05495nam 2200709Ia 450 991022010150332120200520144314.00-8330-7886-0(CKB)2550000001039437(EBL)1365200(SSID)ssj0000860741(PQKBManifestationID)11450730(PQKBTitleCode)TC0000860741(PQKBWorkID)10897008(PQKB)10616492(MiAaPQ)EBC1365200(Au-PeEL)EBL1365200(CaPaEBR)ebr10678750(OCoLC)824512636(EXLCZ)99255000000103943720130111d2013 uy 0engur|n|---|||||txtccrRedefining information warfare boundaries for an Army in a wireless world /Isaac R. Porche III ... [et al.]1st ed.Santa Monica, Calif. RAND[2013]1 online resource (240 p.)Rand Corporation monograph series"Arroyo Center.""Prepared for the United States Army."0-8330-5912-2 Includes bibliographical references (p. 135-142).Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Background; The Army's Role in Cyberspace; What Is Cyberspace?; Environments; Domains; Information Environment; Cyberspace Defined; Cyber-Electromagnetic/Cyber-Electronic Operations; Purpose; Approach; How This Monograph Is Organized; CHAPTER TWO The Information Environment and Information Warfare; The Information Environment; The U.S. Department of Defense View of the Information Environment; Components of the Information Environment; Information WarfareA Definition Debate over the Term; Functional Areas That Compose Information Warfare; The Terms Cyber-Electronic and Cyber-Electromagnetic; CHAPTER THREE The Problem with Information Operations; How Information Operations Are Defined; How Information Operations Are Organized in the Army; Problems with the Current Definition; Misunderstandings and Disagreements; Problems with the Current Organization; Lack of Common Vision for Information Operations; Vision 1: Base Case; Vision 2: Information Operations as a Coordinating and Integrating FunctionVision 3: Information Operations as Command-and-Control Warfare Vision 4: Information Operations as Influence Operations; Vision 5: Information Operations as Advocacy; Vision 6: Information Operations as Everything; Information Operations as a Moving Target; CHAPTER FOUR Redefining and Reorganizing Information Operations; Key Questions and Answers to Guide a Redefinition of Information Operations; Discussion on the Role of IO; Confusion over the Terms Operation and Integration; The Need for Advocacy; What Is Being Integrated, Advocated, or Executed?; Key Capabilities Need to Be IncludedAvoid Long Lists of Capabilities to Define IO Arguments Can Be Made That IO Is Everything; Discussion of Possible Ends to Be Sought; The List of Relevant Capabilities Remains Too Long to Be Useful; Pros and Cons of a Narrow Set of Ends; Information Tasks as Potential Ends; Influence as an End; Command-and-Control Warfare; A Proposed Definition of Information Operations; Proposed Definition; IIO and ITO: Compartmentalizing the Definition; CHAPTER FIVE How Electronic Warfare Overlaps with Other Areas; Analysis of Electronic Warfare and Electromagnetic Spectrum OperationsRelationship of Intelligence Capabilities to Electronic Warfare and Cyberspace Operations Signals Intelligence, Electronic Warfare, and Electromagnetic Spectrum Operations; Electronic Warfare and Signals Intelligence; Relationship Between Electronic Warfare and Cyber Operations; Approach: A System Consideration of Cyber Operations; Electronic Warfare as Fielded Today; Chapter Summary and Conclusions; CHAPTER SIX Overlaps Between Public Affairs and Military Information Support Operations; Comparing Public Affairs and Military Information Support Operations; Public AffairsMilitary Information Support OperationsThe U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U.S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.Rand Corporation monograph series.Information warfareUnited StatesMilitary doctrineUnited StatesComputer networksSecurity measuresUnited StatesPlanningCyberspaceSecurity measuresUnited StatesInformation warfareMilitary doctrineComputer networksSecurity measuresPlanning.CyberspaceSecurity measures355.3/43Porche Isaac1968-942259Paul Christopher1971-904747Arroyo Center.MiAaPQMiAaPQMiAaPQBOOK9910220101503321Redefining information warfare boundaries for an Army in a wireless world2126274UNINA