- "It is completely clear that the state which is
first to create suchweapons will achieve incomparable superiority."
- Major I. Chernishev, Russian Army[1]
-
-
- The human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical
activity of the brain, heart, and peripheral nervous system, the signals
sent from the cortex region of the brain to other parts of our body, the
tiny hair cells in the inner ear that process auditory signals, and the
light-sensitive retina and cornea of the eye that process visual activity.[2]
We are on the threshold of an era in which these data processors of the
human body may be manipulated or debilitated. Examples of unplanned attacks
on the body's data-processing capability are well-documented. Strobe lights
have been known to cause epileptic seizures. Not long ago in Japan, children
watching television cartoons were subjected to pulsating lights that caused
seizures in some and made others very sick.
-
- Defending friendly and targeting adversary data-processing
capabilities of the body appears to be an area of weakness in the US approach
to information warfare theory, a theory oriented heavily toward systems
data-processing and designed to attain information dominance on the battlefield.
Or so it would appear from information in the open, unclassified press.
This US shortcoming may be a serious one, since the capabilities to alter
the data- processing systems of the body already exist. A recent edition
of U.S. News and World Report highlighted several of these "wonder
weapons" (acoustics, microwaves, lasers) and noted that scientists
are "searching the electromagnetic and sonic spectrums for wavelengths
that can affect human behavior."[3] A recent Russian military article
offered a slightly different slant to the problem, declaring that "humanity
stands on the brink of a psychotronic war" with the mind and body
as the focus. That article discussed Russian and international attempts
to control the psycho-physical condition of man and his decisionmaking
processes by the use of VHF-generators, "noiseless cassettes,"
and other technologies.
-
- An entirely new arsenal of weapons, based on devices
designed to introduce subliminal messages or to alter the body's psychological
and data-processing capabilities, might be used to incapacitate individuals.
These weapons aim to control or alter the psyche, or to attack the various
sensory and data-processing systems of the human organism. In both cases,
the goal is to confuse or destroy the signals that normally keep the body
in equilibrium.
-
- This article examines energy-based weapons, psychotronic
weapons, and other developments designed to alter the ability of the human
body to process stimuli. One consequence of this assessment is that the
way we commonly use the term "information warfare" falls short
when the individual soldier, not his equipment, becomes the target of
attack.
-
- Information Warfare Theory and the Data-Processing Element
of Humans
-
- In the United States the common conception of information
warfare focuses primarily on the capabilities of hardware systems such
as computers, satellites, and military equipment which process data in
its various forms. According to Department of Defense Directive S-3600.1
of 9 December 1996, information warfare is defined as "an information
operation conducted during time of crisis or conflict to achieve or promote
specific objectives over a specific adversary or adversaries." An
information operation is defined in the same directive as "actions
taken to affect adversary information and information systems while defending
one's own information and information systems." These "information
systems" lie at the heart of the modernization effort of the US armed
forces and other countries, and manifest themselves as hardware, software,
communications capabilities, and highly trained individuals. Recently,
the US Army conducted a mock battle that tested these systems under simulated
combat conditions.
-
- US Army Field Manual 101-5-1, Operational Terms and Graphics
(released 30 September 1997), defines information warfare as "actions
taken to achieve information superiority by affecting a hostile's information,
information based-processes, and information systems, while defending
one's own information, information processes, and information systems."
The same manual defines information operations as a "continuous military
operation within the military information environment that enables, enhances,
and protects friendly forces' ability to collect, process, and act on
information to achieve an advantage across the full range of military
operations. [Information operations include] interacting with the Global
Information Environment . . . and exploiting or denying an adversary's
information and decision capabilities."[4]
-
- This "systems" approach to the study of information
warfare emphasizes the use of data, referred to as information, to penetrate
an adversary's physical defenses that protect data (information) in order
to obtain operational or strategic advantage. It has tended to ignore the
role of the human body as an information- or data-processor in this quest
for dominance except in those cases where an individual's logic or rational
thought may be upset via disinformation or deception. As a consequence
little attention is directed toward protecting the mind and body with
a firewall as we have done with hardware systems. Nor have any techniques
for doing so been prescribed. Yet the body is capable not only of being
deceived, manipulated, or misinformed but also shut down or destroyed--just
as any other data-processing system. The "data" the body receives
from external sources--such as electromagnetic, vortex, or acoustic energy
waves--or creates through its own electrical or chemical stimuli can be
manipulated or changed just as the data (information) in any hardware
system can be altered.
