <strong>the</strong> followingstages:• Stage one: A point of conflictsuddenly appears;• Stage two: Public attention is broughtand kept at <strong>the</strong> point of conflict;• Stage three: The conflict fades(public attention is turned away from<strong>the</strong> conflict).The conflict fading stage is usuallylong-lasting: in <strong>the</strong> case of Russian-Georgian relations, it lasted a full year.This was driven by <strong>the</strong> vivid events in <strong>the</strong>first two stages, not easily forgotten by<strong>the</strong> public. Even when <strong>the</strong> governmentwants <strong>the</strong> conflict to be over, it continuesto linger.For controlled conflicts—and all<strong>the</strong> conflicts on <strong>the</strong> post-Soviet territoryare like this—<strong>the</strong> fading stage signals<strong>the</strong> end of <strong>the</strong> conflict. After event Xhappens, which was <strong>the</strong> sole purposeof <strong>the</strong> conflict, <strong>the</strong> controllers no longerinvest resources, thus <strong>the</strong> conflict fadesout.Republic of Ukraine. (Univ. of Texas)Russia has vast experience inconducting information operationstargetting outside parties. Let’s recall,for example, <strong>the</strong> “Romancing <strong>the</strong> Stone”situation, when <strong>the</strong> British Special Forceswere caught in Moscow with a ‘stone’used to read information from agentsat a distance. As a result, Moscow’sgovernment passed a law restrictingnongovernmental organizations, sinceone of <strong>the</strong> members of <strong>the</strong> British groupwas also responsible for distributingnongovernmental grants inside Russia.In 2007 a similar information conflictwas observed around <strong>the</strong> poisoning ofAlexander Litvinenko in London.All major international players havedealt with some issue aimed at uniting<strong>the</strong> public: for <strong>the</strong> US it was recoveringfrom <strong>the</strong> Great Depression; and for <strong>the</strong>USSR it was <strong>the</strong> propaganda during <strong>the</strong>foundation of <strong>the</strong> Soviet Union. Themajor players built <strong>the</strong> new picture of<strong>the</strong> world through traditional mediaenviroments: movies in earlier times,and TV now. Ukraine, with its problemof a political split along geographicallines, requires projects of <strong>the</strong> samemagnitude to unite <strong>the</strong> country.Information Warfare Strategieson <strong>the</strong> Internet: Fighting <strong>the</strong>ExtremistsWe can define <strong>the</strong> followingcharacteristics of <strong>the</strong> Internet that do noteasily coexist with items associatedwith visual culture:• A more dispersed environment,where <strong>the</strong> objects are hardlyconnected to each o<strong>the</strong>r;• A multitude of events thatbecomes less important due to <strong>the</strong>irsheer number. As a result it is hardto respond to <strong>the</strong>m with individualinterpretations, which requires moregeneral interpretation systems;• Increased dependence on <strong>the</strong>source of <strong>the</strong> interpretations;• The knowledge of <strong>the</strong> detailscomes before <strong>the</strong> understanding of<strong>the</strong> whole structure;• An Internet environment isformed by interaction with itsconsumers.The Internet environment isfrequently analogous to a socialnetwork, since <strong>the</strong> consumer visits its“own” websites. The consumer trusts<strong>the</strong> information presented <strong>the</strong>re morethan o<strong>the</strong>r sources. The website and <strong>the</strong>consumer have a friendly relationship, ascompared to <strong>the</strong> simpler ‘consumption‘relationship of newspapers or TV.Modeling such a “friendly” environmentshould incorporate <strong>the</strong> fact that modelswork with objects which do not interactphysically with consumers. All objectslie in <strong>the</strong> information environment.Several historical examples showa similar disconnect between <strong>the</strong>physical environment and <strong>the</strong> receiver’sunderstanding of <strong>the</strong> environment:34 Special Edition 2008


• The WWII propaganda campaignwith Japan, where in addition to ninemessages a soldier could verify throughdirect physical contact, <strong>the</strong>re was onemessage with informational evidence.• A maxim was formulated during<strong>the</strong> election of former US PresidentRichard Nixon: since <strong>the</strong>re was no directcontact with <strong>the</strong> candidate, one shouldnot change <strong>the</strong> candidate, but ra<strong>the</strong>r hisimage.Ano<strong>the</strong>r way to change <strong>the</strong>environment is to change <strong>the</strong> voter ra<strong>the</strong>rthan <strong>the</strong> candidate. Therefore, <strong>the</strong>re areseveral ways to change <strong>the</strong> elements of<strong>the</strong> communication chain:• Keep <strong>the</strong> speaker and <strong>the</strong> listenerconstant, but change <strong>the</strong> message. Thisis <strong>the</strong> most standard way of creatingcommunication;• Change <strong>the</strong> speaker (or <strong>the</strong> content)keeping <strong>the</strong> listener constant;• Change <strong>the</strong> listener, but keep <strong>the</strong>speaker constant;• Change <strong>the</strong> context. For example,to diminish <strong>the</strong> negative interpretationof disasters, <strong>the</strong> Russian Ministry ofEmergency Situations started a weeklyTV program about disasters in <strong>the</strong> restof <strong>the</strong> world.The modification of certain “offlimits” subjects can be painful for<strong>the</strong> audience, and usually should beavoided. For example, a figure of <strong>the</strong>Japanese Emperor was one such object;he remained unchanged even afterJapan’s capitulation. Hence, certainpolitical as well as religiously sensitiveobjects remain constant for <strong>the</strong> audience,thus making it harder to modify <strong>the</strong>m.However, <strong>the</strong>re exists a distributionof genuineness within <strong>the</strong> social network:<strong>the</strong> more direct contact we have with oursources, <strong>the</strong> more we trust <strong>the</strong>m. Yet aswe move upward in any hierarchy, <strong>the</strong>reare more possibilities to loose trust, asdirect contact is less likely.Speaking from [author] MarshallMcLuhan’s view, <strong>the</strong> Internet environmentis more similar to <strong>the</strong> acoustic than <strong>the</strong>visual environment. Let’s examine <strong>the</strong>following characteristics of such anenvironment:• An audio environment does nothave a definite distinction between <strong>the</strong>author and <strong>the</strong> listener, since everyonecan be both; Internet blogs providethis opportunity. A visual environmentcreates authorship and correspondinghierarchy;• An audio environment moves awayfrom individual to collective. Collectiveopinion, collective structures dominatehere;• Authority and au<strong>the</strong>nticity are builtthrough institutions, and not throughpeople. Therefore <strong>the</strong>re is a high levelof stability, similar to those in Muslimsociety which are maintained througha religiously-oriented educationalsystem.We can use precisely <strong>the</strong>secharacteristics as counterstrategies:• If everyone is equal in <strong>the</strong> acousticenvironment, this makes it easier for yourpeople or ideas to advance;• The audio environment is morelikely to be affected by a swarmingattack, a la [author John] Arquilla, andnot a standard centralized attack;• The model of a “magnet” attractingattention, which can be realized throughmarginal changes that introduce doubtinto <strong>the</strong> main version of events, withoutopenly denying <strong>the</strong>m;• Major changes in this environmentcan only occur through extraordinaryevents (for example, news of Arafat’sdeath from AIDS can change <strong>the</strong> attitudetowards his movement as a whole).Audio environments can act irrationallyby shifting attention to <strong>the</strong> most vividevent, ra<strong>the</strong>r than <strong>the</strong> most importantone.G e n e r a l t e n d e n c i e s i n t h edevelopment of any environment follow<strong>the</strong> same principle: human systems tryto expand, and thus subordinate anyunclaimed environment. Physical,informational, and virtual environmentsall are constantly under attack by o<strong>the</strong>rphysical, informational, and virtualenvironments trying to force <strong>the</strong> formerto live under its rules.The following goals highlightany attempt to modify <strong>the</strong> points of aconflict:• A change of heroes, enemies, andvictims;• A change of <strong>the</strong> objects ofattention;• A change in <strong>the</strong> underlyingmotivation of actions;• A shift of attention to <strong>the</strong> historicalperiod and <strong>the</strong> symbols of that time.The goal is to create a new virtualreality that would fit <strong>the</strong> interests of <strong>the</strong>communicator. This new virtual realitymust not change completely: as a firststep it can only question <strong>the</strong> validityof <strong>the</strong> previous reality. For example,we can keep <strong>the</strong> heroic event, but finda different motivation for it, such asstruggle for power, cowardice, or o<strong>the</strong>rsimilar negative aspect. So <strong>the</strong> structure:“positive act—positive motivation”is transformed into a “positive act—negative motivation.” Let’s callthis example Negation Through TheChange Of Motivation.During <strong>the</strong> destruction of <strong>the</strong> imageof [Vladimir] Lenin, his story wentthrough a ‘broadening’ of his personalcharacteristics, and as a result it was nolonger a taboo or “off limits” subject.It was okay to move away from acanonical image. The stage of Leninwith a “human face” was followed by<strong>the</strong> stage of Lenin with an “inhumaneface.” Thus even though this broadeningof image was done with noble goals inmind, it was followed at <strong>the</strong> next step bya more negative characterization. Let’scall this device a Negation Through TheBroadening Of The Canon.Ano<strong>the</strong>r device is to change <strong>the</strong>nature of <strong>the</strong> communications: a shiftfrom storytelling from one point of viewto ano<strong>the</strong>r. Let’s take for example possibleways of telling <strong>the</strong> story of “Little RedRiding Hood.” The traditional versionis told from <strong>the</strong> point of view of a littlegirl. But it is also possible to tell thisstory from <strong>the</strong> perspective of <strong>the</strong> mo<strong>the</strong>r,grandmo<strong>the</strong>r, or even <strong>the</strong> wolf. Let’scall this device Negation Through TheChange Of The Storyteller. We can usethis device frequently, as many eventscan be described from <strong>the</strong> point of viewof different witnesses, allowing newinformation to be introduced.The Internet environment has lessinertia; <strong>the</strong>refore it is frequently usedin situations when <strong>the</strong> environmentof traditional media is blocked, forexample, by authorities. A campaignin <strong>the</strong> Internet environment can employdifferent types of messages unusable inan official environment. It could be a35


campaign similar to dissemination ofrumors, which takes on a second-lifethrough repetition.The environment which serves as asource for extremist/terrorism-friendlyfeelings is very ritualized and closed.The main goal of an Internet counterpropagandawar, which has very welldefined rules about both allowable andbanned actions and messages, should beto increase <strong>the</strong> number of possible futurelife directions of an individual. Specificresults of such work are:• A deceleration of <strong>the</strong> processes ofmoving towards a goal predetermined by<strong>the</strong> creators of <strong>the</strong> environment;• An introduction of <strong>the</strong> possible“crossroads” that can shift <strong>the</strong> attentionor action away towards more secondarytasks;• An introduction of new models ofindividual development.The destruction of <strong>the</strong> preprogrammednature of terrorist behaviorcan be done by increasing <strong>the</strong> numberof options for development, where onecan transition from one state to ano<strong>the</strong>r.For example:• Breach of <strong>the</strong> interpretation of realevents;• Breach of <strong>the</strong> understanding ofvirtual objects;• Breach of <strong>the</strong> motivations and goalsof terrorism by showing that <strong>the</strong>y can beachieved using o<strong>the</strong>r means.The destruction of <strong>the</strong> interpretivemodel of <strong>the</strong> object is done by introducinga new opposite characteristic: adding anegative feature to a positive object oradding a positive feature to a negativeobject. For example, when <strong>the</strong> USwas bombing Afghanistan (a negativeobject), <strong>the</strong> addition of dropping foodsupplies and not bombing on religiousholidays added a positive feature to <strong>the</strong>object, which slowed down <strong>the</strong> creationof <strong>the</strong> solitary negative view.In ano<strong>the</strong>r example, <strong>the</strong> OrangeRevolution in Ukraine destroyed <strong>the</strong>legitimacy of power, by introducingnew connections: not just power, but“criminal power.” According to scholarGeorge Lakoff, trying to dispute aparticular framing of an issue does notdestroy it, but ra<strong>the</strong>r streng<strong>the</strong>ns it. Weshould refocus away from disputingsomeone else’s framing of an issue, andtowards creating and maintaining a newone. A more global goal in this case isto conceptually change and modify <strong>the</strong>virtual environment by:• Change of heroes;• Change of enemies;• Change of sacred texts which makea coordinated system of heroes, enemies,and victims.Such principal change is hard toachieve. Therefore we talk more abouta correction of <strong>the</strong> meaning of heroes,enemies, and sacred text. This triad isinterconnected: by changing enemies, wechange <strong>the</strong> heroes, and vice versa.New meanings serve as goals ininformation warfare. These should notrepeat existing and conflicting <strong>the</strong>mes,which would ease <strong>the</strong>ir acceptance into<strong>the</strong> mass consciousness. The generationof new meanings can be seen as aseparate research task. Using ano<strong>the</strong>rhistorical example, when <strong>the</strong> ApostlePaul introduced communion with breadand wine, where <strong>the</strong> latter is seen asblood, introduced something that goesagainst Judaism, which does not allow<strong>the</strong> use of blood. But, this practice wasclose to pagan religions, where <strong>the</strong> use ofblood was accepted. The main obstacleto development of new meanings is that<strong>the</strong>y are hard to come by in a worldflooded with old meanings. If <strong>the</strong>technical aspect of human civilizationhas developed rapidly, <strong>the</strong> social aspectis, paradoxically, advancing slowly.The Internet-environment can fulfillthree tasks:• Compensating for <strong>the</strong> lack ofsomething in reality (for example, filmand comic book superheroes appeared asa reaction to <strong>the</strong> Great Depression);• Reinforcing reality (for example,extremism reinforces <strong>the</strong> existingconfrontation between <strong>the</strong> East and <strong>the</strong>West);• Transforming reality (for example,<strong>the</strong> US war for Muslim hearts and mindsis designed to negate <strong>the</strong> negativitydirected towards <strong>the</strong> West).Perestroika, <strong>the</strong> Orange Revolution,and <strong>the</strong> war for <strong>the</strong> hearts and minds ofMuslims are fought in a highly controlled(by ideology or religion) environment. Inthis case it is only possible to create a newvirtual reality using more “soft” tools,without engaging in direct conflict.Yet ano<strong>the</strong>r counter strategyis creation of an alternative virtualreality:• Stage One: Expansion - broadeningcanonical frames of <strong>the</strong> description,which allows addition of negativefeatures into <strong>the</strong> positive objects, andpositive to negative;• Stage Two: Negativity - additionof negative features into <strong>the</strong> positiveobjects, and positive to negative;• Stage Three: Change of enemiesinto friends - this is a final stage ofchanging <strong>the</strong> virtual reality model.Political leaders go through <strong>the</strong> samestages when <strong>the</strong>y go from admiration tocondemnation. Mikhail Gorbachev,for example, went through this processas did most major figures from hisadministration. Ukraine’s OrangeRevolution went through a stage ofcontrolled chaos, which made it easierto change <strong>the</strong> model of <strong>the</strong> world of<strong>the</strong> mass consciousness. For thatpurpose Perestroika used empty storeshelves, mass protests, and <strong>the</strong> fightagainst alcoholism, which resultedonly in longer lines in <strong>the</strong> stores. TheOrange Revolution openly expressedinsubordination to <strong>the</strong> government, used<strong>the</strong> main square of Kiev as a stage forprotests, and used <strong>the</strong> previously-notedpresidential tape recording scandal toreplace <strong>the</strong> serving president.In many ways <strong>the</strong> West did not win<strong>the</strong> Cold War on <strong>the</strong> level of ideologies,where <strong>the</strong>re were no deviations, butra<strong>the</strong>r on <strong>the</strong> level of reality—everydayexistence. Ballpoint pens, bluejeans,etc. turned out to be more powerful“weapons” than real ones. This happensbecause each element of everyday lifecarries inside it <strong>the</strong> element of virtualreality—new meanings that can disagreewith accepted reality in more “soft” ways.Russia faced <strong>the</strong> problem of confrontingforeign influence much earlier than <strong>the</strong>time of [Emperor] Peter I. This was aproblem during <strong>the</strong> governance of hisfa<strong>the</strong>r, Tsar Alexej Mikhailovich. A. S.Orlov sees <strong>the</strong> emergence of this conflicteven earlier during <strong>the</strong> times of Ivan <strong>the</strong>Terrible.36 Special Edition 2008


The opinions of that earlier time arevery similar to what Muslim society nowexperiences. Both <strong>the</strong>n and now, religionremains <strong>the</strong> main component of thissociety, subordinating everything else.<strong>From</strong> here, we can see a way to influenceMuslim society: through building secularorganizations, which have <strong>the</strong> potentialfor change. The same experience easilytranslates to <strong>the</strong> Internet environment:our goal is to build a new representationof reality in <strong>the</strong> new virtual world.It is possible to borrow experiencefrom o<strong>the</strong>r related disciplines. Forexample, social marketing suggestsdifferent types of interventions dependon <strong>the</strong> target audiences’ motivations,abilities, and possibilities to act. Wemust incorporate all of <strong>the</strong>se factors intoan Internet-based information war.For example, some suggestnongovernmental organizationsbecome highly visible when <strong>the</strong>iractivities resonate with internationalnongovernmental organizations. Thecounteraction strategy in this case canbe fighting against <strong>the</strong> interpretationof a fight for power or property in <strong>the</strong>light of <strong>the</strong> fight for human rights anddemocracy, when such interpretation isprovided by <strong>the</strong> local NGOs. In this way,such interpretation looses resonance.However, information reality turnsout to be more complex than one canassume from such analyses. In <strong>the</strong>case of <strong>the</strong> Internet, we can observe <strong>the</strong>following characteristics:• Multitude of websites: blocking<strong>the</strong>m is no longer effective;• Websites change rapidly: it is hardto apply <strong>the</strong> same methods of influenceon <strong>the</strong>m;• Decentralization: it is harder toattack <strong>the</strong> hierarchy;• Reliance on local websites: thisis <strong>the</strong> source of information in Arabcountries.It is also necessary to be closelyconnected to Arab culture as <strong>the</strong> only wayto establish trust. Counterpropagandarequires even more complex constructsthan propaganda, yet at <strong>the</strong> same time<strong>the</strong> consequences of such actions areharder to plan. Counterstrategy canbe realized through counter-narratives,which can stand against <strong>the</strong> narrativesof <strong>the</strong> terrorists.The most effective counter-narrativesare <strong>the</strong> internal sources of influence. Forexample, <strong>the</strong> UK’s Information ResearchDepartment (part of <strong>the</strong> <strong>Foreign</strong> <strong>Office</strong>and MI6), has worked from inside <strong>the</strong>foreign field. As a result its articles andbooks did not refer to <strong>the</strong> true sourcesor true authorship. Therefore, <strong>the</strong> levelof trust to such information was ra<strong>the</strong>rhigh.ConclusionThe Internet is so flexible it allowsus to use of a wider set of possibilitiesthan traditional media. But <strong>the</strong> consumerwants to receive <strong>the</strong> information flowhe is looking for. The conflict or fightshould not be targeted towards <strong>the</strong> “userwebsite”relationship, as such wouldnot be productive, but towards “eventwaysof interpreting” relationship. It isimportant that this, or any such type ofinterpretation, should be acceptable to<strong>the</strong> consumer.The Internet can foster <strong>the</strong>generation of new needs, which can alsobe an effective technique of informationwarfare. If <strong>the</strong> old needs stem fromreligious or political roots, <strong>the</strong> news onesdo not have this connection and becomea way of creating new meanings. Newneeds can be met: by new people, withnew types of virtual objects.Georgii Pocheptsov is a Professor who most recently served as <strong>the</strong>Head of <strong>the</strong> Department of Information Policy in <strong>the</strong> National Academyof Public Administration under <strong>the</strong> President of Ukraine. He also servedas <strong>the</strong> Chair of <strong>the</strong> Marketing Department at <strong>the</strong> International SolomonUniversity. His prior appointments include serving as <strong>the</strong> Chair of <strong>the</strong>Department of International Communications and Public Relations at <strong>the</strong>Institute of International Relations at Kiev National University; and as <strong>the</strong>Head of <strong>the</strong> Strategic Initiatives Department in <strong>the</strong> <strong>Office</strong> of <strong>the</strong> President ofUkraine. Dr. Pocheptsov has written 40 books which, among o<strong>the</strong>rs, includeInformation Wars, Psychological Wars, Propaganda and Counterpropaganda,Information and Disinformation, Information-political Technologies, andStrategy and Strategic Analysis.37


