Presentation is loading. Please wait.

Presentation is loading. Please wait.

Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.

Similar presentations


Presentation on theme: "Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT."— Presentation transcript:

1 Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT

2 Previous Slide TRADOC DCSINT Opposing Force Operations FM OPFOR FM Opposing Force: Operations Chapter 5 Information Warfare

3 Previous Slide TRADOC DCSINT Information Warfare Concepts Information infrastructure –Majority nonmilitary –Global information infrastructure (GII) –National information infrastructure (NII) –Defense information infrastructure (DII) Blurred boundaries –Instruments of power –Nations/individuals/organizations –Tactics/operations/strategy Perception management –Spin information to OPFOR advantage

4 Previous Slide TRADOC DCSINT

5 Previous Slide TRADOC DCSINT Information Warfare Concepts Information Warfare Concepts (Continued) Technology role –Exponential growth State investment –Creating IT R&D base –Actively pursues external sources Technology vulnerability –Non-hardened COTS systems Neutralizing IT superiority –Extraregional force reliance on IT –OPFOR tool of choice is IW

6 Previous Slide TRADOC DCSINT Information Warfare Concepts Information Warfare Concepts (Continued) New targets –Critical information infrastructure Ease of operations & low cost –IW weapons inexpensive

7 Previous Slide TRADOC DCSINT Elements of IW Electronic warfare (EW) Computer warfare Deception Physical destruction Protection and security measures Perception management Information attack (IA)

8 Previous Slide TRADOC DCSINT IW Elements IW Elements Electronic Warfare Goals to control electromagnetic spectrum Employs lethal and nonlethal methods Focus on enemy C 2 systems Goals to control electromagnetic spectrum Employs lethal and nonlethal methods Focus on enemy C 2 systems

9 Previous Slide TRADOC DCSINT IW Elements IW Elements Computer Warfare Attacks focus on computer systems, networks, and/or nodesAttacks focus on computer systems, networks, and/or nodes IncludesIncludes –Hacking –Malicious software –Deceptive information Conducted prior to and during military actionConducted prior to and during military action TRADOC DCSINT

10 Previous Slide TRADOC DCSINT IW Elements IW Elements Deception Designed to mislead the enemy Includes Physical decoys Electronic devices Operational activities Multispectral effort “ In wartime, truth is so precious that she should always be attended by a bodyguard of lies.” -- Sir Winston Churchill

11 Previous Slide TRADOC DCSINT IW Elements IW Elements Physical Destruction Destroys enemy information infrastructureDestroys enemy information infrastructure Methods includeMethods include –Artillery –Rockets –Missiles –Aviation –SPF/insurgents/terrorists Integrated with other IW activityIntegrated with other IW activity Destroys enemy information infrastructureDestroys enemy information infrastructure Methods includeMethods include –Artillery –Rockets –Missiles –Aviation –SPF/insurgents/terrorists Integrated with other IW activityIntegrated with other IW activity

12 Previous Slide TRADOC DCSINT IW Elements IW Elements Protection and Security Measures Protects OPFOR information infrastructure Includes –Information collection, processing, & utilization –Reconnaissance and counterreconnaissance –Information and operations security –Camouflage, concealment, cover, & deception –Force protection –Secure use of information collection & processing systems

13 Previous Slide TRADOC DCSINT IW Elements IW Elements Perception Management Creates perception of truth that furthers OPFOR objectives Uses PSYWAR to influence attitudes and behaviors Manipulates media and other neutral players

14 Previous Slide TRADOC DCSINT Iraq 1972 – North Vietnam Media Manipulation Media Manipulation Examples

15 Previous Slide TRADOC DCSINT IW Elements IW Elements Information Attack Attacks focus on intentional disruption or distortion of information Involves: –Altering or stealing data –Forcing a system to perform a function for which it was not intended Critical infrastructure targets include telecommunications links and switches, electrical grids, commercial infrastructures, economic infrastructures, etc Attacks focus on intentional disruption or distortion of information Involves: –Altering or stealing data –Forcing a system to perform a function for which it was not intended Critical infrastructure targets include telecommunications links and switches, electrical grids, commercial infrastructures, economic infrastructures, etc

