08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

date, military opponents have been Cold War armies, the armies of Third World<br />

countries, or insurgents—all with outdated military equipment.<br />

The US military does have an organization with tremendous cyber<br />

capability. It is the Defense Information Systems Agency (DISA) that performs<br />

many computer security functions for the armed forces. DISA’s website notes<br />

that it is a combat support agency responsible for planning, engineering,<br />

acquiring, fielding, and supporting global net-centric solutions to serve the<br />

needs of the President, Vice President, the Secretary of Defense, and other<br />

DOD components, under all conditions of peace and war. The DISA website<br />

states that the organization<br />

Provides a seamless, secure and reliable web of communications<br />

networks, computers, software, databases, applications and other<br />

capabilities that meet the information processing and transport needs of<br />

DOD. DISA also ensures the integration and interoperability of<br />

command and control, communications, computers and intelligence<br />

(C4I) systems. 38<br />

This organizational mission does not mention responsibility for the<br />

manipulation, perception, recruitment, mobilization, and fear and intimidation<br />

capabilities of insurgents. Rather the focus is on CNO activities such as<br />

processing information, integrating systems, and ensuring computer security.<br />

Overall, the military’s approach is more specific than the civilian<br />

approach, and it exploits traditional concepts (however the US military is<br />

currently updating its information operations doctrine to include several new<br />

components). Information security, the worldwide information grid and<br />

infrastructure, information attacks, and information operations are part of the<br />

information lexicon of the military. The US military does, of course, utilize<br />

numerous cyber influence concepts in its day-to-day activities. They just don’t<br />

refer to them as such. Before and during combat in Iraq these activities<br />

involved the use of emails and the Internet to convey messages and intentions.<br />

Still, the military would describe these events as information and not cyber<br />

operations.<br />

Over the past decade the definition of IO has evolved and taken on new<br />

elements and new meaning. Even today, however, uncertainty as to what is<br />

meant by the term and what it can do for the commander remains. This<br />

38 See Defense Information Systems Agency website at<br />

http://www.disa.mil/main/about/missman.html<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!