-
- The only body-related information warfare element considered
by the United States is psychological operations (PSYOP). In Joint Publication
3-13.1, for example, PSYOP is listed as one of the elements of command
and control warfare. The publication notes that "the ultimate target
of [information warfare] is the information dependent process, whether
human or automated . . . . Command and control warfare (C2W) is an application
of information warfare in military operations. . . . C2W is the integrated
use of PSYOP, military deception, operations security, electronic warfare
and physical destruction."[5]
-
- One source defines information as a "nonaccidental
signal used as an input to a computer or communications system."[6]
The human body is a complex communication system constantly receiving nonaccidental
and accidental signal inputs, both external and internal. If the ultimate
target of information warfare is the information-dependent process, "whether
human or automated," then the definition in the joint publication
implies that human data-processing of internal and external signals can
clearly be considered an aspect of information warfare. Foreign researchers
have noted the link between humans as data processors and the conduct
of information warfare. While some study only the PSYOP link, others go
beyond it. As an example of the former, one recent Russian article described
offensive information warfare as designed to "use the Internet channels
for the purpose of organizing PSYOP as well as for `early political warning'
of threats to American interests."[7] The author's assertion was based
on the fact that "all mass media are used for PSYOP . . . [and] today
this must include the Internet." The author asserted that the Pentagon
wanted to use the Internet to "reinforce psychological influences"
during special operations conducted outside of US borders to enlist sympathizers,
who would accomplish many of the tasks previously entrusted to special
units of the US armed forces.
-
- Others, however, look beyond simple PSYOP ties to consider
other aspects of the body's data-processing capability. One of the principal
open source researchers on the relationship of information warfare to
the body's data-processing capability is Russian Dr. Victor Solntsev of
the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned
researcher striving to point out to the world the potential dangers of
the computer operator interface. Supported by a network of institutes
and academies, Solntsev has produced some interesting concepts.[8] He
insists that man must be viewed as an open system instead of simply as
an organism or closed system. As an open system, man communicates with
his environment through information flows and communications media. One's
physical environment, whether through electromagnetic, gravitational, acoustic,
or other effects, can cause a change in the psycho-physiological condition
of an organism, in Solntsev's opinion. Change of this sort could directly
affect the mental state and consciousness of a computer operator. This
would not be electronic war or information warfare in the traditional
sense, but rather in a nontraditional and non-US sense. It might encompass,
for example, a computer modified to become a weapon by using its energy
output to emit acoustics that debilitate the operator. It also might encompass,
as indicated below, futuristic weapons aimed against man's "open
system."
-
- Solntsev also examined the problem of "information
noise," which creates a dense shield between a person and external
reality. This noise may manifest itself in the form of signals, messages,
images, or other items of information. The main target of this noise would
be the consciousness of a person or a group of people. Behavior modification
could be one objective of information noise; another could be to upset
an individual's mental capacity to such an extent as to prevent reaction
to any stimulus. Solntsev concludes that all levels of a person's psyche
(subconscious, conscious, and "superconscious") are potential
targets for destabilization.
-
- According to Solntsev, one computer virus capable of
affecting a person's psyche is Russian Virus 666. It manifests itself in
every 25th frame of a visual display, where it produces a combination
of colors that allegedly put computer operators into a trance. The subconscious
perception of the new pattern eventually results in arrhythmia of the
heart. Other Russian computer specialists, not just Solntsev, talk openly
about this "25th frame effect" and its ability to subtly manage
a computer user's perceptions. The purpose of this technique is to inject
a thought into the viewer's subconscious. It may remind some of the subliminal
advertising controversy in the United States in the late 1950s.
