Symposia


Los Angeles - October 18, 1996


Major General John P. Casciano
Assistant Chief of Staff, Intelligence
HQ, USAF

Introduction

I appreciate the opportunity to share with you my thoughts about information warfare (IW). I'll explain what your Air Force and mine is doing about it, and our vision for a core competency of the Air Force -- Information Superiority. You'll find we are doing some pretty exciting things.

I believe, as do many folks who are objectively thinking about IW, that we in the Air Force are in the lead within the United States military in terms of a doctrinal approach, cultural adaptation, organizational adaptation, and plain capability. We ought to take pride in that. It's being done through a lot of bright, young people's hard work and good thinking. It is an important part of our future.

As I address the topic of information warfare, I will cover what it is and why it is important. I'll discuss vulnerabilities and threats. And, finally, I'll talk about how we are building our Air Force's IW capabilities to meet the core competency of Information Superiority. There are a lot of different policy discussions going on at various levels within Washington among the Services, the Joint Staff, and other organizations. We in the United States Air Force have a particular approach that we are advocating.

What is Information Warfare?

It all starts with a definition. The definition of IW we are using in the Air Force is: "Any action to deny, exploit, corrupt, or destroy the enemy's information and its functions; protecting ourselves against those actions; and exploiting our own military information functions." This means making sure you can do unto others so they can't do unto you; and then taking advantage of superior information capabilities to dominate in any kind of situation, peace through war. I don't want to belabor this, but we have been doing information warfare for a long time. When Doyle Larson, the AFA president, was at Electronic Security Command, he was in the midst of this. It was his brain child. He soed by one word: precision! Whether a precision weapon is lethal or non-lethal, it will require precise information. This is fundamental to our future. We have to know where is the enemy, what his capabilities are, what his weaknesses and critical targets are, and what his centers of gravity are. It's something we've classically done, but when you get into the era of information warfare, it demands more precision and more rigor than we have ever had to grapple with before. We've got to be able to manipulate information. That is characteristic of warfare and has been for a long time.

For example, during World War II, the Germans used to guide bombers over Great Britain using intersecting radar beams. We were able to determine they were doing that; spoofed it, making the bombs fall away from their targets; and consequently disrupted the German capability for a period of time.

We also need to deny the enemy the ability to do the same kind of thing to us. That involves protection. That involves defense in ways that we have not really thought of before -- protecting our information realm.

That puts us into the fifth dimension of warfare. Technology first allowed us to operate on land and sea. At the beginning of this century, we then moved into air and, eventually, space. That is the domain where we have unique competencies in our U.S. Air Force. We also have competencies to operate in the infosphere, "the fifth dimension of warfare" as General Fogleman has called it many times in speeches.

Information is a domain that is not uniquely ours, but is certainly one that culturally we find very comfortable in the Air Force. We are used to global and theater ranging capabilities and the use of intelligence, surveillance and reconnaissance. That is what the whole history of our U.S. Air Force has been about for 50 years. It enabled us to build the SIOP [Single Integrated Operational Plan]. It enabled us to win the Cold War. It enables us today to apply information precisely at times and places of our own chooHow does this fit in doctrinally? First, Cornerstones of Information Warfare was published a little over a year ago to address our traditional capabilities in air and space and our view of the requirement to maintain information superiority and information dominance, just as we maintain air and space superiority.

Second, in today's revolution in military affairs, there are three components. You take new technology, you develop doctrine and concepts for using it, and you adapt organizationally so that you can handle it for the future and gain an advantage over an adversary.

Why is this important? In the past, using closed information systems, the kinds we were used to during the Cold War, we had all kinds of protection for classified information, whether it was operational information, warplanning information, or intelligence information. Today, we are very dependent on the microchip and the Internet for global communications, which, by and large, are commercially driven. Our dependence on information, and our dependence on commercial, unclassified technologies and links represent both certain vulnerabilities and certain opportunities to us.

Right now, much of our unclassified, but nonetheless sensitive, information from a war planning and military execution stand point, moves over the commercial backbone. We consider encryption and closed systems, but ultimately we've got to manage the risks out there. We can no longer, at least within the current budget environment, build a completely closed system. It just would not work. About 90 percent of our critical information for planning and execution runs over commercial links these days, quite a change from the world in which many of us grew up.

