[Infowarrior] - IO: DoD wages infowar on itself

Richard Forno rforno at infowarrior.org
Fri Sep 19 00:06:02 UTC 2008


The threat from within
E-mail overload degrades military decision-making
By Col. Peter R. Marksteiner

http://www.afji.com/2008/09/3640424

If a technological or biological weapon were devised that could render  
tens of thousands of Defense Department knowledge workers incapable of  
focusing their attention on cognitive tasks for more than 10 minutes  
at a time, joint military doctrine would clearly define the weapon as  
a threat to national security.

Indeed, according to the principles of network attack under Joint  
Publication 3-13, “Information Operations (IO),” anything that  
degrades or denies information or the way information is processed and  
acted upon constitutes an IO threat. That same publication cautions  
military leaders to be ever-vigilant in protecting against evolving  
technologically based threats. Yet throughout the Defense Department  
and the federal government, the inefficient and undisciplined use of  
technology by the very people technology was supposed to benefit is  
degrading the quality of decision-making and hobbling the cognitive  
dimension of the information environment.

Commentators use terms such as data smog, informania, data  
asphyxiation, attentional overload and cyber-indigestion to describe a  
newly recognized phenomenon: information overload. Lax digital hygiene  
and the careless use of technology exacerbate the harmful effects of  
information overload. As a result, commanders and decision-makers at  
all levels are rendered less aware and less capable of resolving  
complex issues and maintaining decision dominance across the range of  
military operations.

Joint doctrine unambiguously recognizes that “information is a  
strategic resource vital to national security,” and that “dominance  
of the information environment is a reality that extends to the Armed  
Forces of the U.S. at all levels.” Though IO doctrine doesn’t  
specifically appear to address unintentional internally generated  
threats, JP 3-13’s definitions and analytical framework clearly  
illuminate an evolving IO threat to which we routinely subject our  
decision-making processes by neglecting to manage information overload.

Information overload is taking on greater prominence in academic and  
mainstream media, with coverage cast primarily on lost productivity,  
economic impacts, and worker health and satisfaction. From the  
relentless torrent of e-mail, to the Internet’s seductive capacity to  
draw knowledge workers away from productive cognitive engagement like  
intellectual crack cocaine, there’s a growing consensus that while  
information is generally a good thing, too much of it clearly is not.

IO threats come in many different forms. Maybe it’s a server-clogging  
12 megabyte PowerPoint slide with an embedded photo of a tropical  
sunset inviting you to a retirement luncheon for someone you’ve never  
met. Perhaps it’s the eighth volley of a “reply to all” e-mail  
chain recounting a discussion that’s irrelevant to you and 47 of the  
other 50 CC’d addressees. Or it could be the important deadline you  
overlooked because the task and due date were buried somewhere in the  
middle of a rambling narrative, the subject line of which failed to  
differentiate it in any way from the inescapable rising tide of  
inconsequential flotsam already choking your inbox.

We all receive too much e-mail. According to the Radacati Research  
Group, roughly 541 million knowledge workers worldwide rely on e-mail  
to conduct business, with corporate users sending and receiving an  
average of 133 messages per day — and rising. While no open-source  
studies address how the Defense Department’s e-mail volume compares  
to corporate users’, my own anecdotal experience and that of legions  
of colleagues suggests a striking similarity. Without fail, they  
report struggling every day to keep up with an e-mail inbox bloated  
with either poorly organized slivers of useful data points that must  
be sifted like needles from stacks of nonvalue-adding informational  
hay or messages that are completely unrelated to any mission- 
furthering purpose.

E-mail is a poor tool for communicating complex ideas. Text-only  
communication, or “lean media,” as it is referred to by researchers  
who study the comparatively new field of computer mediated  
communication, lacks the nonverbal cues, such as facial expression,  
body language, vocal tone and tempo, that inform richer means of  
communication. Moreover, aside from its qualitative shortcomings and  
viral-like reproductive capacity, a growing body of research suggests  
e-mail’s interruptive nature is perhaps the most pressing threat to  
decision-making in the cognitive dimension.

