United States Army Field Manual 3-13 Information Operations/Introduction

From Wikisource
Jump to navigation Jump to search

Introduction

Information operations (IO) encompass attacking adversary command and control (C2) systems (offensive IO) while protecting friendly C2 systems from adversary disruption (defensive IO). Effective IO combines the effects of offensive and defensive IO to produce information superiority at decisive points.

IO brings together several previously separate functions as IO elements and related activities. IO elements include the IO core capabilities, specified supporting capabilities, and related activities discussed in chapter l. It also allows commanders to use all of them both offensively and defensively, as they deem appropriate. The assistant chief of staff (ACOS) G-7 has the coordinating staff responsibility for coordinating IO elements and related activities. This enables the G-7 to shape the information environment to friendly advantage and protect commanders and friendly C2 systems from adversary IO.

Commanders do not conduct IO simply for the sake of doing IO. Effective IO is an integrated effort that synchronizes the effects of IO elements/related activities to accomplish specific objectives designated by the commander. It is the means commanders use to mass the effects of the information element of combat power.

Offensive IO destroy, degrade, disrupt, deny, deceive, exploit, and influence adversary decisionmakers and others who can affect the success of friendly operations. Offensive IO also target the information and information systems (INFOSYS) used in adversary decisionmaking processes.

Defensive IO protect and defend friendly information, C2 systems, and INFOSYS. Effective defensive IO assure friendly commanders an accurate common operational picture (COP) based not only on a military perspective, but also on nonmilitary factors that may affect the situation. An accurate COP is essen- tiul to achieving situational understanding. (See FM 6-0.) Most IO elements may he used either offensively or defensively. Effective IO requires integrating IO related activities—such as, public affairs and civil military operations—into IO as well.

The goal of IO is to gain and maintain information superiority, a condition that allows commanders to seize, retain, and exploit the initiative. It facilitates more effective decisionmaking and faster execution. IO involve constant efforts to deny adversaries the ability to detect and respond to friendly operations, while simultaneously retaining and enhancing friendly force freedom of action. When expeditiously exploited. IO provide a potent advantage that facilitates rapid military success with minimum casualties. Effective IO and information management allow commanders to take advantage of opportunities, while denying adversary commanders the information needed to make timely and accurate decisions or leading them to make decisions favorable to friendly forces.

Army forces routinely employed the elements of IO separately in past conflicts. Psychological operations, operations security, military deception, physical destruction, and electronic warfare were viable tools of Army commanders during World War II. The Gulf War demonstrated the benetit of employing these elements together and synchronizing them with ground operations. Capitalizing on this knowledge, the Joint Staff produced a series of doctrinal publications that culminated in October 1998 with JP 3-13, Joint Doctrine for Information Operations.

Today, Army IO doctrine and tactics, techniques, and procedures (TTP) adapt joint IO doctrine to achieve information superiority at decisive points during full spectrum operations. Because adversaries have asymmetric abilities to counter finite friendly IO capabilities, the probability of maintaining information superiority over long periods is unlikely. Therefore, oummanders execute IO to gain information superiority at times and places where it supports their intent and concept of operations.

Technological advancements in automated INFOSYS and communications have allowed commanders to see the battlefield as actions unfold, closer to near realtime than ever before, and to rapidly pass information across their areas of operations. Combined, IO and advanced INFOSYS and communications continue to shorten the time required for staff processes. This compresses the decision cycle and increases operational tempo, the rate of milimry action. Commanders now have opportunities to achieve decisive results early in an operation, reducing casualties and conserving resources.

Advancements in automated INFOSYS und communications carry with them vulnerabilities commanders need to recognize and offset. Clearly, a force dependent on technology offers adversaries new opportunities to degrade its efféctiveness. Army forces face significant vulnerabilities due to their dependence on information technology. Army communications and technologies are becoming more and more dependent on commercial backbuoes and commercial off-the-shelf products and systems that are also readily available to potential adversaries. This situation makes defensive IO an essential aspect of all operations.