information operations and the conduct of land warfare

14
4 September-November 1998 l MILITARY REVIEW This article is reprinted with permission of the Association of the US Army (AUSA). This article was originally published by AUSAs Institute of Land Warfare (ILW) as Land Warfare Paper No. 31, October 1998, and was presented by the author at an education forum during AUSAs Annual Meeting. Information requests should be directed to James D. Blundell, Director of Programs, at (800) 336-4570 or (703) 841-4300, extension 631. AUSA and ILW publications are available on the AUSA web page at: <www.ausa.org>. The ILWs purpose is to extend AUSAs educational work by sponsoring scholarly publica- tions, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as an ILW Paper represents research by the au- thor which, in the opinion of the editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an ILW Paper does not indicate that AUSA agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate AUSA members thinking and others concerned about important defense issues. Foreword Information operations (IO) represent a core Army XXI capability. They will allow for unprec- edented battlespace awareness, increased speed and tempo in land warfare and, ultimately, for Army information superiority. These expectations must be tempered with the knowledge that they represent the institutional Army view of IO. Other views exist which challenge current Army war- fighting assumptions. The central argument developed in this article concerns whether IO will be an adjunct to current operational methods a force multiplier or a totally new operational mechanism which will provide warfighting capabilities which hereto- fore did not exist. Both schools of thought are analyzed along with a discussion of IO definitions and target sets and IOs land warfare implications. This articles value is derived from its ability to generate debate on an issue of central importance to the Army. As the victors of the Cold and Gulf Wars, our approach to IO is inherently more con- servative than that of many of our future opponents, some of whom will rely upon cyberterrorism and other asymmetric attempts to overcome our battle- field advantages. Thus, while IO will allow us to greatly advance our traditional warfighting capa- bilities, we must recognize that they may open up new warfighting venues which will need to be ex- plored and debated to ensure that the Army retains its battlefield dominance into the early 21st century. General Gordon R. Sullivan, US Army, Retired, AUSA President, October 1998 Information Operations and the Conduct of Land Warfare by Robert J. Bunker Copyright 1998 AUSA

Upload: others

Post on 16-Nov-2021

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Operations and the Conduct of Land Warfare

4 September-November 1998 l MILITARY REVIEW

This article is reprinted with permission of the Association of the US Army (AUSA). Thisarticle was originally published by AUSA�s Institute of Land Warfare (ILW) as Land WarfarePaper No. 31, October 1998, and was presented by the author at an education forum duringAUSA�s Annual Meeting. Information requests should be directed to James D. Blundell,Director of Programs, at (800) 336-4570 or (703) 841-4300, extension 631. AUSA and ILWpublications are available on the AUSA web page at: <www.ausa.org>.

The ILW�s purpose is to extend AUSA�s educational work by sponsoring scholarly publica-tions, to include books, monographs and essays on key defense issues, as well as workshopsand symposia. A work selected for publication as an ILW Paper represents research by the au-thor which, in the opinion of the editorial board, will contribute to a better understanding of aparticular defense or national security issue. Publication as an ILW Paper does not indicate thatAUSA agrees with everything in the paper, but does suggest that the Association believes the paperwill stimulate AUSA members� thinking and others concerned about important defense issues.

ForewordInformation operations (IO) represent a core

Army XXI capability. They will allow for unprec-edented battlespace awareness, increased speedand tempo in land warfare and, ultimately, forArmy information superiority. These expectationsmust be tempered with the knowledge that theyrepresent the institutional Army view of IO. Otherviews exist which challenge current Army war-fighting assumptions.

The central argument developed in this articleconcerns whether IO will be an adjunct to currentoperational methods �a force multiplier � or atotally new operational mechanism which willprovide warfighting capabilities which hereto-fore did not exist. Both schools of thought areanalyzed along with a discussion of IO definitions

and target sets and IO�s land warfare implications.This article�s value is derived from its ability to

generate debate on an issue of central importanceto the Army. As the victors of the Cold and GulfWars, our approach to IO is inherently more con-servative than that of many of our future opponents,some of whom will rely upon cyberterrorism andother asymmetric attempts to overcome our battle-field advantages. Thus, while IO will allow us togreatly advance our traditional warfighting capa-bilities, we must recognize that they may open upnew warfighting venues which will need to be ex-plored and debated to ensure that the Army retains itsbattlefield dominance into the early 21st century.

�General Gordon R. Sullivan, US Army,Retired, AUSA President, October 1998

Information Operationsand the Conduct of

Land Warfareby Robert J. Bunker

Copyright 1998 AUSA

Page 2: Information Operations and the Conduct of Land Warfare

5MILITARY REVIEW l September-November 1998

THIS ARTICLE FOCUSES on the implica-tions of IO on the US Army�s conduct of land

warfare over the next decade.1 This transitionalperiod�from the experimental Force XXI to the digi-tized Army XXI�offers many promises, potentialsand even pitfalls for the world�s predominant landpower force. Army Brigadier General James M.Dubik has recognized this in an earlier ILW paper�Creating Combat Power for the 21st Century.�2

The term �information operations� conjures upmany images. To some the vision of Robert A.Heinlein�s classic Starship Troopers comes tomind with its �mobile infantry� forces in high-tech body armor.3 Armed with vast amounts ofindividual firepower and linked into informationnets, these soldiers provide one future Army forcearchetype. Another vision is at odds with thehigh-tech warrior tradition. It is that of out-of-shape armchair soldiers sitting behind theircomputer terminals launching war-winningcyber-attacks at the stroke of a key. A thirdvision is derived from the cyber-punk genre. It isthat of a �Johnny Mnemonic-type� individual,with hard-wires in his brain and enough down-loaded information to make a modern super-computer look like a kid�s cheap toy.4 Suchenhanced individuals would give a whole newmeaning to the concept of �special forces.� Whilesome truth probably exists in each of these visions,for now that is all they are�future visions.

This article will not consciously promote an un-derlying thesis or policy with regard to the Army�srelationship to IO except for the self-evident factthat they are becoming increasingly critical to itscontinued battlefield dominance. This article hastwo goals: to focus on the important transitionalperiod we are now facing and show the basis of IOthinking and the two competing schools of thoughtwhich have developed, outlining areas of potentialsynthesis between them; and to assess the potentialimpact of these operations on land warfare andanalyze some of the issues associated with them.