Interruptions are carcinogenic to complex decision making. Cheri  
Speier, associate professor of information systems at Michigan State  
University, explains that “more frequent interruptions are likely to  
place a greater processing load on the decision-maker. Each  
interruption requires a recovery period where reprocessing of some  
primary task information occurs. Consequently, the number of recovery  
periods, the recovery time and likelihood of errors all increase as  
the frequency of interruption increases.” Gloria Mark, who teaches  
informatics at the University of California, Irvine, found that  
knowledge workers spend an average of only 11 minutes on a project  
before being interrupted.

Round-the-clock checking

According a recent study conducted by Basex Inc., an IT business  
consultancy whose work on information overload has repeatedly been  
featured in national media, “the majority of knowledge workers ...  
tend to open new e-mail immediately or shortly after notification,  
rather than waiting until they have a lull in their work.” The latest  
Basex observation comports with other study results, including AOL’s  
2007 Third Annual E-mail Addiction Survey, which found people check e- 
mail around the clock. Fifty-nine percent of those with portable  
devices check every time a new e-mail arrives. Basex says  
interruptions already consume about 28 percent of the average  
knowledge worker’s day, and e-mail-driven interruptions continue to  
increase, contributing to an estimated $650 billion a year in lost  
productivity for U.S. companies.

Several U.S. and European firms are experimenting with policies  
designed to curtail the inefficient use of e-mail and reinvigorate  
person-to-person communication. Last October, the Wall Street Journal  
reported that “growing numbers of employers are imposing or trying  
out ‘no e-mail’ Fridays or weekends.” Companies that have  
instituted such rules report positive reviews from the rank and file,  
including a Georgia-based company that found overall e-mail volume  
dropped 75 percent throughout the work week after imposing a no e-mail  
Friday policy.

 From cell phones to iPods to MySpace Web pages, as IT becomes  
ubiquitous in peoples’ daily lives, it becomes harder for employers  
to draw lines between personal and official IT use in the workplace.  
“It is typical for workers to read their personal e-mail, make  
personal phone calls and even surf the Web recreationally from their  
offices,” says Jonathon Spira, Basex CEO and senior researcher.  
“Thanks to the Internet, it is taken rather for granted now that a  
knowledge worker should have access to cartoons, games and an enormous  
variety of trivial information at any time.” If a person can send an  
instant message or answer a cell phone in the produce aisle or church  
pew, the prospect of doing so “on the clock” doesn’t seem  
unreasonable.

Consider the following statistics:

å A 2008 survey of 20 Welsh firms found that “up to 91 percent of  
workplace Internet use in Wales is spent on social networking sites  
like Facebook.”

å Investigating Internet use at the IRS, the Treasury Department found  
that 51 percent of the time an employee was online was for personal use.

å Websense, an Internet filtering and Web consultant company, reports  
that 60 percent of employees who access the Internet at work do so for  
personal reasons, such as “shopping, banking, checking stocks or  
watching sports events, playing online poker, booking travel, and  
accessing pornography sites.”

å A 2007 AOL survey reported that 60 percent of people who use e-mail  
admit to checking their personal e-mail at work an average of three  
times per day.

We don’t know whether the Defense Department work force is subject to  
the same sort of undisciplined Internet use or the extent to which  
that sort of use, if it’s going on, affects mission capability. What  
we do know is that during Minot Air Force Base, N.D.’s second failed  
nuclear surety inspection, inspectors observed as a guard played video  
games on his cell phone instead of keeping watch. Also, according to a  
Defense Information Services Agency study, of the top 10 Air Force  
user circuits, which account for one-third of all Air Force Internet  
traffic, Amazon.com was the fifth-most-frequently accessed domain.  
Sports news sites, streaming audio and video sites, banking, humor and  
Internet dating sites also numbered in the top 25.

Minimizing the time wasted on nonproductive pursuits is hardly a new  
leadership or management challenge. What’s relatively new is the ease  
with which employees can access nonproductive pursuit without leaving  
their desks and the numberless array of activities that can keep them  
unproductively occupied once they wander off task. Mark notes: “The  
ease of access compounds the distractive potential of the Internet for  
information workers.” Based on a preliminary review of a study  
she’s conducting on Internet use, she observed, “It seems to me  
that most Internet use is a distraction from work. ... It’s really  
the great distracter because it’s very easy to get wrapped up in one  
distraction that leads to another, and another.”

