Introduction to Information Operations Attaché Corps- SEP 09

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Air Force Core Functions
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Chapter 2 Digital Terrorism.
Unified Land Operations
Special Operations Center of Excellence
SOF Core Operations and Activities
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Information Warfare Psychological Operations Implications for 21 st Century Organizational Leadership Federal Information Systems Security Educator’s Association.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,
TLO 2: Action: Plan operational security. Intermediate-level training.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
New Army Terms Table D-1. New Army terms Army positive control Army procedural control civil support1 combat power (Army) command and controlwarfare command.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Communicating with Skeptical Audiences: Challenges and Solutions October 2003 Information Operations: Accessing the Skeptics Steven J. Iatrou Naval.
C4ISR and Information Warfare
United States Army Combined Arms Center
Campaign Planning Process Step 3B – System Center of Gravity Analysis
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Civil Affairs Capabilities and Deployment CPT Marshall Sybert
Operational Security PCC. VII-F.1.
ADP 2-0 and ADRP 2-0 U.S. Army Intelligence Center of Excellence 10 September 2012 This briefing is: UNCLASSIFIED//FOUO POC: Mr. Craig Sieting Doctrine.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Air and Space Functions >. If you are an AIRMAN then you believe that airpower, if used in certain ways, will achieve victory more quickly than if used.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
C4ISR and Information Warfare Naval Weapons Systems.
United States Air Force: Air Doctrine – Provide Global Capability
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
ASSOCIATION OF OLD CROWS PROPRIETARY INFORMATION The information contained in this document is the property of the AOC. Further dissemination is prohibited.
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
ICT, WARFARE AND PEACE; FOOD FOR THOUGHT Brian Naudé.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Warfare Communities of the Fleet and Marine Forces
Navy Information Operations
By CPT Robert L. Crabtree
Defense Policy Making You may not be interested in war, but war is interested in you.
UNCLASSIFIED 2/6/2016 7:56:41 PM UNCLASSIFIED Page 1 of 7 Pages Space Policy Issues - Space Warfare Definitions - 15 June, 2010.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Military Intelligence
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
Civil Military Operations and the Fundamentals of Joint Operations.
OPERATIONS SECURITY 16 August August 2004.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
WARFARE COMMUNITIES OF THE FLEET AND MARINE FORCES.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Campaign Planning Process Working Overview Slides
DoD Cyberspace Workforce Definitions
Panel Discussion: C4I Solutions for Combating
The MDMP Process MDMP Inputs MDMP Outputs Step 1 MDMP Inputs Step 5
Command Indoctrination Operations Security DD MMM YY
DoD Cyberspace Workforce Definitions
ADEISA – Industry’s contribution to ADF Superiority of the EMOE
Operations Security (OPSEC)
Overall Classification of this Briefing is UNCLASSIFIED
Operations Security (OPSEC): A Force Multiplier
Small unit proficiency
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

Introduction to Information Operations Attaché Corps- SEP 09 UNCLASSIFIED Introduction to Information Operations Attaché Corps- SEP 09 What is IS? Why should I care? What is this IO stuff and how does it help me obtain IS? I’m so glad you asked. I’m just dying to tell you about it. The overall classification of this briefing is: UNCLASSIFIED UNCLASSIFIED

Information Superiority UNCLASSIFIED Information Superiority IO The operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. (FM 3-0, JP 3-13) KM IM Here is how the Army defines IS. We have to achieve advantages across the IE (the aggregate of individuals, organization, and systems that collect, process, disseminate, or action information) in order to significantly affect the outcome of operations. This is what IS is all about. The BLUF is that IS means that we have a clear understanding of reality and the adversary does not. Understanding reality means: We understand the adversary—his locations, intent, strengths, and vulnerabilities We understand the environment and how it will affect both the adversary and friendly operations We understand ourselves—our locations, unit strengths/vulnerabilities, personnel status, maintenance status, training status, etc ISR UNCLASSIFIED

Intel, Surveillance, Recon Intelligence: Intelligence is the product resulting from collection, processing, integration , analysis, evaluation and interpretation of available information; information and knowledge about an adversary obtained through observation. (JP 1-02) Surveillance: The systematic observation of aerospace, surface or subsurface areas, places, persons, or things by visual, aural, electronic, photographic or other means. (JP 1-02) Reconnaissance: A mission undertaken to obtain by visual observation or other detection methods, information about the activities and resources of a enemy or potential enemy, or to secure data concerning the meteorological, hydrographic, or geographic characteristics of a particular area. (JP 1-02)

Information Operations UNCLASSIFIED Information Operations Information Operations (IO): The employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to affect or defend information and information systems, and to influence decision-making. (FM 3-13) Information Operations (IO): The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own. (JP 3-13) As stated before, Army doctrine is consistent and compatible with joint doctrine. The new FM 3-0 adopts the joint definition for IO. UNCLASSIFIED

The Key Elements of IO Core Elements of IO : UNCLASSIFIED The Key Elements of IO Core Elements of IO : Operations Security (OPSEC) Psychological Operations (PSYOP) Military Deception (MD) Electronic Warfare (EW) Computer Network Operations Computer Network Attack (CNA) Computer Network Defense (CND) Computer Network Exploitation (CNE) Lets take a quick look at each of the Core Elements of IO… They are intended to manipulate information UNCLASSIFIED

UNCLASSIFIED Operations Security Operations Security is process of identifying essential elements of friendly information (EEFI) and subsequently analyzing friendly actions attendant to military operations and other activities to: Identify those actions that can be observed by adversary intelligence systems. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive EEFI time to be useful to adversaries. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. (FM 3-13) Bottom line, OPSEC is a formal, 5-step process that is about identifying and protecting our Essential Friendly Elements of Information. It is an analytical tool used to protect unclassified information. UNCLASSIFIED