Defining IO�Information operations� is a relatively new

term. In the current Army Field Manual (FM)

100-5, Operations, June 1993, the term is not evenmentioned.5 Early definitions of this term can befound in US Army Training and Doctrine Com-mand (TRADOC) Pamphlet 525-5, Force XXI Op-erations, August 1994: �Continuous combined

arms operations that enable, enhance, and protectthe commander�s decision cycle and executionwhile influencing an opponent�s; operations areaccomplished through effective intelligence, com-mand and control, and command and control war-fare operations, supported by all available friendlyinformation systems; battle command IO are con-ducted across the full range of military opera-tions.�6 FM 100-6, Information Operations, Au-gust 1996, defines IO as �Continuous militaryoperations within the MIE [military informationenvironment] that enable, enhance and protect thefriendly force�s ability to collect, process and acton information to achieve an advantage across thefull range of military operations; IO include inter-acting with the GIE [global information environ-ment] and exploiting or denying an adversary�s in-formation and decision capabilities.�7

The value of information to the conduct of landwarfare has been commented on by Army Chief ofStaff General Dennis J. Reimer��The evolvingmilitary information environment will fundamen-tally change the way we, the Army, conduct opera-tions in peace and conflict. IO includes all mea-sures, both offensive and defensive, taken toachieve information dominance. The Army will in-tegrate IO into every aspect of Army XXI.�8

Yet two years later, some debate exists concerningthe nature and value of IO to Army XXI. EarlyArmy definitions are in variance with current jointforce perceptions. Further, while IO are recognizedas being potentially of great value, their actualvalue to date is disputed. One school of thoughtposits that they represent an adjunct to current

This article represents the opinions of the author andshould not be taken to represent the views of the Departmentof the Army, Department of Defense (DOD), ILW or AUSAor its members. All rights reserved. No part of this articlemay be reproduced, stored in a retrieval system or transmit-ted in any form or by any means, whether electronic, me-chanical, photocopying, recording or otherwise, without theprior written permission of AUSA�s Institute of Land War-fare, 2425 Wilson Boulevard, Arlington, VA 22201.�Editor

The best IO definition is currentlyprovided by DOD. IO are defined as �actions

taken to affect adversary information andinformation systems while defending one�s owninformation and information systems.�. . . IW,

in turn, is conceptually subordinated to IO. It isdefined as �information operations conducted

during time of crisis or conflict to achieveor promote specific objectives over a specific

adversary or adversaries.�

INFORMATION OPERATIONS

Page 3: Information Operations and the Conduct of Land Warfare

6 September-November 1998 l MILITARY REVIEW

operations�the end result of which is to enhancecurrent Army capabilities by making what it hastraditionally done better by means of a forcemultiplier effect. Another school of thoughtsuggests that IO will provide the Army with newcapabilities. Instead of being a simple adjunct to

current operations, according to this school, theinfluence of the �information revolution� onwarfare will result in the redefinition of operationsthemselves. Both schools do agree that IO hasbecome a dominant, albeit at times ambiguous,concept for Army professionals to wrestle with.

As can be seen even within the Army, one of themaddening aspects of IO is defining them. This is

particularly troublesome for those who did notgrow up with computers and who inherently do notfeel comfortable working with them. An Internet-based attack, the use of propaganda and even ter-rorism can be labeled as forms of IO. Unless indi-viduals can agree upon a broader definition, theirexamples have little in common with each other.

Joint force definition. The best IO definition iscurrently provided by DOD. IO are defined as�actions taken to affect adversary information andinformation systems while defending one�s owninformation and information systems.�9 As previ-ously discussed, early Army definitions were sub-ordinated to more traditional commander and force

needs. The joint force definition is much more ab-stract in nature.10 It literally decouples the conceptof operations from the physical environment inwhich the Army is used to campaigning. As anoutcome, cyberspace takes on its own form of ex-istence and becomes, in its own right, a form of

battlespace where IO can be conducted. For thosesoldiers and leaders who think solely in terms oftanks, helicopters and artillery pieces, this concep-tual leap is extremely difficult to grasp, much lessaccept.

Information warfare (IW), in turn, is conceptu-ally subordinated to IO. It is defined as �informa-tion operations conducted during time of crisis orconflict to achieve or promote specific objectivesover a specific adversary or adversaries.�11 The ba-sic joint force IO concept is illustrated in Figure 1.

The next challenge is differentiating between�information� and �information systems.� Thedefinition of information used in Concept for Fu-ture Joint Operations: Expanding Joint Vision2010 is �data collected from the environment andprocessed into a usable form.�12 Data is then de-fined as �representation of facts, concepts, or in-structions in a formalized manner suitable for com-munication, interpretation or processing byhumans or by automated means. Any representa-tions such as characters or analog quantities towhich meaning is or might be assigned.�13 Basedon these perceptions, an information attack uponan opposing force�s (OPFOR�s) systems result inthe disruption of its cognitive hierarchy. This isdone by targeting data�a processing function.This will directly affect higher-level functions suchas cognition and judgment.14

War in the Information Age outlines four basicforms of information that form the core uponwhich America�s information-age Army proce-dures and organizations will be built:l Content information is the simple inventory

of information about the quantity, location andtypes of items.l Form information is the descriptions of the

shape and composition of objects.

It is probably more useful to view twoforms of information existing based upon

message and processing considerations. Thefirst form, data, is raw, disorganized andunfiltered in nature. . . . The second form,

information, represents data which has beenfiltered and organized by human and electronicprocessors. Information represents a smaller,

but more valuable, resource pool than dataand is only as good as the validity of the data

provided and the sophistication of theprocessor involved.

Page 4: Information Operations and the Conduct of Land Warfare

7MILITARY REVIEW l September-November 1998

l Behavior information is three-dimensionalsimulation that will predict behavior of at leastphysical objects, ultimately being able to �wargame�courses of action.l Action information is the kind of information

that allows operations cells to take appropriate ac-tion quickly.15

The attack and defense of each of these fourforms of information could also fit into the IOmandate. More recently, three views of informa-tion prevail: �The first considers information interms of the inherent message, the second in termsof the medium of production, storage, transmissionand reception. The emerging third view tran-scends the former two; it speculates that informa-tion may be a physical property�as physical asmass and energy, and inherent in all matter.�16 Thefirst view generally complements the Joint Vision2010 processing definition based upon IO directedagainst data. It also seems to include information

which is viewed as �organized data��as opposedto raw data, which is disjointed in nature because ithas not been processed through some sort of filteringsystem. The second view, which is medium- orconduit-based, would appear to fall under the rubricof information systems rather than information.

