Thursday, April 14, 2011

NATO PSYOP: A camel is a horse designed by a committee.


Common sense dictates that America should never go to war, or anything resembling war alone. The recent action in Libya is a case in point. President Obama held off committing US resources until there was some sort of ‘international push’ and ultimately took the position that the US would not be the lead – perhaps for the first time.

Of course the President came in for criticism from both sides of the aisle for acting or not acting and theorectically the French are ‘in charge’. However, is this a NATO kumbaya moment? Not really. Here are a couple of today’s headlines:

April 14, 2011: U.S. Ignores Plea for More Libya Strikes: France (http://www.defensenews.com/story.php?i=6237431&c=EUR) (Source of Photo)

April 14, 2011: NATO Struggles to Secure More Planes for Libya (http://www.defensenews.com/story.php?i=6236097&c=EUR)

April 14, 2011: French, British leaders meet about West’s role in Libyan uprising (http://www.washingtonpost.com/world/france-britain-call-for-summit-on-natos-role-in-libyan-uprising/2011/04/13/AFy71qVD_story.html?hpid=z2)

I find these headlines troubling, but not surprising. Having served at a 4* NATO Task Force HQ where there were more Generals than Lieutenants, I’m familiar with the darker side of the Alliance – national politics and personalities.

The President was, in my humble opinion, on the money when he made sure that the US would not be the lead, however, this may turn out to be more wishful thinking than practicality. The Libya mission is at the moment at least, a relatively straight forward kinetic operation. Military targets are identified, aircraft and missiles are launched.

Given this simplicity and the need to control airspace, not to mention control fires to avoid fratricide, the Alliance, at least in theory, should be able to enlist and coordinate efforts of its members. This apparently does not seem to be the case as evidenced in the headlines.

My previous posts showed that I believe our enemies will exploit these attacks in propaganda against us, especially in the Muslim world. This effort continues unabated. While I’m not involved in any active operations, I would be quite surprised if there is even a dedicated and streamlined US information engagement effort touching SOCOM, EUCOM and AFRICOM while integrating active and reserve PSYOP forces to implement a comprehensive information engagement strategy including traditional PSYOP and CNO for its own sake and for psychological effect.

National needs and priorities are always at work inside the Alliance. Often the friction among these often conflicting priorities is exacerbated by senior officers who put national needs (after all their national GOs write the OERs) ahead of the good of the alliance.

Of course, I’m also not sure that the Alliance has an adequate capability to develop an overarching information engagement strategy, never mind implement the operations to support it.

I welcome input from those of you out there who can set me straight.

Friday, April 8, 2011

Being Part of PSYOP: The Bigger Picture


Been kind of busy the past two weeks. On Monday I was sworn in to the Bar of the Supreme Court of the United States in open court. The ‘main room’ is not as big as you might think, but being at the Bar in front of the 9 Justices is intimidating just the same.

Plane back was incredibly late and I’ve been running around playing catch up all week. What does this have to do with PSYOP/MISO?

Let’s see: Iraq and Afghanistan are still going strong, we’ve added Libya to the latest list of the ‘what the heck are we doing here conflicts’, the federal government is getting reading to shut down, and oh yes, taxes are due next week.
This morning I’m walking the Big Dog and we spot a guy next to car with a CA Purple Heart license plate. Seems he was a crew chief for “Dustoff”, Medevacs in RVN for two years and many of his ‘stops’ were places I’ve been as well. For two guys who never met each other, we hit off pretty well.

I also ran into a retired Navy Captain with Army SF experience (5th Group) in my class at the Supreme Court on Monday. In this day and age of economic uncertainty, 7x24 information connection and instant gratification it was comforting to spend time with other guys who had the military experience.

For those of us that have been in PSYOP/MISO the experience can be considered even more profound because our work has saved lives. The non-lethal effects of PSYOP/MISO on the battlefield and in the streets and airwaves have been proven to reduce friendly and civilian casualties in the long and short run.

So, on this day of looming US federal government closure, take a moment and reflect on your comrades and your missions. Remember those that are no longer with us and for just a moment, consider those on the front lines today and who will be there tomorrow.

Suddenly even the prospects of a billion dollar government closure don’t seem so profound.

Thursday, March 31, 2011

Cyber PSYOP: A Sneak Preview

Cyber PSYOP Primer – Sneak Preview

I have just submitted an article to Perspectives, the PSYOP Association Professional Journal. Since Cyber PSYOP is a topic near and dear to my heart, I’m kind of pressed for time this week in DC, and because I would like to encourage readers of my Blog to read Perspectives, I’m providing a summary of the article as this week’s Posting.

