Documente Academic
Documente Profesional
Documente Cultură
Paper
Within the three domains there are specific layers of activity which can be
identified and mapped. The physical domain made up of the sea, land and air
environments, including weather and space, together with the physical networks
which transmit the data. Within the virtual domain are the various layers and
repositories of information the internet is a good example of this where
information exists in a virtual form which is completely disassociated from the
network and physical topology. The virtual domain also includes persona which
can also be mapped. For example, an individual may have a number of email
accounts, a Facebook and a Twitter account; collectively these form their virtual
persona and, in theory, all relate to the same individual. However, persona can
Figure 1 - Visualising the Information Domain
be hijacked or impersonated relatively easily which provides a vector to influence
information as it flows through the virtual domain and also identifies that this
must be a key area to be protected. Finally, people and the social groups which
they move in form the cognitive layer. This domain can also be mapped as the
others using a combination of tools such as IBM i2 ANB and Esris GIS.
Intelligence has always operated in all three domains, however, the level of
activity that goes on within the virtual domain has now increased significantly.
Communications between entities in the battlespace used to involve for
example, point to point radio networks so the virtual domain was limited to the
electromagnetic transmission between them. Today entities communicate using
email and chat rooms which route traffic via satellites and network operating
centres around the world. This results in multiple opportunities to disrupt or deny
information flows or perhaps modify persona. The global information revolution
is resulting in growing opportunities for both state and non-state actors to
access cyber technologies and thus act freely in the virtual domain. Thus, the
almost guaranteed integrity and availability of the virtual domain which has been
enjoyed in the past is unlikely to continue with future conflicts.
Intelligence led operations within the virtual domain can also be more cost-
effective than their physical alternatives. They are certainly not without cost
significant investment is required to obtain effective capabilities that can
act within the virtual domain. However, returning to the example above and
considering the resources required to disrupt C capabilities across a wider
region, it is clear that the attack vectors using the virtual domain will require far
less resource than either the capital cost of procuring multiple warships/planes
or the costs of providing platforms and munitions capable of conducting fires.
Whilst some degree of credible force will always be needed, in a resource
constrained era together with use of precision strike to minimise collateral
damage, cyber has the potential to offer greater effect for less cost especially via
the investment in the provision of geospatial information/intelligence.
It was outlined in the introduction that the future operating environment will be
increasingly Contested, Congested, Confused and Cluttered. Whilst this will also
extend into the virtual domain, achieving greater precision of effect with less
physical collateral damage is inherently easier than operations in the physical
domain. This mechanism of achieving effect via intelligence operations is
therefore better aligned with the National Security Strategys increased focus on
Soft Power, and is also more able to support activities as part of the Integrated/
Comprehensive Approach as fires are often seen to be, at best, unpalatable and,
at worst, can be counterproductive in achieving the overall political end-state.
However, there is significant potential for collateral damage and unintended
second order effects within the virtual domain. For example, cyber activities to
disrupt power infrastructures could also affect hospitals or schools in the local
area. Thus, the potential for collateral damage as a result of virtual activities will
need to be evaluated equally as rigorously as for physical fires and hence why the
use of the geographic approach helps overcome such issues.
The tools to enable this are already in place. MoD Joint Action doctrine
provides a framework to integrate intelligence activities using Full Spectrum
Targeting as the means to decide which activities are most appropriate in
achieving our desired objectives; this is the key mechanism which allows the
bringing of information to the centre of intelligence led operations. Further,
within the development of intelligence led operations, geospatial information/
intelligence is rapidly becoming a foundation capability, a joint enabler upon
which other intelligence disciplines can overlay their information to synergistic
effect.
Precision can be defined as the ability to deliver the desired effect (in space and
time) with the minimum of assets while, at the same time, minimising collateral
damage. It will be essential to the successful conduct of operations in the future
2020 contingency operating environment for a number of reasons:
Precision across the Levers of Power. The levers of power must be coherent
within the strategic narrative in order to maximise their effect. In being
coherent, effects must be synchronised across all lines of activity this is, in
essence, the Integrated/Comprehensive Approach and demands precision in
time and space, which geospatial information/intelligence provides, in order
to be effective.
The drivers outlined above indicate that increased precision will be required in
all three domains of cyberspace and for which geography provides the glue:
The set of capabilities which are derived are in effect, a set of Mission Threads.
The relationship between these capabilities and military activities ie Joint Action
is shown in Figure 2 above. The arch construct shows that all mission threads
are dependent on IA, IM and IX but are also reliant upon each other in order to
maintain overall integrity remove one component and the arch collapses. This
concept, which is the subject of ongoing UK doctrinal development for Joint and
Coalition use, has been developed and proven on complex coalition operations
in Afghanistan. A key feature of mission threads is that they are championed
from within the J3/5 community supported by a technical lead within the J6
cadre and subject matter expertise from branch specialists such as J2 they thus
have operational provenance and are not a specific technical capability, service
or process.
Cyber warfare is about ... ... which leads to ... and requires
increasing our ability and actions which are more appropriate a better understanding of the cognitive domain
propensity to operate in the virtual to the future operating environment and the associated human terrain
domain (Congested, Cluttered, Confused and a change in mindset to consider the virtual domain
Contested) as a primary area of warfare
the ability to achieve more with less full consideration of information activities as part
alignment with the national security of the estimate and targeting process
strategy aspiration to use more soft appropriate tools and equipment to influence and
power exploit the virtual domain
the potential to conduct asymmetric intelligence tools and analysis which reflect our
warfare of own actions which are more focus on the virtual and cognitive domains
likely to be aligned with and part of an utilising the geographic approach
Integrated Approach Situational Tools which support geospatial and
more opportunities to create effect as non-geospatial representations
our adversaries become increasingly
dependent on the virtual domain
enabling greater agility and tempo faster, more accurate decisions Decision Superiority
a tempo of operations which overwhelms Information Superiority
the adversary, getting inside his OODA A decision making process where BM, Int and C
loop are fully meshed and integrated
operating effectively in the influence at the centre of intelligence better understanding of the human terrain
strategic information environment activities a strategic narrative
intelligence activity which is coherent with consideration of the strategic narrative in all
the strategic narrative aspects of planning
personnel at all levels who understand delegation of authority to engage with the media
the strategic narrative and thus shape to the lowest levels
their actions accordingly appropriate tools to interact with the media and
quicker and more effective interaction target audiences
with non-defence audiences in order to
achieve influence
being more precise in space and less collateral damage more intensive targeting cycle requiring more
time more effective fires accurate and timely intelligence
activity in the cognitive and virtual more timely and accurate BM and Int functions
domains which is more appropriate in the which are properly meshed with the targeting
future operating environment cycle (J2-3-5 integration)
better synchronisation of effects so better understanding of the human terrain (all
more effective actors)
ability to exploit more accurate weapon better understanding of the information flows
systems through the virtual domain (all actors)
understanding and defending our freedom of action at all times assured communications channels
own information assured C understanding of the vulnerability of operating in
the virtual domain
more robust procedures for ensuring persona are
valid
fallback equipment, networks and procedures
Esri UK
sales@esriuk.com
01296 745500
www.esriuk.com