Shannon, Hypergames and Information Warfare...
Transcript of Shannon, Hypergames and Information Warfare...
![Page 1: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/1.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
1/27
�
�
�
�
�
�
Computer Science & Software Engineeringhttp://www.csse.monash.edu.au/
Shannon,Hypergames andInformation Warfare
Carlo Kopp, BE(Hons), MSc, PhD, PEngMonash University, Clayton, Australiaemail: [email protected]
c© 2002, Monash University, Australia
![Page 2: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/2.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
2/27
�
�
�
�
�
�
Defining Information WarfareUS DoD: ‘Information Warfare is any action to Deny, Exploit, Corrupt
or Destroy the enemy’s information and its functions; protecting our-
selves against those actions and exploiting our own military information
functions’.
• IW is defined as ‘actions’ which yield intended outcomes of ‘denial’,
‘exploitation’, ‘corruption’ and ‘destruction’ of an opponent’s ‘infor-
mation’.
• The model does not provide a quantifiable basis or measure of ‘in-
formation’.
• Borden (1999) and Kopp (2000) argue that Shannon (1948) provides
a model to address this limitation. Shannon’s ‘channel capacity’
model relates useful channel capacity to bandwidth and the ratio of
available signal to noise.
![Page 3: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/3.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
3/27
�
�
�
�
�
�
Shannon’s Model (1)
C = B.log2(S
N) (1)
![Page 4: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/4.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
4/27
�
�
�
�
�
�
Shannon’s Model (2)
• Shannon’s model defined in terms of a communication channel, with
a ‘source’, ‘destination’, ‘transmitter’, ‘receiver’ and a ‘noise source’
which impairs the channel ‘capacity’, otherwise bounded by ‘band-
width’ and ‘signal’.
• Borden: ‘IW is a battle for bandwidth (capacity)’.
• Shannon’s model can be easily mapped on to the four ‘canonical
offensive Information Warfare strategies’.
1. Denial of Information.
2. Deception and Mimicry.
3. Disruption and Destruction.
4. SUBversion.
![Page 5: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/5.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
5/27
�
�
�
�
�
�
Four Canonical IW Strategies
1. Denial of Information / Degradation or Destruction
(US DoD), i.e. concealment and camouflage, or stealth.
2. Deception and Mimicry / Corruption (US DoD), i.e.
the insertion of intentionally misleading information.
3. Disruption and Destruction / Denial [1] (US DoD),
i.e. the insertion of information which produces a dysfunction inside
the opponent’s system; alternately the outright destruction of the
receiver subsystem.
4. SUBversion / Denial [2] (US DoD), i.e. insertion of infor-
mation which triggers a self destructive process in the opponent’s
target system; SUB at the simplest level amounts to the diversion
of the thread of execution within a Turing machine.
![Page 6: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/6.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
6/27
�
�
�
�
�
�
Model for DoI/Degradation Strategy
1. DoI/Degradation Strategy
DESTINATION
MESSAGE
RECEIVER
RECEIVEDSIGNAL
SIGNAL
TRANSMITTERSOURCEINFORMATION
MESSAGE
ATTACKER’SNOISE SOURCE
NOISESOURCE
![Page 7: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/7.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
7/27
�
�
�
�
�
�
Model for D&M/Corruption Strategy
2. D&M/Corruption Strategy
SIGNAL
TRANSMITTERSOURCEINFORMATION
MESSAGE
DECEPTIVE
SIGNAL
TRANSMITTERATTACKER’SATTACKER’S
INFORMATIONSOURCE
NOISESOURCE
MESSAGE
DESTINATIONRECEIVER
RECEIVEDSIGNAL
![Page 8: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/8.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
8/27
�
�
�
�
�
�
Model for D&D/Denial (1) Strategy
3. D&D/Denial [1] Strategy
RECEIVER
RECEIVEDSIGNAL
SIGNAL
TRANSMITTERSOURCEINFORMATION
MESSAGE
ATTACKERDISRUPTS OR