-
- US Views on "Wonder Weapons": Altering the
Data-Processing Ability of the Body
-
- What technologies have been examined by the United States
that possess the potential to disrupt the data-processing capabilities
of the human organism? The 7 July 1997 issue of U.S. News and World Report
described several of them designed, among other things, to vibrate the
insides of humans, stun or nauseate them, put them to sleep, heat them
up, or knock them down with a shock wave.[9] The technologies include
dazzling lasers that can force the pupils to close; acoustic or sonic
frequencies that cause the hair cells in the inner ear to vibrate and
cause motion sickness, vertigo, and nausea, or frequencies that resonate
the internal organs causing pain and spasms; and shock waves with the
potential to knock down humans or airplanes and which can be mixed with
pepper spray or chemicals.[10]
-
- With modification, these technological applications can
have many uses. Acoustic weapons, for example, could be adapted for use
as acoustic rifles or as acoustic fields that, once established, might
protect facilities, assist in hostage rescues, control riots, or clear
paths for convoys. These waves, which can penetrate buildings, offer a
host of opportunities for military and law enforcement officials. Microwave
weapons, by stimulating the peripheral nervous system, can heat up the
body, induce epileptic-like seizures, or cause cardiac arrest. Low-frequency
radiation affects the electrical activity of the brain and can cause flu-like
symptoms and nausea. Other projects sought to induce or prevent sleep,
or to affect the signal from the motor cortex portion of the brain, overriding
voluntary muscle movements. The latter are referred to as pulse wave weapons,
and the Russian government has reportedly bought over 100,000 copies of
the "Black Widow" version of them.[11]
-
- However, this view of "wonder weapons" was
contested by someone who should understand them. Brigadier General Larry
Dodgen, Deputy Assistant to the Secretary of Defense for Policy and Missions,
wrote a letter to the editor about the "numerous inaccuracies"
in the U.S. News and World Report article that "misrepresent the
Department of Defense's views."[12] Dodgen's primary complaint seemed
to have been that the magazine misrepresented the use of these technologies
and their value to the armed forces. He also underscored the US intent
to work within the scope of any international treaty concerning their
application, as well as plans to abandon (or at least redesign) any weapon
for which countermeasures are known. One is left with the feeling, however,
that research in this area is intense. A concern not mentioned by Dodgen
is that other countries or non-state actors may not be bound by the same
constraints. It is hard to imagine someone with a greater desire than
terrorists to get their hands on these technologies. "Psycho-terrorism"
could be the next buzzword.
-
- Russian Views on "Psychotronic War"
-
- The term "psycho-terrorism" was coined by Russian
writer N. Anisimov of the Moscow Anti-Psychotronic Center. According to
Anisimov, psychotronic weapons are those that act to "take away a
part of the information which is stored in a man's brain. It is sent to
a computer, which reworks it to the level needed for those who need to
control the man, and the modified information is then reinserted into
the brain." These weapons are used against the mind to induce hallucinations,
sickness, mutations in human cells, "zombification," or even
death. Included in the arsenal are VHF generators, X-rays, ultrasound,
and radio waves. Russian army Major I. Chernishev, writing in the military
journal Orienteer in February 1997, asserted that "psy" weapons
are under development all over the globe. Specific types of weapons noted
by Chernishev (not all of which have prototypes) were:
-
- * A psychotronic generator, which produces a powerful
electromagnetic emanation capable of being sent through telephone lines,
TV, radio networks, supply pipes, and incandescent lamps. * An
autonomous generator, a device that operates in the 10-150 Hertz band,
which at the 10-20 Hertz band forms an infrasonic oscillation that is destructive
to all living creatures. * A nervous system generator, designed to
paralyze the central nervous systems of insects, which could have
the same applicability to humans. * Ultrasound emanations, which one
institute claims to have developed. Devices using ultrasound emanations
are supposedly capable of carrying out bloodless internal operations without
leaving a mark on the skin. They can also, according to Chernishev, be
used to kill. * Noiseless cassettes. Chernishev claims that the Japanese
have developed the ability to place infra-low frequency voice patterns
over music, patterns that are detected by the subconscious. Russians claim
to be using similar "bombardments" with computer programming
to treat alcoholism or smoking. * The 25th-frame effect, alluded to
above, a technique wherein each 25th frame of a movie reel or film
footage contains a message that is picked up by the subconscious.
This technique, if it works, could possibly be used to curb smoking
and alcoholism, but it has wider, more sinister applications if used
on a TV audience or a computer operator. * Psychotropics, defined
as medical preparations used to induce a trance, euphoria, or depression.