The third view, based upon information as aphysical property, a structuralist perspective, pro-poses that �Information is as basic to physical real-ity as matter and energy�all material objects aresaid to embody not only matter and energy, butalso �information.� The spectrum for this viewruns from modestly regarding information as anoutput of matter and energy; to regarding informa-tion as equal in importance to matter and energy;to regarding information as even more fundamen-tal than matter and energy. Information, then, is anembedded physical property of all objects that ex-hibit organization and structure. This applies todirt clods as well as DNA strands.�17

US

Arm

y

The definition of information used in Concept for Future JointOperations: Expanding Joint Vision 2010 is �data collected from the environment and

processed into a usable form.� Data is then defined as �representation of facts, concepts, orinstructions in a formalized manner suitable for communication, interpretation or processing by

humans or by automated means, [and] any representations such as characters or analogquantities to which meaning is or might be assigned.� Based on these perceptions, an information

attack upon an OPFOR�s systems result in the disruption of its cognitive hierarchy.This is done by targeting data�a processing function.

A soldier receives raw voice dataand must �process it into a usableform� before retransmitting it byautomated means to both higherand lower headquarters.

Page 5: Information Operations and the Conduct of Land Warfare

8 September-November 1998 l MILITARY REVIEW

While this cutting-edge scientific view will havemany implications for future IO, in tandem withthe development of the new sciences of chaos andcomplexity theory and other post-mechanical andnonlinear disciplines, it will more heavily influ-ence the Army After Next (AAN) than the moreimmediate Army XXI.18

Over the next decade, it is probably more usefulto view two forms of information existing basedupon message and processing considerations. Thefirst form, data, is raw, disorganized and unfilteredin nature. The vast majority of battlespace infor-mation is gathered from human and electronic sen-sors. The second form, information, represents

data which has been filtered and organized by hu-man and electronic processors. Information repre-sents a smaller, but more valuable, resource poolthan data and is only as good as the validity of thedata provided and the sophistication of the proces-sor involved.19 Many information-specifictypologies can exist, including the previously men-tioned one based upon content, form, behavior andaction information.

The Concept for Future Joint Operations de-fines information system as: �Integrated systemsof doctrine, procedures, organizational structures,personnel, equipment, facilities and communica-tions designed to support a commander�s exerciseof command and control across the range of mili-tary operations, by collecting, processing, analyz-ing, archiving and disseminating information.�20

The current special forces definition representsa variation on this theme: �The personnel andequipment to manage, display, transport and dis-seminate information needed for rapid decisionmaking necessary for victory.�21 The mediumview mentioned earlier suggests that such a systemis composed of information production, storage,transmission and reception.

Probably the most useful way of defining a ge-neric information system is to recognize that itrequires seven basic components to minimallyfunction.22 These are sensors which provide data;processors who filter and organize it into informa-tion; receptors who utilize it; databases where data

and information are stored; transmitters who dis-seminate data and information; rules which definesystem operation and structure; and synergy whichallows a system to function better than the totalsum of its parts. These components are not mutu-ally exclusive. A receptor, for example, might be adecision maker or a trigger-puller or could just aswell be a sensor which has been provided withnew information concerning its sensing mission.What must also be recognized is that an individualsoldier or a tank and its crew can be thought of as aminiature information system form even thoughthe system which is being discussed in this articleapplies to Army XXI itself. An applied view ofIO is expressed in Figure 2. It provides the con-ceptual basis from which the conduct of ArmyXXI IO can be discussed.

Page 6: Information Operations and the Conduct of Land Warfare

9MILITARY REVIEW l September-November 1998

Army XXI IODerived from Figure 2, nine basic target sets ex-

ist in IO. These target sets can be applied againstthe popularized notion of the Clausewitzian trinityof a nation-state represented by its military, gov-ernment and people. By necessity, Army XXI IOwill focus upon the MIE. However, attributes ofthe informational environments belonging to thegovernment and its people will impact the successof Army XXI on the battlefield. Increasing Armyreliance on civilian Internet switches representsone example. If the Internet were disrupted byhackers, operating independently or in the employof a foreign government or criminal organizationwhile a military operation was in progress, infor-mation exchange between Army units could be-come severely disrupted. Another example can bederived from a recent incident. On 25 June 1998,the computerized reservation system belonging toAmerican Airlines went down for 3 hours for un-known reasons. Flight delays resulted whichranged from 15 minutes to 2 hours.23 Civilian car-riers provide the Army with an additional surgecapability to project its forces immediately. If thereservation systems of these carriers were targetedon an ongoing basis, the resulting chaos could dis-rupt such a surge capability, not to mention themassive problems it would generate for businessprofessionals and other air travelers.24

When specifically applied to the MIE, these ninetarget sets can be broken down into two derivedfrom information and seven derived from charac-teristics of information systems. Data obtained bysensors and information generated by processorscan be attacked in three basic ways�destruction,degradation and alteration. The destruction of dataand information is very straightforward�a stringof �0s� and �1s� representing bits of information iseliminated. Degradation of data and informationis the partial elimination of a string of �0s� and�1s� so that message gaps appear. Data and infor-mation alteration is the resequencing of a string of�0s� and �1s.�25

Data alteration. Of these three forms of attack,alteration is the most threatening but also the mostcomplicated to undertake. It can result in wrongdecisions and actions being made, while alsopolluting the data and information belonging to amilitary force. This can produce ambiguity withina force concerning the validity and reliability ofsections of its knowledge pool. For example, ifthe text of an on-line helicopter repair manual forthe AH-64D Longbow Apache were altered, lead-

ing to a disaster for either the helicopter crewmenor the ground crew, all on-line repair manualswould become suspect. Unless proofed line-by-line or, far more likely, reloaded from secure back-ups protected by strong firewalls or physical air-gaps, their use would be denied to Army per-sonnel. On the other hand, digital destruction re-sults in the erasure of data and information whichwould be quite obvious, would not result in faultyhelicopter repairs being made and is more easilysolved. Possibly a more insidious example wouldbe that of changing the dosage of medications for

Virtually all aspects of Armyoperations can be made more efficient viainformation technologies. In the case of

nonstate war in urban environments, �One ofthe major insights gained from the Russian

experience in Grozny concerns informationdominance. The importance of being able to

control broadcasting capabilities, suppressinflammatory information, influence attitudesand hamper or intercept information flow

within hostile elements was abundantly clear.Russian forces were unable to do these

things and suffered accordingly.

A.

Mo

rko

vkin

a,

So

lda

t U

da

chi

An unescorted RussianTV crew interviews soldiersduring the fighting in Chechnya.

Page 7: Information Operations and the Conduct of Land Warfare

10 September-November 1998 l MILITARY REVIEW

Army personnel or altering the information con-cerning the effects of prescribing two medicationstogether so that fatal or near-fatal combinationscould result.

