|
|||||||
|
Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-and-a-half-years collection of 47,000 files from June 1996 to January 2009 (~6.9 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, cryptome.info, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,100 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost. |
16 June 1997
FM 100-6
27 AUGUST 1996 By order of the Secretary of the Army:
DENNIS J. REIMER
General, United States Army Chief of Staff
Official:
JOEL B. HUDSON Active Army, USAR, and ARNG: To be distributed in accordance with DA Form 12-11E, requirements for FM 100-6 (Qty rqr block no 5425).
FM 100-6
Field Manual
Headquarters
Department of the Army Washington, DC, 27 August 1996 INFORMATION OPERATIONSContentsChapter 1 OPERATING ENVIRONMENT
Chapter 4 RELEVANT INFORMATION and INTELLIGENCE
Chapter 6 PLANNING AND EXECUTION
[Separate files below] Appendix A PLANS AND ORDERS (34K)
Appendix B RESPONSIBILITIES OF SUPPORTING AGENCIES (16K)
Appendix C PLANNING CONSIDERATIONS (17K)
Appendix D STAFF ORGANIZATION AND TRAINING (8K)
GLOSSARY (29K) REFERENCES (12K) INDEX (63K)
PrefaceThis manual addresses the operational context of information operations (IO), relevant terminology, and the environment of information operations. It supports battle command and provides guidelines for commanders that conduct IO to support all phases of the force-projection operating environment, including planning and executing early entry and force-projection operations in joint and multinational settings. Military operations occur in peace and war. The traditional focus when discussing information and C2 was electronic warfare (EW), electronic countermeasure (ECM), and electronic counter countermeasure (ECCM) operations that take place during war. The focus of this manual is on command and control warfare (C2W), public affairs (PA), and civil affairs (CA). All are operations that the Army currently uses to gain and maintain information dominance as well as effective C2. Successful operations require effective C2 to transform military capabilities into applied military power. The more effective the force's C2 system, the more completely its capabilities can be realized in peace or war. As the Army's capstone doctrine for IO, this manual supports soldiers and leaders that execute IO to support military operations. Not only does the doctrine herein provide commanders and their staffs with guidance to conduct information operations, it also serves as the foundation for development of US Army tactics, techniques, and procedures (TTP) manuals. It is also the foundation to refine existing training support packages (TSPs), mission training plans (MTPs), training center and unit exercises, and service school curricula. The manual provides a basis to examine organizations and materiel developments applicable to IO. This doctrine applies to the total Army--active and reserve components and Army civilians. It is specifically oriented at the operational and tactical levels of military operations. It may be useful to other services, nonmilitary agencies, and allies involved in such operations. The proponent of this manual is HQ TRADOC. Send comments and recommendations on DA Form 2028 directly to Commander, US Army Combined Arms Center, ATTN: ATZL-SWW-L, Fort Leavenworth, Kansas 66027-1352. Unless this publication states otherwise, masculine nouns or pronouns do not refer exclusively to men.
IntroductionThe Army is embracing a new era characterized by the accelerating growth of information, information sources, and information dissemination capabilities supported by information technology. This new era, the so-called Information Age, offers unique opportunities as well as some formidable challenges. New technology will enhance the Army's ability to achieve situational dominance on land, where the decisive element of victory for our nation has always been critical. At the same time, it will enable adversaries to employ many of these same capabilities. This new technology also allows the Army to transform itself. The Army is changing the way it does business in the foxhole; in its schools and training centers; and in its doctrine, training, leader development, organizations, materiel development, and soldier development. Responding to the challenges and opportunities of the Information Age, the Army is preparing the warfighter for operations today as well as in the twenty-first century. Information and the knowledge that flows from it empower soldiers and their leaders. When transformed into capabilities, information is the currency of victory. Information operations integrate all aspects of information to accomplish the full potential for enhancing the conduct of military operations. Information operations are not new. In their simplest form they are the activities that gain information and knowledge and improve friendly execution of operations while denying an adversary similar capabilities by whatever possible means. Effects of IO produce significant military advantage for forces conducting such operations. Information is an essential foundation of knowledge-based warfare. It enables commanders to coordinate, integrate, and synchronize combat functions on the battlefield. To gain the relative advantage of position (maneuver) and massing of effects (firepower), commanders must act while information is relevant and before the adversary can react. Targeting an adversary's information flow to influence his perception of the situation or prevent him from having or using relevant information contributes directly to decisive operations. As the commander targets the adversary's information systems (INFOSYS), he protects his own. Realizing that absolute and sustained dominance of the information environment is not possible, commanders seek to achieve information dominance at the right place, the right time, and in the right circumstances. They seek information dominance that defines how the adversary sees the battlespace, creating the opportunity to seize the initiative and set the tempo of operations.
Notwithstanding the synergy possible with the power of information and information technology, fog and friction will remain; the challenge of sorting out the signals from the noise amidst a mass of expanding data will also remain. Many solutions to the dilemma of uncertainty for the commander are technical. But there can be no information revolution without the human influence and understanding of soldiers and commanders who link and integrate information, technology, and action. IO do not offer any panaceas. Perfect knowledge is not the objective. The military objective remainsóto enter an operational theater capable of achieving superior relative combat power against an enemy, or to establish situational dominance in operations other than war (OOTW). The Army's keystone doctrine in FM 100-5 describes how the Army thinks about the conduct of operations. This manual, while designed to enhance and enable the operations in FM 100-5, reaches out to accommodate and leverage newly emerging information technologies, especially digitization. As the Army's capstone publication for information operations, this manual supports the National Military Strategy and explains the fundamentals of IO for the Army. IO doctrine reflects, and goes beyond, the joint military strategy of command and control warfare (C2W), which implements Department of Defense (DOD) information warfare policy. This manual --
This publication provides Army capstone doctrine and facilitates the transition to the Information Age.
|
Operating EnvironmentArmy forces today are likely to encounter conditions of greater ambiguity and uncertainty. Doctrine must be able to accommodate this wider variety of threats. In so doing, the Army is prepared to respond to these worldwide strategic challenges across the full range of possible operations as part of a joint and combined team.
FM 100-5
Commanders and their staffs operating in the Information Age face an increasingly complex environment. Commanders and staffs at all levels will encounter an expanding information domain termed the global information environment (GIE). The GIE contains those information processes and systems that are beyond the direct influence of the military or even the National Command Authorities (NCA), but nevertheless may directly impact the success or failure of military operations. The media, international organizations, and even individuals represent a partial list of GIE players. This chapter describes the GIE domain and introduces the concept of information dominance as the key element for operating effectively within this new environment. To achieve information dominance, the commander must be able to dominate both the traditional maneuver-oriented battlefield and the military information environment (MIE), defined as that portion of the GIE relevant to his operation. To achieve the latter, the commander directs the acquisition, use, and management of friendly and enemy information and conducts command and control warfare (C2W) attack and protect operations.
GEOSTRATEGIC AND TECHNOLOGICAL
|
CHALLENGESCommanders and national leaders face significant and interrelated challenges in dealing with and anticipating the effects of the global visibility of operations and rapid changes in information technology and their impacts in the GIE. Information securityTwo commonly recognized facts address why information security (INFOSEC) is an important challenge. First, the Defense Information Systems Agency (DISA) reports that over 95 percent of DOD communications during peacetime travel over the relatively unprotected public switch network (PSN) and are largely outside the direct control or influence of the military. In addition, a significant amount of open-source intelligence is carried by commercial means. Continuous OperationsBecause of the pervasive and intrusive nature of the MIE, preparation for dealing with IO must not wait until a unit receives a warning order to deploy. By that time, the commander and his staff must have already developed plans and procedures for dealing with the myriad aspects and influences in the MIE or risk being rapidly overcome by events. Policy and Public OpinionWith global visibility, dramatic information displays and expert analyses of military operations in progress can rapidly influence public opinion and, therefore, policy related to the conduct of military operations. The population that receives and potentially reacts to this coverage includes the US public, decision makers, alliance or coalition partners, and other nations. It also includes potential or actual adversaries of the US. The news media will most likely provide 24-hour coverage of all perspectives on the operation. Global visibility of operations can also affect a commander's decision-making. When the information in the GIE is inaccurate, incomplete, not presented in context, based on rumor or the result of purposeful misinformation or disinformation efforts, a commander may react in haste, make an emotional decision, or make choices that are inconsistent with the real situation, up to and including a termination of an ongoing operation. Effective commanders anticipate how the adversary might attempt to manipulate the news media in order to prevent a potential foe from setting the terms of the conflict in the public arena. MoraleThe global visibility of operations impacts a command's combat power by either enhancing or degrading soldier morale. Soldier spirit and perseverance, the will to win, dedication to the cause, and devotion to fellow soldiers and the unit can be rapidly undermined by what is being said in the GIE. The instant communications capabilities of these INFOSYS often disseminate information to soldierswhether accurate or inaccuratefaster than the military chain of command. Bad news, misinterpretation, inaccurate information, and misinformation (or disinformation) impact families and communities as well as soldiers, affecting their morale and commitment to the objective at hand and potentially undermining the critically important human psychological dimensions discussed in FM 100-5. Nevertheless, Americans on and off the battlefield will continue to have free access to radio, television, and the press and be aware of events and circumstances. Legal ConsiderationsRelatively few rules and laws govern the use of or access to many new INFOSYS or technologies. For that reason, IO confront legal challenges and other constraints such as rules of engagement (ROE) or status of forces agreements/status of mission agreements. Tension exists both in peace and during times of conflict. Collection of intelligence, or, simply, information in peacetime, is often limited by policy and/or law. Many policies and laws for using nonmilitary computer systems and other information networks during peacetime are yet to be determined. For example, the control or regulation of access on the internet to protect sensitive information or critical network nodes is largely unaddressed. What are the ROE for the INFOSYS in peace? In war? Close coordination with the supporting judge advocate is critical in confronting IO challenges based on legal considerations. Because many of the actors and influences in the MIE are outside friendly military control, contracts or legal restrictions may prevent the military from controlling or influencing the use of civilian assets by an adversary. As an example, during hostilities an allied coalition force may depend upon an international agency to change the access codes for an imagery satellite to protect critical information in the area of responsibility (AOR). Without the change, the imagery is available in the open market. An adversary could, under commercial contract, download critical satellite imagery of the geographic region in near-real time as the satellite passed over the ground station.