History has shown that the US DOD has a strong tendency to favor kinetic operations even in the face of a nimble and capable opponent. The discipline of PSYOP has been ignored for years to its detriment. As we enter an era of uncertainty with respect to potential enemies and adversaries exacerbated by shrinking budgets, while it is readily acknowledged at the highest levels of our government that Cyber Security is important, there is almost no attention given to Cyber PSYOP.

Cyber PSYOP, simply stated, is the application of PSYOP principles to electronic media, systems and networks. Unlike many other forms of PSYOP, CP operates at all levels: strategic, operational and tactical. The virtual nature of CP blurs the lines of deployment so that even the most tactical of attacks, say on a targeted individual, can spider web out through cyber space and rise to the strategic level.

Target analysis is critical in CP because CP can be employed with laser like focus against individual targets through their devices (e.g. smart phones), their social connections (e.g. Facebook, Linkedin, MySpace, etc.) or more broadly aimed at larger groups such as government bureaucrats who are on the same network or within the same department, agency or bureau.

Intelligence Preparation of the Battlefield (IPB) for Cyber PSYOP involves target profiling and technology profiling.

CP is an important part of our influence operations arsenal. Its importance is directly proportional to the technology reliance of the target. The more reliant the target is on technology, the more susceptible they will be to CP.
I believe that within the next few years CP will emerge as a mainstream discipline ahead of the employment of CNO as a warfighting systems. CP will prove itself in urban conflicts to come. However, the nature of CP also appeals to our enemies. They have shown themselves to be creative and adaptive and at times far more nimble then we are. Consequently part of our CP resources must be devoted to developing and executing counter CP operations to minimize the impact of enemy CP and insuring that we dominate the information battlefield.

Tuesday, March 22, 2011

Libya: Who is in charge of the attack? An important PSYOP/MISO Issue.


My time in Bosnia during 1997 – 1998 taught me quite a bit about the practical aspects of running an alliance. In some respects an alliance is like a family and not everyone gets an equal vote all the time. The Stabilization Force (SFOR) had the advantage of being a NATO entity. While this wasn’t a perfect construct, at least there were some basic rules over who did what, how the force was organized, funding mechanisms and doctrine.

Photo Source: Wired; URL below

According to President Obama: “First of all, I think it’s very easy to square our military actions and our stated policies. Our military action is in support of an international mandate from the Security Council that specifically focuses on the humanitarian threat posed by Colonel Qaddafi to his people. Not only was he carrying out murders of civilians but he threatened more. He said very specifically, we will show no mercy to people who lived in Benghazi.

And in the face of that, the international community rallied and said we have to stop any potential atrocities inside of Libya, and provided a broad mandate to accomplish that specific task. As part of that international coalition, I authorized the United States military to work with our international partners to fulfill that mandate.” (source: http://www.whitehouse.gov/blog/2011/03/21/president-obama-answers-questions-libya-testament-men-and-women-uniform; accessed 22 March 2011).

Let’s take a look at a couple of key phrases here: “an international mandate from the Security Council”, “international coalition”; and “work with our international partners”. Does this mean that the Secretary General of the UN is the “Commander” of the Libyan mission? Do all of our international partners get to task our aircraft and prioritize targets?

The NY Times reported that the US is moving swiftly to hand command over to our allies (see http://www.nytimes.com/2011/03/22/world/africa/22libya.html?_r=1; accessed 22 March 2011). Does this mean a French or British flag officer will have opcon (operational control) over US forces in the Med?

Does this ersatz coalition have a formal HQ with a combined, joint Military Information Support task force? Are the influence operational objectives clear? Has the coalition taken the necessary time and effort to craft a coordinated information operations effort to include Computer Network Operations, Public Affairs and EW to maximize the effectiveness of the fighting force and minimize the danger to friendly forces?

Frankly I believe many of these questions remained unanswered as our planes streak over Libyan skies. At first blush it would appear that the President has moved swiftly to answer the political mail, and is now trying to minimize his and our collective exposure.

As with any operation, plans don’t often survive first contact and there is already fog in the media. The President implied that the US took the lead because “Our ability to take out, for example, Qaddafi’s air defense systems are much more significant than some of our other partners.” (same source as above) and that fine military authority, “Wired” reported on secret PSYOPs and Commando Solo (see http://www.wired.com/dangerroom/2011/03/secret-libya-psyops/).