16 Previous Slide TRADOC DCSINT Tools of IW Physical destruction means Electronic destruction means Malicious software Denial-of-service attacks News agencies TV/radio/Internet Print media Communication networks Diplomatic activities Reconnaissance /espionage /eavesdropping technologies

17 Previous Slide TRADOC DCSINT Targets of IW Decision makers Weapons Hardware Critical information infrastructure C 2 systems Information & telecommunications systems C 2 centers & nodes National communications media Transmitters Communication devices Communication protocols

18 Previous Slide TRADOC DCSINT Strategic IW The State controlling/manipulating information events in the strategic environment Attacks enemy critical infrastructures information base Strategic Integration Department develops strategic information warfare plan Chief of IW on the General Staff handles IW functions

19 Previous Slide TRADOC DCSINT Operational-Level IW Supports strategic campaigns and operational objectives Focus is on affecting enemy’s LOCs, logistics, C 2, and critical decision-making processes Targets information or information systems – both human or automated

20 Previous Slide TRADOC DCSINT Operational-Level IW Operational-Level IW Offensive IW Seeks to deny, degrade, destroy, disrupt, deceive, and exploit enemy’s information systems Helps OPFOR seize the initiative Forces enemy commander to be reactive Slows enemy tempo & disrupts decision cycle

21 Previous Slide TRADOC DCSINT Operational-Level IW Operational-Level IW Defensive IW Protects and defends OPFOR information and information systems Conceals locations of critical information systems Detects attacks Portrays false OPFOR information

22 Previous Slide TRADOC DCSINT IW Planning & Execution IW ElementObjectivesTargets Electronic WarfareExploit, disrupt, deny, and degrade the enemy’s use of the electromagnetic spectrum. C 2 and RISTA assets and networks. Computer WarfareDisrupt, deny, or degrade the enemy’s computer networks and information flow. C 2 assets and networks (both civilian and military). DeceptionMislead enemy decision makers. Cause confusion and delays in decision-making process. Persuade adversary’s population and international community to support OPFOR objectives. Key decision makers from political, military, economic, and diplomatic elite. General population and international media sources and Internet sites.

23 Previous Slide TRADOC DCSINT IW Planning & Execution IW Planning & Execution (Continued) IW ElementObjectivesTargets Physical DestructionDestroy enemy’s information infrastructures (both civilian and military). C 2 nodes and links, RISTA assets, telecommunications, and power sources. Protection and Security Measures Protect critical assets.Enemy RISTA assets. Perception Management Distort reality or manipulate information to support OPFOR goals. RISTA assets, media sources (international and domestic). Information AttackObjectives vary based on situational needs and objectives of the attack. Computer networks, software, hardware, telecommunications, power sources, and any other electronic source or conduit of communication or information.

24 Previous Slide TRADOC DCSINT Strategic Context Strategic Context Strategic Operations IW used in peace and war Critical IW elements include perception management, deception, and protection & security measures IW targets include –Key leaders/decision makers –Media –Diplomatic entities –Private organizations –Public opinion –National will –Coalition members

25 Previous Slide TRADOC DCSINT Strategic Context Strategic Context Regional Operations Focus on foreign perception of operations and preventing international intervention Internal campaign directed at national will IW elements dominating include EW, IA, protection & security measures, and perception management

26 Previous Slide TRADOC DCSINT Strategic Context Strategic Context Transition Operations Focus on access-control operations, perception management & deception campaigns, and protection & security of IW assets Deception conceals course of transition Paramount goal to preserve instruments of power & prepare for adaptive operations Internal IW addresses reasons for transition operations & national will International IW popularizes State actions

27 Previous Slide TRADOC DCSINT Strategic Context Strategic Context Adaptive Operations Information campaigns, IA, EW, & physical destruction focused on extraregional threats Target enemy will and international opinion Leverage international media Internal efforts censor & manipulate media

28 Previous Slide TRADOC DCSINT Information Warfare Information Warfare Summary Information warfare concepts Elements of IW Tools of IW Targets of IW Strategic IW Operational-level IW IW Planning Strategic context


Download ppt "Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT."

Similar presentations


Ads by Google