08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER FIFTEEN: CONCLUSIONS<br />

Terminology, Unintended Consequences, and Other Issues<br />

It is the author’s hope that this work has induced some creative<br />

thinking on the part of the reader concerning current US IO theory and practice<br />

in order to make recommendations to align it with the current environment. It is<br />

not the goal of the author to engage in further polemics on IO or the term<br />

Information Age. It appears certain that militaries around the world will<br />

continue to use the IO paradigm and societies the Information Age paradigm.<br />

But hopefully this work’s examination of our environment has pointed out<br />

other ways to view our evolving world.<br />

The first conclusion of this work is that current US military<br />

information operations terminology and doctrine are inadequate to confront the<br />

cyberbattlefields and cyber-related theories that have emerged over the past ten<br />

years. US IO doctrine writers would benefit by studying cyber-related concepts<br />

more closely and by adding more cyber-related concepts to their doctrinal base.<br />

This would also remedy the divide in terminology between civilian and military<br />

theorists. Such studies and additions would provide a more comprehensive<br />

analysis of contemporary scenarios and may better prepare the military for<br />

conflict management issues.<br />

At the start of the 1990s or earlier, the world enjoyed a surge in the<br />

ability to obtain and share information. Caught up in the excitement of the<br />

moment, analysts began to talk about the advantages of the Information Age.<br />

But as noted in Chapter One, many Internet definitions of “Information Age”<br />

describe it as the use of computers. Computers and networks form the basic<br />

infrastructure of current society. They are the work horses that provide access<br />

to the information which we use and crave. More appropriately, then, we live in<br />

a Cyber Age and not in an Information Age.<br />

Further, there has always been an “information threat” whether it be<br />

perception management, deception, or pure manipulation of data. There hasn’t<br />

always been a “cyber threat” which is yet another indicator of why IO is the<br />

wrong term. A term like “cyber operation” would be a more appropriate term as<br />

would the term “Cyber Roadmap.” Satellites, sensors, computers, networks,<br />

and other devices may pass information, but these are cyber devices, not<br />

information devices. The Cyber Age is what is new. We should be discussing<br />

the GCP (Global Cyber Process) instead of the GIE (Global Information<br />

Environment). A GPS “produces” information, but it is based on the GCP. The<br />

vision of the Federal Communications Commission is to focus on digital<br />

268

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!