Australia: Current Developments In Australian <strong>Army</strong>Information OperationsBy James Nicholas, Major, Australian <strong>Army</strong>Editorial Abstract: Major Nicolas notes Australia’s armed forces are considering doing away with <strong>the</strong> term “informationoperations” and substituting <strong>the</strong> term “information actions” in its place. IO appears to be too much of a specialist’s stovepipe, as influence emanates from all military activities. This change may better reflect <strong>the</strong> relative weighting Australia placeson specific aspects of information-related issues, such as <strong>the</strong> terms “decision superiority” and “influence.”IntroductionOver a decade ago, <strong>the</strong> concept of “command and controlwarfare” was incorporated into US doctrine. It focusedon enabling US commanders to complete <strong>the</strong>ir decisionmakingcycles more quickly and more effectively than <strong>the</strong>iradversaries. Subsequently, <strong>the</strong> concept was refined andrenamed “information warfare,” and later replaced by <strong>the</strong>concept of information operations which has been incorporatedin Australian and allied joint doctrine.The developing concept of information operations isbroader than its predecessors. While continuing to focuson <strong>the</strong> need to move through decision-making cycles morequickly and effectively than <strong>the</strong> adversary, IO also recognizes<strong>the</strong> need to influence and win support to enable friendly forcemilitary actions. This support primarily emanates from <strong>the</strong> localpopulation in an area of operations, as well as from broaderregional and international audiences.Currently, <strong>the</strong> Australian <strong>Army</strong> is developing processes toenable conduct of information operations at <strong>the</strong> tactical level.While <strong>the</strong> Australian Defense Force (ADF) joint informationoperations doctrine allows <strong>the</strong> strategic whole of government tofocus on operational planning, such doctrine does not providecommanders an adequate approach to conduct tactical level IO.Accordingly, many believe a gap exists in tactical Australian<strong>Army</strong> information operations.Issues addressed here include: status of Australian jointand ABCA armies’ doctrine; coalition experience; informationoperations versus use of <strong>the</strong> term information actions (IA); coreelements of information actions; and information actions andintelligence preparation of <strong>the</strong> battlespace.Status of Australian Joint and ABCA Armies’DoctrineAustralia published its first joint doctrine on informationoperations in 2002. Until early 2006 <strong>the</strong>re was no change inAustralian joint doctrine, and little change in <strong>the</strong> Australian/British/Canadian/American (ABCA countries’) joint andarmies’ doctrine. In early 2006 <strong>the</strong> US issued a new US jointinformation operations publication. Some IO professionalsenvisaged that this publication, toge<strong>the</strong>r with recent operationalexperience, may force change in <strong>the</strong> doctrine of ABCAarmies.Prior to 2007, <strong>the</strong> ADF produced joint informationoperations doctrine suited to <strong>the</strong> conduct of strategic andoperational IO, but no lower order doctrine existed. The decisionto develop Australian <strong>Army</strong> land warfare doctrine (LWD)arose from <strong>the</strong> requirement to develop an <strong>Army</strong> informationoperations capability to address tactical requirements, foroperations at brigade and below.The 2002 doctrine provided an Australian perspective oninformation operations, based primarily on US doctrine of <strong>the</strong>time. Since <strong>the</strong>n <strong>the</strong>re have been shifts in joint US informationoperations doctrine, and although not fundamental, <strong>the</strong> changesare significant. In late 2006, <strong>the</strong> Australian <strong>Army</strong> finally beganwriting its own information operations doctrine.Coalition ExperienceRecent operational experience has generated considerablecriticism of Coalition information operations. First, <strong>the</strong>secriticisms include being unwieldy and difficult to apply;secondly, as being inadequate in relation to <strong>the</strong> practical aspectsof gaining influence and support. This is especially significant inwhat may largely be an unfriendly operating environment, withan instinctively distrustful civilian population. Additionally,aspects such as training, inadequate allocation of appropriateresources, untrained staff, and inadequate intelligence supportto IO, have all drawn close examination. A US commanderrecently wrote:I am absolutely convinced that we must approach IO in adifferent way and turn it from a passive war fighting disciplineto a very active one. We must learn to employ aggressive IO.We cannot leave this domain for <strong>the</strong> enemy; we must fight himon this battlefield and defeat him <strong>the</strong>re just as we’ve provenwe can on conventional battlefields.Complicating our efforts in <strong>the</strong> information domainis <strong>the</strong> fact that we are facing an adaptive, relentless, andtechnologically savvy foe. Our adversary recognizes <strong>the</strong>global information network is his most effective tool forattacking what he perceives to be our center of gravity: publicopinion—both domestic and international. And <strong>the</strong> truth of <strong>the</strong>matter is that our enemy is better at integrating informationbasedoperations, primarily through mass media, than we are.In some respects we seem tied to our legacy doctrine, andless than completely resolved to cope with <strong>the</strong> benefits andchallenges of information globalization.Such feedback may have been <strong>the</strong> basis for <strong>the</strong> decisionat <strong>the</strong> recent ABCA Information Operations Project Teammeeting to recommend <strong>the</strong> abandonment of <strong>the</strong> concept of IO,at least in its current form. The team recommends <strong>the</strong> term‘information operations’ be discarded, but that <strong>the</strong> core activity38 Special Edition 2008


of influence be retained. British Forces are also conductinga detailed analysis of <strong>the</strong> influence component of informationoperations.The ABCA report recommendations were an effort toensure a less cumbersome application of various capabilities,and to meet situations where influence and support achieve amuch greater weighting than at present. Thus <strong>the</strong> Australian<strong>Army</strong> views retention of <strong>the</strong> term ‘information operations’ asnon-critical; however, retention of <strong>the</strong> underlying concept of‘influence’ is seen as paramount.Ano<strong>the</strong>r critical need is to remove information operationsfrom a specialist stove-pipe, and recognize that influenceemanates from all military activities: ei<strong>the</strong>r as a planned (listorder) effect, or as an unintended (second or third order)effect.Information Operations Versus Information ActionsApart from <strong>the</strong> ABCA Project Team’s recommendation notto retain <strong>the</strong> term information operations (yet to be formallyendorsed by ABCA), fur<strong>the</strong>r examination of how NATO sees<strong>the</strong> IO construct led <strong>the</strong> Australian <strong>Army</strong> to examine alternativeterms to describe tactical level information-related actions.One issue with <strong>the</strong> term information operations is <strong>the</strong>current variety of definitions in use. The Australian jointdoctrine definition is significantly different from US jointdoctrine, and those of <strong>the</strong> o<strong>the</strong>r ABCA services.The varying definitions reflect <strong>the</strong> relative weightingplaced by different countries or organizations on <strong>the</strong> decisionsuperiority and influence aspects of information operations. Thecurrent US joint and <strong>Army</strong> definitions focus on achievement ofdecision superiority, with somewhat less emphasis on influence.The current Australian joint definition addresses both aspects.The current NATO definition reflects <strong>the</strong> need for informationoperations to focus on influencing target audiences. The currentUS, NATO and Australian Joint formal definitions are:(US Joint) The integrated employment of <strong>the</strong> corecapabilities of electronic warfare, computer networkoperations, psychological operations, military deception, andoperations security, in concert with specified supporting andrelated capabilities, to influence, disrupt, corrupt, or usurpadversarial human and automated decision making whileprotecting our own.(NATO) Coordinated actions to create desired effects on<strong>the</strong> will, understanding, and capability of adversaries, potentialadversaries, and o<strong>the</strong>r approved parties in support of overallobjectives by affecting <strong>the</strong>ir information, information-basedprocesses, and systems while exploiting and protecting one’sown.(Australian Joint) The coordination of information effectsto influence <strong>the</strong> decision making and actions of a targetaudience and to protect and enhance our decision making andactions in support of national interests’.A second issue with <strong>the</strong> term information operations is thatit is somewhat at odds with o<strong>the</strong>r Australian <strong>Army</strong> doctrinalguidance and recommended ABCA standards. At present,<strong>the</strong> term “operation” is used openly, with a wide range ofActions described as operations. Examples are “bridgingoperations,” and “transport operations.” The reference aimsto establish tighter usage and more precise meaning within adefined spectrum. For example, <strong>the</strong> Australian Government’scommitment to stability in <strong>the</strong> Solomon Islands, OperationAnode, conducts four types of activities: offensive, defensive,stability, and enabling. Enabling activities can be described astactical actions that link, support, or create <strong>the</strong> conditions foroffensive, defensive, and stability activities.Offensive activities in turn have a number of associatedactions, such as: attack, advance, and pursuit. Within anoffensive activity (including defensive, stability, and enablingactivities), information actions would be intrinsically organicto <strong>the</strong> conduct of that activity, and may be represented in oneor more (simultaneous or separate) information actions. Wecan use a number of tools to best effect implementation of <strong>the</strong>information action (Figure 1).The Australian <strong>Army</strong> is <strong>the</strong>refore considering replacing<strong>the</strong> term information operations with information actions. Anemerging Australian <strong>Army</strong> definition under consideration is:Actions conducted to influence target audiences in orderto achieve understanding, acceptance, and support of ouractions and aims, and to diminish <strong>the</strong> quality and speed of <strong>the</strong>adversary’s decision making, while maintaining our own, toachieve decision superiority.Battlespace Operating SystemIn <strong>the</strong> Australian <strong>Army</strong> tactical lexicon, informationoperations is also referred to as a battlespace operating system(BOS). This is a framework within which a force synchronizesactions across <strong>the</strong> battlespace. The <strong>Army</strong> fur<strong>the</strong>r envisionsmoving away from <strong>the</strong> title of ‘IO BOS.’ Accordingly, <strong>the</strong>y areconsidering a number of titles, including ‘information dominanceand influence’ (IDI) BOS. This reflects an Australian <strong>Army</strong>view that <strong>the</strong> previously-titled BOS needs to reflect informationdominance in terms of effective electromagnetic environmentmanagement—resulting in domination of adversary or neutralinformation and protection of one’s own. Additionally, coreinfluence activities are incorporated into <strong>the</strong> BOS, extendingnot only across <strong>the</strong> information environment, but also <strong>the</strong>cognitive environment of any target audience.Core Components of IAAt present, information actions are <strong>the</strong> integratedemployment of a number of core capabilities: deception,psychological operations (PSYOP), electronic warfare(EW), operations security (OPSEC), and computer networkoperations (CNO). Additionally, IA has a number of supportingcapabilities, including physical attack, information security,and some related capabilities —public information and civilmilitarycooperation (CIMIC). These various capabilities canbe employed across three core information actions that alignto <strong>the</strong> broad ABCA working group’s recommendations. Thecore actions are:39


Title Activity Actions Info Actions Capabilities/ToolsOffensiveAttack, Advance,Pursue, etc.A <strong>Military</strong> Operation, egOPERATION ANODEInformation Actions1) Influence2) Counter Command,3) Command & InfoProtectionPSYOP, MILDEC,EW, CNO, CIMIC, PI,MPA, PPP, OPSEC,HUMINT, Targeting,(Example list)DefensiveStatic, Delaying, As above As aboveMobileStability etc. As above As aboveEnabling etc. As above As AboveFigure 1. Link between an Operation, Activity, Action, and Capability in Describing Information Actions.1. Influence: aimed at changing <strong>the</strong> perceptions and willof target audiences.2. Counter Command: focused on diminishing <strong>the</strong>adversary’s command and control systems and associateddecision making.3. Information and Command Protection: focused onprotecting our own information and command and control andinformation systems.Influence actions include employing <strong>the</strong> supportingcapabilities of <strong>Military</strong> Public Information, PSYOP, deception,CIMIC, plus presence, posture, and profile tasks. However,depending on <strong>the</strong> results of ongoing analysis, this list mayeventually include o<strong>the</strong>r tactical capabilities.Counter command actions include employment of a rangeof capabilities or tools. OPSEC, EW (specifically electronicattack), and CNO (computer network operations, includingattack) are predominantly focused on <strong>the</strong> physical dimensionof information terrain (information systems). Deception andPSYOP focus on <strong>the</strong> cognitive dimension (decision makers’brains). Yet we may also employ o<strong>the</strong>r capabilities enablingphysical destruction of enemy commanders, <strong>the</strong>ir staffs, andsystems. Coalition staffs would draw on <strong>the</strong> assistance andadvice of specialist staff areas such as EW, PSYOP, and kinetictargeting as appropriate. The Australian <strong>Army</strong> is still analyzingwhich staff function should have responsibility for CounterCommand Activity.Information and command protection actions includeemployment of a range of capabilities including informationsecurity, EW (via electronic protection), CNO (primarily,computer network defense), OPSEC, counter deception, andcounter PSYOP/counter propaganda. While information andcommand protection actions would most likely draw heavilyon <strong>the</strong> assistance and advice of specialist staffs, indicationsare that “operations” or <strong>the</strong> “3” may be <strong>the</strong> most appropriateresponsible staff area. Notably, <strong>the</strong> ABCA Armies’ draft reportrefers to this activity solely as information protection, though<strong>the</strong> Australian <strong>Army</strong> is still examining inclusion of commandprotection. There is an obvious need to address protection ofour own commanders, staffs, and command and control systemsagainst <strong>the</strong> adversaries’ counter command activity.Fur<strong>the</strong>rmore, commanders are increasingly likely toencounter a range of actions intended to impair or diminish <strong>the</strong>quality of <strong>the</strong>ir decision making, and <strong>the</strong>ir ability to commandeffectively. With our increasing IT reliance, modern armiesand commanders will undoubtedly face hostile activity directedtowards destroying or impairing automated command andcontrol and information systems.Defense against such measures is <strong>the</strong> core information andcommand protection activity. Physically, commanders, <strong>the</strong>irheadquarters, and staffs could be subject to destruction by arange of weapon systems or attacks. Defense against suchhostile actions is <strong>the</strong> realm of OPSEC, as well as defensiveforce protection and o<strong>the</strong>r security measures. Commandersmay be <strong>the</strong> target of deception measures, or PSYOP intendedto impair <strong>the</strong> quality of <strong>the</strong>ir decisionmaking. Defense againstsuch measures is achieved through effective intelligence,surveillance, target acquisition, and reconnaissance (ISTAR),enabling accurate situational awareness, understanding, andcounter deception measures.The potential for all service members to be subject toan evolving class of incapacitating or debilitating weaponsis also increasing. The following quote advocates <strong>the</strong> needto “firewall” <strong>the</strong> minds of commanders, staffs, and systemsoperators:We are on <strong>the</strong> threshold of an era in which <strong>the</strong>se dataprocessors of <strong>the</strong> human body may be manipulated ordebilitated. An entirely new arsenal of weapons, based ondevices designed to introduce subliminal messages or to alter<strong>the</strong> body’s psychological or data processing capabilities, mightbe used to incapacitate individuals.We are potentially <strong>the</strong> biggest victims of informationwarfare, because we have neglected to protect ourselves.Our obsession with a ‘system of systems’ is most likelya leading cause of why we neglect <strong>the</strong> human factor inour information warfare <strong>the</strong>ories. It is time to change ourterminology and our conceptual paradigm. Our terminologyconfuses us, sending us in directions dealing primarily withhardware, software, and communications components. Weneed to spend more time researching how to protect <strong>the</strong> humansin our data management structures. We cannot sustain anythingwithin those structures if we’re debilitated by our adversaries.Right now someone may be designing <strong>the</strong> means to disrupt<strong>the</strong> human component of our carefully constructed notion ofa system of systems.There has been significant development in <strong>the</strong> evolutionof mind- altering weapons since <strong>the</strong> preceding quotes werewritten. While much more than a doctrinal issue, <strong>the</strong>re isobvious value in placing greater emphasis on protection of40 Special Edition 2008


commanders, <strong>the</strong>ir staffs, and systems operators. Hence, <strong>the</strong>Australian <strong>Army</strong> is considering inclusion of “command” into<strong>the</strong> core activity of information and command protection.Information Actions and Intelligence Preparation of<strong>the</strong> BattlespaceAustralian <strong>Army</strong> planning doctrine includes a chapteron Intelligence Preparation of <strong>the</strong> Battlespace (IPB). Thedescription places more emphasis on factors that have far widerscope than <strong>the</strong> traditional domains such as physical terrain,wea<strong>the</strong>r, conventional or adversary weapon capabilities, andtactics, techniques, and procedures. These factors include: <strong>the</strong>electromagnetic spectrum, societal, political, cultural, religious,and economic aspects, with this list not being exhaustive.Past Australian <strong>Army</strong> doctrine gives limited consideration ofinformation terrain and human terrain; future doctrine willaddress <strong>the</strong>se areas in more depth.The information terrain is an increasingly importantcomponent of <strong>the</strong> battlespace. It includes <strong>the</strong> individuals,organizations, and systems of both friendly and adversaryforces that collect, process, or disseminate information—aswell as <strong>the</strong> information itself. It also includes <strong>the</strong> civilianpopulation and governmental agencies that coordinateinternational efforts, non-governmental organizations, and <strong>the</strong>news media. Accordingly, <strong>the</strong> information terrain and humanterrain are interconnected.Australian <strong>Army</strong> doctrine regarding information actionsneeds to address intelligence support, through <strong>the</strong> IPB, to all coreareas of information actions. Given recent operational feedbackand associated criticisms of current doctrine, we should placemore emphasis on intelligence support to influence, particularlyin respect to peace support and counterinsurgency operations.Much greater emphasis could be placed on defining, describing,and understanding <strong>the</strong> diverse groups and micro populationsthat may exist in an area of operations and areas of interest.For each segment of <strong>the</strong> population, as well as <strong>the</strong> overallpopulation, this would include aspects such as aspirations,motivations, goals, religions, leaders, leadership rivalries andassociated factions, alliances, loyalties, obligations, hatreds,daily rituals, historical dates and cultural norms.Likewise, <strong>the</strong> Australian <strong>Army</strong> is considering informationactions, its roles, and relationships across <strong>the</strong> five lines ofoperation considered within adaptive campaigning:1. Joint Land Combat - Involves actions to secure <strong>the</strong>environment, remove organized resistance, and set conditionsfor <strong>the</strong> o<strong>the</strong>r lines of operation;2. Population Protection - Provides protection and securityto threatened populations in order to set <strong>the</strong> conditions for <strong>the</strong>re-establishment of law and order;3. Public Information - Informs and shapes <strong>the</strong> perceptions,attitudes, behavior, and understanding of target populationgroups;4. Population Support - Establishes/restores or temporarilyreplaces <strong>the</strong> necessary essential services in effectedcommunities;Commonwealth of Australia(Univ. of Texas)5. Indigenous Capacity Building - Nurtures establishment ofcivilian governance (local and central), security, police, legal,financial, and administrative systems.Based on contemporary operational experience, <strong>the</strong>reappears to be a growing recognition that Australia shouldadopt a broader, more comprehensive, yet more systematicapproach to information-related actions. The answer to currentdifficulties in applying information actions to operations isnot to abandon <strong>the</strong> concept, but to “think outside <strong>the</strong> box” andimprove on it.In order for this to occur, <strong>the</strong> Australian <strong>Army</strong> iscurrently developing doctrine to meet <strong>the</strong> needs of <strong>the</strong> tacticalcommander. This will fur<strong>the</strong>r develop concepts discussed inthis article, to ensure that information actions broadly align to<strong>the</strong> Australian joint IO approach, and help <strong>the</strong> <strong>Army</strong> implementits components of any or strategic shaping and influencing plan.Additionally, <strong>the</strong> Australian <strong>Army</strong> is cognizant of <strong>the</strong> ABCAProgram’s works, and of <strong>the</strong> need for doctrinal interoperabilitywith o<strong>the</strong>r nations.Development of Australian <strong>Army</strong> doctrine will enablerefinement of information actions land capabilities, byproviding guidance to commanders and <strong>the</strong>ir staffs on <strong>the</strong> mosteffective employment of IA-related capabilities across <strong>the</strong>IDI BOS. Underpinning this development is that informationactions are intrinsically one of <strong>the</strong> four types of activities:offensive, defensive, stability, and enabling. Accordingly, wemust plan information actions in conjunction with all aspectsof a military operation, to ensure success and relevance in <strong>the</strong>future complex operating environment —across all lines ofoperation.Defeat or Neutralize Extremists’ Use of <strong>the</strong>Internet?How Australia plans to defeat or neutralize extremist useof <strong>the</strong> Internet raises a number of issues. First and foremostare those actions undertaken by a ‘Whole of Government’41