DESTROYSRECEIVER
NOISESOURCE
MESSAGE
DESTINATION
![Page 9: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/9.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
9/27
�
�
�
�
�
�
Model for SUB/Denial (2) Strategy
4. SUB/Denial [2] Strategy
(B)
(A)
SOURCE
DESTRUCTIVEEFFECT
SYSTEMIN VICTIM
TRANSMITTERATTACKER’SATTACKER’S
SUBVERSIVEINFORMATION
SIGNAL
SUBVERSIVE
NOISESOURCE
MESSAGE
DESTINATIONRECEIVER
RECEIVEDSIGNAL
SIGNAL
TRANSMITTERSOURCEINFORMATION
MESSAGE
![Page 10: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/10.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
10/27
�
�
�
�
�
�
Model for Exploitation Technique
Exploitation Technique
RECEIVED
DESTINATIONRECEIVER
SIGNALSIGNAL
TRANSMITTERSOURCEINFORMATION
MESSAGE
ATTACKER’SRECEIVER
ATTACKER
NOISESOURCE
MESSAGE
![Page 11: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/11.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
11/27
�
�
�
�
�
�
Example of DoI/Degradation Strategy
Stealth Technology
1. DoI/Degradation Strategy
Radar PerformanceDegrades Hostile
Background & Receiver Noise
(c) 2001, Carlo Kopp
![Page 12: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/12.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
12/27
�
�
�
�
�
�
Example of D&M/Corruption Strategy
Deception Jamming
2. D&M/Corruption Strategy
Errors in Hostile RadarIntroduces Tracking
(c) 2001, Carlo Kopp
![Page 13: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/13.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
13/27
�
�
�
�
�
�
Example of D&D/Denial (1) Strategy
Anti−Radiation Missiles
3. D&D/Denial [1] Strategy
Destroy Hostile Receivers
(c) 2001, Carlo Kopp
![Page 14: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/14.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
14/27
�
�
�
�
�
�
Example of SUB/Denial (2) Strategy
Triggers Premature Missile Fuse Jamming
Detonation
4. SUB/Denial [2] Strategy
(c) 2001, Carlo Kopp
![Page 15: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/15.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
15/27
�
�
�
�
�
�
Limitations of the Shannon Model
1. The Shannon model provides a powerful tool for capturing the inter-
actions between adversaries and the information carrying channel.
2. The Shannon model cannot capture how the manipulation of the
channel might be reflected in the behaviour of the adversaries.
3. How can we best model the interaction of adversaries given their use
of some combination of the four canonical strategies?
![Page 16: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/16.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
16/27
�
�
�
�
�
�
Hypergames (Bennett/Fraser/Hipel)
Hypergames are games in which the respective adversaries may not
be fully aware of the nature of the engagement they are participating
in, or indeed that they are actually participating in an engagement.
Characteristics include:
1. Players may have false perceptions of the intent or aims of the other
players.
2. Players may not understand the choices available to other players.
3. Players may not know who other players in the game may be.
4. A player may be subject to one or more of the previous mispercep-
tions of the game.
The ‘perfect information’ assumption does not hold for a hypergame.
![Page 17: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/17.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
17/27
�
�
�
�
�
�
Boyd vs Hypergames
1. Boyd (1986) defines the ‘Observation-Orientation-Decision-Action’
loop or ‘OODA Loop’ as a model for an engagement.
2. A player’s perception of a game is described by the ‘Observation-
Orientation’ phase of an OODA Loop.
3. A player’s choices in a game are described by the ‘Decision-Action’
phase of an OODA Loop.
4. Boyd’s OODA loop describes the basic dynamic in a Game/Hypergame.
Information Warfare is a means to an end in a hypergame - it permits
alteration of an opponent’s perception of the game in a manner yielding
an advantage to the player using it.