Opportunities and Vulnerabilities

Let's turn now to the opportunities, vulnerabilities and threats. We face a double-edged sword. Our reliance on technology confronts uare from Napoleon's time, and before, warriors were able to move small rom the use of the telescope, men went to the pony express and then to the wire telegraph where they were able to move a little more information a bit farther and faster. Today, however, we are moving massive amounts of information literally at the speed of light. That is why I say the future of warfare -- our future as an Air Force and U.S. military -- is going to be dominated by the precise application of force based on precise information.

What is vulnerable? A lot. We have spent a lot of time trying to determine what our vulnerabilities are. We are moving a lot of relevant information on commercial communications and it affects virtually every part of our Air Force operations at a typical base.

For example, we move medical information and order blood and medical supplies over commercial links. We also manage the movement of cargo and fuels the same way. In an expeditionary world, where we must deploy fast to get to a hot spot, fuels and logistics tend to be long poles in the tent. Yet, most such data goes over essentially unprotected commercial links. We are taking advantage of telemedicine capabilities in the military to do diagnostics from a long distance and move medical supplies, blood, medical information and so on. All of this information is vulnerable. We are taking advantage of the commercial opportunities, but it is a double-edged sword that also opens up vulnerabilities. You don't want the wrong kind of blood going to the wrong place at the wrong time.

In communications, we are relying more and more on INMARSAT, but it is subject to being exploited, jammed, denied, and manipulated...yet we proliferate these systems. We have to. We have no other alternative. Even something as common as bank Automated Teller Machines (ATM) breed vulnerability. When I travel now, instead of going to the finance h my government credit card and I draw money. Those transactions move over relatively unprotected lines. Imagine the kind of turbulence thatystem and started manipulating our financial records. What would it do to a spouse in a family whose military member was deployed overseas? You could quickly run into a lot of financial difficulty. It would affect morale, and it would overload the system. It would cause the individual who was deployed not to focus on the primary warfighting job. Those potential vulnerabilities are there. We have to streamline our support functions to take advantage of technology and cut down costs, but it means we are more at risk.

I don't want to belabor this. The actual intrusion into these systems is relatively benign and today is mostly at the hacker level. But, the more people think and talk about computer intrusions, and the more it appears in movies and television programs, the more folks are going to try their hands at it.

It is not only our networked communications and computer systems that we need to protect; some basic warfighting capabilities are also subject to these kinds of vulnerabilities. We must protect embedded computer systems as we build new systems for the future. The Electronic Systems Center at Hanscom [AFB, Mass.] has the lead for this in Air Force Materiel Command.

Threats

Let's now turn to the potential threats. I like to categorize them in three ways: The hacker or the "ankle biter," which I think is what we are primarily seeing or detecting right now; the nation-states that are interested or involved in information warfare; and then, very significantly, transnational groups who can and do operate in this fifth dimension.

Hackers get their "handles" from the Internet. They are adept at their trade, but some of them end up in jail. These are the gunslingers of the 21st century. They attack and use the same kinds of tools that we use in the military. They do reconnaissance in cyberspace -- "surfing the net" -- and collect information. They do intelligence preparation of the battlespace so they can map our systems, our capabilities and our information. They use stealth tools, breaking into systems and leaving trap doors for later exploitation, and they use precision attack. Their tools and techniques are not unfamiliar to us in the military, and we've seen all kinds of examples. Senator Nunn held hearings on this subject and the President has set up a new commission on the protection of our nation's critical infrastructure. This commission includes representation from the financial community, banking community, commerce, transportation, and logistics.

The tools of the hacking trade are available over the Internet. You can go out there, find the tools and download them. You don't have to have a lot of technical knowledge; you don't have to be a software programmer. You don't have to know the guts of the computer and communication business. You just download the software, simply point and click and you can be an information warrior. We see lots of evidence of this.