Psychological Operations UNCLASSIFIED Psychological Operations Psychological Operations convey selected information to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately to influence the behavior of foreign governments, organizations, groups, and individuals. (JP 3-53 / FM 3-05.30) Remember that one of the key ingredients for a good fight is people. Wouldn’t it be nice if we could influence people to act in ways that are beneficial to us and in ways that are detrimental to our adversary? That’s the purpose of PSYOP. Notice that the definition of PSYOP says that we only conduct PSYOP against foreign targets! Influence the behavior of foreign gov’ts, organizations, groups, individuals! UNCLASSIFIED

Deliberately mislead enemy decision-maker! UNCLASSIFIED Military Deception Military Deception (MD) are actions executed to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission (JP 3-58/FM 3-13) Remember that earlier we said that the goal of IO was to destroy the adversary’s ability to understand reality. If that is the case, what better tool to use than deception? Military Deception is all about causing the adversary decision-maker to misunderstand what is going on so that he makes the wrong decision. That gives us an advantage that we can exploit. Deliberately mislead enemy decision-maker! UNCLASSIFIED

UNCLASSIFIED Electronic Warfare Electronic Warfare is military action using electromagnetic and directed energy to control the electro-magnetic spectrum or to attack the enemy (JP 3-51/FM 3-13). The three major subdivisions of EW are: Electronic Protection (EP) Electronic Warfare Support (ES) Electronic Attack (EA) Any modern adversary we face makes extensive use of the electromagnetic spectrum. We obviously depend on the electromagnetic spectrum for communications and radar especially. Since use of the spectrum is so important to conducting coordinated operations, it would make sense that we seek to control the spectrum. We use a lot of communications and radar systems so we have to be able to protect ours and attack the adversary UNCLASSIFIED

Computer Network Operations UNCLASSIFIED Computer Network Operations Computer network attack is to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves (JP 1-02/ FM 3-13). Computer network defense consists of defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction (JP 3-51 / FM 3-13). Computer network exploitation (CNE) is enabling operations and intelligence collection to gather data from target or adversary automated information systems or networks. (DODD 3600.1 / FM 3-13) All modern militaries and most adversaries make extensive use of computer networks for communications and information management. We are especially dependent upon our networks. We even declare ourselves to be “network-centric”. Network centricity gives us great flexibility and capability. But it also creates vulnerabilities. The vulnerabilities associated with computer networks extend from the lowest tactical level all the way up to the nation’s critical infrastructures. UNCLASSIFIED

Related Activities Related Activities : Public Affairs UNCLASSIFIED Related Activities Related Activities : Public Affairs Civil Military Operations Defense Support to Public Diplomacy Speaking of PA, PA is one of the three supporting elements. The others are Civil Military Operations and defense support to public diplomacy. These are considered “Related Activities” of IO because they are not intended to influence decision makers. But of course, they have an influential effect by virtue of their activity. Therefore, they must be coordinated with the elements of IO so as to not inadvertently counter the efforts of them and to (hopefully) complement them. UNCLASSIFIED

UNCLASSIFIED Public Affairs Public Affairs are those public information, command information, and community relations activities directed toward both the external and internal publics with interest in the Department of Defense. (JP 3-61 / FM 3-13) PA fulfills the Army’s obligation to keep the American public and Army personnel informed UNCLASSIFIED

Civil Military Operations UNCLASSIFIED Civil Military Operations Civil Military Operations establish, maintain, influence, or exploit relations between military forces, governmental and non-governmental civilian organizations and authorities, and the civilian populace in a friendly, neutral, or hostile operational area in order to facilitate military operations, to consolidate and achieve operational US objectives. (FM 3-05.40/JP 3-57) CMO resources are limited. Rational decisions must be made on how to best employ these scarce resources. Since CMO activities have the ultimate purpose of facilitating military operations and to achieve operational US objectives, they need to be fully integrated into IO. The CMO activities undertaken must not be frittered away without contributing to the commander’s overall objectives and they can be extremely influential in persuading both civilian leaders and the general populace to support US goals. UNCLASSIFIED

UNCLASSIFIED Combat Camera Combat Camera: The acquisition and utilization of still and motion imagery in support of combat, information, humanitarian, special force, intelligence, reconnaissance, engineering, legal, public affairs, and other operations involving the Military Services. JP 3-61, JP 1-02 COMCAM program belongs to Defense Visual Information Directorate which falls under the Assistant Secretary of Defense for PA The COMCAM mission is to provide the OSD, CJCS, the Milt Depts, the COCAM and JTFs with imagery capability ISO operational and planning requirements across the range of military operations COMCAM supports all IO capabilities that use images of US or friendly forces operations, whether to influence an adversary or other TAs or support US Forces and or allies The provide images for PSYOP, MILDEC, PA, and CMO use, but can also be used for BDA/MOE analysis UNCLASSIFIED

Measuring Effects Measure of Effectiveness – A criterion used to assess changes in system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect. (JP 3-0) Measure of Performance – (DOD) A criterion to assess friendly actions that is tied to measuring task accomplishment. (JP 3-0) Terrorist Zarqawi lashes out against Muslim clerics for not opposing US offensive operations in Iraq and Afghanistan Post Falluja, Nov 04

Why is this important What are those things that we need to do as allies? Coalition operations and IO International Community

Summary IO: Integrated employment of capabilities UNCLASSIFIED Summary IO: Integrated employment of capabilities Core, Supporting, Related Effects Planning IO Objectives Tasks IO Cell The IO planner will be on the front lines of the information war. He/she must use all the elements, supporting elements, and related activities to seize and retain the advantage and initiative in the information environment. Information Operations are critical shaping operations that must be accomplished in order to enable military success in any contemporary operation. UNCLASSIFIED