INFORMATION DOMINANCE:
|
FundamentalsWhile reflecting the increased complexity and lethality of the modern battlefield, Army doctrine recognizes that advanced weapons and technologies are no better than the skill with which leaders and soldiers employ them against the enemy. COGNITIVE HIERARCHYInformation is defined as-- A given piece of data is largely meaningless by itself. Only when data is processed, that is, placed into a situational context, does it gain meaning and become, by definition, information. Knowledge is derived from information. Knowledge is information that has been tested and accepted as factual--
Commanders and their planners must always be sensitive to the difference between beliefs and knowledge. Untested beliefs, even when commonly held, differ from facts and are, in essence, opinions that can later prove to be wrong. Decisions based upon beliefs instead of facts are always at risk. Understanding is achieved by using judgment to give knowledge relevance within a specific situational context. Ideally, understanding a situation supports a commander in battlefield visualization and creates the conditions from which plans can be formed and effective actions taken. See Figure 2-1. While it is certainly desirable to achieve full understanding of a situation before making decisions, commanders must be fully prepared to make decisions in an operational environment of ambiguity, characterized by imperfect information and incomplete understanding. Command decision-making will remain an art, not a science, even in the Information Age. A goal of IO is to narrow the gap between the art and science of command decision making. STRATEGYThe National Military Strategy recognizes that information warfare (IW) is one of many capabilities within the US military elements of national power. IW can support the overall US Government strategic engagement policy during peacetime, crisis, conflict, and postconflict. The ability of the US Government to influence the perceptions and decision making of others greatly impacts the effectiveness of deterrence, power projection, and other strategic concepts. This paragraph introduces and defines information warfare and explains its relationship with the Army's interpretation--information operations. In times of crisis, information can deter adversaries from initiating actions detrimental to interests of the US Government or its allies or detrimental to the conduct of friendly military operations. If carefully conceived, coordinated, and executed, IW--
Information WarfareInformation warfare is the term adopted by the Department of Defense (DOD) and the joint staff to recognize a range of actions taken during conflict to achieve information superiority over an adversary. It is specifically defined in CJCSI 3210.01 as-- Actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one's own information, information-based processes, information systems and computer-based networks. The objective of IW is to attain a significant information advantage that enables the total force to quickly dominate and control the adversary. The strategic goal of IW is to seize and maintain a decisive advantage by attacking an adversary's NII through exploitation, denial, and influence, while protecting friendly INFOSYS. IW offers either side the chance to strike at a distance with relative safety. The Army, recognizing that IW as currently defined by DOD is more narrowly focused on the impact of information during actual conflict, has chosen to take a somewhat broader approach to the impact of information on ground operations and adopted the term information operations. The Army has adopted this broader approach to recognize that information issues permeate the full range of military operations (beyond just the traditional context of warfare) from peace through global war. IO implement the IW policy for the land component commander. Information OperationsInformation operations integrate all aspects of information to support and enhance the elements of combat power, with the goal of dominating the battlespace at the right time, at the right place, and with the right weapons or resources. IO are defined as-- Continuous military operations within the MIE that enable, enhance, and protect the friendly force's ability to collect, process, and act on information to achieve an advantage across the full range of military operations; IO include interacting with the GIE and exploiting or denying an adversary's information and decision capabilities. Units conduct IO across the full range of military operations, from operations in garrison, through deployment, to combat operations, and continuing through redeployment upon mission completion.
COMPONENTS OF
|
OperationsCommanders seek to apply overwhelming combat power to achieve victory at minimal cost. They integrate and coordinate a variety of functions with the elements of combat power to sustain it at the operational and tactical levels.
HISTORICAL PERSPECTIVE Major emphasis was placed on C2W, CA, and PA activities during Operations Desert Shield and Desert Storm. Commanders integrated OPSEC, military deception, PSYOP, and EW efforts during Desert Shield to pave the way for successful combat operations. During planning for Desert Storm, the senior leadership recognized that Iraq's C2 was a critical vulnerability whose destruction could enable victory with minimal friendly loss. This is evident from the Secretary of Defense's guidance outlining the military objectives for Desert Storm:
During Desert Storm's air operations, the enemy was selectively blinded by EW and physical destruction to mask friendly force movements and operations. Deception operations continued to enforce erroneous enemy perceptions of the CINC's intentions. EW and precision air strikes against C2 targets were used to disorganize and isolate Iraqi forces. When the ground attack commenced, Iraqi forces were close to disintegration, with numerous formations unable to coordinate their efforts. The need for synchronization was an early lesson learned and demonstrated immediate payoffs. Successfully denying Saddam Hussein the ability to command and control his forces substantially reduced casualties on all sides and significantly reduced the time required to achieve coalition objectives. Fully aware that the enemy, as well as the public at home, was focused on PA coverage of the confrontation, the coalition used that coverage to confuse the enemy by encouraging speculation on the place, time, and size of the impending attack. At the same time, the coalition learned that immediacy of media attention could have unforeseen consequences for its own strategic, operational, and tactical planning. After the cessation of hostilities, CA elements enhanced the restoration of Kuwaiti governmental and social order and responded promptly and effectively to one of the central unanticipated consequences of the war as Iraqi forces created an enormous refugee crisis in the northern Kurdish provinces of Iraq and in southern Turkey. COMMAND AND CONTROL WARFARETo be effective, C2W needs to be fully integrated into the commander's concept of the operation and synchronized with other operations. The synchronization of these actions will require rapid and reliable intelligence support and communications. JFCs [joint force commanders] should ensure that the C2W objectives are part of the planning guidance and priorities. C2W directly supports the Army goal of achieving information dominance and winning any conflict or succeeding in any OOTW quickly, decisively, and with minimum casualties. C2W incorporates both the sword against anadversary's C2 system and the shield against the C2-attack actions of the adversary. This combination of both offensive and defensive aspects into an integrated capability provides expanded opportunities for synergy in warfare. C2W allows the Army and individual commanders to accomplish missions with fewer risks, in shorter time frames, and with fewer resources. Role of C2WC2W applies to all phases of operations, including those before, during, and after actual hostilities. Even in OOTW, C2W offers the military commander lethal and nonlethal means to achieve the assigned mission while deterring war and/or promoting peace. The offensive aspect ofC2W can slow the adversary's operational tempo, disrupt his plans and ability to focus combat power, and influence his estimate of the situation. The defensive aspects of C2W minimize friendly C2 system vulnerabilities and mutual interference. C2W is defined as-- The integrated use of operations security (OPSEC), military deception, psychological operations (PSYOP), electronic warfare (EW), and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary C2 capabilities, while protecting friendly C2 capabilities against such actions. Command and control warfare applies across the operational continuum and all levels of conflict.
