Building a basis for information warfare Rules of Engagement.
e-Document
Building a basis for information warfare Rules of Engagement.
Copies
0 Total copies, 0 Copies are in, 0 Copies are out.
The U.S. armed forces face a global information threat which could launch an attack without warning. This surprise attack could damage the U.S. armed forces ability to mobilize, deploy and control forces worldwide. The attack will use the global information infrastructure to target the information based processes the U.S. armed forces utilize to dominate the entire spectrum of conflict. To protect information based processes, U.S. armed forces joint operational planners are building plans to defeat and possibly attack information based threats. This monograph discusses how the U.S. armed forces should regulate the defensive and offensive responses to information attack with Rules of Engagement. After defining several terms, this monograph illustrates the gravity of the threat the U.S. armed forces face in the information spectrum. The proliferation of computers and networking is creating a huge underclass of IW warriors bent on destroying, manipulating, and stealing information. While past IW threats were curious 'hackers,' the modem IW environment is encompassed by over 18 countries currently pursing active IW attack and defense programs. Dealing with a threat requires operational planners recognize that information is rapidly becoming the center of gravity for military operations. This monograph proposes IW planners build IW ROE that extends maximum protection to information by protecting key information systems and infrastructure. Additionally, IW ROE should also allow the U.S. armed forces to autonomously implement retaliatory or pre-emptive self defensive actions to counter any information based threat. After describing the areas IW ROE should carefully consider, the monograph examines the inadequacies of purely defensive IW policies, centrally controlled IW attack response, and the legal, historical, and theoretical justification for retaliatory and preemptive IW ROE. This monograph concludes by recommending the US develop a national information policy, military information strategy, and single DoD focal point for IW. A national information policy outlines legal, political, and moral constraints for military operations. A military information strategy translates national policies into concrete objectives for operational planners to build upon Finally, a single focal point for IW affairs facilitates cohesive IW attack and defense plans by combining all IW affairs under one agency.
  • Share It:
  • Pinterest