Sensors, which range from close-in to stand-offforms, can be targeted by denying them data, alter-ing the data provided, disrupting their sensing

capabilities or destroying their capability to func-tion. Data denial focuses on electromagnetic sig-nature suppression and other techniques such asfrequency-hopping broadcasts so that sensors areunable to gather data. Data alteration allows sen-sors to obtain data that the OPFOR wants to be ob-tained. This could allow a tank to broadcast atruck signature and vice versa or create the illusionthat more forces exist than really do. Disruption ofsensing capabilities can be undertaken by provid-ing �noise� in the appropriate segment of the elec-tromagnetic spectrum to achieve a masking effector by the employment of obscurants which can beused to coat the surfaces of sensing devices, mak-ing them opaque to electromagnetic radiation.

Sensor destruction can be achieved physically, bytargeting them with conventional weaponry or bynonlethals such as destructive microbes, ornonphysically via electromagnetic pulse whichwould burn out their components.

Processors, both human and machine, can be at-tacked in order to degrade or influence analysisand decision-making functions. Providing proces-sors altered data, via the sensors of their informa-tion net, would be the most basic form of such anattack because skewed data input results in skewedinformation output. Machine processors can alsobe targeted by corrupting their algorithms with a virusor providing them, as in the case of expert systems,with contradictory instructions which can result inthe machine equivalent of a nervous breakdown.Humans, on the other hand, suffer greatly whenfaced with excessive ambiguity. If a human deci-sion maker, such as a foreign military commander,can be purposefully targeted in this regard, his orher analytical process will suffer. Further, humanshave a number of basic biological needs, such assleep, and if such needs can be denied to them forextended periods of time, their decision-makingcapabilities will become severely degraded.

Receptors are vulnerable to sender deceptionand can be made to either believe that informationbeing sent to them is false, as in the case of its ap-pearing to come from an OPFOR when it is com-ing from their own force, or that informationwhich is being sent to them is true, as in the case ofits appearing to come from their own force when itis actually coming from the OPFOR (spoofing). Inthe first instance, information is not being acceptedwhen it should be. In the second, information is

The Concept for Future JointOperations defines information system as:

�Integrated systems of doctrine, procedures,organizational structures, personnel, equipment,

facilities and communications designed tosupport a commander�s exercise of command

and control across the range of militaryoperations, by collecting, processing, analyzing,

archiving and disseminating information.�

Page 8: Information Operations and the Conduct of Land Warfare

11MILITARY REVIEW l September-November 1998

being accepted when it should not. Both forms ofsender deception can cause confusion and disrup-tion to the OPFOR. Anything from e-mail messagesto phone conversations to digital radio transmissionsto videotapes can be affected in this manner.

Databases represent the physical hosts and me-diums in which data and information are stored.This hardware is susceptible to physical and upper-tier nonlethal attack. While less sophisticated thantargeting data and information itself via cyberspace,database targeting will result in either informa-tional destruction or the denial of its use until data-base repairs are made or the surviving informationthey contain is salvaged and transferred to anotherdatabase.

Transmitters are representative of communica-tion devices and protocols and are highly suscep-tible to traditional forms of attack based upon elec-tronic warfare, jamming measures and precisionfires. As in conventional operations, this is one ofthe most desirable target sets to attack because itprovides the informational linkages within and be-tween military units.

Rules such as standing operating procedures, thelaws of war and military ethics moderate and regu-late warfare.26 Rules help to establish warfare as alegitimate form of organized political violence�an extension of politics by other means�betweensovereign states as opposed to mass murder, ethniccleansing, terrorism and other forms of criminalactivity waged by nonstate actors and illegitimatedespots. Western rules of war are easy to attackbecause they represent artificial political conven-tions. By removing their uniforms and militaryinsignia from their vehicles and mixing themselves inwith civilian populations, many non-Western forcesactively engage in applied IO against US forces.

Synergy in an information system results in amilitary force gaining battlefield advantage by fus-ing together the individual contributions of itscomponents into something greater than the sumof its parts. This synergy allows for faster OODA(Observe-Orient-Decide-Act) loops, reaction timesand decision cycles to take place. By understand-ing an OPFOR information system process, thissynergy can be attacked and degraded, disruptedor destroyed as an outcome of coordinated attacksupon the other IO target sets. As an example, thecomplete disruption of any one category of targetsets, such as transmitters, will cripple an informa-tion system. Attacking the proper combinations oftarget sets may also achieve this desired effect bycreating a cascading effect.

Based on the above typology, Army branchescan attack specialized parts of an adversary�s in-formation and information system, and also help toprotect their own assets. The tasking model usedby US Army Intelligence and Security Command(INSCOM) breaks down IO into those units/func-tions which defend information, attack informationand provide IO enablers as depicted in Figure 3.27

Such actions can be active or passive. A securefirewall between brigade networks would repre-sent a passive form of defense, while installingBlitzkrieg software, which recognizes hacking at-tempts and repels them, would be an active formof defense.28 The INSCOM model appears to bebut one approach to undertaking IO. Because this

The primary danger which exists withtraditionalist-school thinking is that of beinglulled into a false sense of security. Because

Army XXI will be so far in advance of its nearestcompetitors, it may become fashionable to

suggest that no one will ever be able to catch upto the Army in warfighting capacity. This would

assume that IO will remain subordinate toconventional operations over the long term.As a result, land warfare forces would retain

their current capabilities and continuallyrefine them.

XX

US

Arm

y R

ecr

uit

ing

Co

mm

an

d

Page 9: Information Operations and the Conduct of Land Warfare

12 September-November 1998 l MILITARY REVIEW

Page 10: Information Operations and the Conduct of Land Warfare

13MILITARY REVIEW l September-November 1998

concept is so new and dynamic, no general Army con-sensus exists in regards to which combat, support orservice branch should undertake which IO mission.

IO’s Competing ViewsTwo schools of thought exist in regard to IO�s

significance. The major perceptions of theseschools of thought are discussed below.

The force multiplier school. The operational con-cepts developed in Joint Vision 2010�dominantmaneuver, precision engagement, full-dimensionalprotection and focused logistics�are derived frominformation superiority and other joint warfightingcapability objectives. Information superiority,however, is the only objective which is integral toall four operational concepts.30 Such superiority isdefined as �the capability to collect, process, anddisseminate an uninterrupted flow of informationwhile exploiting or denying an adversary�s abilityto do the same.�31 This form of strategic guidanceallows Army XXI to become better at what it al-ready does, which is to seize terrain and destroyopposing conventional military forces belonging toother nation-states.