CJCSI 3210.03, 31 March 1996
C2W ElementsThe foundation for C2W is robust and redundant command, control, communications, and computer (C4) INFOSYS, coupled with seamless, national-to-tactical, relevant information and intelligence support. The building blocks, or elements, of C2W include-
Thesebuilding blocks contribute to protection of the force and mission accomplishment in various ways, depending on the situation. This situation dependence leads to the building blocks that are shown in a constantly changing pattern in Figure 3-1. The integrated employment of these five elements leads to synergy on the battlefield and results in the most effective execution ofC2-attack and/or C2-protect tasks. The commander drives this C2W process to achieve agility by focusing attacks on the adversary's ability to command and control his forces while simultaneously protecting friendly C2. OPERATIONS SECURITY Operations security is defined as-- A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities; identifying those actions that can be observed by adversary intelligence systems; determining indicators adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; and selecting and executing measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation.
Joint Pub 3-54
OPSEC is the key to denial. It gives the commander the capability to identify those actions that can be observed by adversary intelligence systems. It can provide an awareness of the potentially friendly indicators that adversary intelligence systems might obtain. Such an awareness could be interpreted or pieced together to derive critical information regarding friendly force dispositions, intent, and/or courses of action that must be protected. The goal of OPSEC is to identify, select, and execute measures that eliminate, or reduce to an acceptable level, indications and other sources of information that may be exploited by an adversary. OPSEC planning is severely challenged by the new family of global commercial capabilities, to include imaging, positioning, andcellular systems that offer potential adversaries access to an unprecedented level of information against friendly forces. The inevitable presence of the news media during military operations complicates OPSEC. The capability of the media to transmit real-time information to a worldwide audience could be a lucrative source of information to an adversary. OPSEC planners, working closely with PA personnel, must develop the EEFI used to preclude inadvertent public disclosure of critical or sensitive information. Many different measures impact OPSEC. These includecounterintelligence, information security (INFOSEC), transmission security (TRANSEC), communications security (COMSEC), and signal security (SIGSEC). As more and more of the force is digitized, INFOSEC takes on an ever-growing importance. MILITARY DECEPTION Military deception is defined as-- Actions executed to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission.
Joint Pub 3-58
Military deception is the primary means to influence the adversary commander's decisions through distortion, concealment, and/or falsification of friendly intentions, status, dispositions, capabilities, courses of action, and strengths. The goal of deception is to cause the opposing military commander to act in a manner that serves the friendly commander's objectives. Historical Perspective Tactical deception had significant positive impacts on the success of Operation Overlord, and, thus the retaking of the European continent in World War II. Deception worked hand in hand with OPSEC to keep the organization and location of the real Overlord cantonments, training sites, dumps, movements, and embarkations carefully hidden. Unbelievable effort was put into creating mock airfields and ports, phony ships, boats, planes, tanks, vehicles, and troop movements, both real and staged. A new era of deception was introduced-the electronic one. German coastal defense radars were destroyed in a calculated pattern. Deception planners purposely left some intact in the Calais region. The night the invasion was launched, the Allies began massively jamming German radars with chaff. But they purposely did not completely cover their targets. German radar operators could "see" between Allied jamming curtains. And, what they saw was a ghost fleet of small ships towing barges and blimps headed for Calais at eight knots-or the speed of an amphibious fleet. Powerful electronic emitters received the pulse of the German radar and sent it strongly back to the German receivers. For each repetition of this deception it looked to the German operators like a 10,000-ton ship was out there. The small ships also had the recorded sounds of the amphibious assault at Salerno to play over speakers from 10 miles out. German troops ashore could hear the Allies "getting into their landing craft" for the run into the beach. This information threw German intelligence into chaos for several precious hours and played a major role in delaying German counteractions to the actual invasion taking place at Normandy. PSYCHOLOGICAL OPERATIONS Psychological operations are defined as-- Operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and, ultimately, the behavior of foreign governments, organizations, groups, and individuals. The purpose of PSYOP is to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.
Joint Pub 3-53
PSYOP are based on projection of truth and credible message. PSYOP are an essential tool in both C2-protect and C2-attack operations. The Army has shown considerable strength in applying both PSYOP and deception to military operations. PSYOP can proliferate discrete messages to adversary C4I collectors, enhance joint combat power demonstrations with surrender appeals, and magnify the image of US technological superiority. PSYOP elements must work closely with other C2W elements and PA strategists to maximize the advantage of IO. As an example, the Army has shown considerable strength in applying both PSYOP and deception to military operations. PSYOP's main objective in C2-protect is to minimize the effects of an adversary's hostile propaganda and disinformation campaign against US forces. Discrediting adversary propaganda or misinformation against the operations of US/coalition forces is critical to maintaining favorable public opinion. As an early commander of Combined Task Force Provide Comfort, it is my belief that much of the success achieved during Operation Provide Comfort can be attributed to the successful integration of PSYOP in support of the overall humanitarian assistance mission. Over five million PSYOP products were dispersed over northern Iraq and southeastern Turkey in support of the Operation's goals and objectives. PSYOP is a true force multiplier." ELECTRONIC WARFARE Electronic warfare is defined as-- Any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum (EMS) or to attack the enemy. The three major subdivisions within electronic warfare are electronic attack (EA), electronic protection (EP), and electronic warfare support (ES).
Electronic Attack
Electronic Protection
Electronic Warfare Support PHYSICAL DESTRUCTION Physical destruction is defined as-- The application of combat power to destroy or neutralize enemy forces and installations. It includes direct and indirect fires from ground, sea, and air forces. Also included are direct actions by special operations forces. The destruction of a hostile C2 target means that adversary C2 capabilities are degraded for a period of time or, if necessary, permanently shut down. Physical destruction is used only after a full, comparative assessment-strategic-through-tactical perspectives-of the trade-offs between preserving the target versus its destruction. Historical Perspective On April 14, 1943, US intelligence experts intercepted and decoded a message revealing that Admiral Isoroku Yamamoto, Commander-in-Chief of Japan's Navy, would be flying to Bougainville in four days. When analysis determined that Bougainville lay just within the extended range of US P-38 fighters at Henderson Field on Guadalcanal, Allied planners recognized the opportunity to strike at the heart of Japanese command and control and strategic planning in the Pacific. In less than 48 hours, Admiral Chester W. Nimitz's forces planned and coordinated an operation to shoot down Yamamoto's plane and obtained approval from Secretary of the Navy Frank Knox and President Roosevelt. Yamamoto was known to be invariably punctual, and American planners were confident that his plane would appear over Bougainville on schedule-9:39 am, April 18. At that moment, 16 carefully positioned P-38s from Henderson Field spotted the two Japanese Betty bombers of Yamamoto's party and attacked. Both aircraft were quickly sent plummeting to the ground, completing a classic information operation that took less than four days from start to finish and rendered irreparable damage to Japanese command and control. The Japanese would feel the impact of this single mission throughout the remainder of the war. C2W DisciplinesThe two disciplines that comprise C2W are C2-attack and C2-protect. C2-ATTACK
C2-Attack Principles
Figures 3-2 and 3-3 illustrate some of the potential relationships between the elements of C2W. C2-Attack Effects In general terms, C2-attack has four effects that focus on the adversary's C2 infrastructure and information flow to produce a lower quality and slower decision-making process.
Historical Perspective Heraclitus of Ephesus in sixth century BC noted that "if you do not expect the unexpected, you will not find it." During the German invasion of the Soviet Union in June 1941, the Germans recognized, but the Russians did not, exploitable deficiencies in the existing Soviet C2 system. Employing the tools of C2W in an interrelated fashion, the Germans were able to effectively disrupt, exploit, and destroy the Soviet C2 system. Using weapons specifically built for C2W, the Germans attacked elements of the Soviet system by air, artillery, and sabotage. The results of these attacks were startling. Due to cross-border German sabotage efforts, many of the Soviet units "did not receive the war alert order when it was issued [from Moscow] on the night of 20-21 June 1941." By 24 June, large gaps had already been torn in the Soviet communications network, thus forcing commanders to rely on easily exploitable, unprotected, radio networks. This, in turn, led to the successful targeting of exposed command posts and associated units throughout the theater. These attacks, because of their effectiveness, led Soviet commanders to prohibit the use of radios because they might give positions away. Using C2W, the Germans had effectively shut down the Soviet C2 system, creating an operational environment that quickly led to a general collapse of the entire eastern front. C2-PROTECT
C2-protect can be offensive or defensive. Offensive C2-protect uses the five elements of C2W to reduce the adversary's ability to conduct C2-attack. Defensive C2-protect reduces friendly C2 vulnerabilities to adversary C2-attack by employing adequate physical, electronic, and intelligence protection. C2-Protect Principles The C2-protect process can best be understood by reverse engineering our C2-attack process. Commanders ask how the adversary can employ destruction, EW, military deception, OPSEC, and PSYOP to disrupt our C2 systems and decision-making process. Having wargamed the adversary's C2-attack courses of action, the commander can develop a comprehensive protect operation, synchronized with the main effort and C2-attack. The commander is guided by the five principles of C2-protect.