There are many examples, within the Air Force, and elsewhere. We put a lot of focus on detecting this kind of thing. We have a capability that we built in San Antonio [Texas] that is a network security monitot did not have the network security monitoring capability. It is a matter of cost. We are going to complete the build by the end of this fiscal year, but we are not there yet. We found somebody entering Patrick through an Internet provider in Bedford, Massachusetts. That is one of the difficulties with this. You really don't know where it is coming from in a lot of cases. It requires a lot of detective work. Sometimes we are successful. The OSI and the FBI are often successful in finding the perpetrators. Other times we are not, because we don't have the tools fully matured to be able to do that. They came through Patrick to a couple of sites on the West Coast, again, doing the kinds of things that I talked about -- password sniffing, probing, intelligence preparation of the battlespace and that sort of thing.

A couple of people have suggested I arranged the attack on the Air Force Academy just to coincide with CORONA. It actually started before. A sharp systems administrator started seeing the systems slow down. There are two e-mail systems there, one for use by the cadets and one for use by the staff. The systems administrator contacted our Air Force Computer Emergency Response Team in San Antonio. They came in and did the analysis and tracked it. We have finally tracked it to a university host somewhere else in the country. School is back in session! It may just be as simple as that. The hacker introduced an e-mail bomb that proliferated itself and just slowed the system. That is the kind of thing that is possible.

Turning now to nation states. Obviously, I can't go into any detail on this, but suffice it to say that many nation states are aware of information warfare. There are about a dozen and a half countries that have active defensive or offensive information warfare programs. NATO is also examining what it needs to do in information warfare. Weof our traditional friends and allies over information warfare and command and control warliterally is a global problem.

Let me finally cover transnational actors such as those involved in international terrorism, various ethnic or fundamentalist groups and narcotrafficing. I'll give you a couple of examples. As the international political system evolves, we are moving into a multi-player world where actors other than nation-states can do a lot of damage. The Strano Leftist Network operating out of Italy is involved in all kinds of things, mostly as an intelligence network operating over the Internet, but it also has political agendas. Some of its political agendas have to do with the repression of minorities, such as the Zapatistas in Mexico, and anti-nuclear testing. They organized an international effort to shut down the Internet in France during December 1995 and in Mexico in June of this year. This is real. These are transnational actors doing the kinds of things that nation-states have traditionally done.

Building for Information Warfare

What has the Air Force done to develop IW capabilities? Well, it starts with the legacy of Doyle Larson who organized a team of young people -- communicators, Intel people, traditional operators, and engineers -- in the former Electronic Security Command and Air Force Intelligence Command. They started seeing the kinds of vulnerabilities that are out there and the trends in the information age. They really did a lot of seminal work in bounding the problem and started developing tools. That led Lt. Gen. Ken Minihan, then the first commander of Air Intelligence Agency (AIA), to stand up the Air Force Information Warfare Center in September 1993 to focus on this problem, to develop concepts, and to build tools, tactics and techniques that could then be exported to the warfighting commands. That has been a successful venture.

There has been a lot of direction from the four-stars in terms of how we need to educate the force, how we need to invest, and how we need to operationalize information warfare in our Air Force. The CORONA Conference in 1995 issued the Cornerstones of Information Warfare document. Significantly, General Fogleman gave direction to stand up the 609th Information Warfare Squadron at Shaw Air Force Base to fully operationalize information warfare on behalf of the JFACC [Joint Forces Air Component Commander] and the fighting forces. I had the opportunity to travel to Shaw with Lt. Gen. Jumper [AF/XO] and Lt. Gen. Fairfield [AF/SC] a few weeks ago to visit the 609th IWS. The squadron is up and running, and has a cadre of good, motivated people. They are taking this challenge very seriously and making great strides in operationalizing information warfare. They have a plan of action that is going to get IW into our exercises -- at Green Flag and Blue Flag and some joint exercises. The recent CORONA generated a lot of discussion on IW. The Secretary and Chief believe it iso just follow this train of thought. Everything we do needs to be put into a joint context. That is the world as it exists today, and it is the right way of doing business. Anything we do in the Air Force has to be consistent with a CINC's requirements or a JTF commander's requirements and must meet those objectives. We believe that IW is absolutely critical and integral to Air Force operations at the JFACC level and below. We have some things to offer other communities, but our focus is on the operational and tactical levels of warfare. A lot of the targets and a lot of the things we would want to affect -- command and control nodes and the adversary's integrated air defense system (IADS) -- are things the Air Force worries about on the battlefield. We don't claim IW exclusively. We think we've got good ideas. We think we've got good capabilities. And we are reaching out to the other services and the joint community to offer what we have. But, our focus is going to be on JFACC and below.

