History and - PowerPoint PPT Presentation

1 / 28
About This Presentation
Title:

History and

Description:

History and Evolution of IO Prepared by the Joint IO Center – PowerPoint PPT presentation

Number of Views:51
Avg rating:3.0/5.0
Slides: 29
Provided by: ehu80
Category:

less

Transcript and Presenter's Notes

Title: History and


1
  • History and
  • Evolution of IO

Prepared by the Joint IO Center
2
Learning Objectives
Origins of IO
Historical applications
IO Today
What is different?
Why is it important?
3
Information OperationsFocus
Actions taken to affect adversary information
and information systems. . .
Systems, people, facilities supporting
information- dependent functions
Attacks take many forms physical, cyber,
psychological, etc.
4
The IO Battlefield
Info systems critical to military operations
Now
Our present theory is to destroy personnel, our
new theory should be to destroy command. Not
after the enemys personnel has been
disorganized, but before it has been attacked,
so that it may be found in a state of
disorganization when attacked. J.F.C. Fuller
Memorandum Strategic Paralysis as the Objective
of the Decisive Attack, 1918
5
History
IO
Supporting and secondary
Civil War
World War I
World War II
Vietnam
Somalia
IO
Primary and fully integrated
Desert Storm
6
American Civil War
7
World War I
8
World War II
Strategic attacks against infrastructure
Double-edged sword of Enigma
Communications jamming
C2 targets - John Waynes radioman
Deception critical to success of first fully
integrated plan - 1940s technology
9
Vietnam-Tet Offensive
Who won the Tet Offensive?
North Vietnam victorious in the long run
10
The Cold War
Can be viewed as a technology contest won by the
West for many reasons. . .
  • One of which was the USs demonstrated
    technological superiority and ability to conduct
    a coherent information campaign (PSYOP and
    deception).

11
Desert Storm
The first Information War
Coordinated planning for EW, OPSEC, deception,
PSYOP, destruction
Targeting against leadership and military C2
12
Somalia
Turning around your high-powered, fully wired
expeditionary force in Somalia with a single,
30-second videoclip. - Weaponry by CNN
13
Desert Storm
Strong evidence to support Desert Storm as first
US offensive info war
Less evidence exists that defensive IO was given
much consideration by either side
Post-war analysis highlighted numerous serious
exploitable IO deficiencies with coalition forces
OSD, JCS, and service IO functions were created
14
Desert Storm
Patriot missile hits SCUD
Iraq lost the war before it even began. This was
a war of intelligence, EW, command and control,
and counterintelligence. Iraqi troops
were blinded and deafened. . .Modern war can be
won by informatika and that is now vital for
both the US and the USSR. LtG Bogdanov,
Chief of the General Staff, Center for
Operational and Strategic Studies, Oct 1991
15
Afghanistan
The mission of destroying missile sites and arms
depots is almost the easy part. The critical task
is to continue to reshape the information
environment and target points of fracture in the
opposition. P.W Singer, Foreign Policy Studies
16
Is IO THAT Important?
Revolution in Military Affairs or Buzzword du
jour?
17
Information Technology Revolution
INFORMATION TECHNOLOGY, specifically the use
of COMPUTERS and NETWORKING, is a worldwide
revolution affecting every aspect of human life
from industry to government to entertainment.
18
Information TechnologiesWhat is Different?
Geography
is changing.
There are few geographical boundaries in the
information infrastructure.
Target access points are changing and may not be
in geographical proximity to the target.
The military can no longer create and control the
battlespace
19
Information TechnologiesWhat is Different?
TECHNOLOGY
is changing.
Technology leadership shifting from military to
civilian sector
Info technology inexpensive and readily available
Impact of computers and networking
Electromagnetic spectrum (including satellites)
and landline
20
Information TechnologiesWhat is Different?
21
Information TechnologiesWhat is Different?
Technology is rapidly moving - outpacing controls
Must anticipate the future to stay ahead (18
month life cycle - or less)
Demand for real time, highly reliable,
manageable information
22
New Age
Information
Industrial
Legacy support institutions are becoming less
relevant All support is under examination for
relevancy Military organizations and other
existing institutions under scrutiny (NSA, CIA,
etc...)
23
IO - Lucrative Tool
No Quick Fixes
Many Targets
Anonymous Adversaries
Uncertain Responsibilities
Simple Technology
Deterrence Infrastructure Resiliency
Poorly Defined Remedies
(Takes a licking and keeps on ticking)
Ambiguous Law
24
Challenges Immediate
No common vocabulary
Responsibilities are widely scattered
Issues extend beyond DoD
Intelligence system challenged
IW traditional methods are ineffective
Defense ignored or focused on classified systems
25
Challenges Long Term
Technologies are revolutionizing. . .
Information collection, processing, dissemination
Command control
Conduct of operations
Requires development of. . .
Expanded collection means
New doctrine (supported by training
education)
Must make correct decisions about investments in
information technologies and human capabilities
26
Potential Threats
Information technologies are available to all
(and many are interested)
No rear area in IO
As US reliance on information grows the threat
becomes more complex, sophisticated, clandestine

Rapid introduction of advanced technologies
brings increased capability to adversaries
Information can be our vulnerability as well as
our strength.
27
Thats Whats NewHow Does All This Impact JIOC?
28
SummaryKey Points
IO
Not a new concept (origins in writings of Sun
Tzu circa 300 BC). However the Information Age
elevates it to a new level.
Information Age technologies are revolutionizing
military operations. However legacy information
systems remain and must be considered in mission
planning.
Dependence on Information Age technologies
creates new vulnerabilities. (Use leads to
dependence which creates vulnerabilities.)
Write a Comment
User Comments (0)
About PowerShow.com