Historical Perspective The history of the Information Age is being made now. In 1988 we saw the first well-publicized case of a computer virus. This insidious, self-replicating virus known as the Internet Worm penetrated the computer system at the University of California at Berkeley, corrupting thousands of computers on the internet. A computer emergency response team (CERT) had been created at Carnegie Mellon University. In 1993 they had their first large event as they put out a warning to network administrators that a band of intruders had stolen tens of thousands of internet passwords. When CERT began in the late 1980s, they processed less than 50 events per year. Now they are in the thousands per year. The military is a target of this attack. Recent stories have told of a 16-year-old who compromised the security of more than 30 military systems and more than 100 other systems before he was caught after a 26-day international electronic manhunt. This experience hints at the impact a professional, well-financed effort could have against computer nets. The lesson this evolving history is showing us vividly today is that the information highway is creating a great vulnerability to US forces. We are all familiar with the security of transmitting information over a radio or telephone. But there is an even greater weak spot now in computers, data bases, software (such as decision-making aids and tools), servers, routers, and switches. This vulnerability exists today and is growing in geometric proportions. C2-Protect Effects The effects of C2-protect mirror those of C2-attack. We can deny information the adversary needs to take effective action. We can influence the adversary not to take action, to take the wrong action, or to take action at the wrong time. We can degrade and destroy his capabilities to perform C2-attack against friendly forces. PSYOP and PA supports C2-protect. PSYOP can drive a wedge between the adversary leadership and its populace to undermine the adversary leadership's confidence and effectiveness. The Commander's Internal Information Program (formerly the Command Information Program), publicized by the PAO, can be extremely beneficial in countering adversary propaganda in the US and among the deployed forces. PA specialists, working with PSYOP and intelligence personnel, can also develop information products that commanders can use to help protect soldiers against the effects of adversary disinformation or misinformation. CIVIL AFFAIRS OPERATIONSCA activities encompass the relationship between military forces, civil authorities, and people in a friendly or foreign country or area. CA activities support national policy and implement US national objectives by coordinating with, influencing, developing, or controlling indigenous infrastructures in operational areas. CA secures local acceptance of and support for US forces. CA is important to gain information dominance because of its ability to interface with key organizations and individuals in the GIE; for example, CA's traditional relationship with NGOs and PVOs such as the International Committee of the Red Cross. Commanders fully integrate civil-military operations (CMO) into all operations and use CMO to influence, coordinate, control, or develop civilian activities and civil organizations. CA activities play a command support role in all operational environments and across the operational continuum. However, CA operations are most common when supporting the lower end of the operational spectrum. Functional SpecialtiesMany CA activities require specific civilian skills. CA activities most relevant to the GIE and supporting IO are categorized into four major sections:
GOVERNMENT SECTION
ECONOMIC SECTION
PUBLIC FACILITIES SECTION
SPECIAL FUNCTIONS SECTION Collection ActivitiesThe nature of CA activities and the need for CA personnel to develop and maintain a close relationship with the civilian populace puts them in a favorable position to collect information. CA information collection activities encompass the complete spectrum of cultural, social, political, and economic issues within the present or potential area of operations. In their daily operations, CA personnel deal with people, equipment, and documents that are prime sources of information. Information collected is often important to other units' staff sections or agencies and supports the CCIR. Information SourcesCA units are included in the information collection plan of the supported unit. CA units report information that meets the criteria of the supported unit's collection plan. Prime sources of information available to CA units include, but are not limited to-
RelationshipsThe information collected can supplement the intelligence effort. US forces need timely and accurate information and intelligence to plan missions, secure the element of surprise, identify and develop targets, and protect US interests across the operational continuum. CA activities are closely tied to the intelligence functions and operations associated with the overall tactical mission. CA personnel are not, and must not have the appearance of being, intelligence agents. The mission of the unit drives the intelligence cycle. As operational planning begins, so does intelligence planning. Requirements for operational planning are normally for finished intelligence studies, estimates, or briefings. CA planners prepare their estimates from basic intelligence documents that are not primarily written for CA use, such as an area study. Intelligence is the product resulting from the collection, evaluation, and processing of information. Overall, CA elements collect information that the G2/J2 turns into intelligence. CA forces, if used correctly, can complement theintelligence collection process, especially HUMINT. In some cases, CA elements can also enhance the capabilities of technical intelligence (TECHINT) or intelligence concerning foreign technological development that may have eventual application for military use. Coordination and SupportAll CA activities require close coordination with military forces, US and foreign government agencies, and nonmilitary agencies with a vested interest in military operations. CA planners must consider all available support to ensure successful completion of the CA mission. In most cases, CA planners directly or indirectly support the agencies assigned by law to carry out national policy. CA planning is a command responsibility. It must be coordinated, at a minimum, with all other staff planners. To ensure success, coordination and cooperation with the following are vital to the conduct of all operations: other US staffs and units, host nation military, coalition military, US Government, foreign governments, international agencies, PVOs, and NGOs. GOVERNMENT AGENCIES Effective CA activities require close contact between the US military, the Department of State (DOS), and other US Government agencies. Because DOS formulates and implements foreign policy, it has a vested interest in CA activities. In the area of CA, DOS has primary or joint responsibility with DOD for policy. Some examples are matters involving PSYOP, PA, CA, civil information, or other measures to influence the attitude of the populace and plans for turning CA activities over to civilian control at the end of hostilities. PVOs AND NGOs The list of PVOs and NGOs that may be found in an AO could be very large. Approximately 350 agencies capable of conducting some form of humanitarian relief operation are registered with the USAID. Commanders must consider the presence and capabilities of PVOs and NGOs and, when appropriate, coordinate and cooperate with their efforts. Because many of these organizations may have been established in the AO in advance of the Army's presence, they may be a good source of information and knowledge. CA, PSYOP, AND PA ELEMENTS CA, PSYOP, and PA elements are able to use the same communications media with essentially the same messages but to different audiences. CA and PSYOP personnel address local populations and enemy forces, respectively, while PA personnel address US forces and national and international news media. Popular American public support contributes to the success of CA. CA and PSYOP personnel provide news and information to the local populace on the effects of combat operations. CIVIL-MILITARY OPERATIONS CENTER Commanders can establish a CMOC to perform liaison and coordination between the military PVOs and NGOs, as well as other agencies and local authorities. Figure 3-4 illustrates additional GIE players that may interact with the CMOC. Relationships with nonmilitary agencies are based on mutual respect, communication, and standardization of support. NGOs and PVOs have valid missions and concerns, which at times may complicate the mission of US forces. As an example, liaison with an organization that is caring for the sick and injured of the local populace may reveal that human rights abuses are occurring. This information could provoke a response by DOS officials to warn local authorities to stop such abuse from happening, as well as increasing the level of protection for the local population by US forces. STAFF CA operations must be integrated into the battle plan, to include providing for timely and accurate reporting of the operation and combating distorted or disinformation disseminated by the adversary. The CA representative to the IOBS-