Who are the players? The BNCC (Base Network Control Center) initiative is building cyber fences around our bases, whether in garrison or deployed, so that anything that comes in, passes through network security monitoring equipment and we can tell whether we are being attacked. We have got about 1,500 people in the POM invested in this. Lt. Gen. Fairfield has taken the lead on this and it includes setting up a BNCC at every Air Force base and furnishing the tools that allow those BNCCs to operate. I already covered the 609th Information Warfare Squadron. We are up and running with it. IOC [Initial Operational Capability] was in August this year, and it is going to be the prototype for how we do business in the future. The Information Warfare Center in San Antonio will be a center of excellence for bounding the problem, developing concepts, tools and techniques for the operating forces to use.

General Hawley has the responsibility to lead the CAF [combat and obviously has the space domain. I've discussed AIA, and I see a big role for Special Operations Command in this whole arena. Of course, everyone has a responsibility for the defensive aspects.

Probably the most significant part for the future is the emphasis that the Chief and the Secretary and all of the four-stars have put on training. We are putting IW into all of our curricula. We are educating the force. It is consistent with our culture. Air University produced a 24-minute video called Cyberstrike. It has been out about 7 or 8 months with 2,500 copies around the world. We are implementing two new courses this year; a three day course for General Officers and senior civilians and a five day course for others. We expect to train about a thousand people during this coming year at Maxwell [AFB, Ala.]. IW is going into all of our training programs from the most basic level through tech training through professional military education.

We are also investing money in academic and advanced degree programs to learn more about information warfare, again primarily from the opportunities and vulnerabilities standpoint.

In conclusion, our U.S. Air Force has been a big user of the information domain ever since its beginning...and we continue to be. We are just looking at it in slightly different ways. We have addressed the opportunities and vulnerabilities, and I think our Air Force is responding in the way you would expect. With that, I will conclude my remarks and open it up to questions.

Questions

Gen. Shaud: The questions are in two general areas: Information warfare and about Russia. Would you please help us shift gears just a little bit and talk about General Lebed, his removal as national security advisor, and possibly about the security of the strategic rocket forces, those forces that Sure. I'd be glad to. Let me discuss Alexander Lebed first. If you look back in Russian history, this is not an unusual peir system. There have always been personalities throughout Russian history vying for power and influence. We saw that during the days of the Czars. We saw it certainly during the Communist regime. We have seen it since the end of the Cold War. It is also very characteristic of Boris Yeltsin and the way he has managed his version of the democratic transition. He has a number of people that work for him, some in an inner circle, some in a far outer circle, that he balances off against each other.

He has not hesitated to hire to balance nor to fire to balance. We have seen examples of that over the last five years. Chubays, the chief of staff, got fired a little while ago. Now he is again part of the inner circle and a fairly influential person. Khorzhikov, the Russian general that was so close to him, got fired when Lebed came in. He seems to be reemerging to a certain degree. This is not uncharacteristic of Russian history or the Russian way of doing things. Alexander Lebed has a lot of support. He is a nationalist, but not an ultra-nationalist, like Zhirinovsky, but he believes in Russia. He is proud of Russia and its accomplishments over its history. He is very much committed to a democratic transition.

He is also very worried about the Russian military. There is no question that he is worried about the Russian military. Two hundred and fifty thousand military families are without housing. Talk about concerns for quality of life -- people who haven't been paid and who can't get the basics! Military people have to go out and essentially do the lowest jobs in society in order to feed their families. They are tempted to engage in black marketing and organized crime. The Russian military is still very proud. It is still very professional. I think it is t right thing, but the problems that it faces are really tremendous.

Alexander Lebed will be around for a long time. He is one of the most popular politicians in the country. He is cernd compete for the presidency next time or, depending on what happens to Boris Yeltsin with his health situation, sooner. But I don't think he is gone from the scene. I would not be surprised to see him hired back at a later time as others have been hired back. If you are into prayer, pray for Russia. The country is going through a rough transition to democracy and capitalism.

