Skip to main content

Aiding Understanding of a Contested Information Environment’s Effect on Operations

  • Chapter
  • First Online:
Human-in-the-Loop Simulations

Abstract

The operations of government, industry, the military, academia, and even personal activity can be negatively affected by information attacks on and through cyberspace. Modeling and simulation can be used to increase the understanding of potential effects these attacks may generate and guide the development of contingency planning. The increased understanding and more comprehensive and focused contingency planning will enhance the ability of organizations to assure their operation or mission, when operating in a contested information environment. This enhanced mission assurance will increase the overall national security and the deterrence against the use of information attacks in the future. This chapter pulls these concepts together and develops requirements for modeling and simulation capabilities to enhance mission assurance.

The essence of winning and losing is in learning how to shape or influence events so that we not only magnify our spirit and strength but also influence potential adversaries as well as the uncommitted so that they are drawn toward our philosophy and are empathetic towards our success.

Col. John Boyd (Dewar et al. 1996)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Air Force Doctrine Document 3–12 (2010) Cyberspace operations, 15 July 2010

    Google Scholar 

  • Alberts D, Garstka J, Hayes R, Signori D (2001) Understanding information age warfare. Command and Control Research Program, CCRP 2001

    Google Scholar 

  • Alford LE, Dudas BA (2005) Developing a validation methodology for TacAir SOAR agents in EAAGLES. M.S. thesis, September. Air Force Institute of Technology, Wright Patterson AFB

    Google Scholar 

  • Arthur WB (1994) Inductive reasoning and bounded rationality (The El Farol Problem). Am Econ Rev (Pap and Proc) 84:406–411

    Google Scholar 

  • Azuma R, Daily M, Furmanski C (2006) A review of time critical decision making models and human cognitive processes, 2006 IEEE aerospace conference, July 2006, pp 1–9

    Google Scholar 

  • Beeker K, Mills RF, Grimaila MR (2010) Applying deterrence in cyberspace. IO J 1(4):21–27

    Google Scholar 

  • Boyd J (1987) Slide series: a discourse on winning and losing, Maxwell air force base. Tech Rep M-U 43947, August

    Google Scholar 

  • Burke MJ, Henly JM (2002) The APL coordinated engagement simulation (ACES). John Hopkins APL Technical Digest 23(1)

    Google Scholar 

  • Cares J (2002) The use of agent-based models in military concept development, Winter simulation conference

    Google Scholar 

  • Castelli CJ (2008) Defense department adopts new definition of cyberspace. Inside the air force (23 May 2008). http://integrator.hanscom.af.mil/2008/May/05292008/05292008-24.htm

  • Chew E, Swanson M, Stine K, Bartol N, Brown A, Robinson W (2008) NIST Special Publication 800-55-Revision 1: Performance measurement guide for information security, National Institute of Standards and Technology, Gaithersburg, MD, July

    Google Scholar 

  • Davis PK (1995) Distributed interactive simulation in the evolution of DoD warfare modeling and simulation. Proc IEEE 83(8):1138–1155

    Article  Google Scholar 

  • Dewar JA, Bankes SC, Hodges JS, Lucas T, Saunders-Newton DK, Vye P (1996) Credible uses of the distributed interactive simulation (DIS). Rand Corp, Santa Monica, CA ADA306986

    Google Scholar 

  • Endsley MR (1998) Toward a theory of situation awareness in dynamic systems. Hum Factors 37(1):32–64

    Article  Google Scholar 

  • Endsley MR, Jones WM (1997) Situation awareness, information dominance, and information warfare. Technical Report AL/CF-TR-1997-0156, Armstrong Laboratory, WPAFB,OH 45433, February

    Google Scholar 

  • Fortson LW and Grimaila MR (2007) Development of a defensive cyber damage assessment framework. In: Proceedings of the 2007 international conference on information warfare and security (ICIW 2007), Naval Postgraduate School, Monterey

    Google Scholar 

  • Fry SA (2009) Joint Publication 1-02: Department of defense dictionary of military and associated terms, Joint Chiefs of Staff, US Department of Defense. http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf

  • Grimaila MR (2008) Improving the cyber incident mission impact assessment process. In: Proceedings of the cyber security and information intelligence research workshop (CSIIRW 2008), Oak Ridge National Laboratory, Oak Ridge

    Google Scholar 

  • Grimaila MR, Fortson LW, Sutton JL and Mills RF (2009a) Developing methods for timely and relevant mission impact estimation. In: Proceedings of the 2009 SPIE defense, security and sensing conference (SPIE DSS 2009), Orlando, FL