In concert with the G2/J2 and chief of staff, the CA staff officer (G5/J5) controls, coordinates, and integrates the CA effort at each echelon. One essential function is to prepare and issue a CA annex as part of the unit's OPORDs or OPLANs. See Appendix A, Annex A. Historical Perspective In the early spring of 1991, in the aftermath of its humiliating defeat at the hands of US-led coalition forces, the Iraqi Army launched a violent attack against the Kurdish minority in northern Iraq. More than half a million refugees fled across the border into southeastern Turkey. Huddling on exposed mountainsides, they promptly began to become ill and die from starvation, exposure to the bitter cold, and various diseases. The world press reported that over a thousand Kurds, especially children and the elderly, were dying each day. On April 5, President Bush directed US military forces to "stop the dying." Lieutenant General John M. Shalikashvili, then deputy commander of US Army Europe, was placed in command of the coalition task force Provide Comfort. Elements of several CA units, active and reserve, were redeployed from the Persian Gulf or deployed from Fort Bragg to Turkey under the 353d Civil Affairs Command (USAR), Bronx, New York. In Turkey, the CA soldiers joined with 10th Special Forces Group to aid overwhelmed relief workers already on the scene. The latter included personnel from the United Nations High Commissioner for Refugees, the US Department of State Office of Foreign Disaster Relief, the Turkish Red Crescent, and more than 40 different civilian humanitarian relief organizations, all of which were attempting to care for the Kurds in 40 or more scattered locations. Shalikashvili's greatest problem became coordinating all the organizations' efforts with the US Air Force-the primary means for transporting emergency supplies into the region. At US European Command Headquarters in Stuttgart, Germany, an Army Reserve CA captain with the 353d saw a possible solution. The captain, a software engineer in civilian life, joined with three other CA reservists in an intensive three-week effort, first in Stuttgart and later at Incirlik Air Base, Turkey, to design and implement a unique relief supply data base. Their program, later named the Disaster Assistance Logistics Information System (DALIS), combined key data from agencies on the type of aid arriving, storage locations, and intended destinations. DALIS allowed planners to coordinate efforts and deliver the right supplies to the right locations at the right time. These innovative soldiers used the power of the microprocessor to unscramble what threatened to be a logistical, diplomatic, and humanitarian nightmare. By combining data from multiple sources, they provided vital information that reduced redundancy and avoided maldistribution of resources at a critical moment, saving thousands of lives. Using IO, CA soldiers became masters of the situation and made a decisive contribution to the success of Provide Comfort. PUBLIC AFFAIRS OPERATIONSPublic affairs must be integrated with other battlefield functions to achieve the desired effect of an accurate, balanced, credible presentation of information that leads to confidence in force and the operation PA fulfills the commander's obligation to keep the American people and the soldiers informed. PA operations help establish the conditions that lead to confidence in America's Army and its readiness to conduct operations. Army operations are of interest to the public and subject to being covered by the media. PA is therefore a function that supports both combat and noncombat operations and contributes to success in war and other military operations. MissionsThe inherent challenge is for commanders to understand the dynamics of media coverage. The media can potentially have a quick and pervasive impact on their plans and operations. Its coverage of the development of plans and the conduct of operations may impact and influence strategic decisions in a more profound and immediate way than in the past. PA operations enable commanders to effectively operate with the media. Commanders must also have a better appreciation for the immediacy of media coverage such as personal interviews, live versus taped reports, film versus written dispatches, methods of transmission, and so on. The commander's information needs are not answered by a single source, but by a combination of many systems and functions, including the news media. The advances in information technology provide potential adversaries with the capability to exploit (deny, distort, degrade, or destroy) information. The PAO must have the capability to monitor the national and international media and identify and assess information relevant to the operation. The missions of PA, PSYOP, and CA involve communicating information to critical audiences to influence their understanding and perception of the operation. Information communication must be fully coordinated to eliminate unnecessary duplication of effort and ensure unity of purpose. Planning for these operations must be synchronized, and the messages they communicate must be truthful and mutually supportive to ensure that credibility is not undermined and mission success is achieved. The PAO's support to the commander is multidimensional. The PAO advises the commander on media relations and the PA implications of current and future operations and events. He serves as the official command spokesperson and implements the Commander's Internal Information Program. PA focuses on achieving an accurate, balanced, and credible presentation of timely information that communicates the commanders perspective to enhance confidence in the force and the operation. It provides the critical battlefield function of media facilitation by serving as the interface between the media and the force. With the broad scope and initiative given to soldiers and units today at every level, one of the primary tools the commander uses is the internal information program. Well-informed soldiers are likely to have higher morale and perform better. Soldiers need and want information from both external and internal sources and are interested in the public perception of an operation. Therefore, PA operations use various communication methods and channels to make this information available to soldiers, other Army audiences, and external audiences. The broad range of missions the Army executes today are done in an environment of global visibility. Media coverage can be pivotal to the success of the operation and achieving national strategic goals. Impact of ChangeEvery aspect of every operation may be an issue of interest to the media and consequently to the public. Existing and emerging technology puts military operations onto the global stage, often in real time. Soldier actions can induce public reactions, which in turn causes NCA reactions that impact operations without ever engaging US forces. For example, real-time or near real-time reports of the actions of a soldier manning a roadblock, the results of a minor skirmish, or the effects of a major combat action become the subject of discussion. Media personalities, politicians, pundits, critics, academics, and the general public rapidly form positions and opinions, often in pursuit of agendas well beyond the scope and purpose of the operation being reported. They become active participants in the international public debate of events and issues. Adversaries can also attack the public opinion center of gravity and affect operations without ever engaging US forces. All Army operations can be influenced through planned or inadvertent messages communicated via the GIE. PA and the associated GIE addresses simultaneous effects that are integral to all levels of war (Figure 3-5). In the Information Age, the old separation of public information and internal information activities are compressed. Providing accurate, timely news, information, and entertainment reduces distractions, rumors, fear, and confusion that could cause stress and undermine efficient operations. Such activities contribute to team building, morale, and unit cohesion. They enhance soldier confidence and understanding. They contribute to ethical behavior, respect for the law of war, private property, the rights of civilians and noncombatants, and human dignity. Coordination and SupportPA is a battlefield function and has a direct impact on the conduct of operations. It must be fully integrated into the planning process at all levels and across the full continuum of operations. A member of the PA staff serves on the IOBS (see Appendix D). The PA representative assesses media presence, capabilities, information needs and interests, and content analysis of both traditional media and electronic forums such as those on the internet and electronic bulletin board. Finally, PA operations must be integrated into the battle plan, to include providing for the timely and accurate reporting of the operation, combating distorted or disinformation disseminated by the adversary. The PA representative to the IOBS-
PA is integrated into the OPLAN/OPORD through the PA Annex.
Appendix A, Annex A provides
the information to implement PA media facilitation, news, information provisions,
and force training operations. This annex is coordinated with all staff agencies,
especially those that significantly impact the information environment, that
is, PSYOP, CA, signal, military intelligence, to ensure that PA activities
are synchronized with other activities. Historical Perspective At 1800 hours local (Riyadh) on 27 February 1991, the Gulf War CINCCENT and ARCENT commanders agreed that in all likelihood no more than 24 hours of battle remained. At 2100 hours during a briefing for the press corps telecast live around the world, the CINCCENT reflected that opinion and indicated that coalition forces would be pleased to stop fighting when so ordered. The time of the briefing in CONUS (1300 hours EST) ensured a wide audience, including the President of the United States, for at least a portion. Reacting to the briefing, the President and the Chairman of the Joint Chiefs of Staff (CJCS) conferred, and the CJCS called Riyadh from the Oval Office, indicating the President's wish to stop the offensive as soon as practicable. The CINC called his component commanders, stating that the NCA was considering a cease-fire at 0500 (local) on 28 February. Meanwhile, VII Corps had prepared a double envelopment movement, passing 1st Cavalry Division around to the north of 1st Armored Division, to crush what remained of the Iraqi Republican Guard. The corps intended to execute the double envelopment beginning at 0500 on the 28th. In accordance with an ARCENT warning order concerning the cease-fire, however, VII Corps units assumed a local security posture, focusing on force protection. An ARCENT frag order, published at 0200 and titled "Potential Temporary Cease-Fire," reiterated the 0500 implementation time. At 0300, CENTCOM notified ARCENT that the President had set 1200 am eastern standard time on 28 February (0800 hours local) as the beginning of the cease-fire time and urged the Army component to inflict the greatest possible damage on the enemy before that hour. Accordingly, ARCENT published a new FRAG order at 0330, calling for the resumption of offensive operations. At 0406, the VII Corps commander ordered his division commanders to execute the double envelopment with a new departure time of 0600, being mindful of the 0800 cease-fire. Difficulties inherent in reordering battle and executing the mission for maximum gain over the next four hours led to confused communications, misunderstood commander's intent, and postwar questions over operational and tactical execution.
