SEPTEMBER 2015
The laws and norms surrounding the movement of economic goods across geopolitical boundaries are well-defined. By contrast, the ability to create and manipulate information has become ubiquitous and robust legal frameworks governing how state actors, individuals, and institutions interact with the information ecosystem do not yet exist. This creates risk and opportunity for state and non-state actors looking to devise new information manipulation tactics and make claims on this evolving space. Information control has always been a key component of strategy; however the current speed of evolution provides an advantage to potential disruptors, who do not have sunk costs in existing expensive processes and techniques. Whereas during the medieval period, a limited number of literate clergy had the ability to control the information space (which was explicitly linked to the capacity to wage war), today both state and non-state actors, no matter how marginal, have the ability to contribute to the information battlespace. Even a single, well-placed YouTube video, such as the beheading videos released by ISIL can influence military response.
Information is a non-rivalrous commodity, which should fundamentally change military investment profiles. In FY10, the United States spent $160B for the wars in Iraq and Afghanistan, compared to CIA estimates of Al Qaeda’s 2010 operating budget of $30M. Despite 5,000 times more investment by the US, Al Qaeda continued to expand its influence throughout the region with involvement in Yemen, Russia, Syria, and by facilitating the eventual destabilization of Iraq. In the information age, spending and traditional military definitions of success no longer correlate with stable end states. It is more difficult to characterize 21stcentury conflicts in terms of definitive winners and losers than traditional industrial conflicts. It follows that post-industrial, digital-age conflicts will be characterized by informational pluralism, and that single source-point information control is no longer viable for military organizations.
The Department of the Navy’s (DON’s) information construct is currently divided along two objectives. One objective is to disseminate propaganda about the DON’s agenda and operations to a small circle of military-industrial and congressional elites who can afford 4-digit subscriptions to defense publications. The approach is not only fundamentally undemocratic, but also flawed in its assumption that “authoritative information” flowing out of the Navy information channels actually holds value in the information economy. The Navy information organization relies on humans to do the searching, processing, and dissemination of information, while most private-sector organizations, rely on advanced algorithms to fulfill these functions. Relying on humans results in slower processing speeds, increased error rates, and the bias that occurs from having associative, rather than random access, memory. Humans are subject to confirmation bias and will continually reinforce existing hypotheses with new information, rather than allowing the data itself to guide conclusions. In a world where decisions are made based on multiple sources, curated by digital systems, human-centric, centralized information systems are decreasingly relevant.
The second objective is to manipulate the information space as it is perceived by our adversaries, via network operations and psychological operations, for example. However, the efficacy of this construct is challenged by adversaries, many of whom recognize that they can achieve strategic objectives at minimal cost by creating a multiplicity of equally viable perceptions within the information space. While the US Navy continues to rely on an outdated approach to information, countries such as Russia and China understand how to apply pressure to their adversaries by insidiously manipulating information through a broad range of channels. This is evident in Russia’s substantial investments not only in internal propaganda machines such as RussiaTV, but more disturbingly Washington D.C. think tanks and London banking. Similarly, China’s ability to map connections and place pressure on individuals through data gathered in the OPM breach clearly indicates how information is valued in the Chinese defense paradigm.
The primary goal of the current battlespace information agenda is to have real-time ‘perfect’ information that is consistent from the tactical to the strategic level—the battlefield equivalent of the Waze app for traffic or Uber for transportation services. These capabilities are being developed using today’s information paradigms and technology, although they are unlikely to be operational for several years. However, with minimal investment, unsophisticated actors have the ability to disrupt this approach by making it impossible to distinguish real from fabricated threats. This is comparable to populating the Uber app with fake cars, eliminating users’ ability to distinguish between real and avatar drivers and therefore efficiently travel between points. The Russians demonstrated this approach in 2014 when they flooded social media channels with false reports of a chemical spill in Centerville, Louisiana. Optimizing the battlefield information ecosystem for real-time, perfect information piped through singular channels creates tremendous vulnerabilities when the potential for information oversaturation by an adversary is high.
Often times, DON assessments of novel approaches to the legal uses of information and weaponization (notably the use of disinformation) devolve into rights-based arguments focused narrowly on injunctive norms and “ethical” applications of information within defined legal realms such as intellectual property and privacy. While important, these conversations amongst military and political leadership often contribute little in terms of practical solutions and tend to overlook evolving challenges within the information space. The DON has been efficient in developing sweeping statements about the “importance of information” that never get adopted locally, while our adversaries continue to experiment with novel approaches in the information space. The military is the catastrophic backstop for the United States, and as adversaries invest aggressively and disruptively to control this evolving space, the DON will undoubtedly have a role to play in informing future frameworks and tactics.
In order to influence the information space, the DON must make investments in global cultural understanding. Cultural proficiency within the information space is not only paramount to generating information that produces the desired effects, but also critical to the DON’s ability to effectively mine the data of our adversaries. Effective use of information requires first-hand knowledge and cannot be outsourced to the intelligence community or communicated through powerpoint briefs. It requires understanding consumption habits, means of ingestion, and technical and semantic characteristics of information in a particular context. Close collaboration and immersion is necessary to understand subtle cultural constructs and the DON must grow this expertise or develop partnerships to provide the depth and breadth of cultural understanding across the DON needed to function in the information age.
Secondly, perhaps the greatest threat the DON faces is having its information ecosystem saturated with disinformation, or false positives. This mandates the use of advanced algorithms to parse the information ecosystem efficiently. Complex models and algorithms are often more art than science and heavily influenced by their creators. This capability must be developed organically, allowed to grow, and continually adapted by experts and integrators. This is a way of thinking that has become a core capability in an information world that resides in a small subset of synthesizers. It is non-transferable, cannot be trained, and cannot be outsourced. The DON must invest in finding and cultivating this unique set of talents. The US Navy must acknowledge its role and invest accordingly or it will find itself increasingly unable to compete on the information battlefield.
No comments:
Post a Comment