Such traditionalist concepts fully complementinitiatives to take the current mechanized force ofBradley Fighting Vehicles, Abrams tanks, Apache he-licopters and digitize them via appliqués. Wiredfighting vehicles, artillery and helicopters benefitfrom IO by means of sensors which can betteridentify OPFOR, thus minimizing the �fog of war�and providing dominant battlespace awareness.

An interactive �picture� will yield much moreaccurate assessments of friendly and enemy opera-tions within the area of interest. Although this willnot eliminate the fog of war, dominant battlespaceawareness will improve situational understanding,decrease response time and make the battlespaceconsiderably more transparent to those whoachieve it.32 If an enemy can be sensed, he canthen be fixed in time and space, and killed withprecision munitions or neutralized with nonlethalforce. These battlespace advantages will allowArmy units to project current combat power levelswith fewer personnel. Accordingly, the Armyheavy division size is being reduced from morethan 18,000 to just over 15,000 soldiers because ofefficiencies realized through information technolo-gies in logistics.33 It should be noted that this per-sonnel savings comes prior to a division digitiza-tion, slated to take place in 2000, and a corpsdigitization scheduled for 2004.34

Virtually all aspects of Army operations can bemade more efficient via information technologies.

In the case of nonstate war in urban environments,�One of the major insights gained from the Rus-sian experience in Grozny concerns informationdominance. The importance of being able to con-trol broadcasting capabilities, suppress inflamma-tory information, influence attitudes and hamper orintercept information flow within hostile elementswas abundantly clear. Russian forces were unableto do these things and suffered accordingly. Giventhe array of communications links�TV, radio, tele-phone, cellular phone, Internet . . . the challenge ofachieving information dominance is formidable.�35

Fortunately, in Bosnia, such mistakes wereavoided by Army and allied forces in Operation

Joint Endeavor. In fact, a well-coordinated infor-mation campaign based on public information (PI),psychological operations (PSYOP) and civil-military cooperation (CIMIC) was undertaken.36

Even with these many benefits, challenges existin regard to IO as a whole. One concern is how toget information to tactical units and back to com-manders. The older communications structure wasbuilt upon voice and low-speed data transmissions,while �the information component of future mili-tary operations will primarily be comprised ofcomputer data, imagery, video and much lessvoice commo than in the past.�37 Another chal-lenge may exist in regard to the potential formicromanagement by senior officers and juniorofficers becoming overloaded with too much informa-tion. Issues such as this will need to be exploredand solved if problems do arise. As an outcome ofdigitization, hierarchical thinking will be replacedwith a more networked approach to warfightingwhich will offer new opportunities in regard tofighting toward a common battlefield image butwill also result in potential dilemmas in regard to

[Data] alteration is the most threatening[form of attack] but also the most complicated toundertake. It can result in wrong decisions andactions being made, while also polluting the dataand information belonging to a military force.

This can produce ambiguity within a forceconcerning the validity and reliability of sections

of its knowledge pool. . . . On the other hand,digital destruction results in the erasure of dataand information which would be quite obvious,would not result in faulty helicopter repairs

being made and is more easily solved.

INFORMATION OPERATIONS

Page 11: Information Operations and the Conduct of Land Warfare

14 September-November 1998 l MILITARY REVIEW

the current organizational structure, with some forma-tions and possibly even rank structures no longer po-tentially needed as Army units get flatter.

What is known is that commercial technologywill begin to provide an increasing segment of the

hardware Army XXI will rely on. This exploita-tion of commercial technology will provide theArmy with many advantages in regard to technicalbreakthroughs but must be tempered with the real-ization that such technology can be bought on theglobal market by anyone.38 While the force multi-plication effects of IO are fully recognized, thecost of digitization is becoming an increasing con-cern. The US Marine Corps commandant statedthat his service cannot afford digitization and sug-gests that to a degree this may also be true for theArmy because of the declining defense budget.39

If this is the case, then Army XXI may ultimatelycomprise only selected divisions of the Army thatwill gain the full benefits IO will provide.40

The new capabilities school. It has become anaccepted fact that nonstate challengers and roguenation-states have no hope of taking on and defeat-ing the United States in conventional warfare. TheArmy is simply too good at what it does. Thedown side of ruling the battlefield is that our oppo-nents have no choice but to replace symmetricalwarfighting with asymmetrical counters. On aphysical level, our opponents are exploring newcombat capabilities based upon weapons of massdestruction. Nuclear, biological and chemicalweapons offer many possibilities, especially whenused by small terrorist cells which cannot be tracedback to their employers.

Our focus, however, is in regard to the digital orcyber dimension. IO allow criminal, guerrilla and

other rogue entities a new operational style whichpreviously did not exist. A force multiplication ef-fect is useless to such entities because they have notraditional combat power to multiply. Rather, IO inthis regard are more visionary in nature and representan asymmetric form of warfare based on what couldbe termed �weapons of mass disruption.�41 Thispotential has not gone unnoticed by government au-thorities with regard to the threat posed to our nation�sinfrastructure.42 A National Defense University re-searcher observed that �The implications of war-fare in the information arena are enormous. First,national homelands are not sanctuaries. They can beattacked directly, and potentially anonymously, byforeign powers, criminal organizations or nonnationalactors such as ethnic groups, renegade corpora-tions, or zealots of almost any persuasion. Tradi-tional military weapons cannot be interposed be-tween the information warfare threat and society.

�Second, even where traditional combat condi-tions exist (hostile military forces face one anotherin a terrain-defined battlespace), kinetic weaponsare only part of the arsenal available to adversar-ies. Indeed, electronic espionage and sabotage,psychological warfare attacks delivered via massmedia, digital deception and hacker attacks on theadversaries� command and control systems will beused to neutralize most traditional forces and allowconcentration of fire and decisive force at the cru-cial time and place in the battlespace.�43

Examples of this new operational style men-tioned in another National Defense University pa-per include:l A �trap door� hidden in the code controlling

switching centers of the Public Switched Networkcould cause portions of it to fail on command.l A mass dialing attack by personal computers

might overwhelm a local phone system.l A �logic bomb� or other intrusion into rail

computer systems might cause trains to be misroutedand, perhaps, crash.l A computer intruder might remotely alter the

formulas of medication at pharmaceutical manu-facturers, or personal medical information, such asblood type, in medical databases.l A concentrated e-mail attack might over-

whelm or paralyze a significant network.l An �info blockade� could permit little or no

electronic information to enter or leave a nation�sborders.44 For information concerning similar con-cepts, refer to Figure 4.