Referred to as "slow-acting mines," they could be slipped
into the food of a politician or into the water supply of an entire
city. Symptoms include headaches, noises, voices or commands in the
brain, dizziness, pain in the abdominal cavities, cardiac arrhythmia, or
even the destruction of the cardiovascular system.
-
- There is confirmation from US researchers that this type
of study is going on. Dr. Janet Morris, coauthor of The Warrior's Edge,
reportedly went to the Moscow Institute of Psychocorrelations in 1991.
There she was shown a technique pioneered by the Russian Department of
Psycho-Correction at Moscow Medical Academy in which researchers electronically
analyze the human mind in order to influence it. They input subliminal
command messages, using key words transmitted in "white noise"
or music. Using an infra-sound, very low frequency transmission, the acoustic
psycho-correction message is transmitted via bone conduction.[13]
-
- In summary, Chernishev noted that some of the militarily
significant aspects of the "psy" weaponry deserve closer research,
including the following nontraditional methods for disrupting the psyche
of an individual:
-
- * ESP research: determining the properties and condition
of objects without ever making contact with them and "reading"
peoples' thoughts * Clairvoyance research: observing objects that
are located just beyond the world of the visible--used for intelligence
purposes * Telepathy research: transmitting thoughts over a distance--used
for covert operations * Telekinesis research: actions involving
the manipulation of physical objects using thought power, causing
them to move or break apart--used against command and control systems,
or to disrupt the functioning of weapons of mass destruction
* Psychokinesis research: interfering with the thoughts of individuals,
on either the strategic or tactical level While many US scientists
undoubtedly question this research, it receives strong support in Moscow.
The point to underscore is that individuals in Russia (and other countries
as well) believe these means can be used to attack or steal from the data-processing
unit of the human body.
-
- Solntsev's research, mentioned above, differs slightly
from that of Chernishev. For example, Solntsev is more interested in hardware
capabilities, specifically the study of the information-energy source
associated with the computer-operator interface. He stresses that if these
energy sources can be captured and integrated into the modern computer,
the result will be a network worth more than "a simple sum of its
components." Other researchers are studying high-frequency generators
(those designed to stun the psyche with high frequency waves such as electromagnetic,
acoustic, and gravitational); the manipulation or reconstruction of someone's
thinking through planned measures such as reflexive control processes;
the use of psychotronics, parapsychology, bioenergy, bio fields, and psychoenergy;[14]
and unspecified "special operations" or anti-ESP training.
-
- The last item is of particular interest. According to
a Russian TV broadcast, the strategic rocket forces have begun anti-ESP
training to ensure that no outside force can take over command and control
functions of the force. That is, they are trying to construct a firewall
around the heads of the operators.
-
- Conclusions
-
- At the end of July 1997, planners for Joint Warrior Interoperability
Demonstration '97 "focused on technologies that enhance real-time
collaborative planning in a multinational task force of the type used in
Bosnia and in Operation Desert Storm. The JWID '97 network, called the
Coalition Wide-Area Network (CWAN), is the first military network that
allows allied nations to participate as full and equal partners."[15]
The demonstration in effect was a trade fair for private companies to
demonstrate their goods; defense ministries got to decide where and how
to spend their money wiser, in many cases without incurring the cost of
prototypes. It is a good example of doing business better with less. Technologies
demonstrated included:[16] * Soldiers using laptop computers to drag cross-hairs
over maps to call in airstrikes * Soldiers carrying beepers and
mobile phones rather than guns * Generals tracking movements of every
unit, counting the precise number of shells fired around the globe,
and inspecting real-time damage inflicted on an enemy, all with multicolored
graphics[17] Every account of this exercise emphasized the ability of systems
to process data and provide information feedback via the power invested
in their microprocessors. The ability to affect or defend the data-processing
capability of the human operators of these systems was never mentioned
during the exercise; it has received only slight attention during countless
exercises over the past several years. The time has come to ask why we
appear to be ignoring the operators of our systems. Clearly the information
operator, exposed before a vast array of potentially immobilizing weapons,
is the weak spot in any nation's military assets. There are few international
agreements protecting the individual soldier, and these rely on the good
will of the combatants. Some nations, and terrorists of every stripe,
don't care about such agreements.
