1 / 17

The overall classification of this briefing is: UNCLASSIFIED

jafari
Download Presentation

The overall classification of this briefing is: UNCLASSIFIED

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. What is IS? Why should I care? What is this IO stuff and how does it help me obtain IS? I’m so glad you asked. I’m just dying to tell you about it. What is IS? Why should I care? What is this IO stuff and how does it help me obtain IS? I’m so glad you asked. I’m just dying to tell you about it.

    2. Here is how the Army defines IS. We have to achieve advantages across the IE (the aggregate of individuals, organization, and systems that collect, process, disseminate, or action information) in order to significantly affect the outcome of operations. This is what IS is all about. The BLUF is that IS means that we have a clear understanding of reality and the adversary does not. Understanding reality means: We understand the adversary—his locations, intent, strengths, and vulnerabilities We understand the environment and how it will affect both the adversary and friendly operations We understand ourselves—our locations, unit strengths/vulnerabilities, personnel status, maintenance status, training status, etcHere is how the Army defines IS. We have to achieve advantages across the IE (the aggregate of individuals, organization, and systems that collect, process, disseminate, or action information) in order to significantly affect the outcome of operations. This is what IS is all about. The BLUF is that IS means that we have a clear understanding of reality and the adversary does not. Understanding reality means: We understand the adversary—his locations, intent, strengths, and vulnerabilities We understand the environment and how it will affect both the adversary and friendly operations We understand ourselves—our locations, unit strengths/vulnerabilities, personnel status, maintenance status, training status, etc

    4. As stated before, Army doctrine is consistent and compatible with joint doctrine. The new FM 3-0 adopts the joint definition for IO.As stated before, Army doctrine is consistent and compatible with joint doctrine. The new FM 3-0 adopts the joint definition for IO.

    5. Lets take a quick look at each of the Core Elements of IO… They are intended to manipulate informationLets take a quick look at each of the Core Elements of IO… They are intended to manipulate information

    6. Operations Security is process of identifying essential elements of friendly information (EEFI) and subsequently analyzing friendly actions attendant to military operations and other activities to: Identify those actions that can be observed by adversary intelligence systems. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive EEFI time to be useful to adversaries. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. (FM 3-13) Bottom line, OPSEC is a formal, 5-step process that is about identifying and protecting our Essential Friendly Elements of Information. It is an analytical tool used to protect unclassified information.Bottom line, OPSEC is a formal, 5-step process that is about identifying and protecting our Essential Friendly Elements of Information. It is an analytical tool used to protect unclassified information.

    7. Psychological Operations convey selected information to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately to influence the behavior of foreign governments, organizations, groups, and individuals. (JP 3-53 / FM 3-05.30) Remember that one of the key ingredients for a good fight is people. Wouldn’t it be nice if we could influence people to act in ways that are beneficial to us and in ways that are detrimental to our adversary? That’s the purpose of PSYOP. Notice that the definition of PSYOP says that we only conduct PSYOP against foreign targets!Remember that one of the key ingredients for a good fight is people. Wouldn’t it be nice if we could influence people to act in ways that are beneficial to us and in ways that are detrimental to our adversary? That’s the purpose of PSYOP. Notice that the definition of PSYOP says that we only conduct PSYOP against foreign targets!

    8. Military Deception (MD) are actions executed to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission (JP 3-58/FM 3-13) Remember that earlier we said that the goal of IO was to destroy the adversary’s ability to understand reality. If that is the case, what better tool to use than deception? Military Deception is all about causing the adversary decision-maker to misunderstand what is going on so that he makes the wrong decision. That gives us an advantage that we can exploit.Remember that earlier we said that the goal of IO was to destroy the adversary’s ability to understand reality. If that is the case, what better tool to use than deception? Military Deception is all about causing the adversary decision-maker to misunderstand what is going on so that he makes the wrong decision. That gives us an advantage that we can exploit.

    9. Electronic Warfare is military action using electromagnetic and directed energy to control the electro-magnetic spectrum or to attack the enemy (JP 3-51/FM 3-13). The three major subdivisions of EW are: Electronic Protection (EP) Electronic Warfare Support (ES) Electronic Attack (EA) Any modern adversary we face makes extensive use of the electromagnetic spectrum. We obviously depend on the electromagnetic spectrum for communications and radar especially. Since use of the spectrum is so important to conducting coordinated operations, it would make sense that we seek to control the spectrum. We use a lot of communications and radar systems so we have to be able to protect ours and attack the adversary Any modern adversary we face makes extensive use of the electromagnetic spectrum. We obviously depend on the electromagnetic spectrum for communications and radar especially. Since use of the spectrum is so important to conducting coordinated operations, it would make sense that we seek to control the spectrum. We use a lot of communications and radar systems so we have to be able to protect ours and attack the adversary