Conceptually, this form of warfighting can beconsidered a form of bond-relationship targeting�

Data denial focuses on electromagneticsignature suppression and other techniques

such as frequency-hopping broadcasts so thatsensors are unable to gather data. Data

alteration allows sensors to obtain data that theOPFOR wants to be obtained. This could allowa tank to broadcast a truck signature and vice

versa or create the illusion that more forces existthan really do. Disruption of sensing

capabilities can be undertaken by providing�noise� in the appropriate segment of theelectromagnetic spectrum . . . or by the

employment of obscurants.

Page 12: Information Operations and the Conduct of Land Warfare

15MILITARY REVIEW l September-November 1998

the links between things�as opposed to precisionstrike, which targets things themselves. A proposeddefinition for this form of operation is: �Ratherthan gross physical destruction or injury, the de-sired end state is to create tailored disruption within athing, between it and other things, or between it and itsenvironment by degrading or severing the bondsand relationships which define its existence.�45

Because Army special operations forces (SOF)do not rely upon forms of traditional combatpower as do conventional Army forces, it wouldseem that they would be more apt to view IO as anew capability rather than as a force multiplier likenonstate groups. If this is the case, they may beginto rely upon offensive IO as a primary means ofdisruptive attack against an OPFOR. Within thenext decade, lessons learned by Army SOF mayoffer little utility to conventional forces in this re-gard. However, what is now considered an uncon-ventional form of IW could become the new norm.

In addition to Army SOF, the employment of IOby private security corporations is another trendwhich must be considered. The Army�s recent de-cision to choose Internet Security Systems, Inc., todefend its cyber assets in over 400 US Army

facilities worldwide suggests that the private sectormay be more adept than traditional military institu-tions at waging war within higher-dimensionalbattlespace.46 This is an ominous trend becausecyberspace would ultimately help to undermine thewarmaking monopoly held by the nation-state�spublic institutions, as it is already doing to con-cepts of national sovereignty.

Land Warfare ImplicationsOf the two schools of thought previously dis-

cussed, the perception of IO as a force multiplierwill presumably dominate over the course of thenext decade or so within Army circles�out toabout 2010. Army XXI, by necessity, will exist intwo worlds�partially mechanical and partiallydigital. First, it will draw its firepower largelyfrom preexisting hardware that was designed forthe Cold War security environment.47 The hard-ware sunk costs and preexisting training and sup-port base dictate no less in an era of declining de-fense expenditures.

At the same time, most of the Army�s seniorleadership will still be traditionalist in its view ofthe influence of technology, especially information

US

Arm

y

Transmitters are representative of communication devices and protocols and are highlysusceptible to traditional forms of attack based upon electronic warfare, jamming measures and

precision fires. As in conventional operations, this is one of the most desirable target sets to attackbecause it provides the informational linkages within and between military units.

A 51st Signal Battalion soldier adjusts hissatellite dish before the VII Corps�offensive during Operation Desert Storm.

Page 13: Information Operations and the Conduct of Land Warfare

16 September-November 1998 l MILITARY REVIEW

technology, on the conduct of land warfare. Boltedonto this hardware will be information devices whichwill multiply its combat power and effectiveness.Given such a near-term scenario, IO will beviewed as a means to an operational end, that is, asa force multiplier for conventional operations andprobably not as a viable operational style in itself.

The primary danger which exists with tradition-alist-school thinking is that of being lulled into afalse sense of security. Because Army XXI will beso far in advance of its nearest competitors, it maybecome fashionable to suggest that no one willever be able to catch up to the Army in warfightingcapacity. This would assume that IO will remainsubordinate to conventional operations over thelong term. As a result, land warfare forces wouldretain their current capabilities and continually re-fine them.48 No basis exists to support such an as-sumption. Rather, it is suggested that IO may ma-ture to the point of becoming an operational stylein itself and/or fuse with conventional operationsto become a dual-dimensional operational hybridwhich is physically- and cyber-based. This matu-ration will develop primarily because of the devel-opment of asymmetric attempts of our opponentsat undermining Army XXI combat power, ArmySOF experimentation in these areas, growing pri-vate security IO capability and the recognition ofthese trends by senior Army leaders.49 This wouldresult in the development of a whole new battle-field upon which the AAN, rather than Army XXI,will be more suited to function.50

This perception brings up two land warfare is-sues which need to be studied further with regardto IO. The first concerns the impact of advanced tech-nology and concepts on land warfare. Do such tech-nologies and concepts tend to get designated as forcemultipliers by the dominant army of the era (the

winners) to allow it to do what it does even better?This would be in contrast to such technologies andconcepts being designated as a new form of opera-tions by inferior armies or groups (the losers) whohave no stake in the prevailing military status quo.

A historical example of this phenomenon is rep-resented by the tank�s development in the 1920sand 1930s. For the Allies in World War II, thetank was early on considered an infantry supportweapon which provided mobile firepower, hencea force multiplier, rather than a key element of anew operational concept which was developed bythe German army. Another example of this phe-nomenon would be the development and employ-ment of functional field artillery, coupled with thelevee en masse and other innovations by the Frencharmy during its revolutionary wars of the late 18thand early 19th centuries. This �loser� army of thelate Absolutist Age went on to redefine warfarebetween the armies of nation-states because it sawthe advanced technology and concepts which haddeveloped as the basis of new operations and notas a force multiplier as did its competitors.

The issue of advanced technology and conceptseither as a force multiplier or as the basis of newoperations will heavily impact our future Army. Itwill likely result in the development of a secondissue�when, and if, the Army should organize it-self around qualitatively new operational styles. Aspreviously mentioned, IO as a force multiplier willpresumably dominate conventional Army forcethinking to about 2010. From 2010 on, however,IO as a real operational style in itself and/or as part ofthe basis of a dual-dimensional operational hybridwill begin to make itself more pronounced. Thetime frame from 2010 to 2025 may thus become acritical period for Army planners. It will representthe last vestiges of Cold War-influenced combathardware mated to digital appliqués and the intro-duction of qualitatively new systems which pos-sess organic informational abilities and the newoperational capabilities they will provide.51

In the short term, however, the future looksbright with regard to the transition from Force XXIto Army XXI and continued Army land warfaredominance with the addition of IO as a force multi-plier. The Army is second to none as a land powerforce in a traditional battlefield setting with con-ventional arms and tactics. However, this recog-nized invulnerability is both a blessing and a banebecause, as discussed earlier, America�s opponentswill ultimately attempt to turn IO into the Army�sAchilles� heel. MR

Dominant maneuver, precisionengagement, full-dimensional protection and

focused logistics�are derived from informationsuperiority and other joint warfighting capabilityobjectives. Information superiority, however, isthe only objective which is integral to all fouroperational concepts. . . . Such traditionalist

concepts fully complement initiatives to take thecurrent mechanized force of Bradley Fighting

Vehicles, Abrams tanks, Apache helicopters anddigitize them via appliqués.