approach: employing strategic, operational, andtactical capabilities that revolve around managementand domination of <strong>the</strong> electromagnetic spectrum. Yetwe must examine o<strong>the</strong>r issues relating to extremistInternet use: spectrum of interest; scenario generation;countering extremist Internet-based influence actions;risk mitigation; and national policy considerations.Spectrum of InterestFirst, it is important to look fur<strong>the</strong>r afield than just<strong>the</strong> extremist group. We must also acknowledge thatan extremist group attempts to influence an audience.This may range from a domestic population (with itsvarious sub-groups), where military or stabilization operationsare being conducted; to <strong>the</strong> domestic audience (includingpolitical) of <strong>the</strong> contributing coalition nations. More broadly,we must consider a world audience who may or may notbe sympa<strong>the</strong>tic (depending on country, background, and/orculture) to <strong>the</strong> extremists’ cause. The latter audiences willhold ongoing interest in both what is occurring, and what isbeing released via Internet and o<strong>the</strong>r media. This may be dueto personal connections to <strong>the</strong> events as <strong>the</strong>y unfold, a culturalor socio-economic link, or a base level interest centered simplyon curiosity.While adversary use of <strong>the</strong> Internet will continue andexpand, it is how coalition nations discredit adversary <strong>the</strong>mesand messages across <strong>the</strong> majority of audiences described, thatmake adversarial Web influence actions redundant. Thus, <strong>the</strong>remainder of this article examines how adversaries seek to gaininfluence, versus dominate <strong>the</strong> electromagnetic spectrum froma technical perspective.Adversaries look to exploit <strong>the</strong> broad fringe populationswithin <strong>the</strong> spectrum of interest. In simple terms <strong>the</strong> adversaryseeks to: separate and splinter local populations againstoccupying forces or agencies, or for those groups that are neutralto <strong>the</strong> adversary and <strong>the</strong> coalition; or subvert <strong>the</strong>m to providefull support by joining in adversary activities. Subversion couldbe achieved via <strong>the</strong> provision of finance, weapons, safe houses,or more simply just not providing information to an occupyingforce on known or intended adversary activities. Additionally,extremists will target contributing coalition nations’ troops andcommanders, in an attempt to affect morale and <strong>the</strong> overallsuccess of <strong>the</strong> military operation.Noting <strong>the</strong> extremists’ spectrum of relative interests,it is likely <strong>the</strong> same spectrum would apply to any coalitionconducting IO (Figure 2). In this author’s opinion, whatmakes coalition IO slow to counter extremist Internet use isnot an issue of technological superiority, nor lack of abilityto respond—but inflexible command structures that do notenable quick and effective counter-computer network ops.This is especially pertinent for audiences in <strong>the</strong> “friendlybut uncommitted,” “neutral,” or “inactive hostile” range ofinfluence.Scenario GenerationAn example of how extremists use information is reflectedin <strong>the</strong> following scenario:Figure 2. Spectrum of Interest.• Extremists react to <strong>the</strong> outcomes of a coalition tacticalaction by posting ei<strong>the</strong>r staged, incomplete, or deliberatelyincorrect website transmissions, to gain maximum effect onone or more groups outlined in <strong>the</strong> spectrum of interest;• Coalition reaction (based on <strong>the</strong> ability to effectivelyupload accurate combat camera images or o<strong>the</strong>r imagery),devises a response at <strong>the</strong> tactical IO level in <strong>the</strong> area ofoperations;• A coalition response would require operational levelapproval, from those who vet—and if required—recommendchanges to any proposal. Additionally, forces may requestfur<strong>the</strong>r guidance from experts at <strong>the</strong> military-strategic decisionmakinglevel, with <strong>the</strong> possibility of input from non-militarystrategic decision-makers and bureaucrats;• Concurrently (and noting <strong>the</strong> known delays imposedby command and control), extremists are planning to launch<strong>the</strong> next information Web activity aimed at influencing thosepopulations within <strong>the</strong> spectrum of interest. One could interpretthat extremists’ second and third order Internet influenceactivities (possibly without a friendly counter-influence activitytargeting <strong>the</strong> first extremist Internet action) are inside <strong>the</strong>response cycle of a coalition or a single nation;• Accordingly, extremists can and will continue toforce coalition reactions to <strong>the</strong>ir Internet activity. In thisscenario, extremists identify and target <strong>the</strong> coalition’s criticalvulnerability of being unable to implement rapid response toWeb-based information actions.Countering Extremist Internet Based InfluenceActionsTo counter extremist dominance, in terms of uploading<strong>the</strong>ir IO messages and disseminating a message quickly toachieve influence, coalition individuals/groups who conducttactical level IO need to be empowered. Leaders at brigadelevel and below must be able to make command decisionsabout <strong>the</strong> responses <strong>the</strong>y devise, and to launch rapid counternetwork-based influence actions.This in conjunction with robust implementation of a<strong>Military</strong> Public Information plan that supports and highlightscoalition strengths, sending messages to <strong>the</strong> world’s mediaand domestic populations that compliment coalition Internetactions. Concurrently, PSYOP and CIMIC would look to buildon <strong>the</strong> influence that “neutral” or “hostile inactive” audiencesare exposed to via coalition Internet actions.42 Special Edition 2008


Risk MitigationAn associated risk of empowering <strong>the</strong> tactical IOcommander is that <strong>the</strong> tactical IO message may not exactlymirror <strong>the</strong> military-strategic IO message. We can mitigatethis risk by effective and direct communication between <strong>the</strong>IO command levels, enabling a detailed understanding of <strong>the</strong>strategic shaping and influencing (S&I) plan established by a“Whole of Government “approach. Thorough understandingof <strong>the</strong> S&I plan, in addition to robust comprehension of <strong>the</strong>operational and tactical IO <strong>the</strong>mes and messages, will assist inrisk mitigation and ensure timely and appropriate responses.While <strong>the</strong> outcome of <strong>the</strong> proposed solution enables aquick response, some could still probably view it as reactive.However, it does have a second order effect of making <strong>the</strong>coalition operational/tactical IO staff less encumbered bytime intensive staffing issues—and more empowered byproactive information Internet actions. Once implemented,such actions would force an extremist group to consider aninfluence response. Accordingly, <strong>the</strong> extremists’ ability of toget inside <strong>the</strong> coalition’s Web-based influence decision responsecycle starts to erode, forcing <strong>the</strong> extremists to respond to outinfluence activities.While an extremist group may choose not to respondwith counter Web-based influence activities, it is at this stage(acknowledging that technical attacks are a separate criticaltarget for extremists), that a coalition starts to achieve Webbaseddecision superiority. While this approach may notcompletely negate extremist use of <strong>the</strong> Internet, combined withtechnological domination of <strong>the</strong> electromagnetic spectrum,it will make extremists’ Web-based influence actions moredifficult.National Policy ConsiderationsAchieving influence “action-decision” superiority across<strong>the</strong> spectrum of influence enables a coalitionto consider implementing more aggressivetargeting of extremists. Web-based informationdeception is but one example. To enableeffective information deception, nationalgovernments must consider Internet-basedrules of engagement that empower <strong>the</strong> tacticalcommander to launch information deceptionagainst Web-based extremists. While thisdelicate legal and ethical subject, in terms ofhow different nations empower <strong>the</strong>ir forces,we must acknowledge that extremists operateunder no such restraints. They are essentiallyfree to conduct Internet-based influence actionsas <strong>the</strong>y desire.Extremists retain <strong>the</strong> ability to utilize <strong>the</strong>Internet for influence activity, knowing that acoalition is only able to conduct counter-actionsthat adhere to restrictive rules of engagement.Future examination of national policies andprocedures (at a military-strategic and politicalstrategiclevel), are needed in order for coalition Web-basedinfluence actions to encounter less operational hindrance.We could continue to hear comments such as “we are failingto win influence and are being defeated by technologicallycompetent extremists in <strong>the</strong> area of influencing perceptions,”unless <strong>the</strong>re is a unified will to empower coalitions to conductinfluence operations free of encumbrances. Such freedom ofaction still needs to maintain <strong>the</strong> moral and ethical high ground,and be appropriately balanced. Yet it demands a tactical andoperational freedom of action which allows degradation ofextremist influence operations on <strong>the</strong> Internet. Accordingly,national governments need to empower <strong>the</strong> highest-levelmilitary-strategic decision-makers and strategic and operationalcommanders to authorize responsive, appropriate tactical-levelactions.<strong>From</strong> a non-technical perspective, preemptive or pro-activedislocation of extremist Internet presence is best achieved byimplementing an aggressive IO campaign which saturates <strong>the</strong>Internet with favorable messages. This should create a situationwhere extremists, in order to pursue <strong>the</strong>ir own IO Internetagenda, are forced to react to an overwhelming coalitionInternet influence campaign. O<strong>the</strong>rwise, extremists have anopen time frame within which <strong>the</strong>y can initiate unhinderedsupport for <strong>the</strong>ir influence campaign.Combined with technological domination of <strong>the</strong>electromagnetic spectrum, reflections presented here are justsome of what we need to fur<strong>the</strong>r explore. In order to combatextremist use of <strong>the</strong> Internet, we must degrade <strong>the</strong>ir abilityto dominate influence activities. We must keep <strong>the</strong>m fromreaching audiences within <strong>the</strong> spectrum of interest.Major James Nicholas, Australian <strong>Army</strong>, serves asStaff <strong>Office</strong>r Grade Two Intelligence, Surveillance andReconnaissance, and IO at <strong>the</strong> Land Warfare DevelopmentCenter. O<strong>the</strong>r postings include Platoon Commander, GeneralEngineering is a Platoon, Logistic Support Force <strong>Army</strong> College ofTechnical and Fur<strong>the</strong>r Education instructor, Faculty Adviser forLogistics Training, and Training Development <strong>Office</strong>r at <strong>the</strong>Defense Intelligence Training Center. His Intelligence Corpspostings include <strong>the</strong> Defense Intelligence Organization asGlobal Security Section Analyst and OIC 35 Security Section,1st Intelligence Bn. Major Nicholas deployed to <strong>the</strong> SolomonIslands in 2005. He holds a Masters in Education & TrainingDevelopment, a BA, and Diplomas in Teaching, VocationalEducation, and Training Development.43


Canada: Information OperationsBy Commander Derek Moss, Canadian NavyEditorial Abstract: Commander Moss notes that information is as important as forces, space, and time on <strong>the</strong> operationallevel. Canada’s IO definition has taken out references to “influence an adversary’s decision makers” implying that Canadacan now message target audiences that are not adversaries. He references Canadian Marshall McLuhan, who famouslywrote “<strong>the</strong> medium is <strong>the</strong> message.” Finally, CDR Moss notes that Canada has developed a increasingly accurate “measuresof effectiveness” (MOE) paradigm.IntroductionInformation Operations is oftentalked about in tones that suggest it isa panacea, created as an alternative tokinetic action. It is often performedby a group of staff officers who are,physically and by job description,removed from operators. Many talkabout it, but few understand it. Althoughnot entirely PSYOP or Public Affairs, itcoordinates and advises on both topics,and many more. This article definesCanadian IO concepts and direction,and offers recommendations for fightingextremists’ use of <strong>the</strong> Internet.Definition of InformationOperationsUntil recently, Canada definedinformation operations as “actions takenin support of national objectives thatinfluence an adversary’s decision-makersby affecting o<strong>the</strong>r’s information andinformation systems while exploitingand protecting one’s own informationand information systems and those ofour friends and allies.” An informationoperation is a “military advisory andcoordinating function that targets andaffects information and informationsystems, human or technical, of approvedparties in order to achieve desired effects,while protecting our own and those ofour allies.”Canada has now removed “influencean adversary’s decision-makers” from<strong>the</strong> definition of information operations.While perhaps only a difference insemantics, <strong>the</strong> implication of this changemay be that we can message targetaudiences that are not our adversaries.The people of Afghanistan spring tomind. An interesting question wouldbe, “does this target audience include <strong>the</strong>Canadian public?” <strong>From</strong> my personalperspective <strong>the</strong> answer would be yes,even though not formalized in Canadiandoctrine. If national opinion is a strategiccenter of gravity, information operationspractitioners had best form relations with<strong>the</strong> Public Affairs section. Of coursethis brings to mind <strong>the</strong> question ofwhe<strong>the</strong>r we are embarking on a slipperyslope—though not if all your informationis correct, and <strong>the</strong> Public Affairs <strong>Office</strong>(PAO) is out front with <strong>the</strong> message.With respect to operational art, ouropinion is that information now rankson an equal level with forces, time,and space as <strong>the</strong> fourth operationalfactor. It is peculiar because <strong>the</strong> effectsit delivers happen in both <strong>the</strong> physicaland cognitive realms. That particularityhas two corollaries: First, only propertargeting and measurement of <strong>the</strong> effectswill allow for a reliable assessmentof information activities; Second, <strong>the</strong>wide range of effects allow for <strong>the</strong> useof information operations along <strong>the</strong> fullcontinuum of conflict for both domesticand international operations.Successful planning, conduct, andexecution of operations require that allmilitary and government agencies andorganizations involved must cooperateand <strong>the</strong>ir activities coordinated. Although<strong>the</strong> term information operations isdefined as a military function, it mustbe coordinated with o<strong>the</strong>r governmentdepartments (OGD), or at least be deconflicted,in order to be successful.Fur<strong>the</strong>r, information operations“Encompass political, economic, anddiplomatic efforts as well as defense andmilitary measures. Coordination amongall government departments, under <strong>the</strong>guidance and direction of <strong>the</strong> centralagencies, is crucial.” IO involves <strong>the</strong>three “Ds” as follows:Elements of IOCanada’s current IO doctrine isbased on original input from 1998,Three D’s of IO. (Author)revised in 2004. Now Canada is workingclosely with NATO to update <strong>the</strong>latter’s doctrine and also with <strong>the</strong> NorthAmerican Aerospace Defense Command(NORAD) and US Nor<strong>the</strong>rn Command(NORTHCOM) IO Staffs. A comparisonof US and Canadian IO doctrine as it hasdeveloped from 1998 through February2006 (Figure 1), reveals <strong>the</strong> following:Canada believes that offensiveinformation operations include actionstaken to influence an adversary’s decisionmakers;and <strong>the</strong>se operations may bedone by affecting kinetically or nonkineticallyan adversary’s use of or accessto information and information systems.Defensive information operations, fromCanada’s perspective, include actionstaken to protect one’s own informationand that of one’s friends and allies.Defensive IO ensures friendly decisionmakershave timely access to necessary,relevant, and accurate information; andensures that <strong>the</strong> friendly decision-makingprocess is protected from all adverseeffects, deliberate or accidental.Electronic Warfare (EW) isdefined as actions taken to exploit<strong>the</strong> electromagnetic (EM) spectrumwhich encompasses <strong>the</strong> interceptionand identification of EM emissions. Itincludes <strong>the</strong> employment of EM energy,including directed energy, to reduce orprevent hostile use of <strong>the</strong> EM spectrumand actions to ensure its effective use byfriendly forces.44 Special Edition 2008


Computer network operations includedefensive, offensive, and exploitationactivities. Computer network attack(CNA) involves actions taken through<strong>the</strong> use of computer networks to disrupt,deny, degrade, or destroy informationresident in computers and computernetworks, or <strong>the</strong> computers and networks<strong>the</strong>mselves. Computer network defense(CND) involves actions taken through<strong>the</strong> use of computer networks to protect,monitor, analyze, detect, and respond tounauthorized activity within Departmentof Defense information systems andcomputer networks. Computer networkexploitation (CNE) enables operationsand intelligence collection capabilitiesconducted through <strong>the</strong> use of computernetworks to ga<strong>the</strong>r data from targetor adversary automated informationsystems or networks.Operations Security is <strong>the</strong>process which gives a militaryoperation appropriate security,using passive or active means,to deny <strong>the</strong> enemy knowledge of<strong>the</strong> dispositions, capabilities, andintentions of friendly forces.Deception is measuresdesigned to mislead <strong>the</strong> enemyby manipulation, distortion, orfalsification of information, toinduce <strong>the</strong>m to react in a mannerprejudicial to his interests.Psychological Operationsare planned activities designed toinfluence attitudes and behaviors,affecting <strong>the</strong> achievement of political andmilitary objectives.Civil-<strong>Military</strong> Cooperation is amilitary function that supports <strong>the</strong>commander’s mission by establishingand maintaining coordination andcooperation between <strong>the</strong> military forceand civilian actors in <strong>the</strong> commander’sArea of Operations.Public Affairs is a distinctivefunction within DND/CF that helpsestablish and maintain mutual linesof communications, understanding,acceptance, and cooperation between anorganization and its audiences.IO targets include decision-makers,perceptions, information systems, <strong>the</strong>C4ISR communication infrastructure,software, and data.Terrorism – <strong>the</strong> CanadianContextCanada is facing several terroristthreat elements: religious extremism,with various Sunni Islamic groupsbeing <strong>the</strong> most serious threat at present;state-sponsored terrorism; secessionistviolence, which encompasses Sikhextremism, and separatist movements inSri Lanka, Turkey, Ireland and <strong>the</strong> MiddleEast; and domestic extremism, includingsome anti-abortion, animal rights,anti-globalization, and environmentalgroups. Plus <strong>the</strong>re exists a small butreceptive audience for militia messagesemanating from <strong>the</strong> United States, whitesupremacists, and elsewhere.With <strong>the</strong> possible exception of<strong>the</strong> United States, <strong>the</strong>re are moreFigure 1. CA & US doctrines compared. (Author)international terrorist organizationsactive in Canada than anywhere in <strong>the</strong>world. This situation can be attributed toCanada’s proximity to <strong>the</strong> United Stateswhich currently is <strong>the</strong> principal target ofterrorist groups operating internationally;and to <strong>the</strong> fact that Canada, a countrybuilt upon immigration, represents amicrocosm of <strong>the</strong> world. It is <strong>the</strong>reforenot surprising that <strong>the</strong> world’s extremistelements are represented here, along withpeace-loving citizens, as part of Diasporacommunities.Most terrorist activities in Canadaare in support of actions elsewhere. Inrecent years, terrorists from differentinternational terrorist organizations havecome to Canada posing as refugees.O<strong>the</strong>r activities include:• Fund-raising and lobbying throughfront organizations;• Providing support for terroristoperations in Canada or abroad;• Procuring weapons and materiel,coercing and manipulating immigrantcommunities, facilitating transit toand from <strong>the</strong> United States and o<strong>the</strong>rcountries, and o<strong>the</strong>r illegal activities.All of <strong>the</strong>se functions are facilitatedby <strong>the</strong> use of <strong>the</strong> Internet, and remainamong <strong>the</strong> core components of cyberterrorism.One of <strong>the</strong> sponsoring registrars forHizballah is Register.com located in NewYork (but with offices in many places).The municipality and province providedhundreds of thousands of dollars in perksto convince it to locate operations inYarmouth, (sou<strong>the</strong>astern) Canada.And, it has a very specific policyfor dealing with cases wheresomeone reports a domain beingused for illegal purposes.“This policy includesreviewing <strong>the</strong> content to determine<strong>the</strong> validity of <strong>the</strong> report and, ifapplicable, disabling <strong>the</strong> domainand notifying <strong>the</strong> customer of<strong>the</strong> reason for this action,” saysWendy Kennedy, <strong>the</strong> firm’smanager of public relations andcustomer marketing. “At times,Register.com has also reachedout to law enforcement to reportsuspicious activity.”But <strong>the</strong> servers in Yarmouth are byno means <strong>the</strong> only ones in Canada whereterrorist-related content may be residing.Until a few weeks ago, <strong>the</strong> website for AlQaeda in <strong>the</strong> Islamic Maghreb, one of <strong>the</strong>most extensive and regularly updated ofits kind, was registered to a building neardowntown Toronto. The address belongsto Contactprivacy, <strong>the</strong> anonymousregistrationarm of Canadian domainnameprovider Tucows Inc. After itsWeb-hosting service in Germany wasalerted to <strong>the</strong> Maghreb site and pulled <strong>the</strong>plug earlier this year, Tucows followedsuit. But in an environment wheresimilar sites are popping up daily, it wasa small victory.45


