133 research outputs found

    A Value Function Approach to Information Operations MOE\u27s: A Preliminary Study

    Get PDF
    A value focused thinking approach is applied to information operations. A preliminary value hierarchy for information operations is constructed by extracting the values of senior military leadership from existing doctrine. To identify these key values for information operations, applicable existing doctrine was reviewed and summarized. Additionally, hierarchical representations of the values represented within each reviewed doctrine are developed. A value hierarchy requires that supporting objectives be mutually exclusive and collectively exhaustive. Within this analysis, these requirements are enforced, in part, by developed definitions which serve as tests to maintain mutual exclusivity. An exhaustive set of supporting values is also guaranteed by identifying a spanning set of values that directly support the overall objective of information operations. This preliminary value hierarchy serves as the basis for continuing research. The implications for this research include the construction of a prescriptive model in which the effectiveness of current and future systems can be assessed on a common scale. Further, the effectiveness of developing technologies can be assessed and the value of these technologies determined with respect to the values of senior military leadership. With this, the value of holes in our suite of information warfare systems can also be assessed in terms of their effectiveness in fulfilling the values of military leadership

    A MODERN GREAT WALL: PRC SMART CITIES AND THE A2/AD IMPLICATIONS FOR AFSOC

    Get PDF
    The People’s Republic of China’s (PRC) proliferation of smart cities—integrated, government-controlled urban surveillance networks—has increased the persistent stare of surveillance technologies globally. While the place of smart cities in strategic competition has been studied, the capability of PRC smart cities to achieve military ends like Anti-Access/Area-Denial (A2/AD) has yet to be explored by Air Force Special Operations Command (AFSOC). The structure and capabilities of PRC smart cities reveal potential A2/AD threats and exploitation opportunities for AFSOC. Using the Integrated Air Defense System (IADS) as a model, this study suggests that PRC smart cities can function as IADS-like weapon systems, with a dispersed network of surveillance technologies integrated via a centralized control layer. PRC smart cities could produce at least two A2/AD threats to AFSOC: denial of aircraft entry to airspace and suppression of logistics and sustainment requirements (e.g., electricity and fuel). Conversely, AFSOC can exploit PRC smart cities using cyber-attacks—such as distributed denial of service and software manipulation—to preserve access and placement. This thesis concludes that AFSOC should pursue two lines of effort by investing in both: “living off the grid” independent of smart city infrastructure and new cyber technologies and tactics for Suppression of Enemy Information Systems—actions to disturb smart city command and control—to combat and exploit PRC smart cities.Major, United States Air ForceApproved for public release. Distribution is unlimited

    Secure ADS-B: Towards Airborne Communications Security in the Federal Aviation Administration\u27s Next Generation Air Transportation System

    Get PDF
    The U.S. Congress has mandated that all aircraft operating within the National Airspace System, military or civilian, be equipped with ADS-B transponders by the year 2020. The ADS-B aircraft tracking system, part of the Federal Aviation Administration\u27s NextGen overhaul of the Air Transportation System, replaces Radar-based surveillance with a more accurate satellite-based surveillance system. However, the unencrypted nature of ADS-B communication poses an operational security risk to military and law enforcement aircraft conducting sensitive missions. The non-standard format of its message and the legacy communication channels used by its transponders make the ADS-B system unsuitable for traditional encryption mechanisms. FPE, a recent development in cryptography, provides the ability to encrypt arbitrarily formatted data without padding or truncation. Indeed, three new algorithms recommended by the NIST, may be suitable for encryption of ADS-B messages. This research assesses the security and hardware performance characteristics of the FF1, FF2, and FF3 algorithms, in terms of entropy of ciphertext, operational latency and resource utilization when implemented on a Field-Programmable Gate Array. While all of the algorithms inherit the security characteristics of the underlying AES block cipher, they exhibit differences in their performance profiles. Findings demonstrate that a Bump-in-the-Wire FPE cryptographic engine is a suitable solution for retrofitting encryption to ADS-B communication

    FROM FLIGHT LINES TO HEADLINES: HARNESSING TACTICAL AIR FORCE INFORMATION WARFARE FOR STRATEGIC EFFECTS

    Get PDF
    The current United States Air Force (USAF) information operations (IO) force posture, which operates predominately at the operational level with a small portion integrated at the tactical level within Special Operations Wings (SOW), is not distributed to effectively exploit the informational aspects of military activities. This research highlights the criticality of integrating IO officers across the levels of warfare, emphasizing their potential in conventional tactical units. This research analyzes the untapped synergy of IO, Agile Combat Employment (ACE), and air advising and finds that their integration demonstrates how integrated deterrence can be operationalized. Moreover, the study reveals discrepancies between doctrinal prescriptions and operational realities, which have led to impractical and occasionally inaccurate interpretations of how IO is employed in practice. In response, this research recommends revising the roles and functions of IO officers to align more closely with operational realities. Finally, the research advocates instilling an IO practitioner mindset across the force, emphasizing the significance of cognitive resilience—the capacity to counter foreign malign influence—as a fundamental function of IO. These recommendations aim to fortify the USAF’s tactical integration of IO, ensuring a more dynamic and resilient force capable of addressing the complexities of modern conflict.Approved for public release. Distribution is unlimited.Captain, United States Air Forc

