08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

If this is the key assumption of the roadmap, and IO theory in general,<br />

then we have been wasting lots of time and money. Information has always<br />

been the key ingredient of our operating environment, as essential as the air we<br />

breathe. Highlighting the importance of information in this manner underscores<br />

a problem with US military culture—it is composed of a lot of elements, and<br />

one of these is unintended soundbites. Often, however, we fail to look beyond<br />

the tip of the last letter in the bite and question its utility or authenticity. We<br />

accept terms at face value when we should be questioning or reevaluating them<br />

often. We simply can’t become prisoners to the theory of unquestioning<br />

acceptance. Appendix Two of this work, an article on the US soundbite<br />

“asymmetric warfare,” demonstrates this fact more explicitly and shows that<br />

other nations do not understand the term asymmetric warfare as the US does. In<br />

fact, there are almost as many definitions of asymmetric warfare as there are<br />

teachers and writers describing it.<br />

Due to our terminology and paradigm faults, our military analysts may<br />

have missed several of the cyber-associated issues of this decade such as<br />

cybermobilization, cyberrecruiting, and cybermanipulation. Instead our analysts<br />

are focused on the more traditional terms of operational security, PSYOP,<br />

deception, and electronic warfare as core capabilities and the baggage inherent<br />

in them. Only computer network operations (CNO), the fifth core capability, is<br />

relevant and able to describe the complexity of the current operating<br />

environment. Unfortunately, the US military examines CNO primarily from an<br />

attack and defend paradigm. Of more relevance would be new terms such as<br />

CYOP (the mix of psychological operations and cyber capabilities),<br />

CYFORMATION (the union of computers and information), CYTRONIC (the<br />

integration of computers and electronics), and other related terms. The “cy”<br />

prefix indicates the Cyber Age (the ability of computer chips to allow us to<br />

access and share information) and distinguishes it from just the use of<br />

information. Such a designation would help us extricate ourselves from the<br />

information paradigm. The complexity and richness of cybernetics disappears<br />

in the term IO which is far too simplistic to represent all that is happening.<br />

The ability of insurgents to cybermobilize their compatriots is key to<br />

understanding some of their success. Mobilization is the foundation for an<br />

insurgency as laid out in US insurgency doctrine, yet we very seldom, if ever,<br />

discuss this idea. Focus is on the offensive aspect of an insurgency. Are we<br />

overlooking these areas and concepts due to our reliance on the wrong<br />

paradigm? One would think so. Our troops in Iraq, facing an environment much<br />

more complex than this simple explanation, are certainly affected by it.<br />

It is not, of course, that the other four IO capabilities do not involve<br />

digital processes. On the contrary, the author recognizes, and is amazed by, the<br />

270

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!