Porn versus TerrorYears ago, authorities noticed thatchild pornography websites, thoughoften operated from outside NorthAmerica, made use of North Americananonymous-registration services. Inresponse, a large number of watchdoggroups began hunting down such sitesto force <strong>the</strong> registration firms to shut<strong>the</strong>m down. Wade Deisman, Directorof <strong>the</strong> National Security Working Groupnear <strong>the</strong> University of Ottawa, notedin August 2007 that “There’s nothingnear that level [of public monitoring]with terrorist websites” and “I haven’tseen anything that comes even closeto addressing this issue.” If you shutdown a terrorist site, you still can’tarrest it’s originator. If you keepit going, you can at least monitor<strong>the</strong> site.Countering Terrorist Use of<strong>the</strong> InternetTerrorist use of <strong>the</strong> Internetcan be countered when a terroristattack is computer based;is orchestrated by a foreigngovernment, terrorist group, orpolitically motivated extremists; oris done for purposes of espionage,sabotage, foreign influence, orpolitically motivated violence.Ward Elcock, Canadian SecurityIntelligence Service (CSIS)Director to <strong>the</strong> National JointCommittee of Senior CriminalJustice Officials, noted on 22 November2001 that “Our role is to determine whatis out <strong>the</strong>re so as to provide adequatewarning to government and, whereappropriate, to law enforcement agenciesabout threats to <strong>the</strong> security of Canada,in particular from terrorism. If we loseour ability to do so, <strong>the</strong>n Canadians andour allies will have been ill served.” Thethreat of attacks on critical informationsystems and <strong>the</strong> infrastructures thatdepend on <strong>the</strong>m will, in <strong>the</strong> foreseeablefuture, be almost impossible to eliminateentirely, owing to <strong>the</strong> fact that attacktools, networks, and network controlsystems are constantly evolving. As newtechnologies develop, so too will newattack tools along with <strong>the</strong> sophisticationof <strong>the</strong> perpetrators who use <strong>the</strong>m.The Canadian Cyber IncidentResponse Center (CCIRC) is <strong>the</strong> nationalfocal point for addressing cyber securityissues. A component of <strong>the</strong> governmentoperations center, it is located under <strong>the</strong>national emergency response system.CCIRC is <strong>the</strong> focal point for reportingreal or imminent threats and incidents.It includes a threats and vulnerabilityidentification and analysis, early warningdissemination, and incident strategicresponse and coordination elements.P r o t e c t i n g C a n a d a ’ stelecommunications networks is a jobtoo big and too important for any onecompany or government. Therefore:• A partnership approach to cyberDominion of Canada (Wikimedia)security provides <strong>the</strong> momentum, speed,and flexibility required to addressemergencies and <strong>the</strong> challenges presentedby emerging technologies;• I n d u s t r y C a n a d a , a s t h elead government department fortelecommunications, has established<strong>the</strong> Canadian TelecommunicationsCyber Protection Working Group(CTCP) to promote industry-to-industry,government-to-industry, and industry-togovernmentcooperation in protectingCanadian networks;• Industry Canada and <strong>the</strong>C T C P Wo r k i n g G r o u p h a v eestablished <strong>the</strong> Canadian Networkfor Security Information Exchange(CNSIE) to promote collaborationamong larger communities of cybersecurity stakeholders such as <strong>the</strong>telecommunications, financial, energy,and vendor communities and o<strong>the</strong>rgovernment departments;• Collaboration has been establishedwith domestic and international partnerssuch as <strong>the</strong> Canadian Cyber IncidentResponse Center (CCIRC), as wellas <strong>the</strong> US and UK Network SecurityInformation Exchanges.Short-term SolutionsTwo agencies, <strong>the</strong> Royal CanadianMounted Police (RCMP) and CSIS,are lead counterterrorism elements inCanada. They have access to a widerange of investigative tools and powers—including physical surveillance,interception of communications(telephone, computer, pager,etc.), and recruitment of humansources or agents who canreport on suspects’ activitiesand intentions. Legislation,ministerial directions, and policydefine what can be investigatedand which tools can be usedunder what circumstances. Manypowers require prior ministerialand judicial authorization. Inaddition, both agencies aresubject to independent review.Just because an investigativecapability is lawful and availabledoes not mean it will be useda u t o m a t i c a l l y. C a n a d i a nintelligence and law enforcementagencies do not have <strong>the</strong> human andtechnological resources to target allpotential targets all <strong>the</strong> time. For <strong>the</strong> mostpart, <strong>the</strong>y focus on two categories—first,leaders and principal organizers andsecond, those who represent a seriousthreat in that <strong>the</strong>y are known to haveengaged in terrorist activity in <strong>the</strong> pastor are believed to be planning futureterrorist action in Canada or abroad.Investigations involving targetsresiding, working, or hiding in Diasporacommunities may present seriouschallenges. Police and intelligenceagencies may not possess <strong>the</strong> requisitelinguistic skills, or may be unable topenetrate closely-knit groups usinghuman sources or agents. They may46 Special Edition 2008


face resistance to requests for communitycooperation, may fail in attempts torecruit new officers from within <strong>the</strong>community, and may even be unableto find individuals prepared to workas translators. They may be forced totake extraordinary measures to protect<strong>the</strong> identity of agents or employeeswho fear for <strong>the</strong>ir safety in closely-knitDiaspora communities. Such measuresmay include:• Joint investigations involvingCanadian and foreign police orintelligence agencies. Terrorist globalconnections and movements call forglobal cooperation to track <strong>the</strong>m andprevent <strong>the</strong>m from taking violent actions.CSIS has reported that it has cooperationarrangements with about 230 agenciesin about 130 countries, while manyforeign police and security agencies havepermanent liaison staff in Canada.• Designation of individuals orentities associated with terrorist activity.Canada did adopt a designation processfor terrorists, terrorist groups, or statesponsors of terrorism after 11 September.By October 2003, <strong>the</strong> Canadian listincluded 31 organizations—10 eachbased in <strong>the</strong> Middle East and Asia, fourbased in South America, three in Africa,and one in Europe.• Security screening of applicationsfor refugee or permanent resident statusor for Canadian citizenship. If terrorismlinks surface during backgroundchecks, <strong>the</strong> government may commencedeportation action. Additionally, <strong>the</strong>Canadian Government can expelsuspected terrorists under special securityprovisions of <strong>the</strong> Immigration Act, andhas done so more than a dozen times.• Screening of people and goodsat ports of entry. Transport Canada,Immigration and Citizenship Canada, <strong>the</strong>Canada Customs and Revenue Agency,and o<strong>the</strong>r organizations have enhanced<strong>the</strong>ir screening for terrorist connectionssince 11 September. A new agency, <strong>the</strong>Canadian Air Transport Security Agency,performs this role at Canadian airports.Long-term SolutionCanadian security and intelligenceagencies seek to build positive counterterrorismrelationships with someDiaspora leaders and groups in <strong>the</strong>following ways:• Consultations and briefings onpolicy or legislative proposals (forexample, those affecting changes inimmigration/refugee criteria or charityregulations);• Membership on advisoryboards (<strong>the</strong> RCMP Commissioner’sMulticultural Advisory Committee, forexample);• Community liaison with policeofficers assigned to specific Diasporacommunities to raise awareness,increase confidence, and promote opencooperation with Canadian authorities;• Direct requests for help andcooperation, usually through communityleaders or associations (such as <strong>the</strong>Canadian Arab Federation) and inconnection with specific events (forexample, visits to Canada by controversialforeign leaders) or in relation to specificinvestigations.Change: Information Operationsin OperationsIt wouldn’t be a Canadian articlewithout a shameless reference to afamous native son. (William Shatner,Mike Myers, John Candy, or any o<strong>the</strong>rHollywood hack will not be quoted.)Instead, <strong>the</strong> reference here is to MarshallMcLuhan (see book jacket), a nameendured by many Canadians duringpainful undergrad classes.One of McLuhan’s lesser knownbooks (pictured), is strangely prescient.Although not prescriptive, <strong>the</strong> book’s<strong>the</strong>sis, broadly speaking, is that historicalchanges in communications and craftmedia change human consciousness,and that modern electronics arebringing humanity full circle to anindustrial analogue of tribal mentality,what he termed “<strong>the</strong> global village.”By erasing borders and dissolvinginformation boundaries, electronictelecommunications are fated to rendertraditional social structures like <strong>the</strong> nationstate and <strong>the</strong> university irrelevant.McLuhan’s book was written in1967 yet it has a lasting premise. Shortlywe’ll discuss how we apply it today. Butfirst we need to explore an earlier work,Understanding Media: The Extensionsof Man, source of McLuhan’s mostfamous quote:In a culture like ours, longaccustomed to splitting and dividingall things as a means of control, it issometimes a bit of a shock to be remindedthat, in operational and practical fact,<strong>the</strong> medium is <strong>the</strong> message. This ismerely to say that <strong>the</strong> personal and socialconsequences of any medium—that is, ofany extension of ourselves—result from<strong>the</strong> new scale that is introduced into ouraffairs by each extension of ourselves,or by any new technology.Two examples highlight changesintroduced by technology. First, RanaFM is a Canadian Forces radio stationbroadcasting in Afghanistan but locatedin Kingston, Ontario (two hours outside ofToronto). The broadcast is recorded onsiteand digitally transmitted via satellite.Rana FM uses an effective listenerfeedback capability, <strong>the</strong> only one in <strong>the</strong>area of operations. Callers to <strong>the</strong> station,whe<strong>the</strong>r by phone or text message, call alocal Afghanistan number and have <strong>the</strong>irmessage recorded to an in-<strong>the</strong>atre digitalrepository. This message is stored andquickly forwarded to Kingston and puton <strong>the</strong> air, with only a 0.6 second delay.Rana has demonstrated its potential to bea giant campaign-winning enabler withits interactive nature since OperationA<strong>the</strong>na on 6 January 2007. Rana can be47


heard in Kandahar City, <strong>the</strong> KandaharAirfield region, in Sperwan Ghar and,shortly, in Spin Boldak (but spare partsare scarce).Second, My Thum is a cell phoneaggregator that also develops applicationsfor automated responses (SMS, voice,or <strong>the</strong> Internet) to cell calls or Internetcontacts. My Thum services <strong>the</strong> radioindustry in <strong>the</strong> Toronto area. It worksby accessing all of <strong>the</strong> local cell phonecarriers, and setting up a system thataggregates <strong>the</strong>se carriers with onenumber (an SMS “short code” which issimply an easily remembered six digitnumber that callers can recall and dialfrom any cell system). The short codeautomatically brings any cell carrier user/customer to an automated response thatis ei<strong>the</strong>r voice or SMS in <strong>the</strong> case of cellphones (or <strong>the</strong> Internet if so desired).The caller is guaranteed a response.Commercially, My Thum is usedmainly for contests and have great utilityfor “polling <strong>the</strong> audience” safely andinexpensively. The automated responsecan and usually is set to automaticallyanswer and offer an ‘invitation’ to join <strong>the</strong>station’s ‘club’ to receive early advisorieson programs, contests, etc. Because <strong>the</strong>law in Canada requiresusers to agree to receiveSMS from ‘businesses,’this automated systeminvites <strong>the</strong>m to join,thus agreeing to receivewhatever messages aresent to <strong>the</strong>m.Measures ofEffectiveness (MOE)MOE are developedas part of <strong>the</strong> planningprocess to determine <strong>the</strong>effects of IO activities.MOE must link our IOcoordinated activities(cause) to <strong>the</strong> responsegenerated by adversarialcapabilities and decisionmakers.The initial objectivesset <strong>the</strong> course, but MOEact as <strong>the</strong> rudder in orderto maintain that course.MOE feedback allows IO planners<strong>the</strong> ability to revise, create, and deleteIO objectives and <strong>the</strong>mes as required,in order to support <strong>the</strong> commander’smission. Regardless of its importance,<strong>the</strong> conduct of a MOE has been largelyoverlooked. Within Canada, we havedeveloped such a system and have used itsuccessfully in two missions (OperationsHalo and A<strong>the</strong>na). J3 InformationOperations leads <strong>the</strong> MOE effort bydeveloping a combination of quantitativeor objective questions and qualitativeor subjective questions that are felt toaccurately reflect <strong>the</strong> information neededto establish whe<strong>the</strong>r an objective is beingmet. These questions are <strong>the</strong>n distributedto appropriate stakeholders such asCanada’s Assistant Deputy Minister forPolicy, PA, intelligence and those in<strong>the</strong>atre. Once <strong>the</strong> answers are received<strong>the</strong>y are compiled by <strong>the</strong> J3 InformationOperations staff and are <strong>the</strong>n assigned avalue of “met, partially met, or not met”to each objective. The final product issent back to <strong>the</strong> contributing stakeholdersto seek agreement on <strong>the</strong> assessment.ConclusionsOverall, Canada has a very robusttelecommunications industry which,through close collaboration with <strong>the</strong>government, is able to mitigate manycyber attacks against communicationnetworks. As an example, <strong>the</strong> recentattacks against Estonia, which causeda significant stir and amounted to notmuch more than a national five-dayinconvenience, would have causeda five minute disruption in Canada.This has nothing to do with advancedtechnology. In fact, Estonia is one of<strong>the</strong> most communications-advancedcountries in <strong>the</strong> world. Canadiansuccesses are <strong>the</strong> result of a vestedinterest in <strong>the</strong> telecommunicationsindustry in maintaining a robust systembased on redundant technologies andno single points-of-failure. Short-termtechnological solutions will be anongoing, iterative process until longertermsocial solutions are found. Longtermsolutions will not eliminate <strong>the</strong>problem, but <strong>the</strong>y will make it moremanageable.Commander Derek Moss underwent indoctrination training at<strong>the</strong> Naval <strong>Office</strong>r Training Center in Esquimalt, British Columbia andwas subsequently posted to HMCS Terra Nova in Halifax, Nova Scotia. TerraNova was tasked with several exercises in Europe, goodwill visits in <strong>the</strong> GreatLakes, and multiple operations off <strong>the</strong> coast of Haiti. In 1998 he served as Deck<strong>Office</strong>r on <strong>the</strong> HMCS Toronto where, as <strong>the</strong> east coast flagship, he took part inexercises off <strong>the</strong> coast of Canada, <strong>the</strong> United States, and <strong>the</strong> Caribbean. In 2001Cdr Moss joined HMCS St. John’s, deploying to <strong>the</strong> North Arabian Sea andArabian Gulf as Combat <strong>Office</strong>r and, eventually, Plans <strong>Office</strong>r for CommanderTask Group 54.1. He went ashore to <strong>the</strong> Canadian Forces Maritime WarfareCenter, where he held subsequent appointments as Electronic Warfare andAnti-Air Warfare Tactical Development <strong>Office</strong>r. Following a very rewardingExecutive <strong>Office</strong>r tour aboard HMCS Winnipeg, CDR Moss was appointedInformation Operations section head at Canadian Forces Expeditionary ForcesCommand Headquarters, in Ottawa. He holds an undergraduate degree inMedia Communications from <strong>the</strong> University of Ottawa, and a Masters inDefense <strong>Studies</strong> through <strong>the</strong> Royal <strong>Military</strong> College of Canada.48 Special Edition 2008


Israel: Information Operations Threats AndCountermeasuresBy Tomer Ben-AriEditorial Abstract: Mr. Ben-Ari calls for a more proactive response to cyber threats, in order to win on <strong>the</strong> new “cyberfront.” Proactive steps include controlling <strong>the</strong> number of terrorist websites and <strong>the</strong>ir content, creating a search and downloaddetection engine for suspected terrorist activity, surveilling Internet communications devices, identifying insider help, andconcluding international conventions and local legislation. Ben-Ari sees Israel’s vulnerabilities as spam/phishing attacksand terrorist use of webcams. He also explores extremists perceptions of a hundred year war.IntroductionThe use of information operations (IO) by terroristorganizations is here to stay. Conflicts with terror organizationssuch as Hizballah and Hamas show that with <strong>the</strong> use of IO,even attacking <strong>the</strong> civilian population can be achieved easily.As a result, Israel has changed its approachto IO within <strong>the</strong> last decade. The country’sleadership realizes IO is a real threat thatcan easily create massive physical andcognitive damage, to civilians and militarypersonnel alike. Several measures havebeen taken in order to protect criticalinfrastructure, to include countermeasures.Yet a defensive approach is not enough—weneed a proactive approach in order to win acyber war. The software solutions offeredhere focus on active counter-methods. Twovulnerabilities serve as immediate threats for Israel to confront:spam and phishing attacks; and <strong>the</strong> explosion of webcams asa concrete threat.IO Roadmap of Terror OrganizationsDr. Boaz Ganor, a well-known counterterrorism researcher,defines <strong>the</strong> potential of terror as <strong>the</strong> sum of <strong>the</strong> motivation andoperational capability of terror groups. The use of IO directlyincreases both capabilities and motivation in a significant way,plus at a relatively low cost and minimal risk. The increasinguse of IO warfare tools will surely increase <strong>the</strong> spread andmagnitude of terror worldwide, as well as its sophisticationand ability to avoid interception. The facts clearly indicatethat <strong>the</strong> use of IO will become more popular in <strong>the</strong> yearsto come, due to Western societies’ (followed by developingcountries) increasing dependence on computer systems for alloperations—in almost every aspect of life. Dr. Ganor claimsthat Al Qaeda’s global terrorist warfare is one of <strong>the</strong> mostdangerous threats ever mounted against mankind; fur<strong>the</strong>rmore,it is more lethal than <strong>the</strong> threat posed by <strong>the</strong> Cold War’s nuclearconfrontation between America and <strong>the</strong> Soviet Union. Dr.Ganor points out several characteristics of contemporaryterrorism:• The first characteristic is that Al Qaeda and its affiliates arenot bound by any geographical or national restraints. Today alQaeda and its affiliates are dispersed in many lands, especiallyin lawless regions, but also have cells in Western countries.The cyber world has no law, limits, or constraints. Computersystems and networks are interconnected and accessible fromanywhere, thus <strong>the</strong>re is no need to physically be present insome geographic area to exploit <strong>the</strong>m. Additionally, <strong>the</strong>reare many security flaws in current systems. It takes a longtime to fix <strong>the</strong>m, leaving <strong>the</strong>m vulnerable forsome time. Moreover, we don’t know everyvulnerability—<strong>the</strong>re are lots of viruses andvulnerabilities found daily. As terroristsuse <strong>the</strong> Web to organize, recruit, and ga<strong>the</strong>rintelligence (and exploit information) itwill be much more difficult to fight terrorgroups, find <strong>the</strong>m, or trace <strong>the</strong>ir operations.They are able to hide just about anywhere,Israeli Defense Forces insignia.do all communications over <strong>the</strong> Web, exploit(Wikimedia)vulnerabilities, and cause real damage.• Second, Al Qaeda and its affiliates are interested inemploying weapons of mass destruction represents a transitionfrom conventional to non-conventional terrorism. Thereare cookbooks available on <strong>the</strong> Web offering “step by step”instructions on how to make bombs and o<strong>the</strong>r lethal weapons.By using Web communications it will be easier to interact withresearchers that are trying to develop chemical, biological, andnuclear weapons, and are willing to sell <strong>the</strong>ir knowledge forextra income. It is relatively easy to influence people anywhereto develop <strong>the</strong>se weapons, and to use <strong>the</strong>m to serve mutual goalsof both terror organizations and <strong>the</strong>ir collaborators.• Third, Al Qaeda and its affiliates believe <strong>the</strong>y are waging a“100 years” war, in which <strong>the</strong>y will ultimately prevail, no matterhow many years it will take to achieve <strong>the</strong>ir objectives. This isa non-rational perception of time. World leaders have a toughtime convincing <strong>the</strong>ir civilian populations to fight such longwars, yet civilians demand immediate security. This perceptionof time by terrorists, <strong>the</strong> strength of terror movements, isopposite and irrational for nation states. Most believe currentIO threats such as Distributed Denial of Service (DDOS)attacks, partial damage to government services, communicationbetween service cells, and information ga<strong>the</strong>ring are stillfar less damaging than a 9/11 attack. Never<strong>the</strong>less, terroristorganizations believe that as <strong>the</strong> Web and computerizedsolutions develop in <strong>the</strong> forthcoming years, our lives willbecome captive to a handful of computers. This will enable<strong>the</strong>m to find weak points in <strong>the</strong> civil and governmental systems,49


and cause massive damage in <strong>the</strong> long run. Due to <strong>the</strong> fact that<strong>the</strong>y only need to succeed a few times out of many attempts,it’s only a question of time before <strong>the</strong>y will be able to causesignificant damage on an ongoing basis.• Fourth, Al Qaeda’s pre-9/11 organizational structure haschanged from a structured, hierarchical organization witha decision making process based on command and controlprinciples, into its current flat and cellular organizationalstructure. After losing much of its infrastructure in Afghanistanas well as <strong>the</strong> ability to move freely, Al Qaeda began usingo<strong>the</strong>r Islamic terrorist organizations as proxies to carry out<strong>the</strong>ir operations. Spreading <strong>the</strong> message and recruiting over<strong>the</strong> Web can prove to be a tremendous unexpected proxy. Byusing simple cyber recruitment tactics, organizations like AlQaeda’s can easily outsource <strong>the</strong>ir operational attacks—evento individuals.All of <strong>the</strong>se factors indicatethat information operations are hereto stay. Countries must encourageresearch and <strong>the</strong> development of toolsto resolve <strong>the</strong>se and future IO threats,to avoid being surprised at <strong>the</strong> end of<strong>the</strong> day.IO in IsraelCyber threats have been indecision-maker and intelligenceforces’ crosshairs since computersstarted playing a major role in ourdefense forces and day-to-day lives.At first governments didn’t see cyberthreats as ano<strong>the</strong>r war zone, but as away of ga<strong>the</strong>ring critical intelligenceinformation on forces, strategies,and facilities. In <strong>the</strong> past 10-12years Israel has changed this thoughtprocess. Today Israel understandsthat cyber threats are actually ano<strong>the</strong>rwar front. Cyber attacks will not bedirected only at defense forces, but willmainly attempt to interrupt and affect <strong>the</strong> civilian population.This occurred during <strong>the</strong> Second Lebanese War [2006], whenIsrael’s adversaries attempted to demoralize <strong>the</strong> civilianpopulation by aiming thousands of missiles at <strong>the</strong>m. Through<strong>the</strong>ir massive exposure to computerized services, civilians willserve as a main front in a future cyber war. Damage to bankingsystems, traffic control systems, or major news websites (toinclude taking <strong>the</strong>m hostage) can cause chaos, damage, andfear. In <strong>the</strong> past 10 years more and more government officesbegan providing Web services, making <strong>the</strong>se more essentialand more common in <strong>the</strong> public sector. Government and civilsector services are <strong>the</strong> main factors in our day-to-day lives.Continuing disruptions of critical infrastructure might raise <strong>the</strong>question “Can this government really defend and secure us?”Governments recognize that disruptions of websites, even if notcausing an immediate security crisis, can motivate more andmore people to try to hack and cause fur<strong>the</strong>r problems.Republic of Israel (Univ. of Texas)Israel is facing increasing attacks on its computerinfrastructure, averaging approximately 20-40 thousandattempted attacks every day, mainly against governmentwebsites and services. There is a real fear <strong>the</strong>se may expandto more serious attacks: such as data corruption; data ga<strong>the</strong>ringand spying operations; traffic disruption; and <strong>the</strong> spread ofdisinformation thru media sites.During <strong>the</strong> Second Lebanese War, Hizballah opened awebsite hosted in Iran. Launched in English, Arabic, andFarsi (and after <strong>the</strong> war in Hebrew), <strong>the</strong> site offered reports on<strong>the</strong> Israeli Defense Force (IDF) and <strong>the</strong> political situation inIsrael. This Web effort was a well planned attempt to influenceIsraeli public opinion. It also turned out that Israel sufferedfrom critical information leaks. Anyone could easily findmovies, pictures, and operational charts that included frequencynetwork channels, soldiers’ equipment, and tactical memos.Classified information from <strong>the</strong> “BinatJabel Fight” was also available. BinatJabel is a village in sou<strong>the</strong>rn Lebanonwhich is considered as Hizballah’smain area. The Second LebaneseWar saw intense fighting <strong>the</strong>re, though<strong>the</strong> IDF eventually managed to takecontrol of <strong>the</strong> town—a major turningpoint in that war. On <strong>the</strong> o<strong>the</strong>r hand,Hizballah had modern equipmenton <strong>the</strong> battlefield including cameras.Photos and movies didn’t find <strong>the</strong>irway to <strong>the</strong> Web in an uncontrolledway. It is believed that rocket strikelocations were reported to Hizballahin real-time via <strong>the</strong> Web, which helped<strong>the</strong>m improve <strong>the</strong>ir aim. Fur<strong>the</strong>r,a huge number of websites weredefaced as protests against Israel, toinclude NASA, Microsoft, Universityof California at Berkeley, and USGovernment pages. The hackersused Structured Query Language(SQL) injection techniques to extractusers’ names and passwords, <strong>the</strong>n used this access to changewebsite content. In order to motivate supporters, especially <strong>the</strong>younger generation, Hizballah recently launched a computergame named “Special Forces 2.” The game imitates events thatactually happened, such as kidnapping soldiers, firing rocketson Israeli towns, and participating in guerrilla battles. Basedon recent experiences, Israel changed its attitude toward <strong>the</strong> IOthreat, and established units that will deal with this problem ona daily basis. These new organizations will provide preventiveinstructions, consulting options, and tools.Defensive OperationsIsrael’s definition of IO is similar to Ivan Goldenberg’sdefinition, who claims that information warfare is <strong>the</strong> offensiveand defensive use of information and information systems todeny, exploit, corrupt, or destroy an adversary’s information,50 Special Edition 2008