![Page 18: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/18.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
18/27
�
�
�
�
�
�
The Game Model
Model
Player ‘A’ Game Player ‘B’ Game
Actions Actions
‘A’ ‘B’
Decision
Model for a Game
FunctionDecisionFunction
OutcomeModel
Outcome
![Page 19: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/19.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
19/27
�
�
�
�
�
�
The Hypergame Model (1)
‘A’
Both PlayersAccount forAdversary’s
Game Strategy
Model for a Hypergame
FunctionDecisionFunction
OutcomeModel
‘B’
OutcomeModel
on Available Information
Decision
Player ‘A’ Game Player ‘B’ Game
Actions Actions
PerceivedModel
‘B’ ‘A’Model
Perceived
InformationInformation
The Accuracyof the PerceivedGames Depends
![Page 20: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/20.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
20/27
�
�
�
�
�
�
The Hypergame Model (2)
1. Denial of Information, this IW strategy is central to hyper-
games in which either the presence of a player, or the intent of a
player is to be concealed from another.
2. Deception and Mimicry, is applied in a hypergame in order to
alter another player’s perception of the game at hand. It amounts
to directly changing another player’s perception of the game.
3. Disruption and Destruction, is applied by a player in a hy-
pergame to prevent another player from perceiving the state of the
game. D&D can betray the player using it.
4. SUBversion, is a strategy where a unilateral action by a player
alters the perception of the situation by a victim player to elicit a
self destructive unilateral action.
![Page 21: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/21.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
21/27
�
�
�
�
�
�
DoI/Degradation Strategy
Model
Attacker Degrades
FunctionDecisionFunction
PerceivedVictimModel
AttackerOutcome
Victim’s Information Flow
Decision Actions ActionsInformationInformation
Attacker Game
Perceived
Model
Victim Game
Attacker
OutcomeModel
Victim
1.DoI/Degradation Strategy
Degraded
to Impair Qualityof Victim’s Model
![Page 22: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/22.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
22/27
�
�
�
�
�
�
D&M/Corruption Strategy
Model
Victim’s Model
FunctionDecisionFunction
PerceivedVictimModel
AttackerOutcome
to Manipulate
Decision Actions ActionsInformationInformation
Attacker Game
Perceived
Model
Victim Game
Attacker
OutcomeModel
Victim
Corrupted
Victim’s Information FlowAttacker Corrupts
2.D&M/Corruption Strategy
![Page 23: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/23.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
23/27
�
�
�
�
�
�
D&D/Denial (1) Strategy
Model3.D&D/Denial [1] Strategy
FunctionDecisionFunction
PerceivedVictimModel
AttackerOutcome
Decision Actions Actions
Information
Attacker Game
Perceived
Model
Victim Game
Attacker
OutcomeModel
Victim
to Impair Qualityof Victim’s Model
Victim’s Information FlowAttacker Destroys
![Page 24: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/24.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
24/27
�
�
�
�
�
�
SUB/Denial (2) Strategy
Model
Message
FunctionDecisionFunction
PerceivedVictimModel
AttackerOutcome
Subversion
Decision Actions Actions
Information
Attacker Game
Perceived
Model
Victim Game
Attacker
OutcomeModel
Victim
Attacker ManipulatesVictim’s Information Flow
4.SUB/Denial [2] Strategy
to Trigger Self DestructiveAction
![Page 25: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/25.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
25/27
�
�
�
�
�
�
Conclusions
1. Shannon’s paradigm of an information carrying channel provides a
good basis for modelling the effects of Information Warfare.
2. The four canonical IW strategies can be readily modelled using Shan-
non’s theory.
3. Hypergames provide a good model for representing interactions be-
tween adversaries executing IW actions.
4. Hypergames provide a good model for representing the dynamic of
Boyd’s OODA loop.
5. Future research should explore modelling such systems with higher
order hypergames.
![Page 26: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/26.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
26/27
�
�
�
�
�
�
End Presentation
![Page 27: Shannon, Hypergames and Information Warfare …users.monash.edu/~carlo/InfoWar/Lectures/_JIW-2002-1-CK...Computer Science & Software Engineering 2/27 Defining Information Warfare](https://reader033.fdocuments.in/reader033/viewer/2022042412/5f2b1d1f5db696273d05f74b/html5/thumbnails/27.jpg)
Computer Science & Software EngineeringComputer Science & Software EngineeringComputer Science & Software Engineering
27/27
�
�
�
�
�
�
Revision InformationThis document is currently at revision level:
$Id: _JIW-2002-1-CK-S.tex,v 1.4 2002/11/24 06:01:13 carlo Exp carlo $