![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtN-Bgfs_oBelbcWE1w6gLvg3wl3IbpdkLrVus2kfgUhuU5uZiQtrOraSHXrk-lY8rfsknVodbY_QEn00K3vMLUmAMdVwZBMZAJTt0AIM6RiBS84_EdMhhqbtx40nOm9C9AkZnQU6g_AqB/s400/Picture+6.png)
Army must develop process to
wage war in cyberspace
wage war in cyberspace
By Greg Grant
ggrant@govexec.com
ggrant@govexec.com
With wars increasingly fought among the people, information is now an element of combat power as important as lethal action in determining a conflict's eventual outcome, said an Army officer who heads the services computer warfare efforts.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV3UqboVJwVhQ_xGp9DAjRHFMMJXUo9l4HPoeo9qvsDfXDxncB2jaRPLWnu_vzWL1W_ECg2hBipzIKWAP-WDPTZqsHlS3RrGP408hAW5FB5Uo25PBpQ9oJTD7iZLJ1M0svDXszjPoXgmYh/s400/cyberwar.jpg)
Digitization has dramatically increased the speed at which information moves about the battlefield, he said. Unlike the air and space domains, the Army operates on the ground, which means among the people, Parks said in a conference call with reporters. America's enemies influence a populations' mind-set by using Web sites and chat rooms to spread propaganda that casts the U.S. military in a bad light.
"We have to pick up the pace, ... respond, react, be proactive enough to stay out ahead of the speed of megabytes," he said.
The Army has turned to academia for expertise in the humanities and social sciences to better understand foreign cultures and how to influence societies with information operations.
The service now must find a way to "maneuver around" a potential enemy's information campaign, Parks said. Being proactive, rather than simply reacting to an enemy's misinformation, is of utmost importance, he said, because members of the public often believe the first thing they hear, even if it's not true. In addition, the military also "hacks" into jihadi Web sites to try to stop the spread of enemy propaganda.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0HqsakSGh40VgHfpl_grhOAgLKWMBZA5qD13HnRwV6l49N6aG7CEBk4TPGK38KUSTiLFuYp5jzsA2bCXTdlaXagNw10IsXiKq-7Hv7deZoE5JwqsEFrxpgr1bSf7T-sGH-WOmNRh4-0s0/s400/Picture+6.png)
Rather than the ad hoc approach to information operations the Army has pursued, the paper designated specific staff responsibilities for everything from informing and educating the public (delegated to the public affairs and psychological operations staff) to hacking into enemy computer networks (a task for intelligence officers). The service is recruiting a younger generation of hackers, Parks said, for, as the Army puts it, "computer network attack and computer network defend."
The United States finds itself more often fighting small, distributed terrorist and insurgent cells that are able to communicate and coordinate attacks using cell phones and that can share on Web sites lessons on the best way to attack U.S. forces. The challenge is finding weaknesses in the enemy's computer network that can be hacked, Parks said.
No comments:
Post a Comment