If there’s a formidable air defense system, you wouldn’t be seeing Commando Solo flying around. And, by the way, where is the funding for this operation coming from as the defense budget continues to get pruned.

Overall it would appear that we are potentially on the precipice of yet another military mission in a Muslim nation with the potential of fanning the flames of other conflicts and perhaps offering an excuse to jump start fundamentalist efforts in other parts of the globe.

I applaud President Obama for his nimbleness, but let’s hope we don’t get burned jumping over the latest candlestick.

Monday, March 21, 2011

PSYOP and Libya: Quick Comments

1. US and allies blamed for horrific civilian deaths. Gory pictures of children will be shown. I would not put it past COL Q to inflict these casualties himself if there are no 'real' ones he can exploit.

2. Anti-US fervor to be stoked any place where they need an excuse.

3. Given that Libya does not have a strong military class nor a middle class, there is a great deal of uncertainty as to how the country could be reconstituted under a new ruling government or how it might be partitioned into a new rebel led territory and the balance led by COL Q. Should this happen, the Western powers would have to remain in place until COL Q goes.

4. Any new government might be fundamentalist in nature and present a whole new set of issues.

Just my take off the top.

Tuesday, March 15, 2011

Something Different: IO and Terrorists


Today's posting is something a bit different. Following is a concept paper I drafted for a colleague. Essentially I took the IO capabilities of DoD and then provided analysis on Terrorist employment of those same capabilities.

Comments and input are welcome of course.

Photo Source: http://samsonblinded.org/blog/osama-too-good-to-be-true-part-1.htm

Terrorist Use of Information Operations (IO)

COL (R) Lawrence D. Dietz; General Counsel & Managing Director Cyber Security,
TAL Global Corporation

I Introduction
The US Department of Defense employs Information Operations to influence the course of battle and act as a combat multiplier. Terrorists are also very successfully employing IO and technology to their advantage. This short paper will give you an overview to assist you in future research.

II Department of Defense IO Capabilities

Reference: http://www.carlisle.army.mil/usawc/dmspo/Publications/Information%20Operations%20Primer%20AY11%20Web%20Version.pdf; Accessed 15 Mar 11

A. Core Capabilities

1. Psychological Operations (PSYOP) now Military Information Support Operations (MISO) – operations designed to influence the behavior of the target in line with CDR’s Concept of the Operation (CONOP)

2. Military Deception (MILDEC) – actions taken to shield true capability from the enemy (e.g Patton’s fake Army in the UK as a decoy for the Normandy invasion.

3. Operations Security (OPSEC) – all measures taken to shield information from adversaries and enemies

4. Electronic Warfare (EW) – dominance of the electronic spectrum, actions can include jamming to deny the enemy is communication, actions taken to identify enemy electronic emitters to facilitate identification of their units, other order of battle information, targeting for interception or jamming.

5. Computer Network Operations (CNO)
a. Computer Network Attack (CNA) – denying the enemy the use of their IT networks.
b. Computer Network Exploitation (CNE) – using the enemy’s network for friendly advantage, e.g. intelligence collection, communications medium, storage of hostile software code, etc.
c. Computer Network Defense (CND) – defending one’s own network

B. IO Supporting Capabilities

1. Counterintelligence
2. Combat Camera (Air Force Unit that provides still and video camera support)
3. Physical Attack
4. Physical Security
5. Information Assurance – protecting electronic information

C. IO Related Capabilities

1. Public Affairs = Public Relations; a conduit to the media and creator of print, and broadcast media.
2. Civil Military Operations – military forces employing civilian skills to improve the life and infrastructure of a local population.
3. Defense Support to Public Diplomacy – Department of Defense support to the Department of State’s Public Diplomacy Operations

II Terrorist Use of IO Capabilities

A. Core Capabilities

1. Propaganda – Terrorists are making exceptionally good use of the Internet as a means to inform, influence and recruit. They are also being supported by ‘friendly’ media such as Al Jazeera which tends to spin the news in a way that is favorably received by the Arab Street. Terrorist propaganda is especially effective due to the speed with which they capitalize on events that serve their purpose. This rapid response is indicative of a streamlined or de-centralized chain of command and abbreviated approval cycle.

Allied information support operations tend to be much more cumbersome due to the heavy ROE and complex approval schema which can often include both military and civilian command cycles.

