Friday, December 2, 2011

New Definitions for Information Operations

Ever since I began studying information operations (IO) five years ago, I have been frustrated with the definitions. Too many are bureaucratic non-definitions, often circular in nature. "The Office of Special Studies conducts studies that are special." What is 'special'? "Special refers to studies, particularly those carried out by the Office of Special Studies." You get the idea.

Perhaps most frustrating is the fact that the five "core capabilities" of Information Operations overlap terribly. Nor are they all really capabilities. Electronic warfare (EW) pertains to the physical waves of radios, radar, etc; it is a medium (or, to be more specific, operations in a given medium). Likewise, computer network operations (CNO) pertains to a medium. But military deception (MILDEC) and operational security (OPSEC) are both activities , which can be carried out in a varied of media. Psychological operations (PSYOP) are defined as operations by the military to convey information to a foreign audience to influence it. Again, that is an activity, and arguably one that encompasses MILDEC. Thus, if one hacks into an enemy computer to plant bogus information which will deceive him, one is engaging in CNO, MILDEC and PSYOP all at once.

It may be time to return to the drawing board. What, at the most fundamental level, is IO? Let me propose that its primary realm is the mind of the enemy. This makes it distinct from intelligence which, most fundamentally, pertains to our own mind and what we know (and adding to that body of knowledge).

There are really only two things we can do to the enemy's mind: we can convey information to it, or we can withhold information from it. We may be trying to make him feel fearful, over-confident or ignorant; we may be trying to make him attack the wrong location or hold back from attacking all together. But IO contains only two fundamental activities for accomplishing all those missions and more: we can convey information or withhold it.

Withholding information is conceptually simpler, so we will deal with it first. There are two basic means of withholding information: (1) preventing the enemy's eyes and ears from collecting it and (2) preventing its effective communication to headquarters.

Preventing collection can be either passive or active. Passive collection prevention means employing security, that is, metaphorically (or sometimes literally) building fences. Security includes computer firewalls (part of computer network defense, or CND), background checks, ID cards and a host of other measures designed to prevent the enemy from getting close to information he might like to obtain. Active collection prevention involves targeting enemy attempts to collect information. This can include physical destruction of enemy satellites or reconnaissance craft, but it can also include the capture or turning of enemy agents, which is the realm of counterintelligence (CI). CI often makes use of knowledge about the enemy - intelligence - to improve its collection prevention capabilities; if you know the enemy spy is coming, it is much easier to arrest him.

Preventing enemy communication can take a variety of forms: physical destruction of communications infrastructure, jamming of enemy signals (EW), or destroying enemy computer networks with viruses (a form of computer network attack - CNA).

While there are many forms of withholding information, this activity is relatively straight-forward. More complex is conveying information to the enemy. One of the reasons for this is that while the enemy's ignorance is almost always an obvious good for us, his possession of information - be it true or false - requires a more complex plan. Moreover, IO can also target third parties that are not necessarily enemies, including neutral nations or populations under enemy governments.

There are two ways of dividing means by which information is conveyed to the enemy. The first schema for thinking about this involves the true/false/partly true division. (This should not be confused with white, black and grey propaganda, terms which refer to the stated source of propaganda, rather than its contents.) Any body involved in conveying information may convey truthful messages; on the other hand, certain organizations - such as the Peace Corps and Voice of America - do not knowingly convey falsehood, since doing so would undermine their basic mission. While outright deception certainly has its utility, half-truths are often more useful, and must always be used to support deception.

The other method of dividing means of information conveyance is by medium. To some extent these media correspond to the IO "core capabilities".  Electromagnetic waves are clearly the realm of EW, while the bits and bytes of computer information belong to CNO.  Physical observation of troop movements may be prevented by OPSEC, or exploited by MILDEC.  Words and images (carried via leaflets or broadcasts) may be conveyed by PSYOP as well as non-IO entities.  Although such functions as White House press conferences are not primarily concerned with IO,  they should be planned in coordination with a larger IO strategy to ensure consistency.