information-based processes, information systems, andcomputer-based networks while protecting one’s own. Suchactions are designed to achieve advantages over military,political, or business adversaries. This definition is sometimesminimized to <strong>the</strong> following: “Taking <strong>the</strong> offensive on <strong>the</strong>computer services of <strong>the</strong> enemy while defending one’s owncomputerized services: defending and securing <strong>the</strong> secrecy of<strong>the</strong> service while maintaining its availability.”Israel has established <strong>the</strong> National Data ProtectionAuthority (NPDA) to lead <strong>the</strong> way in information warfaremeasures. This authority is responsible for securing governmentoffices and services from possible offensive operations. NPDAleads <strong>the</strong> research and countermeasures effort against anyinformation warfare danger. The authority is under IsraeliShabak (Israel’s internal security service, <strong>the</strong> equivalent of<strong>the</strong> US Federal Bureau of Investigation) supervision. In orderto better deal with information warfare dangers, <strong>the</strong> primeminister’s office has adapted a data protection doctrine to beapplied to all government infrastructures defined as critical.Fundamentals of Israeli protection doctrine are:• Information Mapping: Each office and critical institutewould examine and categorize data as sensitive or nonsensitiveinformation, according to twomain parameters: classified informationand vital information. The latter meansinformation which needs to be keptavailable and reliable at all times.Each entity receives a risk analysisbased on information exposure and use.This includes possible threats, currentvulnerabilities, increasing risks, andcountermeasures taken;• The Human Factor: <strong>Office</strong>s mustminimize human errors, <strong>the</strong>ft, fraud,or misuse of information. Therefore,each employee should be questionedand checked thoroughly. Connectionswith outsourcing companies should be reduced to a minimum.Employee training is provided on how to identify and track asocial engineering attack;• Logic Protection: Each office will define a managementpolicy for all <strong>the</strong> computer data systems. Each user will beable to access only <strong>the</strong> resources that were authorized to him.Password usage is a must. Biometric devices will be combinedon some of <strong>the</strong> systems. Logical monitoring will look forsuspicious acts within <strong>the</strong> system’s log;• Physical Protection: Employees must reduce <strong>the</strong> numberof printed documents, limit access to printing rights, andprevent <strong>the</strong> exposure of classified information to optical ormagnetic devices. Secure data transfer between differententities is required. Employees ensure only unclassified datais put on personal computers.• Disaster Recovery Planning (DRP): Preventing disruptionsand sabotage to an entity’s ongoing work processes, andprotecting critical processes from deliberate damage orunexpected failure are absolute necessities. This process willenable <strong>the</strong> quick restoration of <strong>the</strong> system to its former statusbefore a collapse starts. Organizations must maintain statusof <strong>the</strong>ir systems at all times.• Network and Internet Security: Access to internal datashould be limited based on management roles. There willbe no direct connection between office data and websites.<strong>Office</strong> websites will have a secure zone for <strong>the</strong>ir computers.Establishing firewalls on all networks, plus consistentlychecking for Trojan horses, viruses, and o<strong>the</strong>r malicioussoftware is required.Countering Cyber Terror Methods andRecommendationsIn order to win on <strong>the</strong> cyber front, we require proactivesteps. In order to prevail in cyberspace, protection of valuableresources is not enough—we need offensive action in order toreduce a terrorist organization’s impact.• The first action to take is to control <strong>the</strong> number of terroristwebsites and terrorist content on <strong>the</strong> Web. Here, one personcan look like a whole army. It is very easy to appear to be apowerful and large organization by opening many websites,<strong>the</strong>n generating content and traffic. Moreover, unlike real life,on <strong>the</strong> Web people do not die: <strong>the</strong>ir message can stay forever.A combination of DDOS attacks againstterrorist websites, plus legislation thatprohibits terrorist propaganda on <strong>the</strong>Web will significantly reduce <strong>the</strong> amountof terrorist content. We should alsoconsider deliberate actions make someselected sites serve as “honey traps.”• The second action is to create asearch and download detection engine.It is possible to know <strong>the</strong> IP address of<strong>the</strong> websites one visits, and <strong>the</strong> filesWestern Wall webcam, Jerusalem.downloaded. If searched information(Window on <strong>the</strong> Wall)looks suspicious, for example too manysearches for maps, plans, and data of <strong>the</strong>Empire State Building, <strong>the</strong>n security authorities should checkout <strong>the</strong> person(s) making those queries• Third is surveillance of Internet communication devices.Emails describing <strong>the</strong> planned 9/11 attacks were found onAl Qaeda computers. These communications are not limitedto email, but extend to o<strong>the</strong>r text and voice communicationdevices such as Skype or MSN Messenger. Detection softwaresearching for suspicious information transfers can detectextremist actions prior to implementation.• Fourth, one must identify insider help. An employee of acritical organization can help extremists get control of computersystems within an organization. Possible scenarios are openingspecific ports or connecting a wireless device to <strong>the</strong> network.With insider help, extremists can remotely log into <strong>the</strong> network,access software, and cause damage. A system to ga<strong>the</strong>r andanalyze all system transactions in an organization can recognizeabnormal behavior, which may imply a potential attack.• The fifth action, probably <strong>the</strong> basic factor for all of <strong>the</strong>above counter-solutions, is legislation. Currently <strong>the</strong>re are no51


strict rules on what is legal or illegal in <strong>the</strong> cyber arena, thusmany loopholes exist. In order to win <strong>the</strong> battle against cyberterror, we should be prepared to pay a price in personal freedom.What rights are we willing to give up when using <strong>the</strong> Webin order to ensure security? This question is critical and weshould answer. Fur<strong>the</strong>r, existing rules vary from one country toano<strong>the</strong>r. In order to succeed in this war, we must legislate strictrules—and international conventions must be signed.Immediate Cyber ThreatsMany of <strong>the</strong> terrorist threats that are being discussed todayrequire intensive and sophisticated development. Yet twotypes of threats can be developed quickly, using off-<strong>the</strong>-shelftechnologies and a relatively small group of people. Theseimmediate concerns are spam/phishing attacks, and webcamexploitation.• Spam and Phishing can become attractive to terroristgroups, not merely as a tool to spread <strong>the</strong>ir messages, but also toraise funds and recruit members. More importantly, spam can beused by terrorists to influence non-members of a terrorist groupto carry out attacks that coincide with <strong>the</strong> terrorists’ goals andplans. Such connections allow coordinate among a dispersed,heterogeneously motivated network of activists. Now wecommonly assume that some Islamic terrorist organizations willonly recruit staunch believers to carry out attacks (especiallysuicide attacks), but in <strong>the</strong> future <strong>the</strong>y may use “outsourcing”techniques—and will find <strong>the</strong> right justification for doing so.The trigger may be lack of resources, or <strong>the</strong> clear logistical andoperational benefits of “outsourced” activities. Worse, it mayresult in higher quality attacks.The main features that make spam and phishing attractiveto terrorists are:1. Anonymity and difficultyof tracing;2. Low cost to reach a largeaudience, hence <strong>the</strong> ability toengage in a large number ofinitiatives;3. Leverage in reachingnew and o<strong>the</strong>rwise inaccessibleaudiences;4. Ability to recruit operativesfrom within <strong>the</strong> society underattack;5. Ability to spread fear, evenwithout any action being taken.A f t e r d e t e c t i n g a n dcommunicating with possiblecarriers, <strong>the</strong>ir communicationscan be moved to more securesystems.•Webcams for Surveillanceand Information Ga<strong>the</strong>ring:These days <strong>the</strong>re are manycameras on <strong>the</strong> Web. These arevery simple and cheap to install;some are wireless and o<strong>the</strong>rssatellite-based, and all are reasonably priced. Some webcamsare private, showing entertainment places, malls, and privatehomes, while o<strong>the</strong>rs are government-based, showing touristplaces, traffic junctions, and streets. Webcam host sites canalso serve as a webcam search engine. Combined with softwareproducts such as Google Maps and Microsoft Live Maps thatuse cameras combined with static photos, we can view everystreet corner. In <strong>the</strong> future, as network pipes become wider andnetwork traffic faster, we will have live scenes on those samestreet corners.By exploiting <strong>the</strong>se webcams, terror organizationscan acquire intelligence on specific targets without steppingfoot on <strong>the</strong>m. Moreover, video information can be analyzedby computer vision algorithms. Based on technology availabletoday, it’s not difficult to access a specific webcam and analyzeits data stream. For instance, how many people cross a specificstreet each day and at what times, or how many police carspass? Such software would create reliable, long-term, wellanalyzedinformation about happenings in many differentplaces. Extremists could separately and easily monitor multiplelocations, without putting <strong>the</strong>ir spies at risk.ConclusionIsrael believes that IO will become an essential weapon in<strong>the</strong> future in any war or actions against terrorists. Since it willbecome easier to hit Western society using IO methods, Israelmust be prepared to take offensive methods and measures.Resources should be invested in finding vulnerabilities andfixing <strong>the</strong>m. Catching terror groups before <strong>the</strong>ir actual missionand detecting IO attacks prior to <strong>the</strong> point where massivedamage is done is <strong>the</strong> goal of offensive actions. Legislation andworldwide cooperation should be enhanced as well in order togenerate effective solutions.Tomer Ben-Ari has mainly focused on IO and cyber issuessince 2003. His research is focused on helping decision-makersdeal with possible threats and providing countermeasures as well. He hasdesigned and developed a large range of software products mainly in <strong>the</strong>data management area for <strong>the</strong> following companies\institutions: IDF, Intel,GDH and currently Top Image systems (TISA). He is adept at pointingout possible threats from terrorist groups in cyberspace. He combined hisresearch with Israel’s International Disciplinary Center’s InternationalInstitute for Counterterrorism. Toge<strong>the</strong>r with Dr. Boaz Ganor and Dr. RonRymon, Mr. Ben-Ari published papers at conferences, including “TheSecurity and Privacy in Information Society” held in Germany in 2005and “The Advanced Program of <strong>the</strong> Information Management Association”in 2007 in Canada. A recognized international speaker, he has providedcouncil to different governments. <strong>From</strong> 2001 he has served as a softwareengineer and system architect for many software systems for <strong>the</strong> Israeliarmy and <strong>the</strong> private sector. He holds a BA and an MS in computerscience from <strong>the</strong> Inter Disciplinary Center, Hertzliya, Israel.52 Special Edition 2008


Information Operations In SenegalBy Antoine Wardini, Colonel, Senegalese <strong>Army</strong>Editorial Abstract: Colonel Wardini notes information technology is slowly making inroads in Senegal. As a result, IOefforts focus on support to public affairs, civil-military operations, and defense support to public diplomacy. Psychologicaloperations and winning hearts and minds are implied in such an approach. Of special interest to <strong>the</strong> US is that China hasannounced its intention to finance <strong>the</strong> final steps of setting up Senegal’s government Intranet.IntroductionInformation is a strategic resource,vital to national security. <strong>Military</strong>operations depend on informationand information systems for manysimultaneous and integrated activities.Since <strong>the</strong> 1960s, <strong>the</strong>re have beenextraordinary improvements in <strong>the</strong>technical means of transmission,protection, collection, storage, andanalysis of data, which have allowedsignificant improvements in <strong>the</strong>exploitation of <strong>the</strong> information domain.Information Operations is anevolving discipline within <strong>the</strong> military.It has emerged from earlier conceptsoriginating in <strong>the</strong> 1990s and takesinto account lessons learned from<strong>the</strong> Gulf War(s), phenomena such as<strong>the</strong> so-called “CNN Effect,” and <strong>the</strong>enormous advances in informationtechnology. Today Germany leads aNATO multinational effort on developinginformation operations as an integratingfunction/joint mission area within <strong>the</strong>military, called <strong>the</strong> “MultinationalInformation Operations Experiment”(MNIOE).This concept of informationoperations is somewhat new to mostmilitary experts. However, it is acceptedworldwide that <strong>the</strong> instantaneouscapability of transmitting informationtoday is a serious issue for all, and thata “hot talking image” is worth 10,000words.Information operations are defined as“<strong>the</strong> integrated employment of electronicwarfare, computer network operations,psychological operations, militarydeception, and operations security, inconcert with specified supporting andrelated capabilities, to influence, disrupt,corrupt, or usurp adversarial humanand automated decision making whileprotecting our own.” In o<strong>the</strong>r words,information operations can be definedas actions taken to affect adversaryinformation and information systemswhile defending one’s own.The purpose of this doctrine is toprovide joint force commanders (JFC)and <strong>the</strong>ir staffs guidance to help prepare,Senegalese Forces symbol.(Ministry of Armed Forces Senegal)plan, execute, and address informationoperations in support of joint operations.The principal goal is to achieve andmaintain information superiority over<strong>the</strong> enemy.In order to tackle our topicprogressively, one must understand<strong>the</strong> military capabilities of InfluenceOperations. They focus on affecting<strong>the</strong> perceptions and behavior of leaders,groups, or entire populations. Influenceoperations employ capabilities thatprotect operations, communicate<strong>the</strong> commander’s intent, and projectaccurate information to achieve desiredeffects. Ultimately, <strong>the</strong>se should resultin differing behaviors or changes in <strong>the</strong>adversary’s decision cycle, which alignswith <strong>the</strong> commander’s objectives.<strong>Military</strong> capabilities of InfluenceOperations consist of:• Psychological operations (PSYOP)• <strong>Military</strong> deception (MILDEC)• Operations security (OPSEC)• Counterintelligence (CI) operations• Counterpropaganda operations• Public affairs (PA) operationsContextWith an approximately 90% Muslimpopulation, Senegal is—and still remains—a secular country, as mentioned in<strong>the</strong> constitution and enjoyed by itsinhabitants. Senegal has never undergonea military putsch (coup d’état), andbesides <strong>the</strong> well-controlled rebellion in<strong>the</strong> south, has never been threatened byany kind of external instability. This signof stability is unique in our sub-regionwhere <strong>the</strong> countries bordering Senegalhave experienced, at least one time, aputsch. Senegal belongs to <strong>the</strong> Saharanregion, a remote desert-like area, targetedby Islamic extremists as a potentialsanctuary for future activities.Social AspectWe can define Senegal’s knownthreats as poverty, drought, disease,political issues, growing Islamicmovements, drugs, and refugees. Allare internal problems <strong>the</strong> governmenthas to deal with as first priorities. Ino<strong>the</strong>r words, today’s enemy is no longer<strong>the</strong> conventional army right next door;well organized and structured, fighting53


organizing facilities). Media aresometimes invited to <strong>the</strong> front linesto cover military operations, through“embedding” ground rules established by<strong>the</strong> designated PA staff. In liaison with<strong>the</strong> ground commander’s staff, DIRPAprovides ways to get friendly messagesto <strong>the</strong> target audience.In <strong>the</strong> civil military operations(CMO) field, <strong>the</strong> armed forces help toimprove <strong>the</strong> welfare of <strong>the</strong> populationby taking part in <strong>the</strong> country’s social andeconomic development. Accordingly,commanders conduct CMO to address<strong>the</strong> root causes of instability, to assist inreconstruction after a conflict or disaster,and to conduct o<strong>the</strong>r military operationsindependently—but in support of—national security objectives. CMO, by<strong>the</strong>ir nature, affect public perceptions in<strong>the</strong>ir immediate vicinity. Distribution ofinformation about CMO efforts throughPA and PSYOP can affect <strong>the</strong> perceptionsof a broader audience, and favorablyinfluence key groups or individuals. Thatis why we exercise our heartfelt conceptof ‘<strong>Army</strong>-Nation,’ meant to assess <strong>the</strong>participation of <strong>the</strong> Senegalese armedforces in <strong>the</strong> country’s development,with 100% involvement in <strong>the</strong> followingfunctions:• The national integration function,exercised through military enrollment/conscription, a major factor in nationalcohesion assisted by <strong>the</strong> establishment ofa civic (national) service more accessiblefor our youth;• The economic function, reflectingcountless Engineer Corps actions (<strong>the</strong>construction of bridges, ferries, wells,etc.), along with <strong>the</strong> involvement of<strong>the</strong> Air Force (MedEvac, transport ofVIPs) and <strong>the</strong> Navy (marine resourcesprotection);• The social function which is <strong>the</strong> soleresponsibility of <strong>the</strong> Health Directorateand is <strong>the</strong> backbone of public health.The Senegalese armed forces, asa whole, take part in youth activities(sports and o<strong>the</strong>r activities), and play avery important role in <strong>the</strong> contingencyrescue plan, known as Plan ORSEC(Rescue Operations Plan). The militaryhealth benefit institution, known as“Mutuelle des Forces Armées,” is mainlyconcerned with setting up preventionand solidarity mechanisms that benefitmilitary members and <strong>the</strong>ir families.Our <strong>Military</strong> Building Cooperative(known as COMICO) is fully orientedtowards helping its members becomehome owners in nice and safeneighborhoods. To better portray <strong>the</strong>leadership’s concern for <strong>the</strong> soldier’swelfare, two o<strong>the</strong>r major social structuresstarted business in 2006:• The Injured <strong>Military</strong> ReinsertionAgency aims to find ways to assistretirees and departing military personnelwith <strong>the</strong>ir transition into civilian life;• The Invalids Foundation supports <strong>the</strong>handicapped and <strong>the</strong>ir families.As far as defense support to publicPrinciple cities of Senegal.(CIA World Factbook)diplomacy is concerned, our militarycontributes to peacekeeping and helps toenforce stability on <strong>the</strong> African continentand around <strong>the</strong> world. Thee actionsare in line with our signed alliances,treaties, and international agreements,and our concept of Peace Defense. Thiscommitment is not in vain; Senegal has along series of humanitarian interventionsthat traces <strong>the</strong> history of our armedforces.These efficient humanitarianinterventions come under <strong>the</strong> aegisof <strong>the</strong> United Nations, <strong>the</strong> EconomicCommunity of West African States(ECOWAS), <strong>the</strong> former Organization ofAfrican Unity (now <strong>the</strong> African Union),and so on. These organizations havehonored our armed forces with worldwiderecognition for <strong>the</strong>ir dedication towardspeace and justice. As a matter of fact, ourforces deployed regularly in support of,or parallel to our diplomacy, playing animportant role in peacekeeping around<strong>the</strong> world. In carrying out <strong>the</strong>se noblemissions <strong>the</strong>y have given <strong>the</strong>ir best, toinclude <strong>the</strong> ultimate sacrifice, and alwaysin solidarity with <strong>the</strong> conflict-strickencountries.Our achievements during our 47years of peacekeeping-engagements arehighly appreciated by <strong>the</strong> internationalcommunity. The sheer number ofactivities speaks for itself. For thissuccessful cooperative work, Senegal’sArmed Forces were awarded <strong>the</strong> 2007African Integration Trophy.Senegal’s Views for CounteringExtremist Use of <strong>the</strong> InternetOur country has no precise orobjective definition of what constitutesextremism on <strong>the</strong> Internet. For mostpeople, <strong>the</strong> term refers to <strong>the</strong> propagationof extreme views, usually of a political,social, or religious nature through <strong>the</strong>World Wide Web.The cheap Internet medium provideseasy access to a lot of informationand entertainment, every moment ofevery day. Some terrorist groups useit as a part of <strong>the</strong>ir decentralized andinternationalized command and controlstructure. In this highly sophisticateddomain, Senegal has a lot to learn anda long way to go. Our armed forces donot have <strong>the</strong> technology to hunt, track, orcounter extremist views on <strong>the</strong> Internet.Thus, Senegal currently uses no activemeasures against this threat. The ‘ifyou see it report it’ recommendation isour only available warning system sofar. However, our hierarchy is planningto train some officers in advancedsoftware, to counter intrusion and <strong>the</strong>ftby subversives or wrongdoers.In addition, Senegal’s Americanallies are setting up <strong>the</strong> “ECOWASRegional INFORMATION ExchangeSystem” (ERIES) throughout <strong>the</strong> Africancontinent to provide information trackingand sharing among friendly nations. The2006 exercise Africa Endeavor took placein Pretoria, Republic of South Africa, asa major US-sponsored event focusing on<strong>the</strong> ability of coalition communicationsystems to work toge<strong>the</strong>r.55