In the space of 11 hours, a press conference that included unguarded opinions
about the past and future course of a war profoundly affected the strategic,
operational, and tactical levels of that war. Commanders on the front lines
were neither informed nor consulted on the intent of the public briefing,
either before or after it had taken place. The ubiquitousness and immediacy
of press reportage effectively erased boundaries between national and theater
command authorities and dramatically compressed the time between strategic
decision and operational consequences.
|
Relevant Information and IntelligenceIn modern battle, the magnitude of available information challenges leaders at all levels. Ultimately, they must assimilate thousands of bits of information to visualize the battlefield, assess the situation, and direct the military action required to achieve victory. RELEVANT INFORMATIONRelevant information is defined as-- Relevant information has a direct relationship with the MIE in two important ways:
In the past the Army has tended to approach the collection and use of operational information from a specialized perspective. For example, different BOS elements have collected and used information necessary to support their particular functions, such as--
Only a limited amount of such information was shared and that at relatively high levels within the military organizational hierarchy. Information flowed up and down stovepipes with routines that tended to slow the sharing of information across organizational boundaries. Relatively little effort was focused upon the systematic integration or synchronization of information. Normally, numerous specialized, noninteractive data bases were developed and maintained to meet the needs of particular elements on the battlefield. Because of changes in the information and operational environments, we can now achieve new levels of efficiency and effectiveness in use of information by integrating and synchronizing the collection, processing, and dissemination efforts. Efforts must focus on leveraging the potential operational contribution of information by efficiently collecting and sharing information across all BOS elements. Assessment CriteriaBecause sources of information are imperfect and susceptible to distortion and deception, commanders and planners must carefully assess the quality of the information prior to its use. They can do so using the following six criteria:
As a first priority, information should be accurate and relevant. As a second priority, it should be both timely and in usable form. Finally, information should be as complete and precise as possible. The following rule of thumb supports these relationships: incomplete or imprecise information is better than none at all; untimely or unusable information is the same as none at all; inaccurate or irrelevant information is worse than none at all. Decision and Execution CycleCommanders must have information to command. Information is the medium that allows the commander's decision and execution cycle to function. Information gives direction to actions by the force, provides courses of action for protecting the force, and helps the force accomplish its operational mission. Relevant information drawn from the MIE supports the creation of situational awareness that contributes directly to effective C2 during all stages of the decision and execution cycle. C2 in an environment of situational awareness helps the commander ensure unity of effort toward mission accomplishment. Ultimately, C2 depends on the right person having the right information at the right time. C2 is a continuous, cyclical process by which a commander makes decisions and exercises authority over his forces to accomplish an assigned mission. A commander's decision and execution cycle has four sequential steps (see Figure 4-2).
The commander operates within the GIE, adjusting his MIE to enhance his situational awareness as necessary. Moreover, the commander uses his various means in the MIE to ensure that all elements of his force have a common, complete, and relevant situational awareness. This requires a sophisticated INFOSYS that enhances the commander's ability to share, manage, and move information among organizations. The commander also uses his information capabilities to support OOTW. The emphasis during such missions shifts away from the combat focus of C2W operations and starts to take in broader considerations contributing to efficient and effective operations. These operations often involve a variety of GIE players. For example, the G3/J3 works closely with PA and CA officers, among others, to determine critical information requirements pertaining to his AO. INTELLIGENCEIntelligence is-- Intelligence is also the critical subelement of relevant information that focuses primarily upon foreign environments and the adversary. In support of friendly operations, intelligence helps produce a common, current, and relevant picture of the battlespace that reduces uncertainty and shortens the commander's decision-making process. Against an adversary, intelligence is vital for developing and executing effective C2W operations that degrade and distort the enemy's decision-making process while protecting friendly C2. Intelligence support to IW executed at the strategic and national levels must be leveraged to support C2W and IO conducted at the operational and tactical levels. This effort requires a seamless intelligence-collection process and supporting architecture, providing real-time intelligence products focused on CCIR. Role of IntelligenceIntelligence provides the commander with an accurate understanding of the threat situation as it relates to current and future operations. Intelligence personnel acquire, use, manage, and exploit information to produce such an understanding. For common situational awareness to be accurate and current, the intelligence effort is continuous. Intelligence collection includes all possible sources, from national-level covert operations through local open sources such as news media, commercial world contacts, academia, and local nationals. In noncombat operations, HUMINT, open sources, and other government agencies provide timely information to augment the unit's more traditional battle-focused intelligence-collection effort. The intelligence effort provides current, accurate threat and targeting data to weapon systems and intelligence sensors. Their effectiveness is dependent upon the rapid movement of data between collector, processor, decision maker, and shooter. Intelligence supports C2W, focusing on C2-attack and C2-protect. Intelligence-Enabling FunctionsThe primary purpose of intelligence is to enable well-informed operational decisions based on an accurate understanding of the situation. The essence of intelligence is to collect, analyze, screen, and present information requested by the commander. Intelligence helps reduce uncertainty for the commander by screening out information that is not relevant to his decision-making process. Intelligence-enabling functions focus on assessing friendly vulnerabilities, understanding the adversary, employing IPB, and assessing battle damages. ASSESSING FRIENDLY VULNERABILITIES The first critical step in protecting IO capabilities is to identify specific and potential threats. Potential threats range from the adversary's direct overt and covert actions, to individuals and organizations seeking to exploit military INFOSYS, to natural phenomena. They include a new family of global commercial imaging, cellular telephone, and positioning systems that jointly or separately provide a potential adversary with near real-time information on forces and movements. The fluid, porous nature of the MIE makes it difficult to protect INFOSYS from possible attacks. Therefore, intelligence provides the commander the necessary information to conduct risk assessments and develop risk management options to protect vital C2 components and capabilities. The risk assessment is based on identification of such factors as specific threat capabilities, technical capabilities, doctrine, and past performance of the threat force. The risk assessment is not a finished document, but a continuous process that is constantly updated to reflect changes in the operating environment, technology, and threat acquisitions. Because C2W offers potential adversaries the chance to strike at the supporting infrastructure of the US force--wherever it is located--the commander and his staff must be aware of threats to their INFOSYS at the home station. UNDERSTANDING THE ADVERSARY The effectiveness of C2-attack is predicated on a thorough understanding of an adversary, his C2 system, and his decision-making process. The deeper the understanding, coupled with the tools and techniques to take advantage of such knowledge, the more effective the exploitation of the potential adversary. At all levels of war, intelligence is an operational tool that identifies, assesses, and exploits the enemy's information and C2 systems. Data is required on what information the adversary collects, by what means, what reliability he places on various sources, and how that data is evaluated. Intelligence personnel must be able to describe the enemy's decision-making process and how direction is sent to subordinates. Detailed intelligence is required on the social and cultural environments and the psychological makeup of the adversary's key leaders and decision makers. How they interact and perceive one another are important aspects of the information necessary to develop effective PSYOP and deception operations. How subordinates execute decisions completes the picture. Having a detailed understanding of the adversary's use of information is necessary in order to determine where and how to effectively influence his actions (see Figure 4-3). "Know the enemy and know yourself, and you will be victorious." EMPLOYING INTELLIGENCE-PREPARATION-OF-THE-BATTLEFIELD In this context, IPB is the continuous process used to develop a detailed knowledge of the adversary's INFOSYS. IPB is a continuous process of overlapping and simultaneous actions that produces situation updates on a continuous basis and providing options to the commander. This form of information IPB, as shown in Figure 4-4, is the basis for planning operations, developing C2W courses of action, and targeting. The process builds upon the standard IPB but also requires--
Much of this information should be routinely collected and maintained in national-level data bases and be readily available at the start of a mission. The IPB actions the intelligence officer accomplishes to support IO include constructing a template of the adversary decision-making process, understanding the information infrastructure of the adversary, and analyzing the adversary's vulnerabilities. Constructing a Decision-Making Template The first step in the IPB process is to construct a template of the adversary's decision-making process. This aspect of information IPB focuses on developing an understanding of the leadership/personality profiles of the critical adversary decision makers. It address how they use information to make decisions, how they interact as organizations to make decisions, and how they execute those decisions. This step is linked directly to the ultimate goal of IO, which is to find ways to create a desired response in the adversary decision-making process, to create a relative military advantage, or to achieve the desired end state of the military operation. Understanding the Adversary's Information Infrastructure. The second element of IPB is to understand the information infrastructure of the adversary. See Figure 4-3, which depicts how information flows within the unit, organization, and structure. This analysis includes the human interface as a valid form of information distribution and is not limited to only technology assessments. An understanding of how information from outside the adversary's unit, organization, or structure flows must also be developed for the commander's use. This includes understanding the local, regional, and global information environments. CA teams operating in-country can greatly assist in this process. Analyzing the Adversary's Vulnerabilities. Next, the intelligence officer analyzes the decision-making template and the infrastructure template to determine adversary vulnerabilities. Vulnerability analysis occurs on two levels.