Page 14: Information Operations and the Conduct of Land Warfare

17MILITARY REVIEW l September-November 1998

Robert J. Bunker is an adjunct professor, the National Security Studies program, California State Uni-versity, San Bernardino, and professor, Unconventional Warfare, American Military University, ManassasPark, Virginia. He holds a Ph.D. in Political Science from Claremont Graduate University. He was aspeaker at the Institute of Land Warfare Professional Education Program at the Association of the US Army(AUSA) annual meeting, Washington, DC, 14-16 October 1996, and presented this article at an educationforum during AUSA�s annual meeting in October 1998. He is a frequent MR contributor and book re-viewer. His article �Failed-State Operational Environment Concepts� appeared in the September-October1997 edition of Military Review. Additionally, he has published numerous articles and reports in otherprofessional military journals and government publications, and has served as a consultant to both militaryand law enforcement agencies. He was a speaker at the Ninth Annual Strategy Conference, Strategic Stud-ies Institute, US Army War College, Carlisle Barracks, Pennsylvania, 31 March-2 April 1998.

1. For a complete listing of documents related to information operations (IO) oncompact disc, see Land Information Warfare Activity at <http://www.sytexinc.com/cdrom/background/pubs.htm>. For an excellent set of annotated information war-fare references compiled by Daniel E. Magsig, go to <http://carlisle-www.army.mil/usacsl/org/iw/tutorial/intro.htm> and click on �References.�

2. James M. Dubik, Creating Combat Power for the 21st Century, Land WarfarePaper No. 25 (Arlington, VA: The Institute of Land Warfare, Association of the UnitedStates Army, October 1996).

3. Robert A. Heinlein, Starship Troopers (New York: G.P. Putnam�s Sons, 1959).4. William Gibson, Johnny Mnemonic (New York: Ace Books, 1995).5. Headquarters, Department of the Army, US Army Field Manual (FM) 100-5,

Operations (Washington, DC: US Government Printing Office [GPO], 14 June 1993).6. TRADOC Pamphlet 525-5, Force XXI Operations: A Concept for the Evolution

of Full-Dimensional Operations for the Strategic Army of the Early Twenty-First Cen-tury (Fort Monroe, VA: US Army Training and Doctrine Command, 1 August 1994),Glossary-4.

7. FM 100-6, Information Operations (Washington, DC: GPO, 27 August 1996).Access via <http://www.atcs-army.org/cgi-bin/atdl.dll/query/download/fm/100-6/fm100-6.zip>.

8. Cited in MG John D. Thomas Jr., commander, US Army Intelligence and Secu-rity Command, �Impact of Information Operations for the Force XXI Army� (Fort Belvoir,VA: US Army Intelligence and Security Command), briefing slides presented at theAssociation of the United States Army Symposium and Exhibition, �The Role of Spe-cial Operations Forces in Information Operations� Pinehurst, NC, 7 April 1998.

9. US Department of Defense. Department of Defense Directive�Supplement(DODD-S) 3600.1, Information Operations, 9 Dec 96.

10. Later Army perceptions fall within the Joint Vision 2010 conceptual umbrella.See Army Vision 2010 at <http:www.army.mil/2010/>.

11. DODD-S 3600.1.12. Joint Chiefs of Staff, Concept for Future Joint Operations: Expanding Joint Vi-

sion 2010 (Fort Monroe, VA: Joint Warfighting Center, May 1997), 85. Derived fromJoint Publication 6-0, Doctrine for Command, Control, Communications and ComputerSystems Support to Joint Operations.

13. Ibid., 83. Approved DOD terminology.14. Ibid., 85.15. GEN Gordon R. Sullivan and COL James M. Dubik, War in the Information

Age (Carlisle, PA: Strategic Studies Institute, US Army War College, 6 June 1994),18. Derived from William H. Davidow and Michael S. Malone, The Virtual Corporation(New York: HarperCollins Publisher, 1992), 67-72.

16. John Arquilla and David Ronfeldt, Chapter Six, �Information, Power, and GrandStrategy: In Athena�s Camp�Section 1,� John Arquilla and David Ronfeldt, eds., InAthena�s Camp: Preparing for Conflict in the Information Age (Santa Monica, CA: Na-tional Defense Research Institute, RAND, 1997), 144-45.

17. Ibid., 148.18. For an overview of the challenges these sciences and disciplines may pose

for the Army After Next, see Robert J. Bunker, Five-Dimensional (Cyber) Warfighting:Can the Army After Next be Defeated Through Complex Concepts and Technologies?(Carlisle, PA: Strategic Studies Institute, US Army War College, 10 March 1998).

19. This typology draws from �The �Information Pyramid� from Two Views,� JohnArquilla and David Ronfeldt, Chapter Nineteen, �Looking Ahead: Preparing for Infor-mation-Age Conflict,� In Athena�s Camp, 448.

20. Joint Chiefs of Staff, Concept for Future Joint Operations, 86.21. BG John R. Scales, deputy commander, US Army Special Forces Command

(Airborne), �Information Operations� (Fort Bragg, NC: US Army Special Forces Com-mand (Airborne), briefing slides presented at the Association of the United States ArmySymposium and Exhibition, �The Role of Special Operations Forces in Information Op-erations� Pinehurst, NC, 8 April 1998.

22. This basic information system typology was created for use in this article. Aweakness found in IO literature is the lack of a standard model. Another method ofanalysis uses information processing based on the OODA loop concept for offensiveand defensive IO. See MAJ T. Eipp, A Concept for Information Operations (ConceptsDivision, Marine Corps Combat Development Command, 15 May 1998). Access at<http://138.156.107.3/concepts/home.htm>.

23. Associated Press, reporting from Fort Worth, Texas, Thursday, 25 June 1998.24. On a daily basis, information attacks are becoming more common. In late May,

hackers hit US Army computers and altered a command�s Web site. Before that, India�snational security computer network was raided for nuclear weapons secrets. The FBIhas reported that from February to June, half a dozen substantial attacks have takenplace in the United States. See �Hackers Hit U.S. Military Computers,� Associated Press,6 June 1998; and Patrick Connole, �FBI unit reports �substantial� cyber attacks,� Reuters,11 June 1998.

25. This example is at the binary level. Other examples of data and informationalteration include video morphing, voice cloning and e-mail spoofing.