    10. Computer network attack is to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves (JP 1-02/ FM 3-13). Computer network defense consists of defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction (JP 3-51 / FM 3-13). Computer network exploitation (CNE) is enabling operations and intelligence collection to gather data from target or adversary automated information systems or networks. (DODD 3600.1 / FM 3-13) All modern militaries and most adversaries make extensive use of computer networks for communications and information management. We are especially dependent upon our networks. We even declare ourselves to be “network-centric”. Network centricity gives us great flexibility and capability. But it also creates vulnerabilities. The vulnerabilities associated with computer networks extend from the lowest tactical level all the way up to the nation’s critical infrastructures. All modern militaries and most adversaries make extensive use of computer networks for communications and information management. We are especially dependent upon our networks. We even declare ourselves to be “network-centric”. Network centricity gives us great flexibility and capability. But it also creates vulnerabilities. The vulnerabilities associated with computer networks extend from the lowest tactical level all the way up to the nation’s critical infrastructures.

    11. Speaking of PA, PA is one of the three supporting elements. The others are Civil Military Operations and defense support to public diplomacy. These are considered “Related Activities” of IO because they are not intended to influence decision makers. But of course, they have an influential effect by virtue of their activity. Therefore, they must be coordinated with the elements of IO so as to not inadvertently counter the efforts of them and to (hopefully) complement them.Speaking of PA, PA is one of the three supporting elements. The others are Civil Military Operations and defense support to public diplomacy. These are considered “Related Activities” of IO because they are not intended to influence decision makers. But of course, they have an influential effect by virtue of their activity. Therefore, they must be coordinated with the elements of IO so as to not inadvertently counter the efforts of them and to (hopefully) complement them.

    12. Public Affairs are those public information, command information, and community relations activities directed toward both the external and internal publics with interest in the Department of Defense. (JP 3-61 / FM 3-13) PA fulfills the Army’s obligation to keep the American public and Army personnel informedPA fulfills the Army’s obligation to keep the American public and Army personnel informed

    13. Civil Military Operations establish, maintain, influence, or exploit relations between military forces, governmental and non-governmental civilian organizations and authorities, and the civilian populace in a friendly, neutral, or hostile operational area in order to facilitate military operations, to consolidate and achieve operational US objectives. (FM 3-05.40/JP 3-57) CMO resources are limited. Rational decisions must be made on how to best employ these scarce resources. Since CMO activities have the ultimate purpose of facilitating military operations and to achieve operational US objectives, they need to be fully integrated into IO. The CMO activities undertaken must not be frittered away without contributing to the commander’s overall objectives and they can be extremely influential in persuading both civilian leaders and the general populace to support US goals.CMO resources are limited. Rational decisions must be made on how to best employ these scarce resources. Since CMO activities have the ultimate purpose of facilitating military operations and to achieve operational US objectives, they need to be fully integrated into IO. The CMO activities undertaken must not be frittered away without contributing to the commander’s overall objectives and they can be extremely influential in persuading both civilian leaders and the general populace to support US goals.

    14. COMCAM program belongs to Defense Visual Information Directorate which falls under the Assistant Secretary of Defense for PA The COMCAM mission is to provide the OSD, CJCS, the Milt Depts, the COCAM and JTFs with imagery capability ISO operational and planning requirements across the range of military operations COMCAM supports all IO capabilities that use images of US or friendly forces operations, whether to influence an adversary or other TAs or support US Forces and or allies The provide images for PSYOP, MILDEC, PA, and CMO use, but can also be used for BDA/MOE analysisCOMCAM program belongs to Defense Visual Information Directorate which falls under the Assistant Secretary of Defense for PA The COMCAM mission is to provide the OSD, CJCS, the Milt Depts, the COCAM and JTFs with imagery capability ISO operational and planning requirements across the range of military operations COMCAM supports all IO capabilities that use images of US or friendly forces operations, whether to influence an adversary or other TAs or support US Forces and or allies The provide images for PSYOP, MILDEC, PA, and CMO use, but can also be used for BDA/MOE analysis

    16. Why is this important What are those things that we need to do as allies? Coalition operations and IO International Community

    17. The IO planner will be on the front lines of the information war. He/she must use all the elements, supporting elements, and related activities to seize and retain the advantage and initiative in the information environment. Information Operations are critical shaping operations that must be accomplished in order to enable military success in any contemporary operation.The IO planner will be on the front lines of the information war. He/she must use all the elements, supporting elements, and related activities to seize and retain the advantage and initiative in the information environment. Information Operations are critical shaping operations that must be accomplished in order to enable military success in any contemporary operation.

More Related