Vulnerability analysis is then extended to include the collateral damage a C2W action may cause on the operating environment. As an example, an option in attacking an adversary's C2 might be to destroy his electrical power infrastructure. However, the strategic cost (political or logistical) of destroying this capability might outweigh the tactical gains. One implication of the GIE is that actions and their consequences are examined across the MIE, as opposed to the battlefield alone. Developing Options The decision-making template and the infrastructure template are combined to form a C2-attack course-of-action template. Various courses of action can then be developed and analyzed to determine the best way to use IO to influence, support, or accomplish the overall mission. ASSESSING BATTLE DAMAGES BDA serves to confirm or deny previous intelligence estimates and update the IPB. The intelligence system continuously assesses the effectiveness of IO. This BDA allows commanders to adjust IO efforts to maximize effects. An important aspect of this information BDA is timely analysis to determine when exploitable vulnerability is created in the adversary C2 structure. Compared to the way we look at conventional BDA reporting procedures, BDA in IO is not so apparent. Information BDA is not always reported in terms of physical destruction of a target. The challenge of information BDA is to be able to assess the effects of our efforts without the benefit of physical confirmation. The effects may well be trends, activities, and patterns in future adversary actions. They could be as simple as an absence of activity on a C2 net, combined with an increase of traffic elsewhere, that is, reduced very high frequency/ultrahigh frequency (VHF/UHF) transmissions coupled with observations of increased courier traffic or heavy land line activity. BDA also examines the collateral damage C2W actions may cause to nonmilitary systems and capabilities within a commander's MIE.
|
Information SystemsMicroprocessing, miniaturization, communications, and space technologies have combined to permit almost real-time intelligence and information sharing, distributed decision making, and rapid execution of orders from a wide variety of forces and systems for concentrated effect. FUNCTIONSINFOSYS include personnel, machines, manual or automated procedures, and systems that allow collection, processing, dissemination, and display of information. These functions cover all aspects of the organization, providing commanders with an accurate, relevant, common picture and a common situational awareness. Accordingly, a commander should consider his staff as part of the INFOSYS because its chief function is to plan and integrate IO. INFOSYS collect, transport, process, disseminate, and protect information in support of the CCIR. In addition, INFOSYS enable the commander to use information effectively to maintain an accurate view of his battlespace, coordinate the activities of his tactical forces, and help shape his MIE. INFOSYS directly support battle command; however, all aspects of land warfare--operations, logistics, planning, and intelligence--depend on a responsive information system infrastructure. INFOSYS are able to simultaneously support current operational deployments and future contingencies. Interoperability and flexibility are critical characteristics of any INFOSYS, especially given the requirement for Army forces to conduct force projection and split-based operations using strategic systems.
ROLEThe role of INFOSYS is to provide the infrastructure that allows the Army to interface with the GII. INFOSYS enable the integration of all IO activities. INFOSYS form the architecture that--
The accelerated development of information technologies has created new techniques for managing, transporting, processing, and presenting data. These include imagery, video, color graphics and digital overlays, mapping, and data base technology. With the revolution of information technology, developments in satellite communications, network and computer technology, and the infrastructure of military and nonmilitary INFOSYS combine to provide the commander with a global reach capability. See Figure 5-1. Communications and automation architecture allow for modular C2 support for force tailoring during any phase of an operation. Operations take place in a global environment and demand information from a host of information sources. Military and nonmilitary INFOSYS provide that global capability to support commanders and units across the range of operations. Discussion includes the INFOSYS, the principles that form the foundation for their support, and the direction of future INFOSYS technology. Military Information SystemsMilitary INFOSYS integrate fielded and developmental battlefield automation systems and communications to functionally link strategic, operational, and tactical headquarters. INFOSYS maximize available information networks through seamless connectivity as well as C4 interoperability. Figure 5-2 depicts the relationships of strategic, operational, and tactical architectures that tie the many distributed elements into an integrated, interoperable, and cohesive network. JOINT GLOBAL COMMAND AND CONTROL SYSTEM The primary national warfighting C2 information system is the joint Global Command and Control System (GCCS), which interfaces with the Army Global Command and Control System (AGCCS). ARMY GLOBAL COMMAND AND CONTROL SYSTEM AGCCS is a seamless C2 system operating at the upper echelons of the ABCS and supports C2 for echelon-above-corps units. ARMY BATTLE COMMAND SYSTEM ABCS is the primary Army warfighting C2 INFOSYS and employs a mix of fixed/semifixed installations and mobile networks, depending on the subsystem. ABCS is interoperable with theater, joint, and combined C2 systems across the full range of BOS functions. It is vertically and horizontally integrated at the tactical and operational levels. ABCS provides connectivity to combat information data bases and processes information pertaining to each BOS. In addition to the theater-level AGCCS, the other components of the ABCS include the Army Tactical Command and Control System (ATCCS) and the Force XXI Battle Command Brigade and Below System (FBCB2). Army Tactical Command and Control System ATCCS is linked directly to AGCCS, providing the framework of seamless connectivity from brigade to corps. Moreover, it integrates the traditional disparate stovepipe functions into a coherent, seamless infrastructure that binds the BOS together. Figure 5-3 depicts this INFOSYS architecture. Tactical internet capabilities to establish the use and allocation of new IO capabilities offered by digitization of tactical forces are in development. The tactical internet has both operational and systems information architectures. The operational architecture is for required connectivity of force elements and the type and volume of digital information-sharing by elements within the force. The system architecture is for specific hardware and software to provide connectivity and dissemination of battle command information.The two evolving architectures account for predetermined user information exchange requirements throughout the tactical force. Each node of the tactical internet can provide information services while on the move. Network management is an important feature of the tactical internet and is highly critical to the successful delivery of information across the battlefield. It enables the tactical information manager to track tactical users on the battlefield. It provides a tool to assist in the dynamic configuration of battle command information networks needed to conduct tactical IO. Force XXI Battle Command Brigade and Below System. In the near term, the FBCB2 system employs the GPS (POS/NAV) and communicates over the single-channel ground and airborne radio system/enhanced position location reporting system (SINCGARS/EPLRS) and the mobile subscriber equipment/tactical packet network (MSE/TPN). These systems form an integrated network to move information (data) between higher and lower echelons (vertically) and between adjacent organizations (horizontally) without routing through the brigade headquarters. Moreover, FBCB2 provides digital connectivity from brigade to weapons systems or platform level. It transitions from a network of three separate systems to a homogeneous network and system of systems comprised of--
Nonmilitary Information SystemsInformation technology is growing exponentially and transforming how the world conducts business, diplomacy, and war, requiring that commanders have a broader and externally oriented view of all sources of INFOSYS when executing IO. Moreover, DOD has limited authority for securing this civilian infrastructure or influencing the content of its products. Technological improvements in mobility, directed-energy weapons, digitization, and sensors continue to reduce factors of time and space and demand faster tempos of operation across vast areas. Increasing global population, rapidly expanding world economic markets, and unprecedented advances in INFOSYS technology continue to perpetuate a global explosion of information networks of a nonmilitary or commercial nature. These ever-increasing networks are rapidly creating a global web or infosphere of information. Important changes are occurring in broadcast communications technology, computing, and space-based technology. The global nature and speed of news broadcasts can elevate apparently obscure events into international spectacles and has created a market for news known as infotainment. The number of players in the GIE are growing rapidly and sharing new information over computer networks at a steadily increasing rate. Cellular communications and data compression advances increasingly provide greater communications freedom to individuals in ever wider regions of the globe. These advances enable individual soldiers as well as independent media or other actors to independently reach home using the internet or broadcast and publication sources. Potential sources of immediate information and the number and variety of MIE influences (both intentional and inadvertent) are rapidly multiplying. The cumulative effects of these changes permanently alter the shape of organizations and C4I architectures in ways that are just becoming evident.
