Digital Data Warfare Tools: Should CINCs Have Control

The meteoric explosion of information-age technologies led by the ongoing rapid evolution of cyberspace and microcomputers has brought about a revolution in Military Affairs. A new form of Information Operations (IO) Warfare, Digital Data Warfare, portends enormous ramifications for the national sec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Newman, Herb W
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Newman, Herb W
description The meteoric explosion of information-age technologies led by the ongoing rapid evolution of cyberspace and microcomputers has brought about a revolution in Military Affairs. A new form of Information Operations (IO) Warfare, Digital Data Warfare, portends enormous ramifications for the national security of the United States, its allies, and potential coalition partners. Joint Pub 3-13 provides doctrine for the execution of IO in joint operations. It discusses integration and synchronization of offensive and defensive IO in the planning and execution of combatant commanders' plans and operations to support the strategic, operational, and tactical levels of war. What Joint Pub 3-13 does not do is state that combatant commanders should have control of Digital Data Warfare tools. This paper examines and answers important strategic questions concerning combatant commander's control and authority to employ offensive Digital Data Warfare tools. The guideposts of this study provide a primer for understanding control and employment of Digital Data Warfare. Strategy Research Project.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA364586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA364586</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA3645863</originalsourceid><addsrcrecordid>eNrjZDB1yUzPLEnMUXBJLElUCE8sSkssSlUIyc_PKbZSCM7IL81JUXD29HMuVvBILEtVcM7PKynKz-FhYE1LzClO5YXS3Awybq4hzh66KSWZyfHFJZl5qSXxji6OxmYmphZmxgSkAQ5BKOc</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Digital Data Warfare Tools: Should CINCs Have Control</title><source>DTIC Technical Reports</source><creator>Newman, Herb W</creator><creatorcontrib>Newman, Herb W ; ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><description>The meteoric explosion of information-age technologies led by the ongoing rapid evolution of cyberspace and microcomputers has brought about a revolution in Military Affairs. A new form of Information Operations (IO) Warfare, Digital Data Warfare, portends enormous ramifications for the national security of the United States, its allies, and potential coalition partners. Joint Pub 3-13 provides doctrine for the execution of IO in joint operations. It discusses integration and synchronization of offensive and defensive IO in the planning and execution of combatant commanders' plans and operations to support the strategic, operational, and tactical levels of war. What Joint Pub 3-13 does not do is state that combatant commanders should have control of Digital Data Warfare tools. This paper examines and answers important strategic questions concerning combatant commander's control and authority to employ offensive Digital Data Warfare tools. The guideposts of this study provide a primer for understanding control and employment of Digital Data Warfare. Strategy Research Project.</description><language>eng</language><subject>CONTROL ; DATA BASES ; DIGITAL DATA WARFARE ; DIGITAL SYSTEMS ; Electrical and Electronic Equipment ; EVOLUTION(GENERAL) ; Information Science ; INFORMATION WARFARE ; MICROCOMPUTERS ; MILITARY COMMANDERS ; NATIONAL SECURITY ; PLANNING ; RMA(REVOLUTION IN MILITARY AFFAIRS) ; TACTICAL WARFARE ; UNITED STATES</subject><creationdate>1999</creationdate><rights>APPROVED FOR PUBLIC RELEASE</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27546,27547</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA364586$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Newman, Herb W</creatorcontrib><creatorcontrib>ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><title>Digital Data Warfare Tools: Should CINCs Have Control</title><description>The meteoric explosion of information-age technologies led by the ongoing rapid evolution of cyberspace and microcomputers has brought about a revolution in Military Affairs. A new form of Information Operations (IO) Warfare, Digital Data Warfare, portends enormous ramifications for the national security of the United States, its allies, and potential coalition partners. Joint Pub 3-13 provides doctrine for the execution of IO in joint operations. It discusses integration and synchronization of offensive and defensive IO in the planning and execution of combatant commanders' plans and operations to support the strategic, operational, and tactical levels of war. What Joint Pub 3-13 does not do is state that combatant commanders should have control of Digital Data Warfare tools. This paper examines and answers important strategic questions concerning combatant commander's control and authority to employ offensive Digital Data Warfare tools. The guideposts of this study provide a primer for understanding control and employment of Digital Data Warfare. Strategy Research Project.