At the very top of this hierarchy of definitions lies a question about which we have said relatively little: What do we want the enemy to do? That is why IO tries to get inside the enemy's head in the first place. The answer to that question will vary from one situation to the next, but it is the essential question. Closely related to it is a second: What do we want the enemy to think? The answer to the first question may be that we want the enemy to attack a position which he cannot take, suffering major losses in the process. If that is what we want him to do, we will try to accomplish that end by making him think that our position is weaker than it is. Around this we build an IO strategy, both denying and conveying information. We capture his spies and jam his radar so he cannot see the true strength of our position. We also release some true information about the presence of certain commanders elsewhere, suggesting that the units they command are not located at the position in question. Moreover, we also convey false information, suggesting that our forces are thin, perhaps because we believe the enemy will attack elsewhere.

These various categories and definitions are not perfect. Counterintelligence, for example, can gain useful information from turned enemy agents, and thus belongs to the field of intelligence as well as IO. Furthermore, CI can be used both to deny the enemy information as well as to convey information to him.

In spite of this and other shortcomings, I think this schema has much to offer. It provides a logical hierarchy of functions which allow for clear understanding of inter-locking roles. A tactical PSYOP unit may drop leaflets or conduct shows of military force, but both are methods of conveying information to the enemy, and both require some understanding of how the enemy processes information in order to craft effective messages. An emphasis on what IO does and how it does it, rather than how the Pentagon divides it into boxes, may allow for more flexible operations in the field and better outcomes for our IO commanders.


Pictured is an EC-130 Commondo Solo aircraft of the 193rd Special Operations Wing, used for propaganda broadcasts.  Picture via FlightSchoolList.com.

Wednesday, May 4, 2011

US-Indian Relations in the Post-bin Laden World

This morning's FT reports that Osama bin Laden's neighbors in Abbottabad knew his house contained highly conservative residents, among them both Afghan refugees and Arabic-speakers. Moreover, locals knew that the house's residents bought food in large quantities at a time, had a taste for foreign beverages, burned all their trash and refused to allow their servants to hold second jobs with other employers. How did this not raise red flags? One neighbor, Jehangir Khan, reports that security in the area is heavy: “People are frequently asked to produce their national identity cards.” The case that Pakistan's intelligence is incompetent or complicit grows ever stronger.

Meanwhile, the discovery of Osama bin Laden deep in Pakistan, far from the Afghan border, is likely not only to sour US-Pakistani relations, but also - by extension - to strengthen US-Indian relations. Relations between the world's two largest democracies, though sometimes rocky (as in the case of India's recent rejection of US fighter planes), have general been positive in themselves; complications have primarily arisen from US support to Pakistan. If (or when) that support tapers off, US relations with India will likely continue to improve.

So where might we expect, or hope, for future US-Indian cooperation? Four areas come to mind:

  • Anti-piracy operations. We have already seen the Indian Navy take strong actions against Somali pirates. Likewise, the Indian Navy is already active in the Strait of Malacca. The US takes keen interest in the freedom of the seas, particularly in these two regions. Look for growing collaboration between US and Indian forces here.

  • Burma. The US has long tried to isolate the Burmese military junta, but a shift in US strategy and signs of possible change in the regime mean we can expect greater engagement in the future. India, by virtue of its border with Burma, has historically taken a more pragmatic approach to the Burmese junta. As American and Indian views converge, expect greater diplomatic and development cooperation.

  • Terrorism. India's single greatest terrorist enemy is Lashkar-e-Taiba (LeT), whose primary aim is to drive India out of Kashmir. While the US is more interested in al-Qaeda, particularly Al-Qaeda in the Islamic Maghreb (AQIM) and Al-Qaeda in the Arabian Peninsula (AQAP), LeT is connected to the international network of Islamic terrorists, and thus the US and India have a common interest in fighting these forces. That Pakistan's ISI has often been a link in this chain complicates US-Indian cooperation, but if American ties to Pakistan decline, the door is opened for greater counterterrorism coordination.

  • Africa. India has strong ties to Africa, particularly with such important nations as Ethiopia, Nigeria and South Africa. Given its historic participation in the Non-Aligned Movement, India enjoys a degree of trust on the African continent which is rarely afforded to the United States. India will be careful to safeguard that status, but the US would do well to support Indian efforts, as a means of aiding African development and as a counterweight to Chinese penetration of Africa. The US presence in UN peacekeeping operations is currently all but non-existent. With the withdrawal of US forces from Iraq and Afghanistan, however, expect US involvement in peacekeeping to rise somewhat in the coming years. Much of this will be in Africa, where India already participates in peacekeeping missions in Ethiopia, Eritrea, Sudan and Côte d'Ivoire.