Abstract

Conclusions * All of various elements and components of national information power, from Command and Control Warfare (C2W) through Military Information Warfare (IW) to Strategic Information Operations (IO) build upon each other to provide fullest use of information as an element of national power. * The existing DOD definition of IW is dysfunctional: a better concept is to consider IW as those offensive and defensive warfighting actions in or via information environment to control or exploit it. * The existing DOD definition of IO is also dysfunctional: a better concept is to consider IO as the range of military and government operations to protect and exploit information environment. * Together they provide national information power, the broadest range of military, governmental and civilian information capabilities that enable national-level exploitation and dominance of information realm. Changing Definitions The seemingly endless series of changes in official DOD definition of information warfare--a different one in each of three years School of Information Warfare & Strategy has existed--reflects lack of conceptual certainty about what IW is and where it fits into range of elements of national power. The fact that there is no universally-accepted understanding of IW is certainly no surprise, given its newness; for comparison, ask a group of military officers to define strategic airpower or maneuver and you'll get a variety of answers, even though these have been exercised for most of this century. The intent of this paper is to suggest an approach that leads to an understanding of not just IW, but how it fits into full range of national information power. Command and Control Warfare: C2W The Chiefs of Staff published Memorandum of Policy (MOP) 30 in March 1993, defining and establishing guidelines for Command and Control Warfare, or which is perhaps best understood as strategy that implements IW on battlefield. This is IWOs basic building block, its foundation in a sense, and it incorporates a range of operations military understands quite well. The five elements or pillars of C2W are Psychological Operations (PSYOP), Operational Security (OPSEC), Deception, Electronic Warfare (EW), and physical destruction of vital C2 nodes. Because first three of these have been recognizable elements of warfare since biblical times, question that immediately comes to mind is whats new about C2W? The answer involves several words, including stovepipes, synergies, and integration. Stovepipe activities have largely been conducted by small and isolated groups of little known and frequently less well-regarded specialists, so there was little coordinated effort to integrate them into a unified whole and build on synergies between them. This approach forfeited much of advantage that could have been gained by integrating these operations, such as relationship between psychological operations, deception, and operational security. The fundamental intent of MOP 30 (rescinded in early 1997) and now Pub 3-13.1, Joint Doctrine for C2W, is to break down stovepipes and integrate various elements of C2W so that their synergies and relationships can be magnified. One of hallmarks of C2W is that it can be conducted in any or all of different warfighting environments--land, sea, air, outer space, even cyberspace--by any or all of military services. The objective of C2W is incapacitation of enemy's military C2 function, by operations against enemy's C2 target set and protection of one's own. The targets can be physical: such as a command center, communications switching system, or planning cell; or cognitive: such as morale and fighting spirit of enemy forces, or enemy commander's knowledge of friendly forces. …

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.