2. Military Deception (MILDEC) – In my view terrorist operations tend to be decentralized although they employ deception to shield their true intentions and make very effective use of ‘cover’ identities.

3. Operations Security (OPSEC) – Terrorist cells are generally quite secure due to their decentralized nature. Most terrorist organizations appear to have a very healthy respect for Signals Intelligence and will avoid electronic means of communications such as mobile phones to avoid detection. Trade craft to include steganography (the concealment of messages in pictures) is also employed along with other measures such as compartmentalized chat rooms, common password schemas, etc.

4. Electronic Warfare (EW) – Improvised Explosive Devices (IED) are often remotely detonated via mobile phones, garage door openers, etc. I am unaware of any large scale terrorist jamming efforts to date.

5. Computer Network Operations (CNO)

a. Computer Network Attack (CNA) – Experts believe that terrorists will employ cyber attacks in conjunction with a kinetic or physical attack. CNA may be employed prior to or subsequent to the kinetic attack depending on the type of operation.

b. Computer Network Exploitation (CNE) – Terrorists, and nation states for that matter are routinely probing networks of interest. Terrorists are likely to employ a combination of human agents to infiltrate target organizations to be in a better position to exploit networks directly or to insert malicious code (such as the Stuxnet reported planted to damage the Iranian Nuclear Research program) for later execution.

Exploitation can also include gathering intelligence from the network. Terrorist cells must be self-financing. Harvesting data (personally identifiable information or PII) that allows them to steal identities which in turn allows monetization through theft of funds, goods or services is very effective.

Terrorist cells can also exploit networks by gathering information that may be of use to the movement in some way such as to identify potential funding sources or gather target information.

Terrorists are employing the Internet as a cost effective and for the most part, relatively secure communications channel. Their global operations lend themselves to Internet communications for availability, cost and security reasons.

c. Computer Network Defense (CND) – Unable to comment.

B. IO Supporting Capabilities

1. Counterintelligence – No comments

2. Combat Camera – Terrorist organizations make effective use of still and video cameras. They also exploit images captured by other sources such as the media.

3. Physical Attack – Mumbai type attacks are very likely to increase. They require a small footprint, are relatively low in cost and very difficult to defend against. They are very effective at exploiting soft targets which in turns results in dramatic chaos which is then exploited through the media and by the Terrorists’ own sources.

4. Physical Security – No Comment

5. Information Assurance – See Opsec Above

C. IO Related Capabilities

1. Public Affairs = Public Relations; Terrorists are exceptional PR professionals. They understand the value of publicity, especially the emotional appeal of images. They are able to appeal to ‘friendly’ media to a very great extent.
2. Civil Military Operations – Hezbollah and the Taliban have been quite successful at using social welfare as a means to ingratiate themselves with local populations.
3. Defense Support to Public Diplomacy – Governments tend to hide their association with terrorist organizations.

Wednesday, March 9, 2011

Positioned For Troop Reduction? Who is PSYOPing whom?


The Washington Post of March 7, 2011 quoted Secretary of Defense Gates as indicated that the US was “well-positioned” for some troop reductions in Afghanistan in July. If you are a PSYOP (pardon me MISO) soldier, don’t get your hopes up. Don’t get me wrong, I’m a big supporter of Secretary Gates as seen in some previous posts, but my Brooklyn BS detector went off when I read that.

The Washington Post of March 7, 2011 quoted Secretary of Defense Gates as indicated that the US was “well-positioned” for some troop reductions in Afghanistan in July. If you are a PSYOP (pardon me MISO) soldier, don’t get your hopes up. Don’t get me wrong, I’m a big supporter of Secretary Gates as seen in some previous posts, but my Brooklyn BS detector went off when I read that.

While I have not been to Afghanistan, it strikes me that our information support operations forces be they military or civilian are stretched pretty thin. Furthermore, the tribal/rural nature of Afghanistan does not lend itself to mass marketing of any type.

At least Mr. Gates was straight forward by noting that reductions would be small and that a significant US force would remain behind. In theory, the notion of a military draw down should be a signal to NATO and to the US that the diplomatic information efforts need to ramp up. Civilian infrastructure and medical missions also need to be tightened up with realistic fiscal management and timetables coupled with accountability.

I’m still of the opinion that local economies are the fundamental building blocks in that AO. Villages and their traditional leaders will be there long after America departs.

Hopefully we and our NATO allies have the political will to insure a bottom up level of confidence and security otherwise, the terrorist elements within the country and those scurrying back and forth to Pakistan will once again ascend to power.