Techno creep

Militarily, our reliance on IT-based asymmetrical advantages in the  
sensor-to-shooter, logistics and service-delivery arenas occupies  
continuing prominence in strategic planning and resourcing discussions  
at the highest levels. However, our institutionally injudicious use of  
IT in support of the business end of Defense Department operations has  
fostered a culture among action officers, planners and decision-makers  
that accepts efficiency-choking and cognition-degrading data smog as  
just another aspect of modern bureaucracy. The ease with which  
information is accessed, generated and distributed has also  
facilitated a sort of IT-enabled mission creep — techno creep. Techno  
creep is the misplaced reliance on abundance of information to improve  
the timeliness and quality of decision-making, instead of focusing  
energy and resources to ensure decision-makers have the right  
information on which to act. The result is unintended or unaccounted  
for costs that degrade rather than enhance an organization’s  
cognitive output capacity. The problem is so ubiquitous as to be  
almost unrecognizable as a threat. Though academia and the business  
world have taken notice of the economic consequences of information  
overload, the threat to the cognitive dimension of the information  
environment doesn’t appear to have been taken up as a national  
security matter.

The notion that battles are won and lost in the cognitive dimension is  
not limited to decisions about target selection or battlefield  
execution. Decision dominance is a doctrinal mandate at all  
organizational levels and across the spectrum of conflict, wherever  
humans observe, orient, decide and act. Time-tested axioms inform  
military thinking that technological advances present not only  
evolving and novel opportunities but also evolving and novel threats,  
and contemporary IO doctrine sternly cautions us to be ever-vigilant  
to identify and respond to those threats as they present themselves.

Though the Internet and e-mail provide incredibly convenient ways to  
access, generate and transmit massive amounts of information to nearly  
numberless recipients, that same level of convenience may also be the  
paramount challenge of the information age.

The first step in countering the threat presented by information  
overload will require organizations to adopt and enforce a sense of  
what David Shipley and Will Schwalbe, authors of “Send: The Essential  
Guide to E-mail for Office and Home,” refer to as “digital  
mindedness” with respect to e-mail.

Sensible e-mail policy

While volumes have been written on fixing the e-mail problem, at the  
risk of overgeneralizing, the nuts and bolts of a sensible e-mail  
policy should include the following:

å Any tasker or suspense transmitted via e-mail must include (1) a  
word such as “task” or “suspense” or some other service- 
specific buzz phrase that informs the recipient the correspondence  
requires action, and (2) a clearly identified date by which the  
response is due.

å If the text of the e-mail is four lines or more, it must include a  
“bottom line up front (BLUF)” or “summary” or similar phrase,  
no more than two lines, that gives the recipient a general overview of  
what the correspondence contains. For example, a lengthy note  
requesting an opinion on a draft regulation or publication might  
contain a BLUF, right under the salutation, which reads: “request  
your input(s) on attached draft regulation NLT 15 Sep 08.” Details of  
the request, format of the desired response, etc., can then follow in  
additional narrative.

å A recipient should never have to open an attachment to discover what  
the substance of the correspondence is. For example, a lunch  
invitation or proposed organizational course of action described in a  
PowerPoint slide must be accompanied by text in the e-mail that  
describes who, what, when, where, etc., so that the recipient can  
prioritize the correspondence without having to open one or more  
attachments.

å Transmitting via “reply to all” or to address groups should be  
done sparingly, and correspondence should never be forwarded to  
address groups without a short BLUF or overview that allows recipients  
to assess very quickly whether additional attention is required. For  
example, award solicitations for all sorts of categories of personnel  
are routinely group forwarded to entire installation address groups  
with introductions such as “FYSA” or “for your attention.” A  
subject line and BLUF saying something such as “solicitation for  
pilot of the year award” would minimize the cognitive interruption  
visited on nonflying recipients of such correspondence.

å If the rules continue to permit e-mail use for unofficial purposes,  
such as digital water-cooler discussions or unofficial lunch  
invitations, those e-mails should be highlighted with the little blue  
down arrow provided in Microsoft Outlook, or some other immediately  
recognizable identifier that tells the recipient, “If you don’t  
read this, there will be no mission impact.”