</description><subject>CONTROL</subject><subject>DATA BASES</subject><subject>DIGITAL DATA WARFARE</subject><subject>DIGITAL SYSTEMS</subject><subject>Electrical and Electronic Equipment</subject><subject>EVOLUTION(GENERAL)</subject><subject>Information Science</subject><subject>INFORMATION WARFARE</subject><subject>MICROCOMPUTERS</subject><subject>MILITARY COMMANDERS</subject><subject>NATIONAL SECURITY</subject><subject>PLANNING</subject><subject>RMA(REVOLUTION IN MILITARY AFFAIRS)</subject><subject>TACTICAL WARFARE</subject><subject>UNITED STATES</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>1999</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZDB1yUzPLEnMUXBJLElUCE8sSkssSlUIyc_PKbZSCM7IL81JUXD29HMuVvBILEtVcM7PKynKz-FhYE1LzClO5YXS3Awybq4hzh66KSWZyfHFJZl5qSXxji6OxmYmphZmxgSkAQ5BKOc</recordid><startdate>19990315</startdate><enddate>19990315</enddate><creator>Newman, Herb W</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>19990315</creationdate><title>Digital Data Warfare Tools: Should CINCs Have Control</title><author>Newman, Herb W</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA3645863</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>1999</creationdate><topic>CONTROL</topic><topic>DATA BASES</topic><topic>DIGITAL DATA WARFARE</topic><topic>DIGITAL SYSTEMS</topic><topic>Electrical and Electronic Equipment</topic><topic>EVOLUTION(GENERAL)</topic><topic>Information Science</topic><topic>INFORMATION WARFARE</topic><topic>MICROCOMPUTERS</topic><topic>MILITARY COMMANDERS</topic><topic>NATIONAL SECURITY</topic><topic>PLANNING</topic><topic>RMA(REVOLUTION IN MILITARY AFFAIRS)</topic><topic>TACTICAL WARFARE</topic><topic>UNITED STATES</topic><toplevel>online_resources</toplevel><creatorcontrib>Newman, Herb W</creatorcontrib><creatorcontrib>ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Newman, Herb W</au><aucorp>ARMY WAR COLL CARLISLE BARRACKS PA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Digital Data Warfare Tools: Should CINCs Have Control</btitle><date>1999-03-15</date><risdate>1999</risdate><abstract>The meteoric explosion of information-age technologies led by the ongoing rapid evolution of cyberspace and microcomputers has brought about a revolution in Military Affairs. A new form of Information Operations (IO) Warfare, Digital Data Warfare, portends enormous ramifications for the national security of the United States, its allies, and potential coalition partners. Joint Pub 3-13 provides doctrine for the execution of IO in joint operations. It discusses integration and synchronization of offensive and defensive IO in the planning and execution of combatant commanders' plans and operations to support the strategic, operational, and tactical levels of war. What Joint Pub 3-13 does not do is state that combatant commanders should have control of Digital Data Warfare tools. This paper examines and answers important strategic questions concerning combatant commander's control and authority to employ offensive Digital Data Warfare tools. The guideposts of this study provide a primer for understanding control and employment of Digital Data Warfare. Strategy Research Project.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA364586
source DTIC Technical Reports
subjects CONTROL
DATA BASES
DIGITAL DATA WARFARE
DIGITAL SYSTEMS
Electrical and Electronic Equipment
EVOLUTION(GENERAL)
Information Science
INFORMATION WARFARE
MICROCOMPUTERS
MILITARY COMMANDERS
NATIONAL SECURITY
PLANNING
RMA(REVOLUTION IN MILITARY AFFAIRS)
TACTICAL WARFARE
UNITED STATES
title Digital Data Warfare Tools: Should CINCs Have Control
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T20%3A19%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Digital%20Data%20Warfare%20Tools:%20Should%20CINCs%20Have%20Control&rft.au=Newman,%20Herb%20W&rft.aucorp=ARMY%20WAR%20COLL%20CARLISLE%20BARRACKS%20PA&rft.date=1999-03-15&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA364586%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true