    TEXTS, TWEETS, AND TACTICAL STRIKES: RUSSIAN INFORMATION WARFARE METHODS AND IMPLICATIONS FOR THE UNITED STATES AND NATO

    Get PDF
    The character of warfare is constantly evolving, beset by friction and clouded with relentless ambiguity. This study explores the rapidly changing operational environment through a focused analysis of the Kremlin’s military adventurism in Georgia, Syria, and Ukraine. This recently escalated conflict, encompassing the largest front on the European continent unseen since the Second World War, provides valuable insights into the complexity of warfare’s changing character. Specifically, the Kremlin’s evolving approach to Information Warfare reveals a proliferation of new technologies and means that seek to contest the information domain, maximize uncertainty, and paralyze the decision-making ability of their adversaries. This thesis addresses the following questions: 1) What new technological capabilities has the Kremlin employed to create psychological effects and disrupt decision-making at tactical and operational levels? 2) How effective are these methods, and how do they fit within a broader concept of Information Warfare? In addressing these questions, this research will trace the Kremlin’s post-2008 reforms and determine what enduring aspects of Russian Information Warfare (namely cyber, unmanned systems, and EMSO) tell us about the current operational environment. Finally, this research demonstrates how these observed methods may shape the future battlespace, and what wider tactical and operational implications these threats pose to the U.S. and her strategic partners.Major, United States Marine CorpsApproved for public release. Distribution is unlimited

    IPv4 to IPv6 transition : security challenges

    Get PDF
    Tese de mestrado integrado. Engenharia Informática e Computação. Faculdade de Engenharia. Universidade do Porto. 201

    The Future Role of Strategic Landpower

    Get PDF
    Recent Russian aggression in Ukraine has reenergized military strategists and senior leaders to evaluate the role of strategic Landpower. American leadership in the European theater has mobilized allies and partners to reconsider force postures for responding to possible aggression against NATO members. Although Russian revisionist activity remains a threat in Europe, the challenges in the Pacific for strategic Landpower must also be considered. At the same time, the homeland, the Arctic, climate change, and the results of new and emerging technology also challenge the application of strategic Landpower. This publication serves as part of an enduring effort to evaluate strategic Landpower’s role, authorities, and resources for accomplishing the national strategic goals the Joint Force may face in the next conflict. This study considers multinational partners, allies, and senior leaders that can contribute to overcoming these enduring challenges. The insights derived from this study, which can be applied to both the European and Indo-Pacific theaters, should help leaders to consider these challenges, which may last a generation. Deterrence demands credible strategic response options integrated across warfighting functions. This valuable edition will continue the dialogue about addressing these issues as well as other emerging ones.https://press.armywarcollege.edu/monographs/1959/thumbnail.jp

    An Analysis of Factors That Have Influenced the Evolution of Information Assurance from World War I through Vietnam to the Present

    Get PDF
    This study is an exploratory historical analysis of the factors that have influenced the evolution of military Information Assurance (IA) programs from World War I to the present. Although the term IA has recently been widely used throughout the Information Resource Management field (IRM), evidence indicates that information and information systems protection mechanisms were used during every U.S. Military conflict. This research proposes to increase the body of knowledge within the information systems management field by exploring the areas related to Information Assurance (IA) and the ultimate goal of U. S. Defensive Information Warfare. I found that significant events related to the protection of information and information systems security led to certain levels of IA being explored throughout each U.S. Military conflict. The evaluation of these events provides key information that reveals a common approach to IA throughout history and supports the identification of key concepts that have influenced this evolutionary process and shaped the role of IA in current military operations, with indicators of how it may be used in the future

    Maintaining Information Dominance in Complex Environments

    Get PDF
    There are many risks to the U.S. Army’s command and control (C2) operations and to its intelligence and information warfare (IW) capabilities. The challenges include: significant uncertainty; sudden unexpected events; high noise and clutter levels in intelligence pictures; basic and complex deceptions exercised through a variety of channels; the actions of hidden malign actors; and novel forms of attack on U.S. and allied command, control, communications, computers, information/intelligence, surveillance, targeting acquisition, and reconnaissance (C4ISTAR) systems. If the U.S. Army is to secure and maintain information dominance in all environments, it must exploit complexity and uncertainty in the battlespace and not simply seek to overcome it. Innovation requires that new ideas are considered, and that old ideas should be robustly challenged. To achieve and maintain information dominance, the U.S. Army will also require a significant injection of innovation, a robust and resilient C2 and intelligence capability, novel technologies and an accelerated information operations capability development program that is broad, deep, sustained and well-coordinated. Furthermore, once information dominance is achieved, maintaining it will demand continuous change and development.https://press.armywarcollege.edu/monographs/1390/thumbnail.jp
    • …
    corecore