    Google Scholar 

  • Grimaila MR, Schechtman G, Mills RF (2009b) Improving cyber incident notification in military operations. In: Proceedings of the 2009 Insitute of industrial engineers annual conference (IERC 2009), Miami, FL

    Google Scholar 

  • Grimaila MR, Fortson LW, Sutton JL (2009c) Design considerations for a cyber incident mission impact assessment (CIMIA) process. In: Proceedings of the 2009 international conference on security and management (SAM09), Las Vegas, Nevada

    Google Scholar 

  • Hellesen D, Grimaila MR, Fortson LW, Mills RF (2008) Information asset value quantification. In: Proceedings of the 2008 international conference on information warfare and security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, 24–25 April 2008

    Google Scholar 

  • Honabarger JB (2006) Modeling network centric warfare (NCW) with the systems effectiveness ananlysis simulation (SEAS), M.S. thesis, Air Force Institute of Technology, WPAFB, OH

    Google Scholar 

  • Joint Publication 3–13 (2006) Information operations, 13 February 2006

    Google Scholar 

  • Joint Publication 3–30 (2010) Command and control for joint air operations, 12 January 2010

    Google Scholar 

  • Libicki M (1996) What is information warfare? Center for Advanced Concepts and Technology, National Defense University  

    Google Scholar 

  • Libicki M (2007) Conquest in cyberspace: National security and information warfare. Cambridge University Press, New York

    Google Scholar 

  • Libicki M (2009) Deterrence in cyberspace, High Frontier, May 2009. http://www.afspc.af.mil/shared/media/document/AFD-090519-102.pdf

  • Mauney C (2009) Speech, space weapons in the twentyfirst century. http://www.stratcom.mil/speeches/19/

  • Mullen MG (2009) Joint Publication 1: doctrine for the armed forces of the USA, Joint Chiefs of Staff, United States Department of Defense. http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf

  • Paul C (2008) Information operations: doctrine and practice: a reference handbook. Praeger Security International, Westport

    Google Scholar 

  • Paulhamus BL, Castner AK, Jailall RRJ, Sibley NW, Snow KZ (2009) Analyzing the effect of information attack on air and missile defense performance. Military Communications Conference, MILCOM2009

    Google Scholar 

  • Roddy KA, Dickson MR (2000) Modeling human and organizational behaviorusing a relational-centric multi-agent system design paradigm, Naval Postgraduate School, M.S. thesis, Monterey, CA, September

    Google Scholar 

  • Sorrels D, Grimaila MR, Fortson LW, Mills RF (2008) An architecture for cyber incident mission impact assessment (CIMIA). In: Proceedings of the 2008 international conference on information warfare and security (ICIW 2008), Peter Kiewit Institute, University of Nebraska, Omaha

    Google Scholar 

  • Tinnel LS, Saydjari OS, Haines JW (2003) An integrated cyber panel system. In: Proceedings of the 2003 DARPA information survivability conference and exposition, vol 2, pp 32–34

    Google Scholar 

  • Tzu S (1994) The art of war (trans: Lionel Giles 1910). (Electronic text in the public domain May 1994). http://classics.mit.edu/Tzu/artwar.html

  • Ullman DG (2007) OO-OO-OO! The sound of a broken OODA loop, Crosstalk: J def Softw Engineer

    Google Scholar 

  • United States Strategic Command (2006) Deterrence operations, Joint operating concept, version 2.0, Director, Plans and Policy, USSTRATCOM, Offutt AFB NE 68113. http://www.dtic.mil/futurejointwarfare

  • US Government Accountability Office (2006) Internet infrastructure-challenges in developing a public/private recovery plan, GAO-06-1100T, Accessed 13 Sept 2006

    Google Scholar 

  • Verizon Business RISK Team (2009) Data breach investigations report. Verizon Business. http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf

  • Vijayan J (2005) Data security risks missing from disaster recovery plans. Comput World 39:41. Accessed 10 Oct 2005

    Google Scholar 

  • Waltz E (1998) Information warfare principles and operations. Artech House, Norwood

    Google Scholar 

  • Wood R (1995) Information engineering: the foundations of information warfare. Air War College, Maxwell AFB, GA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael W. Haas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this chapter

Cite this chapter

Haas, M.W., Mills, R.F., Grimaila, M.R. (2011). Aiding Understanding of a Contested Information Environment’s Effect on Operations. In: Rothrock, L., Narayanan, S. (eds) Human-in-the-Loop Simulations. Springer, London. https://doi.org/10.1007/978-0-85729-883-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-0-85729-883-6_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-0-85729-882-9

  • Online ISBN: 978-0-85729-883-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics