Global Security and Intelligence Studies Volume 5, Number 1, Spring / Summer 2020 | Page 19
The Case for the Sixth Domain of War: Psychological Warfare in the Age of Advanced Technology
3) It is a sphere that may include the
presence of an opponent
4) It is a sphere in which control can
be exercised over that opponent.
All of the war domains are nested
within the larger information environment.
The use of information during
wartime or in peacetime operations is
not unique to any of the domains. The
objective when conducting information
operations in any of the domains is to
deny, corrupt, or destroy an adversary’s
information and systems, to defend
our own, and to exploit available information
to enhance the decision cycle
and achieve information superiority
(Kovacich and Jones 2006). The Joint
Chiefs of Staff (2019) define “information
environment” as:
The aggregate of individuals,
organizations, and systems that
collect, process, disseminate, or
act on information.
Furthermore, it defines “information
operations” as:
The integrated employment,
during military operations, of
information-related capabilities
in concert with other lines of operation
to influence, disrupt, corrupt,
or usurp the decision-making
of adversaries and potential
adversaries while protecting our
own.
More broadly, “information warfare”
generally comprises three functional
areas:
• electronic warfare (e.g., jamming
communications links, eavesdropping
of signals)
• network warfare (where computer
networks are the weapons and
targets)
• psychological operations (which
aims at altering the perceptions of
the target audience to be favorable
to one’s objective) (Brazzoli 2007)
Where the Cyber Domain
Begins and Ends
Mapping out cyberspace can
assist in visualizing the fifth
domain (see Appendix 1).
Cyberspace is generally viewed as
three layers: physical, logical, and social.
Within these three layers are five
components: geographic, the physical
network, the logical network, cyber
persona, and persona. The geographic
component refers to the physical location
of network elements. The physical
network components include all of the
hardware and infrastructure required
for network operability. The logical layer
is technical in nature and consists of
the logical connections that exist between
devices. The social layer consists
of cyber personas, referring to identification
on a network, such as email addresses
or computer IP addresses, and
personas, meaning the actual person
behind the network. This top social
layer is obviously required, as the fifth
domain cannot be navigated without
end-to-end users. However, operations
conducted with targets in the cyber domain
allow only for the effects of the
two functional areas of electronic and
network warfare, excluding the effects
of psychological operations.
5