Now, about strategic nuclear forces. If there is one bright spot in the Russian military, it is the strategic forces. That is where the money, the talent, and the emphasis that is available has been going for a whole lot of good reasons. The only sense in which Russia remains a superpower is in the nuclear arena. That doesn't mean they don't have other capabilities, but the most viable part of their military is the strategic nuclear forces. We are seeing emphasis on that and the money that is available is going toward that as are good, talented people. Everything I see says there is still very much positive control over the nuclear weapons. Let's hope that continues; I expect it will. Some of the Nunn-Lugar initiatives over the last few years have helped in that respect. We just need to keep that emphasis and keep helping them. I don't lose sleep over Russian nuclear control, I really don't.

Gen. Shaud: The next question came from one of the young people present. Will there be an information warfare career specialty?

Maj. Gen. Casciano: I predict, ultimately yes. That is one of the "to-do's" in our long-range planning process. We have talked about it, and it was discussed at last year's CORONA to see if we need a specific career field for information warfare. It is still too early to tell. What we need are good, creative people, who are traditional operators, new information operators, folks who are in communications, the computer business, engineers, intelligence people and others who deal in information. I think it is too early to develop a separate career field, but it is a big house and a lot of people can be operators in that house. Just as in the movie The Graduate where "plastics" was the key field, today it is "information." If I was talking to someone real young, I'd probably talk genetics and bioengineering because I think that is going to be the next wave that we have to confront.

There are great opportunities and it doesn't depend on the career field. It depends on the mission, function and task that you are asked to perform. There are going to be lots of operator opportunities for people in this area.

Gen. Shaud: The next question relates to your trip to Shaw AFB. Could you describe the way you see the mission of the squadron, how they fit in and do you think there are going to be more squadrons like that?

Maj. Gen. Casciano: I think the squadron is going to be a success, so I tend to believe that there are going to be more squadrons eventually. The mission is to support the JFACC in integrating information warfare writ large into an air cambil a deployed situation, which is where we are going to be really vulnerable in a conflict.

That squadron has a role in protecting the air base, moving in, working with the communication squadron, working with others who are in that business, and building that cyber fence around the base. We have to worry about force protection in a physical sense. We now also have to worry about it in a cyber sense. We have lots of information warfare capabilities. In psychological operations and electronic warfare, we have Compass Call and other capabilities. Over time, we will see an evolution in capabilities. Whether it fits into that squadron or is somehow orchestrated by that squadron, I think it is still too early to tell.

Gen. Shaud: Some say it is illegal to do offensive information warfare in peacetime. Do you agree with this and how do we step into that world of offensive information warfare?

Maj. Gen. Casciano: I don't see the U.S. Air Force engaging in that. That is going to be a legal thicket that the national community is going to have to work its way through. The legal community is somewhat split on just what is and what is not allowed. Congress is going to have to grapple with the issue from a legal stand point. The courts are going to have to do that as well. I don't want to dodge the question, but there is not enough clarity out there now. I know it is something that Dr. Deutch, at CIA, has testified to Congress on and that has been covered in the press in terms of his view of some potentialities there. But, we as a nation need to develop the legal, procedural and organizational mechanisms to be able to deal with this. It is there. It is on our doorstep and we've got to deal with it.


Return to Los Angeles '96 Foundation Forum



 

 











AFA is a non-profit, independent, professional military and aerospace education association. Our mission is to promote a dominant United States Air Force and a strong national defense, and to honor Airmen and our Air Force Heritage. To accomplish this, we: EDUCATE the public on the critical need for unmatched aerospace power and a technically superior workforce to ensure U.S. national security. ADVOCATE for aerospace power and STEM education. SUPPORT the total Air Force family, and promote aerospace education.

SEARCH  |  CONTACT US  |  MEMBERS  |  EVENTS  |  JOIN AFA  |  HOME

The Air Force Association, 1501 Lee Highway, Arlington, VA 22209-1198
Design by Steven Levins | Some photos courtesy of USAF | AFA's Privacy Policy