Stick to the mission

The second step will require organizations to restrict Internet use to  
mission-related purposes. IT policymakers are beginning to impose  
variants of “black list” or “white list” rules governing  
Internet use. The black list prevents users from accessing certain  
sites or domains; the white list permits users to visit only approved  
sites or domains. A one-size-fits-all rule isn’t the answer.

Personnel working in different career fields require differing mission- 
related access to information. For example, knowledge management- 
centric functions, such as intelligence, criminal investigation or  
legal work, require unrestricted access to myriad and constantly  
changing sources of information, making the “white list” system  
unresponsive. Other less information-dependent functions may not  
require that same level of access. Blanket rules are conceptually easy  
to manage but fail to account for varying mission requirements. Overly  
permissive rules and policies, such as those currently in effect, do  
little to prevent cognition-degrading Internet abuse. The complex  
nature of the threat requires a complex, carefully tailored fix.

For all career fields, there’s value in allowing employees to attend  
to limited personal business without leaving their workplaces. In  
order to balance that interest against the Internet’s distractive  
potential, Defense Department organizations should impose strict rules  
permitting users to engage in such nonmission-furthering activities  
only before or after the established duty day or during an approved  
lunch period.

fog and friction

Information overload is the digital age’s fog and friction. Misused  
and overused e-mail degrades the quality of decision-making and denies  
knowledge workers access to the right information because the  
unstructured environment forces them to attempt to digest so much  
information. The scope of the impact of information overload is  
difficult to assess, but the fact that it’s having an impact — a  
profoundly negative one — seems incontrovertible. Though not  
specifically invoking the term “information overload,” the 9/11  
Commission noted that “the U.S. government has access to a vast  
amount of information. ... But the U.S. Government has a weak system  
for processing and using what it has.” We don’t know whether the  
same sort of informational forest-and-tree problem contributed to the  
headline-grabbing misrouting or mishandling of sensitive military  
components in recent months, but it’s difficult to conceive how such  
oversights could occur in a healthy, efficiently running 21st century  
information environment.

Addressing the information overload threat will require sustained,  
uninterrupted attention and some complex, high-functioning, i.e.,  
nondegraded, decision-making. When business enterprises idly permit  
the hobbling of their collective decision-making capacities, they  
sacrifice competitive advantage and risk eventual insolvency. When  
governments and military organizations permit unchecked proliferation  
in threats to the cognitive dimension, they risk much, much more.

Maxwell’s mail overload moment

In an ironic demonstration of the reason the U.S. Defense Department  
needs stricter rules for e-mail use, Maxwell Air Force Base, Ala.,  
suffered an internally generated data smog outbreak in the middle of  
the annual Air Force Cyber Symposium, which it hosted July 15-17. More  
than 200 experts from across the Air Force and the Defense Department  
gathered to “identify strengths, weaknesses, opportunities and  
threats to the Air Force in the cyberspace domain,” according to the  
symposium Web site. That same week, New York City hosted the inaugural  
meeting of the Information Overload Research Group, a team of  
international academic and industry experts, whose charter is to  
“work together to build awareness of the world’s greatest challenge  
to productivity, ... and help make the business case for fighting  
information overload.”

Just as both conferences were getting underway, an e-mail from a well- 
intentioned but digitally undisciplined user announcing an opportunity  
to participate in what the sender called “the funniest card/dice  
game” was sent to several recipients’ Air Force e-mail accounts.  
The ensuing barrage of “please take me off your list” requests —  
sent to huge address groups on two installations — swelled in boxes  
all over Maxwell, the very installation hosting the cyber conference.  
It would be difficult to concoct a timelier example demonstrating the  
need for more exacting rules regarding the use of e-mail.

■
COL. PETER R. MARKSTEINER is director, Air Force Legal Operations  
Agency, Legal Information Services, at Maxwell Air Force Base, Ala.  
The views expressed in this article are the author’s own and do not  
necessarily reflect those of the Air Force or Defense Department. 


More information about the Infowarrior mailing list