O<strong>the</strong>r regular computer-assistedexercises in Senegal are part of <strong>the</strong>“Trans Saharan Counter TerrorismPartnership” (TSCTP), which aimsto build partnerships and streng<strong>the</strong>n<strong>the</strong> abilities of African governmentsand militaries. The hope is that suchactivities will make <strong>the</strong>se nations lessvulnerable to terrorist recruiting efforts,and help catch those already using <strong>the</strong>Web as a safe haven.Last but not least, <strong>the</strong> creation of<strong>the</strong> US Africa Command (AFRICOM)will “streng<strong>the</strong>n security cooperationbetween Africa and <strong>the</strong> USA,” thuscreating new opportunities to bolster <strong>the</strong>capabilities of <strong>the</strong> African leadership.Senegal’s armed forces look forwardto such opportunities in this new era ofinformation operations.At <strong>the</strong> political level, somebelieve that Senegalese PublicTelecommunication Regulatory Agency(ARTP) countermeasures currentlyunderway are likely to be reinforced in<strong>the</strong> near future—with dedicated partners.For example, <strong>the</strong> People’s Republicof China has recently announced itsengagement to fund <strong>the</strong> final stepsof setting up Senegal’s governmentIntranet.Some Recommendations forCountering Net ExtremismThe challenge of Internet extremismurges <strong>the</strong> establishment of a globalnetwork of like-minded individuals,organizations, and opinion-leaders, topromote moderate and progressive ideasthroughout <strong>the</strong> world. Some of Senegal’sideas on how to meet this challengeinclude:• Reinforcement of laws against <strong>the</strong>distribution of extremist material;• Updating of Web legislation;• Actions against relevant Internetservice providers, who once identified,should close down extremist sites or facepotential prosecution;• Parental and teacher use of filteringsoftware to block access to sites withparticular ratings;• Promotion of sites containingcounter-extremist material, andthose promoting tolerance andmulticulturalism;• Building alternative viewpointWeb sites and networks;• Building networks to isolateand marginalize extremists and <strong>the</strong>irsupporters, galvanize <strong>the</strong> revulsion of<strong>the</strong> murder of innocents, and empowerlegitimate alternatives to extremism.Internet users tend to reinforce<strong>the</strong>ir existing perspectives; <strong>the</strong>reforewe must thoughtfully construct counterextremismwebsites, to track <strong>the</strong> verysame people who would be lured byradical ideologies.An IO Topic of ImportanceSenegal’s IO experts believe PSYOPis a very important asset for a commander’ssuccessful mission accomplishment.There is no doubt that PSYOP hasa central role in <strong>the</strong> achievement ofinformation operations objectives insupport of <strong>the</strong> JFC in Senegal. However,in order to maintain credibility with<strong>the</strong>ir respective audience —which is <strong>the</strong>purpose of <strong>the</strong> information operationscell—we recommend facilitating closecooperation and coordination betweenPSYOP and PA staffs.Questions Senegal must fur<strong>the</strong>rexplore: Is PSYOP useful or necessaryin <strong>the</strong> African environment? If yes, whatis <strong>the</strong> best way to make it efficient inSenegal (or Africa), considering <strong>the</strong> lackof sophisticated and technologicallyorientedcomponents? What is <strong>the</strong> bestway to counter PSYOP in Africa? DoesPSYOP apply to low intensity conflictslike civil wars or rebellions in Africa?We look forward to searching for <strong>the</strong>seanswers.Colonel Antonine Wardini is an active duty officer in <strong>the</strong>Senegalese <strong>Army</strong> and presently is <strong>the</strong> military zone commander ofDakar, <strong>the</strong> capital city. He had served as <strong>the</strong> Director of Information andPublic Relations for <strong>the</strong> Senegalese armed forces and acting spokesman for<strong>the</strong> military until 15 June 2007. Colonel Wardini served as infantry battalioncommander, Chief G3 OPS, Chef de Cabinet of <strong>the</strong> General Chairman of<strong>the</strong> Joint Chiefs of Staff of <strong>the</strong> Senegalese armed forces, and press officerin his home country. He was deployed as a UN staff officer in <strong>the</strong> wartornDemocratic Republic of <strong>the</strong> Congo from April 2003 to May 2004. InNovember 2005, Colonel Wardini attended <strong>the</strong> “Media Course” in KAIPTCand later was invited in April 2006 to take part in <strong>the</strong> UN Chiefs PublicInformation Meeting, co-sponsored by DPKO/DPI in New York. ColonelWardini has valuable expertise in field crisis management. He took part intwo humanitarian US-sponsored exercises (Flintlock in Mali and ACRI inThiès, Senegal). He is fluent in French and English and has experience indealing with <strong>the</strong> media, both national and international.56 Special Edition 2008


Argentina: The Challenge OfInformation OperationsBy Dr. Javier Ulises OrtizDr. Ortiz discusses several policies and strategies for protecting Argentinean and coalition critical infrastructure. He describes<strong>the</strong> functions of <strong>the</strong> Armed Forces Scientific and Technical Research Infrastructure Institute, a joint military organizationthat possesses an information security laboratory. He fur<strong>the</strong>r explores <strong>the</strong> Argentine Defense Forces’ creation of “computerscience troops” in its Communications and Computing Systems Command.IntroductionTen years have passed since USmilitary systems were cyberneticallyelectronicallyattacked by means of acomputer network from an unknowncountry—an event known as “SolarDawn.” The 9/11 attacks and o<strong>the</strong>revents, like <strong>the</strong> massive blackouts inbig urban settings, demonstrate thatunlimited security in a complex worldis impossible.Cyberspace is <strong>the</strong> new “A<strong>the</strong>na´sCamp” in today’s conflicts, especially“asymmetrical” ones. In developedcountries <strong>the</strong> concepts of informationwarfare (IW) and information operations(IO) have appeared as new militarydoctrines.According to sociologist ManuelCastells, 9/11 was <strong>the</strong> beginning of<strong>the</strong> first world war of <strong>the</strong> 21st century,<strong>the</strong> “net war” initiated by weak forcesattempting to “impose <strong>the</strong>ir objectivesby using <strong>the</strong> only efficient weapon in itstechnological and military inferioritysituation.” In May 2007, <strong>the</strong> Estoniancomputing system was attacked by halfa million computers, via <strong>the</strong> Internet.Estonia was paralyzed for weeks andneeded NATO’s help to recover. NATOspokesman James Appathurai noted“<strong>the</strong> XXI century is not one of tanksand artillery.” He fur<strong>the</strong>r summarizeda June 2007 NATO chiefs meetingsaying “everybody agreed that it isindispensable to improve <strong>the</strong> protectioncapability of <strong>the</strong> computing systems ofcritical importance.”As an answer to <strong>the</strong>se attacks, anew concept in defense and securitymatters appeared: <strong>the</strong> Protection ofCritical Information Infrastructure(PCII). It is necessary to identify andsecure <strong>the</strong> CII to avoid new “MutualAssured Destruction” vulnerabilitiesin this new age. Cooperative agendasfor regional and defense security issuesmust incorporate CII-related definitions,so that member countries develop <strong>the</strong>irown concepts. Telecommunications(optical fiber, digitalization, computing)represent <strong>the</strong> technological infrastructureof globalization, making strategicdecision-making in real time possibleon a global scale.Argentine national flag.(Wikimedia)Nations can take on elements of newforms like <strong>the</strong> “Digital State” or “Net-State,” and a nation’s sovereign territory<strong>the</strong>n undergoes change in leaders’ minds.Whe<strong>the</strong>r by attack or by accident (suchas a blackout in a megalopolis), <strong>the</strong> risksassociated with not having preventativesystems, early warning, and fast answersbased on emergency plans, can bedevastating.The main objective of <strong>the</strong>se newtypes of conflict is <strong>the</strong> destruction ordisability of information capabilitiesand critical infrastructures. Thisunderstanding of war as “not onlymilitary” has been developed in differentparts of <strong>the</strong> world. Different documentsin <strong>the</strong> USA, Europe, and o<strong>the</strong>r countriesstart to define <strong>the</strong> issue and to generatedoctrine for action. Information spaceand “physical” critical infrastructuresare strategically linked. Thus, networkwarfare is more about organizationaldoctrine than technology.The following US definitions areused in this article:• Critical Infrastructure: systemsand assets, whe<strong>the</strong>r physical or virtual,so vital to <strong>the</strong> United States that <strong>the</strong>incapacity or destruction of such systemsand assets would have debilitating impacton security, national economic security,national public health or safety, or anycombination of those matters.• Information Operations (IO): JointDoctrine’s first IO definition in 1998was changed in 2003 (<strong>the</strong> definitionof Information Warfare was removedcompletely, leaving only <strong>the</strong> definition ofInformation Operations). The February2006 doctrine says IO shall: “… integrate<strong>the</strong> employment of electronic warfare(EW), computer network operations(CNO), psychological operations(PSYOP), military deception (MILDEC),and operation security (OPSEC) inconcert with specified supporting andrelated capabilities to influence, disrupt,corrupt, and usurp adversarial humanand automated decision-making whileprotecting our own.” IO doctrine isin constant evolution, as shown by <strong>the</strong>February 2007 US <strong>Army</strong> update which“uses <strong>the</strong> joint definition of IO as wellas all capabilities that compose IO;however, <strong>Army</strong> doctrine categorizesIO capabilities in <strong>the</strong>mes of five IOtasks: information engagement, C2warfare, MILDEC, OPSEC, informationprotection.”57


Latin America had its first importantcomputer security-related challenge in1999, when facing <strong>the</strong> Y2K problem.Recently, new definitions related tomilitary information technologies startedto appear in many Latin Americancountries. Many nations are updatingdefinitions and doctrines. This articleincludes: strategic perspectives foranalyzing IO issues; <strong>the</strong> developmentof hemispheric strategies for <strong>the</strong>PCII and cyber security; Argentineanrecommendations for counteringextremist views on <strong>the</strong> Internet; <strong>the</strong>Argentine military doctrine related to IO;<strong>the</strong> Argentine military and o<strong>the</strong>r LatinAmerican countries understanding of IO;and conclusions.A Strategic View for Analyzing<strong>the</strong> IssueIn a changing world, conflictsbecome highly complex. Our conceptof conflict, defined along a line fromdeclared wars to undeclared wars,becomes more diffuse between <strong>the</strong>selimits. Presently, we see continuouschanges in regional military strategies,doctrines, capabilities, organizations,land operations, and procedures. Hence,it is more efficient to analyze Argentina’sdoctrine by including elements ofNATO’s IO doctrine. Yet, even NATOstill does not define cyber attacksas military attacks. These wars ofprobable “zero casualties” can beanalyzed from different perspectives,all of which include <strong>the</strong> impact ofinformation technologies—and <strong>the</strong>potential devastating consequences.It is important to analyze differentdoctrinal models based on “real,” andnot “potential” capabilities.Hence, it is necessary to analyzelaws, policies, and national and regionalstrategies. Only <strong>the</strong>n can one understandthat information age conflicts are global,that military forces and doctrine arepart of a nation’s public sector, and thattoge<strong>the</strong>r with <strong>the</strong> private sector <strong>the</strong>yconstitute <strong>the</strong> critical and informationinfrastructure facing <strong>the</strong> cyberspacethreat. We must consider all <strong>the</strong>seelements, but even more explicitly incountries where <strong>the</strong> technological gapis wider, and <strong>the</strong> infrastructure is morevulnerable.Hemispheric Strategies forProtection of Critical InformationInfrastructures & CyberSecurityDuring <strong>the</strong> last five years,Organization of American States (OAS)member countries signed agreementsforming <strong>the</strong> basis for PCII and cybersecurity, as follows:1. Civil and civil-military cooperationin <strong>the</strong> fields of Defense and Security isnecessary, according to <strong>the</strong> five Ministersof Defense of <strong>the</strong> Americas Conference(Santiago de Chile, November 2002).They noted “The Hemisphere faces anincreasingly diverse and complex setof threats and challenges for its states,societies, and people,” and that “eachAmerican state is free to choose itsown defense instruments including <strong>the</strong>mission, personnel, and <strong>the</strong> compositionof Defense and Security Forces neededto guarantee sovereignty, in accordancewith UN and OAS Charters.” There isalso a “particular strategic context ofeach sub-region in <strong>the</strong> Hemisphere.”2. The Defense “White Book:”(Officially <strong>the</strong> Adoption of <strong>the</strong> Guidelineson Developing National Defense Policyand Doctrine Book.) This is a key policydocument providing <strong>the</strong> government’svision for defense of <strong>the</strong> OAS (2002).3. The OAS’s “Declaration onSecurity in <strong>the</strong> Americas” (October 28,2003: This agreement notes <strong>the</strong> newconcept of security in <strong>the</strong> Hemisphere ismultidimensional in scope, and includestraditional and new threats, concerns,plus o<strong>the</strong>r challenges to member states,incorporating <strong>the</strong> priorities of eachstate. Traditional threats, new threats,national concerns, and o<strong>the</strong>r diversechallenges affect member states indifferent ways. New threats includeattacks on cyber security, and “newterrorist threats—whatever <strong>the</strong>ir originor motivation—such as threats to cybersecurity, biological terrorism, and criticalinfrastructure.4. An Inter-American strategyto combat threats to cyber security:Toge<strong>the</strong>r with Argentina, Canada,and Chile, <strong>the</strong> US OAS delegationpresented this document May 19, 2003.This important strategy is key to <strong>the</strong>development and consideration of acommon vision of critical infrastructuresfor all <strong>the</strong> Americas. The documentnotes “A multidimensional andmultidisciplinary approach to createa culture of cyber security” mustbe developed in order to protect <strong>the</strong>infrastructure of telecommunications. Itgives responsibilities to:• The Inter-American Committeeagainst Terrorism (CICTE): Theformation of an Inter-American Alert,Watch, and Warning Network is neededto rapidly disseminate cyber securityinformation and respond to crises.Creation of a Hemispheric network tosupport Computer Security IncidentResponse Teams (CSIRTs) is alsorequired.• T h e I n t e r - A m e r i c a nTelecommunications Commission(CITEL) was formed to identify andadopt secure Internet architecturetechnical standards, in 2004.5. Protect Critical InformationInfrastructures (PCII): Internationalcooperation is <strong>the</strong> key to protection ofessential information infrastructure,coordination of early alert systems,analysis of vulnerability, threats, andincidents—with regard to informationand to coordinate investigations ofattacks against said infrastructuresaccording to national legislation. Thisinformation can be found in <strong>the</strong> BlueBook: Telecommunications Policies for<strong>the</strong> Americas (2005).6. Hemispheric Definition of CriticalInfrastructure (CI): This “refers, amongo<strong>the</strong>rs, to those facilities, systems, andnetworks, and physical or virtual ITservices and equipment, <strong>the</strong> disablingor destruction of which would have asevere impact on populations, publichealth, security, economic activity, <strong>the</strong>environment, democratic governance,or <strong>the</strong> ability of <strong>the</strong> government of amember state to operate effectively.”This important document is key toconsideration of a CI common vision in<strong>the</strong> Americas. OAS, (March 1, 2007).58 Special Edition 2008


Argentina’s Recommendationsfor Countering Extremist Viewson <strong>the</strong> InternetArgentina created a national systemto face <strong>the</strong>se challenges:1. The Information TechnologiesNational <strong>Office</strong> (ONTI) is part of <strong>the</strong>Ministries <strong>Office</strong> Chief. ONTI isresponsible for creating technologicaldevelopment and innovation policies,in order to transform and modernize<strong>the</strong> state. On August 3, 2005, ONTIapproved <strong>the</strong> “National Public SectorInformation Security Policy” for <strong>the</strong>development of Information SecurityPolicies in each public area (regulationISO/CEI 17799).2. Argentina’s Computer EmergencyResponse Team (ArCERT). ArCERTstarted operations in May 1999 underONTI. Main roles are:• Centralize security incidentreports that take place in <strong>the</strong> FederalAdministration, and facilitate informationexchanges in response.• Provide a specialized advisoryservice for network security.• Enhance <strong>the</strong> coordination amongfederal organizations to anticipate,detect, handle, and recover informationfrom security incidents.• Act as a repository of informationfor security incidents, tools, and defensetechnologies.ONTI and ArCERT define <strong>the</strong>following concepts:• Information: every communicationor representation of data or knowledge,in any form (text, numeric, graphic,cartographic, orthographic, oraudiovisual) and by any media (magnetic,paper, PC, audiovisual, or o<strong>the</strong>r).• Information systems: independentsets of information resources organizedto summarize information’s processing,maintenance, transmission, anddistribution by different processes(manual or automatic).• Security Incident: a negativeevent in a PC system, or PC net, thatcompromises <strong>the</strong> confidentiality,integrity, and availability of information.It can be caused through vulnerabilitiesor attempts/threats of breaking into aninformation security infrastructure.• Threats to Information Security:actions against <strong>the</strong> confidentiality,integrity, and availability of information.These threats can be caused by humanerror, attacks, or catastrophic accidents.3. The Homeland Security Systemhas <strong>the</strong> following additional offices withresponsibilities for <strong>the</strong> security of <strong>the</strong>information infrastructure.• The Federal Police Division forTechnological Crimes cooperates withJustice’s investigations on criminalissues.• In <strong>the</strong> National Defense System, <strong>the</strong>Armed Forces Scientific and TechnicalResearch Infrastructure Institute(CITEFA) is <strong>the</strong> only joint militaryorganization dedicated to scientificand technological activities allowedto conduct research and developmentto meet Argentina’s National Defenserequirements.• The Information Security Research& Development (SI6) <strong>Office</strong> is CITEFA’sLab. It was officially created in January2004 to develop information securityR&D activities for both general anddefense areas. SI6 belongs to <strong>the</strong>Information Security Division of <strong>the</strong> ITDepartment. Actually, SI6 is working onintruder detection, intruder classification,intruder identification, honeypots, patternanalysis, biometric au<strong>the</strong>ntication,virtual private networks, firewalls, digitalsignatures, penetration tests, and o<strong>the</strong>rissues. SI6’s mission is <strong>the</strong> generation ofinformation security knowledge throughresearch & development activities.The SI6 Lab considers <strong>the</strong> sum ofcommunity efforts in applied research,using innovative technologies as oneof <strong>the</strong> most efficient ways to buildtechnological knowledge. SI6’s workingprojects include: “Paranoid: IntruderIdentification System using HoneypotTechniques;” “BioVpn: An Open-sourceBiometric Au<strong>the</strong>ntication Process forVPN;” and “Cisilia: A Windows NT/2000/XP Password Cracking DistributedApplication for Linux Platforms UsingOpen Mosix Clusters.”Argentina’s <strong>Military</strong> DoctrineRelated to IOBefore analyzing <strong>the</strong> definition ofIO it is necessary to look at backgroundArgentine provinces.(Wikimedia)information on Argentina’s Structure forNational Defense:1. The National Defense System.Law N° 23.554 de 1988 definesNational Defense as <strong>the</strong> integrationand coordination of all forces of <strong>the</strong>Nation for <strong>the</strong> solution of conflicts thatrequire <strong>the</strong> use of <strong>the</strong> Armed Forces, ina dissuasive or effective way to counterexternal aggression. Its scope is topermanently guarantee <strong>the</strong> sovereigntyand independence of Argentina, toprotect its territorial integrity and selfdetermination, and to protect <strong>the</strong> life andfreedom of its inhabitants.The Armed Forces primaryresponsibility is to defend <strong>the</strong> countryagainst military aggression from o<strong>the</strong>rstates and protect <strong>the</strong> nation’s sovereigntyand territorial integrity. HomelandSecurity Law N° 24.059 establishesthat police and security forces must beused in case of criminal actions, while<strong>the</strong> Armed Forces can, only in specialcases upon request from HomelandSecurity Officials, confront threats of anon-military nature.In 1998, <strong>the</strong> Defense Ministrypublished <strong>the</strong> White Book for NationalDefense in which it analyzed “<strong>the</strong>59


Revolution of <strong>Military</strong> Affairs” (RMA).The RMA changed <strong>the</strong> quantitativecriteria for “soft power.” This concept hasthree axes: space military information,soft power’s use in processing elements(in systems C3I2), and soft power’s usein precision weaponry. The White Bookalso underscores a new danger: <strong>the</strong> threatto Argentina’s own computer systems.A 2001 update to this book includes astrategic view of <strong>the</strong> RMA (with IT) andhow this changed <strong>the</strong> “art of war.” Thisrequired changes in military doctrines, inweapon systems, and in <strong>the</strong> logistical andorganizational structures. This documentfur<strong>the</strong>r established <strong>the</strong> need to integrateC4I2 and electronic warfare systems at<strong>the</strong> national, military, and operationalstrategiclevels; and included <strong>the</strong> satellitesystems applicable to Defense.Decree N° 727/06 streng<strong>the</strong>ned <strong>the</strong>role of <strong>the</strong> Joint <strong>Military</strong> Staff (EMCO)as <strong>the</strong> main military strategic decisionmakerunder <strong>the</strong> civil government.The mission of Chief VI -C3I2 - EMCO (Command, Control,Communications, Intelligence, andInteroperability) is to develop andcontrol <strong>the</strong> policies, plans, programs,and projects of <strong>the</strong> C3I2 joint andcombined staffs, and to provide a Joint<strong>Military</strong> Doctrine for Communicationsand Electronic Warfare. Each of <strong>the</strong>Argentine armed forces has similarareas. The Argentine <strong>Army</strong> has <strong>the</strong>Communications and ComputingSystems Command, staffed by speciallytrained personnel, to include “ComputerScience Troops” and officers withadvanced Computer Science degrees.2. <strong>Military</strong> doctrine related to IO.In Argentina, military doctrine is <strong>the</strong>systematic organization of principles,definitions, regulations, and proceduresthat constitute military knowledge—andoffer satisfactory answers to militaryproblems. Doctrine is <strong>the</strong> basic andactive element in force design, includingJoint <strong>Military</strong> Doctrine, Naval <strong>Military</strong>Doctrine, Air Force <strong>Military</strong> Doctrine,and <strong>Army</strong> <strong>Military</strong> Doctrine. Theseregulate <strong>the</strong> services’ actions to fulfill<strong>the</strong>ir missions as military components,and fundamental institutions of <strong>the</strong>nation. In 2007, Argentina adopted aDefensive Strategic Operational Attitudeby means of a deterrence policy derivedfrom <strong>the</strong> Argentine <strong>Army</strong> Chief of <strong>the</strong>General Staff’s “Argentine <strong>Army</strong> 2025”vision. This plan takes into account<strong>the</strong> peace and cooperation zone createdby <strong>the</strong> Sou<strong>the</strong>rn Common Market(MERCOSUR), including <strong>the</strong> RegionalTrade Agreement (RTA).The Regulation for <strong>the</strong> Conduct of<strong>the</strong> Land <strong>Military</strong> Component establishesthat secure communications are <strong>the</strong>essence of C2 so that <strong>the</strong> commandercan influence operations effectively.Many IO elements are incorporatedin Argentina’s military doctrine. Asmany Argentine military authors note,<strong>the</strong> diverse elements that constituteIO are defined by Argentina’s armymilitary doctrine. The Dictionary of <strong>the</strong>Argentine <strong>Army</strong> defines operations linkedwith IO as follows:<strong>Military</strong> Operations: militaryactivities for situations when facing areal enemy. This includes employmentand direction of dependent elements, toexecute mission needs;E l e c t r o n i c O p e r a t i o n s :complementary operations conductedthrough <strong>the</strong> use of communications andspecial communications electronic media,in order to support o<strong>the</strong>r operationsthroughout <strong>the</strong> electromagnetic spectrumfor <strong>the</strong>ir benefit while restricting oravoiding its use by <strong>the</strong> enemy;Special Operations: operationsdifferent from o<strong>the</strong>rs, ei<strong>the</strong>r because<strong>the</strong>y have particular procedures,organizations, or media, or because<strong>the</strong>re is a need for specially trainedforces. Special operations can beexecuted through conventional or nonconventionalmeans;Non-Conventional Operations:those executed on enemy territory oron friendly territory occupied by <strong>the</strong>enemy, and within <strong>the</strong> scope of attainingdesignated objectives;Complementary Operations (militarydeception): multiple, synchronizedactions to hide from <strong>the</strong> enemy <strong>the</strong> trueintentions of one’s own forces.P e a c e k e e p i n g O p e r a t i o n s :operations to support diplomatic effortsof international organizations to maintain,restore, and/or enforce peace in a conflictzone.Psychological Operations: thoseoperations that use psychological actionsin a planned way to influence <strong>the</strong> behaviorand attitudes of selected individuals orgroups, with <strong>the</strong> aim of facilitating <strong>the</strong>development of one’s own operations.At <strong>the</strong> operational-strategic level <strong>the</strong>seoperations contribute to:• Diminishing <strong>the</strong> morale and fightingstrength of <strong>the</strong> enemy;• Increasing one’s own and one’s alliesfighting strength;• Obtaining <strong>the</strong> help of neutralparties.Civil <strong>Military</strong> operations: supportspecial disaster situations.C2TI. IO doctrine includesC 2 T I ( C o m m a n d , C o n t r o l ,Telecommunications- Computer Science,and Intelligence) as <strong>the</strong> set of human andtechnological resources and proceduresthat allow <strong>the</strong> commander and his staffto control, communicate, and know<strong>the</strong> enemy situation in real time. Thisabbreviation includes <strong>the</strong> o<strong>the</strong>r conceptsof C3I and C4I.Electronic War: a set ofmilitary activities developed in <strong>the</strong>electromagnetic spectrum, with <strong>the</strong>purpose of providing:• Electronic Support Measures: thosethat determine <strong>the</strong> presence of enemyactivity. These are offensive measures(search, intercept, localization, analysis,identification, and evaluation amongo<strong>the</strong>rs);• Electronic Support Countermeasures:those that neutralize and/or reduce<strong>the</strong> use of electromagnetic energydispersed by <strong>the</strong> enemy. These aredefensive measures (such as deceptionand interference);• Electronic Support Counter-countermeasures: those that guarantee <strong>the</strong>electromagnetic energy dispersed byone’s own means. These are offensivemeasures (counter-deception andcounter-interference);<strong>Army</strong> doctrine considers electronicwar as an essential part of every war. Itscharacteristics are that it:• Is permanent, secret, complex, andutilizes highly trained personnel;60 Special Edition 2008


• Is adaptable to planning, centralization,and <strong>the</strong> conduct and coordination witho<strong>the</strong>r electromagnetic activities;• Is flexible and adaptable to militarymaneuvers but possesses securitymeasures;• Is used in tactical surprise andprovides speedy assessments.C o m p u t e r , E l e c t r o n i c ,Cryptographic, and CommunicationsSecurity: The Functional Regulationsof Computer Systems used in <strong>the</strong> <strong>Army</strong>(RFD-75-01) contain <strong>the</strong> general rulesfor data administration and managementfor <strong>the</strong> forces’ computer security anddefine <strong>the</strong> following:• Computer Science: is <strong>the</strong> jointtechnique for <strong>the</strong> automaticuse of information.Computing is importantfor military operations;• Telecommunications& Computer Science: is<strong>the</strong> association betweentelecommunications anddata processors’ technicaleffects that help processinformation;• Computer ScienceTroops: military personnelwho maintain an efficientsecurity system that avoidsboth <strong>the</strong> loss of informationand non authorized accessto <strong>the</strong> data;• Kinds of ComputerSecurity: ElectronicSecurity, CommunicationsSecurity, CryptographicSecurity, Transmission Security,Computer Systems Security, and PhysicalSecurity.Education related to IO. In differenteducational institutes of <strong>the</strong> Educationand Doctrine Command of <strong>the</strong> Argentine<strong>Army</strong> and its higher educationalinstitutions, personnel develop <strong>the</strong>following courses including some aspectof IO:• Technical Higher School of<strong>the</strong> <strong>Army</strong> (EST): offers Degrees inComputer Systems Engineering, apostgraduate course in “ComputerSystems, Cryptography, and Security,”and a “Master in TechnologicalManagement.” The EST participatesin <strong>the</strong> organization of <strong>the</strong> Nationaland International Congresses of <strong>the</strong>Telecomputing and CryptographicSystems Security shows (CONSECRI) where civilian and military expertsfrom Argentina and <strong>the</strong> Region exchangeknowledge on cryptography, cyberattacks, IO, security, and o<strong>the</strong>rs issues;• The Higher School of War (ESG)has a Tactical Trainer (ADITC)with simulation software that trainscommanders and staff and in a GeneralStaff Course <strong>the</strong> curricula includes someaspects of IO. For this reason manyofficers consider monographs or <strong>the</strong>sisrelated to IO in <strong>the</strong>ir studies;Malvinas War Memorial in Buenos Aires(Wikipedia)• School of Communications developstechnical courses for military specialistsand provides specific doctrine to employ<strong>the</strong> communications corps;• School of Computer Science, createdin 1992, has courses in ComputerSecurity Science;• O<strong>the</strong>r Navy and Air Force institutes,and o<strong>the</strong>r public and private universitiessuch as Buenos Aires TechnologicalInstitute (ITBA), also have courses onthis issue;• The Argentine and Chilean Armiesjointly developed a Training System forPeace Missions (SIMUPAS), a virtualpeacekeeping operation.• AFCEA Argentina is <strong>the</strong> SouthAmerican chapter of <strong>the</strong> Armed ForcesCommunications and ElectronicsAssociation (AFCEA International)that unites specialists in C4ISR. AFCEAdevelops military and civilian courses inIW, IO, cyber attacks, and PCII.Argentine <strong>Military</strong> Understandingof IOThe Malvinas War (1982) [editor’snote: also called <strong>the</strong> Falklands War]served as <strong>the</strong> baptism by fire of <strong>the</strong>Communications Units of <strong>the</strong> Argentine<strong>Army</strong>, in conventional operations. Thiswar marks <strong>the</strong> first reference to <strong>the</strong>“Computing Revolution” as applied totelecommunications, andespecially to electronicwarfare. In 1999, <strong>the</strong>Argentine <strong>Army</strong> firstevaluated <strong>the</strong> impact ofinformation technologies,by examining <strong>the</strong> use of<strong>the</strong> Internet and satelliteconnections between o<strong>the</strong>relements. As a result,Argentina created a unified<strong>Army</strong> Communication andComputing System Unit,with a digital net for <strong>the</strong>Systems Integration of <strong>the</strong><strong>Army</strong> (REDISE).Argentina’s evolvingmilitary understanding ofIO over <strong>the</strong> past five yearsis as follows:• Argentina has an IWdoctrine - The ArgentineArmed Forces have specific doctrine oncybernetic war issues to include somerestricted issues. The Argentine conceptof EW (electronic warfare) is valid forIW (Commander of Argentine Navy G.Repetto, 2001);• Strategic IW - In strategic IW, itis necessary to apply “<strong>the</strong> enemy as asystem” <strong>the</strong>ory of Colonel John Warden,attacking <strong>the</strong> C4ISR of an enemy whilemaintaining capabilities in C2 & TI.The threats to <strong>the</strong> national informationinfrastructure are real, non-traditional,and highly diversified. It is necessaryto develop operational concepts andstructures to have superiority on <strong>the</strong> new61


attlefield (Colonel, Ret., of Argentine<strong>Army</strong>, AA, H. Cargnelutti, 2002);• Cybernetic Strategy - Capturingcyberspace’s power requires a CyberneticStrategy to organize <strong>the</strong> CyberneticForce and develop new weapons.New national and international lawsare necessary. Cyberspace, where“cybernetic operations” are conducted, isnot limited as is <strong>the</strong> traditional battlefield.Hence, its duration and operationalrange is wider (Col A.A. and Veteran ofMalvinas War, E. Stel, 2002).• Basic Objectives of <strong>Military</strong>Computer Security - The security of<strong>the</strong> military computer system mustaccomplish four basic objectives:confidentiality, confidence, integrity,and disposability of information. IWis offensive, and it is necessary to trainmilitary personnel how to enter enemynets. This organization would be <strong>the</strong><strong>Army</strong>’s “hackers” in conflict situations.(Captain F. Calvete, <strong>Military</strong> Engineer inComputing Systems of A.A., 2003).• Future Wars - These will involveIW. Modern armies must protect <strong>the</strong>irown information and nets, and attack <strong>the</strong>same capabilities of <strong>the</strong> enemy on <strong>the</strong>new cyberspace battlefield. (Col. A.A.Cerezo, 2003).• Need for new Strategic <strong>Military</strong>Thought in <strong>the</strong> Information Age -Argentina’s National Defense Systemdoctrine must include IW and IOconcepts. IW/IO Commission, <strong>the</strong>Center of Strategic <strong>Studies</strong>, and <strong>the</strong>School of War are all doing work in <strong>the</strong>seareas (CEE-ESG, 2003).• Definitions - Argentina does notstrictly adopt <strong>the</strong> standard IO Definition,but <strong>the</strong> Argentine Armed ForcesInformation System is used in <strong>the</strong> IWcontext. Argentine cyber militarydoctrine is oriented toward a securityperspective, with IW as an asymmetricalthreat. If <strong>the</strong> Argentine Armed Forcesinclude IW concepts in <strong>the</strong>ir doctrine, itcan only help toward <strong>the</strong> identificationof operational and I+D capabilities forasymmetric war. It will be necessary toincorporate both defensive and offensiveIO within <strong>the</strong> definition of futurecomplementary operations (for example,military deception). Even though <strong>the</strong>reis not a doctrinal definition of IW incomputing systems, <strong>the</strong>re is increasinginterest in <strong>the</strong> application of <strong>the</strong>seconcepts (Majors A. A.Machinandiarenaand Tabeada y Gaidano, 2003).• IO is Part of Asymmetrical War - IOincludes attempts to deceive or undermine<strong>the</strong> capabilities of enemy forces.Offensive IO includes infrastructureattacks, PSYOP, and misinformation.It is only necessary to have a PC, amodem, and a program to get into anenemy’s C4 or weapon system. (MajorA.A. Machinandiarena, Battalion 601 ofElectronic Operations, 2004).• Strategic Operational Dislocationin New Wars - Dislocation is achievedthrough a direct or indirect approachagainst an enemy force, to cause animbalance in <strong>the</strong>ir forces, disconnectelements of <strong>the</strong>ir command, affect <strong>the</strong>irmoral and maneuver capability, or toweaken <strong>the</strong>ir defenses. Dislocation canbe achieved via technological and digitalcapabilities, which can be improved stillfur<strong>the</strong>r with <strong>the</strong> use of IO (Col RobertoPritz, Director of <strong>the</strong> Higher School ofWar of A.A., 2005).Latin American Countries’Understanding of IOIn <strong>the</strong> Latin American region <strong>the</strong>reare o<strong>the</strong>r studies related to IT in militaryaffairs. Homeland Security Departmentsinclude many IT security aspects in <strong>the</strong>irrespective areas of responsibility. In <strong>the</strong>military camp, <strong>the</strong>re are fewer precisedefinitions of IO/IW. However, as is <strong>the</strong>case with Argentina, IO is part of militarystudy groups, and many IO-relatedopinions have a national basis:• Strategic Information Warfare (SIW)- This refers to <strong>the</strong> use of computersystems against <strong>the</strong> critical infrastructure(CI) of a country. It is <strong>the</strong> new wayto conduct “war and anti-war” (AlvinToffler). Brazil has created severalresponsible offices designed to defend<strong>the</strong> countries critical infrastructure.(Commander Riquet Filho, Brazil Navy,2003).• Cyber War is Not Yet UniformlyDefined - Cyber war can be understoodas measures taken against C2 systems,operational security, electronic war,piracy, hackers, and informationblockades. Since 2003 <strong>the</strong> BrazilianNavy has established rules of digitalinformation management for <strong>the</strong>irlocal nets (Commander Nascimento deAnnunciacao, Brazilian Navy, 2003).• Cyber War - This concept correspondsto <strong>the</strong> offensive and defensive use ofinformation systems and informationto deny, explore, corrupt, or destroyadversary values and information systemsas well as computer networks. Cyberwar attempts to obtain advantages in both<strong>the</strong> military and civilian realms. Twentycountries are preparing cyber guerillas as“elite troops” (4th Computing SystemsSecurity Committee Meeting, BrazilMinistry of Defense, 2003).• Cyber Terrorism Post 9/11 in <strong>the</strong>Western Hemisphere - The inability toaccurately track cyber attacks may give<strong>the</strong> impression that <strong>the</strong>re are a lowernumber of incidents in Latin America—which is wrong. History indicates politicaland military conflicts are increasinglyaccompanied by cyber attacks. A largepercentage of military traffic movesover civilian telecommunications andcomputer systems. Trends seem topoint to <strong>the</strong> possibility of terroristsusing information technology as aweapon against critical infrastructuretargets. Regional exercises are one of<strong>the</strong> best ways to assess such criticalinfrastructure vulnerabilities. Thereis a significant difference in <strong>the</strong> usageof computers and <strong>the</strong> Internet betweenLatin America, <strong>the</strong> Caribbean, and NorthAmerica. International collaborationand cooperation is important to ensuresecurity of international networks, whichwould in turn make local systems moresecure. (Lt. Col Wanda I. Cortes, US AirForce Reserve, Inter American DefenseCollege, 2004).In July, 2007, <strong>the</strong> ColombianTelecommunications Committeepublished a study for <strong>the</strong> implementationof a National Strategy for CyberSecurity. This report considers securityof communication nets a secondarypreoccupation for most countries in<strong>the</strong> region. Some Latin Americannations have begun adopting informationsecurity labeling procedure (rule ISO/CEI 17799), but <strong>the</strong>re is a juridicalweakness.62 Special Edition 2008


• Identification of CriticalInfrastructure - Mr. Arístides Royo,Ambassador of Panama to <strong>the</strong>Organization of American States(OAS) and Chair of <strong>the</strong> Inter-AmericanCommittee against Terrorism (CICTE),announced in March 2007 that CICTEwill soon begin to review its work plan.It is likely <strong>the</strong> organization will identifyareas related to critical infrastructure,both in physical terms (ports, etc.) and interms of <strong>the</strong> so-called “virtual variety.”ConclusionsDuring <strong>the</strong> course of history,war was fought on open battlefields.During <strong>the</strong> twentieth century, with <strong>the</strong>development of <strong>the</strong> submarine and airpower, war extended its horizon fromone to three dimensional battle spaces. Afourth geo-strategic battle space was alsocreated near <strong>the</strong> end of <strong>the</strong> millennium:cyberspace. At <strong>the</strong> beginning of <strong>the</strong>twenty first century, <strong>the</strong> dimensions ofwar are as foggy as <strong>the</strong>y are clear, asAdmiral William Owens explained in hisLifting <strong>the</strong> Fog of War. For <strong>the</strong> militarycommander, <strong>the</strong> contemporary battlefieldis full of difficulties—<strong>the</strong> Net hasproduced a new fog of war. Cyber warforces changes in many of our objectives,strategies, doctrines, and procedures.In <strong>the</strong>se new conflicts, C2TIs bringdifferent capabilities to commanders.But <strong>the</strong> C2TIs bring new vulnerabilitiestoo because all <strong>the</strong> public-private criticalinformation infrastructures are integrated,and one effective attack could generatemultidimensional “cascade effects.”Within <strong>the</strong> Organization of AmericanStates (OAS), <strong>the</strong> countries of LatinAmerica and North America agreed toa common vision of cyberspace threats,and to <strong>the</strong> first lines of protectionand reaction—both physically andvirtually—against <strong>the</strong>m. In LatinAmerica this situation requires <strong>the</strong>elaboration of relevant national, bilateral,and multilateral policies and strategies.It is first necessary for all membercountries to secure critical informationinfrastructures. Each organization,especially military forces, needs to beprepared and trained to remain mobileand to generate influence (in terms ofpower) on a global scale. Argentineand o<strong>the</strong>r Latin American armies havegeneral doctrinal concepts to confront<strong>the</strong> new challenges in cyberspace.They can help support one ano<strong>the</strong>rs’responsibilities along with o<strong>the</strong>r publicareas, to include not only <strong>the</strong>ir countries,but also regional protection of criticalinformation structures.Regional military forces shouldpermanently update <strong>the</strong>ir doctrines inorder to generate methods, techniques,and training. Each country shoulddevelop new doctrines according to itsown capabilities and national realities,to support both bilateral and multilateralmechanisms of cooperation. Those whohave updated doctrines can confrontnew situations with confidence. Inhis “Strategy for Action,” <strong>the</strong> Frenchstrategist General Beauffre reminds us“it is necessary to act as a thoughtful manand to think as an action man” —because<strong>the</strong> future is now.Javier Ulises Ortiz has a PhD in Political Science. He graduatedwith a degree in International Relations (University of Salvador, BuenosAires, USAL). He also has a Master’s Degree in Drug Conflicts (CatholicUniversity of Salta). His postgraduate work has been in <strong>the</strong> area of strategyat <strong>the</strong> School of War of <strong>the</strong> Argentine <strong>Army</strong> (ESG); and at <strong>the</strong> Defenseplanning and Transformation Course of Defense <strong>Studies</strong> (US National DefenseUniversity). He is a Professor of Strategic Analysis (Information and NewConflicts in <strong>the</strong> ESG and has a Master’s Degree in Defense and HemisphericSecurity (USAL, Inter-American Defense College). He is a member of <strong>the</strong>Center for Strategic <strong>Studies</strong> (ESG); has lectured at <strong>the</strong> School for Advanced<strong>Military</strong> <strong>Studies</strong> (SAMS) in <strong>the</strong> US; and at <strong>the</strong> Armed Forces Communicationsand Electronics Association (AFCEA). He has also lectured in South Americaand in several defense, military, and security institutes of Argentina, France,Colombia, Brazil, Paraguay, and Honduras.63


