08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Civilians, on the other hand, are not so limited in their application of<br />

cyber capabilities and thus have a broader palette of options for describing new<br />

events. The military has no way to address the myriad number of terms such as<br />

manipulation, mobilization, recruiting, squatting and at least a hundred other<br />

“cyber” word combinations. It is important that the military address this crucial<br />

shortcoming in its theory because these cyber-related actions affect the military.<br />

As documented in the conclusion, this shortcoming has affected the US military<br />

in Iraq even when the event occurs far from Iraq. For example, Omar Bakri<br />

Mohammed, an extremist London cleric, recently used live broadcasts on the<br />

Internet to call the young to Jihad. 44 In effect he is relying on cyber-based<br />

technologies to conduct cybermanipulation, cyberrecruiting, and<br />

cybermobilization activities that will affect our forces on the battlefield.<br />

Some armies use different information terminology, however, and<br />

define terms that the US has avoided. A Russian information operation, for<br />

example, does not consist of the same elements as a US military information<br />

operation. It only has two core capabilities, information-technical and<br />

information-psychological. In addition, Russian theorists define in detail the<br />

term “information weapon”—a term the US does not define.<br />

Regarding a Chinese perspective on information operations, one need<br />

only look at the writings of renowned Chinese IO expert Shen Weiguang. He<br />

noted<br />

Information has become as strategic a resource as material and energy.<br />

The information industry has become a national pillar industry, and<br />

information elements have become the most important production<br />

elements…it is necessary to establish a world information security<br />

committee to organize the research and control of information warfare<br />

theory, technology, and equipment as well as information security<br />

issues. 45<br />

Shen has also recommended the development of rules of engagement<br />

for the current environment and the requirement to begin discussion on<br />

developing the theory of information deterrence. Clearly other nations are<br />

examining IO with criteria that differ from the US. They also appear stuck in<br />

the lexicon of the past.<br />

44 Sean O’Neil and Yaakov Lappin, “Britain’s Online Imam Declares War as He Calls<br />

Young to Jihad,” timesonline.co.uk, 17 January 2005.<br />

45 Shen Weiguang, “Checking Information Warfare—Epoch Mission of Intellectual<br />

<strong>Military</strong>,” Jiefangjun Bao [PLA Daily Newspaper], 2 February 1999, p. 6 as translated<br />

and downloaded from the FBIS website on 2 February 1999.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!