26. With regard to some of the ethical and conceptual problems involved in IO,see Bradley Graham, �Authorities Struggle to Write the Rules of Cyberwar: Conse-quences of Using Computers as Weapons Are Largely Unexamined,� Washington Post,8 July 1998, A1.

27. Matrixing the information/information system typology used in this paper withthe INSCOM model represents a future avenue of research which is beyond the scopeof this paper.

28. George I. Seffers, �Inventor Spawns �Electronic Ebola� for Info War,� DefenseNews, 15-21 June 1998, 1, 27. See also Army Times, 28 June 1998, 27.

29. Reprinted from MG John D. Thomas Jr., commander, USAINSCOM, �Impactof Information Operations for the Force XXI Army,� briefing slides (presented at AUSA

Symposium, �The Role of Special Operations Forces in Information Operations,� 7 April1998).

30. Joint Chiefs of Staff, Concept for Future Joint Operations, 33.31. Ibid., 35.32. Joint Chiefs of Staff, Joint Vision 2010 (Fort Monroe, VA: Joint Warfighting

Center, July 1996).33. Daniel M. Verton, �High-tech warriors, high-tech wars: the services extend IT

from digital warriors to digital logistics,� Federal Computer Week, 29 June 1998; andJason Sherman, �Bulking Down,� Armed Forces Journal International, July 1998, 32-34. A controversy concerning proper division size exists. See Richard J. Newman, �Ren-egades finish last: A colonel�s innovative ideas don�t sit well with the brass,� U.S. News& World Report, 28 July 1997, 35.

34. �Washington Watch: Army will fix computer problems.� AUSA News, June1998, 21.

35. John E. Greenwood, �Editorial: Coping with Urban Crises,� Marine Corps Ga-zette, June 1998, 2.

36. See Pascale Combelles Siegel, Target Bosnia: Integrating Information Activi-ties in Peace Operations (Washington, DC: DOD Command and Control ResearchProgram [CCRP], Institute for National Strategic Studies, National Defense University,January 1998).

37. Quote attributed to MG Michael W. Ackerman, USA, Chief of Signal. See JimTice, �Sending the Right Signal/Information as a Weapon,� Army Times, 18 May 1998.

38. George Cahlink, �Army After Next Will Rely on More Commercial Technology,�Defense Daily, 30 June 1998.

39. Editorial, �Two-War Strategy? Modernize, Expand or Give Up,� Aviation Weekand Space Technology, 29 June 1998, 70.

40. Besides cost concerns, technical considerations exist. As an example, the ForceXXI Battle Command, Brigade and Below (FBCB2) system may not be operational intime for the fielding of the 4th Infantry Division as the First Digitized Division in FiscalYear (FY) 2000. See Bryan Bender, �Tests May Delay Fielding of First US DigitisedForce,� Jane�s Defence Weekly, 8 July 1998.

41. �Weapons of mass disruption� is an advanced battlespace term based uponbond-relationship targeting considerations. Traditionalists who see this threat view apotential cyber attack as a weapon of mass destruction, which is an inaccurate defini-tion. See George I. Seffers, �NSA Chief Ups Info War Ante: Says Cyber Attack on U.S.is Weapon of Mass Destruction,� Defense News, 29 June-5 July 1998, 1, 36.

42. The Report of the President�s Commission on Critical Infrastructure Protection,Critical Foundations: Protecting America�s Infrastructures (Washington, DC: GPO,October 1997).

43. David S. Alberts, The Unintended Consequences of Information Age Technolo-gies (Washington, DC: The Center for Advanced Concepts and Technology, Institutefor National Strategic Studies, National Defense University, April 1996), 27-28.

44. For the primary references to these examples, see Lawrence T. Greenberg,Seymour E. Goodman and Kevin J. Soo Hoo, Information Warfare and InternationalLaw (Washington, DC: The Center for Advanced Concepts and Technology, Institutefor National Strategic Studies, National Defense University, January 1998), 3-5.

45. Robert J. Bunker, �Higher Dimensional Warfighting: Bond-Relationship Targetingand Cybershielding.� Parameters. Draft under consideration.

46. Business Editors, �U.S. Army Selects Internet Security Systems� Intrusion De-tection Technology to Protect Critical Networked Information,� Business Wire, 7 July1998.

47. It has been stated that the Longbow Apache has been designed and built forthe digital age. The AH-64A fleet came into being in FY 1984. The AH-64D Modern-ization began delivery in 1997. The Apache attack helicopter is a transitional systemwhich was conceived during the Cold War and has now been upgraded. See �NewsCall: The Longbow Apache Introduces the Army�s Digital Age,� ARMY, June 1998, 57;and McDonnell Douglas Helicopter Systems Pamphlet, Team Apache Modernization:Lifting the Fog of War (Mesa, AZ: Undated).

48. This would mean that speed and precision would be considered the dominantcharacteristics of future warfare. These mechanical perceptions are in variance withemergent nonlinear/post-mechanical sciences.

49. Part of this perceptional shift may include Army XXI warfighting doctrine focusingon who is the �right� enemy. See Dubik, Creating Combat Power for the 21st Century, 7.

50. A number of visions concerning this battlefield are discussed in the papersdelivered at the US Army War College Ninth Annual Strategy Conference, �Challeng-ing the United States Symmetrically and Asymmetrically: Can America be Defeated?�31 March-2 April, 1998. Go to the Strategic Studies Institute (SSI) Homepage at <http://carlisle-www.army.mil/usassi/welcome.htm> for further information.

51. In regard to proposed small-arms capabilities, see Robert I. Widder, ed., Re-port on the Results of the Future Small Arms Conclave �Blue Sky��2020, ContractNo. DAAL03-91-C-0034 (Arlington, VA: Battelle Crystal City Operations 9-10 Septem-ber 1997). This conference took place at Picatinny Arsenal, NJ, under the sponsor-ship of the Joint Service Small Arms Program (JSSAP).

52. Derived from �Module 6: IW Weapons� of the US Army War College Informa-tion Warfare Tutorial. Posted by the Knowledge Engineering Group, Center for Strate-gic Leadership. This module and the tutorial itself can be accessed at: <http://carlisle-www.army.mil/usacsl/org/iw/tutorial/intro.htm>. It is a condensation of materialpresented through an advanced course dedicated to information warfare taught by NSAVisiting Professor Robert J. Minehart Jr. The tutorial represents an unclassified ver-sion of the advanced course. (Notice: Due to the sensitive nature of this section, theterms presented are proposed by open-source [nongovernmental] authors. The ex-amples offered should be considered only as concepts to stimulate your thoughtson �what-if� possibilities. This presentation neither confirms nor denies the exist-ence of such weapons).

NOTES

INFORMATION OPERATIONS