June 24, 2009 in Department of Defense
Cyberspace and its associated technologies offer unprecedented opportunities to the United States and are vital to our Nation’s security and, by extension, to all aspects of military operations. Yet our increasing dependency on cyberspace, alongside a growing array of cyber threats and vulnerabilities, adds a new element of risk to our national security. To address this risk effectively and to sccure freedom of action in cyberspace, the Department of Defense requires a command that posscsses the required technical capability and remains fbcused on the integration or cyberspace operations. Further, this command must be capable or synchronizing wartIghting effects across the global security environment as well as providing support to civil authorities and intemnational partners.
June 23, 2009 in U.S. Army
The 11 Star Memo, signed in 2005 By CGs FORSCOM, AMC and TRADOC also addressed this gap with specific recommendations to “Realign CONUS DOIMS from IMA to NETCOM for a more unified support similar to OCONUS; optimize C2 for IT management; provide central oversight for IT resources and support; provide MACOMs single POC; and provide adequate investment in DOIM operations” CSA has specifically directed that “ protecting the Army’s networks is not just G6 or G3 business, but rather it is Cdr’s business at all levels (MSG 161304Z Aug 04). Yet, there is no single commander responsible for security and quality of service ensuring CONUS LWN capabilities are prioritized and available to support warfighting, business, and intelligence domains. And, no one is responsible to represent the Information Needs of the Unit and User through all Operational Phases and ensure access to the global collaborative environment.
June 2, 2009 in Congressional Research Service
This report describes the emerging areas of information operations, electronic warfare, and cyberwar in the context of U.S. national security. It also suggests related policy issues of potential interest to Congress. For military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance. The use of technology to both control and disrupt the flow of information has been generally referred to by several names: information warfare, electronic warfare, cyberwar, netwar, and Information Operations (IO). Currently, IO activities are grouped by the Department of Defense (DOD) into five core capabilities: (1) Psychological Operations, (2) Military Deception, (3) Operational Security, (4) Computer Network Operations, and (5) Electronic Warfare. Current U.S. military doctrine for IO now places increased emphasis on Psychological Operations, Computer Network Operations, and Electronic Warfare, which includes use of non-kinetic electromagnetic pulse (EMP) weapons, and nonlethal weapons for crowd control. However, as high technology is increasingly incorporated into military functions, the boundaries between all five IO core capabilities are becoming blurred.
May 19, 2009 in Documents, Joint Chiefs of Staff
Care should be taken to protect the quality of information available for friendly decisions and public dissemination. This will ensure the JFC has accurate information by not allowing staffs to unknowingly perceive the joint task force’s (JTF’s) MILDEC efforts as accurate information. This will also ensure the information made public by the JFC is not part of any MILDEC action and lose the public’s trust.