Chile: A Vision Of Information OperationsBy Igor Carrasco NeiraMr. Igor Carrasco Neira noted that in his role as a responsible party for critical information protection in Chile, he is mostinterested in a global reform of <strong>the</strong> agreement on computer crime. Fur<strong>the</strong>r, he feels that information will transform socialdevelopment into a resource, weapon, and target.Though <strong>the</strong> image of IO has shownbrightly since 1991, especially in lightof <strong>the</strong> First Gulf War, it was not until1 January 1994—<strong>the</strong> date when <strong>the</strong>Zapatista <strong>Army</strong> of National Liberation(EZLN) uprising was started in Chiapas,Mexico—that we saw <strong>the</strong> practicaleffects of an information operation.The EZLN first utilized <strong>the</strong> Internet asan instrument of war to disseminate itsideas, to raise money, to denounce <strong>the</strong>Mexican government, and by meansof cyberspace recruiting, to attack <strong>the</strong>networks of <strong>the</strong> Aztec government bysending massive emailings and computerviruses.As a contextual fact, until that date<strong>the</strong> total number of servers connected to<strong>the</strong> Internet worldwide was 2,217,000.As a result, any given state’s use ofinformation technology was low. Yet<strong>the</strong> Zapatista’s IO results could not bequalified in <strong>the</strong> same way; <strong>the</strong>y gainedseveral advantages from <strong>the</strong> use ofinformation technology.What Are <strong>the</strong> Innovations/Advantages of <strong>the</strong> InformationAge?• First, technological advances haveactually permitted information-basedprocesses to reach never before seenlevels of efficiency;• Second, <strong>the</strong>re is an increasinglygreater dependency on technologysystems for handling and transferringinformation;• Third, this dependency enabledidentification of new vulnerabilities andweaknesses that favor <strong>the</strong> developmentof new technologies and procedures forexploiting <strong>the</strong>m, and as a consequence,<strong>the</strong>ir countermeasures;• Fourth, political leaders’ interestin rapidly assimilating <strong>the</strong>ir respectivestates into <strong>the</strong> larger Information Societyhas grown.The importance of this assimilationis evident: those who ignore <strong>the</strong>information age will be left behind,both socially and economically. Forexample, <strong>the</strong> multimedia industry,which includes information technology,telecommunications, and mass media,is clearly affected by information agedevelopments. The requirement foreconomic and societal transformationsmakes entry conditions into aninformation society a decisive <strong>the</strong>mefor <strong>the</strong> future.Chilean Forces insignia.(Wikipedia)Today, <strong>the</strong> cold combination ofcircuits and metal—<strong>the</strong> final product ofan industrial process—does not make <strong>the</strong>difference. It is processed informationthat generates a substantial advantagein social competitiveness. Informationnow has a leading role in transformingsocial development into a “resource,weapon, and target.” Information hasbeen converted into strategic wealth aswell as a condition for competitiveness.Information technologies introduceenormous changes, surpassing pureeconomics and offering new social,political, and cultural promises throughinformation and communicationnetworks.The products derived fromintellectual activity represent a decisivepart of collective wealth. To a largeextent, international competitiveness in<strong>the</strong> new century is a battle of intelligence,that is, of mental models to interpretreality.The pinnacle of world informationnetworks, such as <strong>the</strong> Internet, constitutesa considerable challenge for societies.There are evident benefits for <strong>the</strong> statethat uses electronic media, includinginformation media, but also by implicationassumption of certain risks—understoodto mean <strong>the</strong> possibility of success orfailure—that should be minimized toguarantee information integrity andacceptable service performance. Since1998, <strong>the</strong>re are well-known reportsindicating <strong>the</strong> presence and executionof programs designed to control andelectronically eavesdrop on <strong>the</strong> differentcommunications of our planet. InFebruary 1999, Director of <strong>the</strong> US CentralIntelligence Agency (CIA) George Tenet,warned that “Various countries have orare developing <strong>the</strong> capability to attackadversary information systems.” Helater added, “to develop <strong>the</strong> capabilityto attack computers can be inexpensiveand ultimately attainable: this requiresminimal infrastructure.”National ForcesNational information technologysecurity policy came into being in<strong>the</strong> mid-1990s because of <strong>the</strong> need toconfront <strong>the</strong> “Y2K” effect. This forcedus to prepare for a national catastrophe,or ra<strong>the</strong>r, to construct a national map ofcritical state information infrastructure.Even when primary attention focusedon “information errors,” <strong>the</strong> strategiccharacter of information forced <strong>the</strong>state into an in-depth analysis of <strong>the</strong>road ahead.If <strong>the</strong>re is a sector of societyexperiencing great changes in recent64 Special Edition 2008


years, it would undoubtedly be in statesecurity and <strong>the</strong> armed forces. Thesechanges contributed to <strong>the</strong> promulgationof Law 19.974 in 2004, whose objectiveis to establish and regulate <strong>the</strong> StateIntelligence System (SIE), which isdefined in Article Four (below), andwhich is chaired by Chile’s Directorof <strong>the</strong> National Intelligence Agency(ANI):Article Four: The State IntelligenceSystem, henceforth <strong>the</strong> System, is <strong>the</strong>collective intelligence organization, …functionally coordinated, that directsand executes specific intelligence andcounter-intelligence activities, to advise<strong>the</strong> President of <strong>the</strong> Republic and thosevarious high-levels of leadership of<strong>the</strong> State, with <strong>the</strong> objective to protectnational sovereignty and to preserveconstitutional order and, in addition,formulate intelligence opinions usefulfor achieving national objectives. Theintegral organizations of <strong>the</strong> System,without prejudicing <strong>the</strong>ir agencies and<strong>the</strong>ir obligations with respect to superiorcommanders, should interconnect among<strong>the</strong>mselves through <strong>the</strong> exchange ofinformation and mutual cooperation thatthis law and <strong>the</strong> legal code establish.The National Intelligence Agencywas created in Title Three, Article Sevenof <strong>the</strong> same law:Article Seven: The NationalIntelligence Agency will be created, acentralized public service, of technicaland specialized character, which willbe subordinate to <strong>the</strong> President of <strong>the</strong>Republic through <strong>the</strong> Interior Ministry,whose objective will be to produceintelligence to advise <strong>the</strong> President of <strong>the</strong>Republic and those various high-levelsof leadership of <strong>the</strong> State, in accordancewith current law.Among <strong>the</strong> ANI functions underLetter “C” of Article Eight: To proposeprotective norms and procedures forinformation systems critical to <strong>the</strong>State. In this context, national forces areconcentrated in two areas: identifyingand hardening information networksand infrastructure critical to <strong>the</strong> State:and creating <strong>the</strong> capability to influencea potential adversary.Identification and Hardening ofNetworksThe tasks conducted in this fieldrange from studies of information flowsto reorganizing national networks. Tothis end, <strong>the</strong> government sets forthcreation of a State Connectivity andCommunications Network, throughSupreme Decree 5996 of <strong>the</strong> InteriorMinistry.Presently, <strong>the</strong> Chilean governmentis contemplating cybernetic securitydevelopment within <strong>the</strong> nationaltechnological development plan knownas <strong>the</strong> Digital Agenda. The objective ofthis plan is to increase competitiveness,equal opportunities, individual liberties,quality of life, and <strong>the</strong> efficiency andtransparency of <strong>the</strong> Chilean public sectorthrough development and employmentof information and communicationtechnologies (TIC). At <strong>the</strong> same time,<strong>the</strong>se actions help enrich <strong>the</strong> culturalidentity of <strong>the</strong> nation and its nativepeoples.The government plan of action for<strong>the</strong> period 2004-2006 established 34initiatives, grouped in six areas:1. Expanded access;2. Education and training;3. Online status;4. Digital development of businesses;5. Deployment of <strong>the</strong> TIC industry;6. Legal framework.Two of <strong>the</strong> thirty four initiativesare discussed here: numbers twelveand seventeen. Known as Project5D, or The Connective Network of <strong>the</strong>State, Initiative Twelve encourages<strong>the</strong> telecommunications industries todevelop a broadband highway voiceand-data-over-IPnetwork for <strong>the</strong>public sector. It will connect all publicbranches—including municipalities,schools, hospitals, and clinics—permitting <strong>the</strong>ir convergence into asingle network of telephone, mobile, andInternet services. Initiative Seventeenestablishes a number of Interior Ministryresponsibilities: to search and maintain anational response system for cyberneticincidents; administer programs; reducethreats and vulnerabilities; developsecurity training programs; secure <strong>the</strong>cyberspace in which <strong>the</strong> governmentworks; and administer national andinternational cooperation in cyberneticsecurity matters.O<strong>the</strong>r decrees to improve cybersecurity include new technical normsto provide for <strong>the</strong> confidentiality ofelectronic documents. These measuresestablish steps for <strong>the</strong> public ministriesand services to meet security standardISO 17779, and specify securityresponsibilities for information circulatingon state institutional networks.Creating <strong>the</strong> Capability toInfluence Potential AdversariesNaturally, <strong>the</strong> most serious efforts tocreate capabilities to influence adversariesutilize information technology resourcesfor training armed forces personnel. Thisis particularly critical given that modernconflicts are very different from only afew decades ago. In fact, <strong>the</strong> advanceof technology is in direct relation to<strong>the</strong> decrease of men on <strong>the</strong> battlefield.Historical examples confirm that during<strong>the</strong> US Civil War, <strong>the</strong> “density of men”was approximately 8,200 soldiers persquare kilometer. According to NATOdoctrine, during <strong>the</strong> years 1985-1990<strong>the</strong>re were approximately 400 men persquare kilometer. After observing <strong>the</strong>current war in Iraq, we estimate a densityof 15-17 soldiers per square kilometer.This decrease is due to betterarmament which is increasingly morelethal, more precise, and lighter weight,but also due to better prepared soldiers.We find that soldiers have greater accessto information technology, beginningearly in <strong>the</strong>ir schooling. This enables <strong>the</strong>capability to direct things, people, andequipment with greater efficiency. It alsoallows for <strong>the</strong> introduction of computersystem training directly into <strong>the</strong> militaryenvironment.Presently, <strong>the</strong>re is an organizationwithin <strong>the</strong> Chilean War Academydedicated to this type of training: <strong>the</strong>Computerized Tactical OperationTraining Center (CEOTAC). Thecenter’s fundamental objective is toprepare officers, but includes developing<strong>the</strong> software necessary for this task: <strong>the</strong>SETAC (Tactical Training System).This advanced military simulator65


Chile in its South American context.(CIA)replicates modern combat conditions in<strong>the</strong> computer, thus reducing associatedtraining costs. This same centercreated <strong>the</strong> Institution and OrganizationManagement Training System (SEGIO)software that prepares civil organizationsfor emergency situations.The technology has been veryuseful in educating soldiers, as well asin instructing <strong>the</strong>m in weapons-handlingand marksmanship techniques. TheBernardo O’Higgins <strong>Military</strong> School hasa virtual firing range, with two screensthat can project fixed or moving targets,offering <strong>the</strong> cadets a sensation of reality.The range includes all principal Chilean<strong>Army</strong> weapons: <strong>the</strong> Famae 5.56mmrifle, <strong>the</strong> Beretta 9mm pistol, and <strong>the</strong>Minimi 5.56mm submachine gun—allof which can be loaded, and produce ashot recoil effect. All of <strong>the</strong> precedingtraining saves resources, and results inexcellent marksmen. Such technologiesenable realistic training, produce ahigher quality Chilean soldier, andproduce a deterrent effect on potentialadversaries.Combating Crime and Terrorism:Legal Status in ChileIn 1993, Chile ratified Law Number19.223, which typified legal preceptsrelating to information technology.Following <strong>the</strong> French model, this lawmarked a milestone in Chilean legislation,since it introduced penalties for a numberof IT-associated behaviors. The intentionwas to protect <strong>the</strong> quality, purity, andsuitability of associated information.The law was important for penalizingunlawful access to computer systems,altering and damaging computer data,and divulging such data. Never<strong>the</strong>less,continuous TIC innovations requireconsideration of a global reform oncomputer crimes agreements. Two billsseeking to reform our criminal code onthis matter. Both initiatives addressa similar type of criminal technicalprocessing: <strong>the</strong> predominance of <strong>the</strong>protected legal right as a systematizedfactor. The first is a parliamentarymotion that tackles reform of Law 19.223on information technology crimes:• Unlawfully accessing informationcontained in a computer system;• Destroying a computer system oraltering its function;• Unlawfully obtainingtelecommunication services.The second corresponds to anexecutive message categorizing newmethods that are not criminalized in ourlegislation, such as computer crimes:• Falsification of electronicdocuments and credit cards;• Computer fraud;• U n l a w f u l l y o b t a i n i n gtelecommunication services.Both of <strong>the</strong>se initiatives are currentlybeing processed in <strong>the</strong> Chilean NationalCongress. In short, <strong>the</strong> aforementionedactions seek to solve legal problemsthat have arisen through introductionof new types of criminal offences, ormodification of existing offences basedon traditional legal rights.Chilean International ActionsIn order to address <strong>the</strong> numerousinternational challenges related to thismatter, <strong>the</strong> Special Policy Director(DIPESP) of <strong>the</strong> <strong>Foreign</strong> Affairs Ministryestablished an Inter-Institutional WorkingGroup on Cybernetic Crime in 2004. Thegroup is made up of representativesfrom <strong>the</strong> Interior Ministry, <strong>the</strong> NationalIntelligence Agency, <strong>the</strong> JusticeMinistry, <strong>the</strong> Attorney General, and<strong>the</strong> Investigative Police. Among <strong>the</strong>irobjectives are streng<strong>the</strong>ning cooperativelinks with o<strong>the</strong>r countries, as well aspromoting and deepening an informationexchange to confront emerging threatsin this area.Thus far, Chile has conductedinternational actions primarily at <strong>the</strong>regional level: The Inter-AmericanCommission against Terrorism (CICTE);<strong>the</strong> Meeting of American JusticeMinistries (REMJA) under <strong>the</strong> OAS; <strong>the</strong>General Assembly of <strong>the</strong> OAS; plus <strong>the</strong>fields of APEC and <strong>the</strong> United Nations.In <strong>the</strong> framework of <strong>the</strong> REMJA,Chile actively participated in <strong>the</strong> ThirdMeeting of <strong>the</strong> Group of GovernmentExperts on Matters Relating toCybernetic Crimes, in 2003. A seriesof recommendations arose from thismeeting that are still relevant, and webelieve <strong>the</strong> international communityshould provide appropriate follow-upon <strong>the</strong>se issues.Agreement of <strong>the</strong> EuropeanCouncil on Cybercrime: TheChilean PositionIn order to define our country’sposition regarding eventually joining<strong>the</strong> Agreement of <strong>the</strong> European Councilon Cybercrime, Chile requested reportsfrom all institutions competent in thismatter. In general terms, membersfavored an eventual Chilean entry intothis part of <strong>the</strong> agreement.B e s i d e s s c r u t i n i z i n g t h emethodologies and results of <strong>the</strong> 2004Fifth Meeting of <strong>the</strong> American JusticeMinistries or Attorney Generals, Chileanrepresentatives noted recommendationsfor State members to “evaluate <strong>the</strong>benefit of applying <strong>the</strong> principles of <strong>the</strong>Agreement of <strong>the</strong> European Council66 Special Edition 2008


on Cybernetic Crimes (2001) andconsider <strong>the</strong> possibility of joining thisagreement.”Intelligence and GlobalizationThemes addressing intelligence aremore complicated, given <strong>the</strong> scenariosthat arise from globalization. Althoughthis process presents advantages andopportunities for society, it also givesrise to new conflicts. Emerging areasof struggle range from <strong>the</strong> research, <strong>the</strong>knowledge, <strong>the</strong> industry, and <strong>the</strong> resultingcommerce, to new forms of crime thatlend support to criminal organizations,insurgents, or global terrorists.Information Technology Attackas a ThreatKnowing about and protecting againstcomputer attacks on Chile’s infrastructureis indispensable for functioninginformation and communicationsystems. Fur<strong>the</strong>r, such knowledge iscritical for public administration of<strong>the</strong> country’s vital businesses—energy,electricity, telecommunications, fuelsupply, transportation services, healthservices, and security among o<strong>the</strong>rs.The majority of <strong>the</strong>se services administer<strong>the</strong>ir productive processes remotelythrough computer networks, and in realtime, thus <strong>the</strong>se have become mandatorytasks.This subject demands a relevantexample. In this context, it is certainlynecessary to protect informationnetworks, but also to clearly determine <strong>the</strong>origin and motivation of <strong>the</strong> perpetrators,given that <strong>the</strong> state’s response will becompletely different if <strong>the</strong> attacker is acriminal hacker, or a hostile action byano<strong>the</strong>r nation-state.O<strong>the</strong>r data also provides evidenceof <strong>the</strong> magnitude of technologicaldependency and <strong>the</strong> requirement for itsprotection. In 1983, <strong>the</strong>re were a total of562 computers connected to <strong>the</strong> Internetacross <strong>the</strong> entire world. In 1993, <strong>the</strong>number rose to 1,200,000 computers.By June 2005, counting only broadbandconnections, in Chile alone <strong>the</strong>re were594,000 computers connected to <strong>the</strong>Internet. Today <strong>the</strong> number exceeds onemillion broadband connections. Thus intwo years, <strong>the</strong>re has been more than a60% increase in Chile alone.ConclusionsAll future scenarios must consider<strong>the</strong> state’s dependence on informationsystems and complex computingtechnologies, where many controlprocesses are made in real time andfrom a distance. As a result, <strong>the</strong>se willbe extremely sensitive—if <strong>the</strong>y are notalready—and will be likely targets ofhostile action from Internet and networkexperts.Looking to <strong>the</strong> future, we see <strong>the</strong> highprobability of increasing dependence on<strong>the</strong>se applied technologies:• Cheap solar energy;• Rural Wireless communications;• Genetically modified food;• R a p i d b i o t e s t i n g t h r o u g hnanotechnology;• Filters and catalysts for purifying anddecontaminating water;• Managed application of medicines;• Hybrid vehicles;• Wireless computers;• Quantum cryptography.Finally, to end with <strong>the</strong> words ofauthors John Arquilla and David Ronfeldt,“The information revolution alters <strong>the</strong>nature of conflict and introduces newmodalities in <strong>the</strong> art of war, terrorism,and crime.” Chile is in <strong>the</strong> process ofpreparing to meet <strong>the</strong>se threats, andmore.Igor Carrasco Neira is Chief of <strong>the</strong> Division of <strong>the</strong> InformationSociety (DESI) of <strong>the</strong> National Agency of Intelligence, whosemission is to protect <strong>the</strong> critical information of <strong>the</strong> State. Since 1990 hehas worked in Chile’s defense and homeland security system. He is aformer analyst of organized crime and new threats, and has represented <strong>the</strong>Chilean government at meetings of experts on information security in <strong>the</strong>Inter-American Committee against Terrorism (CICTE) of <strong>the</strong> Organizationof American States in Buenos Aires, Ottawa, and Washington. He teachescourses in Chile and foreign countries on information security, informationsociety, and new threat issues. Mr. Carrasco is an anthropologist with adegree from <strong>the</strong> Austral University of Chile. He is a Professor in <strong>the</strong> Instituteof Political Science of <strong>the</strong> National University of Chile; a Diplomatein National Strategic Intelligence, National School of Intelligence ofArgentina; and a Diplomate in <strong>the</strong> Methodologies of Intelligence in <strong>the</strong>Institute of Political Science, Chile University.67


Air Force Symposium 2008: CyberspaceJuly 15-17Maxwell AFB, AlabamaSymposium Co-hosted By:Air University Cyberspace Information and Operations Study Center, Maxwell AFB, AL8th Air Force and HQ Air Force Cyber Command (Provisional), Barksdale AFB, LAU.S. Strategic Command, Offutt AFB, NETHREE MAIN TOPIC TRACKSDoctrine and Concepts of Operations• Defining Cyberspace• Establish <strong>the</strong> Domain• Control <strong>the</strong> Domain• Use <strong>the</strong> DomainCyberspace Policy and Law• US and Int’l Law of Cyberspace Operations(<strong>From</strong> Peacetime through Post-conflict)• Cyberspace Rules of Engagement, <strong>the</strong> Lawof Armed Conflict, and Interoperability withMultinational Partners• DOD Cyberspace support to <strong>the</strong> DefenseIndustrial Base• Strategic Communications, InfluenceOperations and Public Affairs in CyberspaceGUEST SPEAKERS INCLUDE• Gen. Kevin P. Chilton, Commander, U.S. StrategicCommand, Offutt AFB, NE• Lt. Gen. Robert J. Elder, Commander, 8th Air Force,Barksdale AFB, La., and Joint Functional Componentcommander for Global Strike and Integration, U.S. StrategicCommand, Offutt AFB, NE• Maj. Gen. Charles J. Dunlap Jr., Deputy JudgeAdvocate General, Headquarters U.S. Air Force,Washington, D.C.• Maj. Gen. William T. Lord, Commander, Air ForceCyberspace Command (Provisional), Barksdale AFB, LA• Dr. Rebecca Grant, Founder and President of IRISIndependent Research.USAF CYBER: Supporting National Security• CYBER is Inevitable: <strong>Military</strong>, Media, Markets• CYBER: <strong>Military</strong> and Civilian Perspectives• CYBER: DOD, DHS and Interagency• CYBER: Educating and Developing <strong>the</strong> ForceWho Should Attend: <strong>Military</strong> and civilian defensepersonnel, industry and business leaders, academics, ando<strong>the</strong>rs interested in <strong>the</strong> Air Force’s cyberspace mission.FOR MORE INFORMATIONWeb: http://www.maxwell.af.mil/au/awc/cyberspace/index.htmlE-mail: AFSymposium.2008Cyberspace@maxwell.af.milCommercial Phone: 1-334-953-1153 or 5998DSN Phone: 493-1153 or 599868 Special Edition 2008

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!