-
- This article has used the term data-processing to demonstrate
its importance to ascertaining what so-called information warfare and
information operations are all about. Data-processing is the action this
nation and others need to protect. Information is nothing more than the
output of this activity. As a result, the emphasis on information-related
warfare terminology ("information dominance," "information
carousel") that has proliferated for a decade does not seem to fit
the situation before us. In some cases the battle to affect or protect
data-processing elements pits one mechanical system against another. In
other cases, mechanical systems may be confronted by the human organism,
or vice versa, since humans can usually shut down any mechanical system
with the flip of a switch. In reality, the game is about protecting or
affecting signals, waves, and impulses that can influence the data-processing
elements of systems, computers, or people. We are potentially the biggest
victims of information warfare, because we have neglected to protect ourselves.
-
- Our obsession with a "system of systems," "information
dominance," and other such terminology is most likely a leading cause
of our neglect of the human factor in our theories of information warfare.
It is time to change our terminology and our conceptual paradigm. Our
terminology is confusing us and sending us in directions that deal primarily
with the hardware, software, and communications components of the data-processing
spectrum. We need to spend more time researching how to protect the humans
in our data management structures. Nothing in those structures can be
sustained if our operators have been debilitated by potential adversaries
or terrorists who--right now--may be designing the means to disrupt the
human component of our carefully constructed notion of a system of systems.
-
- NOTES
-
- 1. I. Chernishev, "Can Rulers Make `Zombies' and
Control the World?" Orienteer, February 1997, pp. 58-62.
-
- 2. Douglas Pasternak, "Wonder Weapons," U.S.
News and World Report, 7 July 1997, pp. 38-46.
-
- 3. Ibid., p. 38.
-
- 4. FM 101-5-1, Operational Terms and Graphics, 30 September
1997, p. 1-82.
-
- 5. Joint Pub 3-13.1, Joint Doctrine for Command and Control
Warfare (C2W), 7 February 1996, p. v.
-
- 6. The American Heritage Dictionary (2d College Ed.;
Boston: Houghton Mifflin, 1982), p. 660, definition 4.
-
- 7. Denis Snezhnyy, "Cybernetic Battlefield &
National Security," Nezavisimoye Voyennoye Obozreniye, No. 10, 15-21
March 1997, p. 2.
-
- 8. Victor I. Solntsev, "Information War and Some
Aspects of a Computer Operator's Defense," talk given at an Infowar
Conference in Washington, D.C., September 1996, sponsored by the National
Computer Security Association. Information in this section is based on
notes from Dr. Solntsev's talk.
-
- 9. Pasternak, p. 40.
-
- 10. Ibid., pp. 40-46.
-
- 11. Ibid.
-
- 12. Larry Dodgen, "Nonlethal Weapons," U.S.
News and World Report, 4 August 1997, p. 5.
-
- 13. "Background on the Aviary," Nexus Magazine,
downloaded from the Internet on 13 July 1997 from www.execpc.com/vjentpr/nexusavi.html,
p.7.
-
- 14. Aleksandr Cherkasov, "The Front Where Shots
Aren't Fired," Orienteer, May 1995, p. 45. This article was based
on information in the foreign and Russian press, according to the author,
making it impossible to pinpoint what his source was for this reference.
-
- 15. Bob Brewin, "DOD looks for IT `golden nuggets,'"
Federal Computer Week, 28 July 1997, p. 31, as taken from the Earlybird
Supplement, 4 August 1997, p.B 17.
-
- 16. Oliver August, "Zap! Hard day at the office
for NATO's laptop warriors," The Times, 28 July 1997, as taken from
the Earlybird Supplement, 4 August 1997, p. B 16.
-
- 17. Ibid. ________________________
-
- Lieutenant Colonel Timothy L. Thomas (USA Ret.) is an
analyst at the Foreign Military Studies Office, Fort Leavenworth, Kansas.
Recently he has written extensively on the Russian view of information
operations and on current Russian military-political issues. During his
military career he served in the 82d Airborne Division and was the Department
Head of Soviet Military-Political Affairs at the US Army's Russian Institute
in Garmisch, Germany.
-
|