Like the rest of the nation, the Army relies on elements of an information environment it does not control. These nonmilitary INFOSYS include--
Historical Perspective In 1944, at the Battle of Arnhem, the British First Airborne Division landed with the wrong radio crystals. They couldn't communicate with the outside, not even to their relief column at Nijmegen, a few miles away. They were isolated, under attack by superior numbers, and surprised at being dropped where they weren't supposed to be. During the entire multiday battle, members of the Dutch resistance in Arnhem were routinely talking to the counterparts in Nijmegen by telephone, because the national telephone system had not been taken down. It never occurred to a single paratrooper to knock on the door of a house and call Nijmegen, because the battlefield had been defined outside the civilian infrastructure. The Dutch underground assumed the paratroopers were talking by radio, and the paratroopers had never thought about using the civilian infrastructure. The availability of nonmilitary INFOSYS often offer the command an alternative means to satisfy its informational C2 needs, but only after a careful assessment of security risks. As an additional benefit, use of available nonmilitary INFOSYS may reduce the requirement for deployed military information system packages. Operational use of a nonmilitary system allows planners to compensate for system shortages and to meet the surge of information requirements in the early stages of deployment. The J6/G6 is responsible for standardization of nonmilitary equipment and software used throughout the AO. However, planners have to ensure the deployed modular INFOSYS packages implement open, nonproprietary, commonly accepted standards and protocols to interface with nonmilitary systems. Proper use of INFOSYS creates new challenges at individual user, organization, and system levels. Planners should consider these challenges in IO planning because they will affect the end user and the information management structure. The user will be challenged by the digitization of the battlefield, by interface requirements between the operator and the system, and by the need to develop effective training strategies. The optimal use of INFOSYS ultimately depends on the availability of quality soldiers and leaders who are trained to employ advanced INFOSYS technology. Organizations will be challenged to develop flexible task-organization strategies that use the INFOSYS to adapt to the wide range of different conditions existing in the GIE. In addition, organizations will improve their battlefield functional capability in a digital environment by using advanced computer applications and tools. System challenges will emerge as a result of--
Meeting these challenges will enable and enhance the conduct of future operations. Signal planning increases the commander's options by providing the requisite signal planning support systems to pass critical information at decisive times, thus leveraging and exploiting tactical success and facilitating future operations. |
Planning and ExecutionJFCs employ air, land, sea, space, and special operations forces in a wide variety of operations...to not only attack the enemy's physical capabilities but also the enemy's morale and will. PLANNINGIO planners must consider the conditions that affect the Army as it deploys. They must focus on the principal objective of achieving information dominance, and, in doing so, follow a planning process that applies the components of IO correctly in support of military operations. Employment ConsiderationsThe IO discussed herein depend on a series of considerations and conditions that affect the force-projection army as it deploys and operates to support joint, multinational, and interagency power-projection operations. Figure 6-1 depicts how IO apply across the spectrum of operations and how the use of the IO components, especially C2W operations, increases in times of conflict and war
GEN Gordon Sullivan, CSA (1993)
LEVELS OF WAR The levels of war--strategic, operational, and tactical--provide a useful framework for ordering IO activities within a commander's battlespace. This framework helps clarify IO activities by echelons within the theater across the full range of military operations. In the theater, all land operations are conducted as part of a larger, integrated, joint, multinational, and/or interagency campaign. Under the direction of the NCA, a unified CINC sets the campaign in motion. The campaign is supported by all elements of national power: social, economic, political, and military. The interconnectivity and interoperability of INFOSYS are the critical elements that tie these disparate sources of power together. As described in Chapter 5, INFOSYS connectivity is a prerequisite to success in this multidimensional environment. Strategic Level At the national and theater levels, the employment of IO techniques offers a series of strategic options for consideration. The potential for nuclear exchange and major power conflicts in the post-Cold War world is diminishing. Therefore, military options to effectively attack a strategic target--while minimizing the potentially devastating social, economic, and political effects of conventional military use--increase in importance. Army IO offer both a potential deterrent capability and coercive capability at all levels of war. As with nuclear warfare, nations can engage in IO at strategic, operational, and tactical levels. Similar to nuclear warfare, the effects can be widespread or targeted against a narrow range of hostile capabilities. As with nuclear warfare, nations may eventually develop IO capabilities that are perceived to be principally offensive or defensive. National strategies can be supported by building an IO capability based upon varying combinations of C2-protect and C2-attack and other capabilities. From purely a technical viewpoint, the spectrum of candidate information targets and the range of operational alternatives are virtually unlimited. US Army force component commanders, in support of national and theater strategic objectives, are responsible for employing the full range of their information capabilities during war or OOTW. As part of a national IO strategy, the Army can be called upon to employ its capabilities to support both direct and indirect actions. Occasions have arisen and will continue to arise that dictate the use of Army capabilities outside a purely battlefield context. The Army component commander has capabilities ranging from PSYOP support to deep battle strikes to contribute to joint warfighting operations. Information and INFOSYS capabilities inextricably link the traditional levels of war. These phenomena require commanders and staffs at each level to understand the information gathered, where the information is required, and the means or connectivity necessary to deliver and/or receive that information. National-level systems (DOD and commercial) are increasingly capable of supporting and enhancing tactical operations (weather, communications, imagery, navigation). The challenge for leaders is to--
In many cases the connectivity is found through other services or through civilian agencies. For example, the long-haul connectivity during Operation Desert Shield/Storm was augmented by commercial satellite terminals. Systems such as the Army High Frequency Electronic Warfare System (AHFEWS), employed at the strategic or operational level with other joint C2W assets, could diminish an opponent's confidence and will to fight before operations begin. Army UAVs could contribute to the domination of OOTW situations as an initial show of strength before the possibility of hostilities occur. If necessary, they could provide the selected intelligence needed to dismantle an adversary's C2 structure. Combined with deception and PSYOP, these contributors to C2W could erode a potential opponent's confidence in his own forces and conceal the OB and intentions of the friendly forces. Army component commanders strive to support the joint force attack strategy at all levels in order to commit and employ Army capabilities--including C2W, CA, and PA--to the best possible advantage. As with other military activities, IO need to be coordinated and integrated with the OPLAN and JTF campaign plan and synchronized to achieve decisive results. IO offer the prospect of maintaining friendly C2 and situational awareness at a highly dependable level, while simultaneously degrading an adversary's ability to effectively command and control his forces. Such a combination should create a state of information dominance. Operational Level At the operational level, IO occur across the full range of operations and are critical to the success of each stage of force projection. In peacetime, IO support--
During conflict or hostilities, IO implement C2W activities at each level of war. Continuous engagement in IO helps the commander seize and sustain the initiative and synchronize operational capabilities. This allows the commander to control the tempo of operations so that friendly forces can effectively transition from peacetime to wartime operational environments and situations. During Operation Desert Storm, for example, the coalition experienced information dominance in near real time because the enemy's INFOSYS were almost totally disabled. The linchpin permitting the operational maneuver of coalition forces in Iraq was the enemy's inability to visualize the battlespace. This enabled an entire US corps to move in relatively open desert terrain for distances beyond 200 kilometers and still achieve total operational surprise. The enemy's information flow had been so disrupted and his surveillance capabilities so suppressed that he could not see the battlefield. The success of that operational campaign depended critically on information dominance. Space sensors, aircraft-borne sensors, ground sensors, helicopter-transported Special Forces teams, and Marine drones combined to give the operational commander an accurate and timely picture of the battlespace. Historical Perspective If the Iraqi forces moved in daylight, they were subject to immediate attack by coalition air and surface-to-surface missiles. At night, their movements were detected by superior night- capable sensors. They were then attacked by the coalition's all-weather attack aircraft. Further, their use of broadcast media, coupled with a lack of understanding of the coalition's intent, caused them to base their decision cycle on externally filtered information. Tactical Level At the tactical level, commanders usually accomplish their missions through combined arms operations. At this level, IO are often limited in scope. While a tactical-level commander uses all aspects of IO, the focus is often on disruption or destruction of enemy INFOSYS or nodes, primarily through EW and physical destruction. The commander maintains access to his INFOSYS through OPSEC, ISS, and EP. Other applications include--
Information dominance is a temporary tactical condition achievable through a deliberate process. It entails the construction and protection of the information environment, collection of intelligence and relevant information, processing and dissemination of such information, and focused attack against both the enemy's C2 and his eyes and ears. Information dominance facilitates superiority in battlefield visualization at a specific time and place, creating a window of opportunity that is fleeting at best. The commander must seize the opportunity to gain the advantage through effective battle command. Two features are essential to this process: CCIR and tempo.
Tactical units, both maneuver and CSS, participate in IO directed by higher headquarters. In some operations, tactical units perform targeting--striking C2 nodes, deception, reconnaissance and surveillance, and PSYOP activities focused on supporting an overall theater-level IO. They are also linked to the layered information environment via a CMOC or the PAO. For example, CMOC connectivity to local governmental, cultural, social, and economic institutions can provide a wealth of information supporting military operations. The PAO facilitates media relations and contact to support friendly forces. Historical Perspective One of the earlier applications of C2W was demonstrated during the American Civil War. From the beginning, telegraph lines became an important target of cavalry raiding parties from both sides. Since the Union forces were more extensively equipped with telegraphic systems, they were more vulnerable. This vulnerability was exploited by Confederate troops. Among the more innovative soldiers were the telegraphers attached to Confederate cavalry commands. Their specialists, who were also qualified as flagmen, rode in the lead as Confederate cavalry units raided Union territory. They switched military traffic to the wrong destinations, transmitted false orders to the headquarters of Union commanders, and cast suspicion upon all orders that came by wire. When they had finished the job, they cut all the wire in sight and took home with them as much as they could roll up in a hurry. With an expanded vision, tactical field commanders anticipate potential threats of disinformation, enemy PSYOP, and rumors within their command, as well as the potential backwash of public information into their battlespace. Establishing an effective internal information program enhances the morale of soldiers, reinforces the stated unit mission, and supports accurate media reports for both soldiers and their families. RESTRAINTS AND CONSTRAINTS An increased awareness of how operations shape and are shaped by the MIE is necessary as commanders and staffs plan, prepare, and execute IO. Because information can and will be interpreted differently by any number of individuals or groups, military operations can affect the economic, political, and social fabric of individual lives, organizations, and nations far beyond the scope and intent of the military operation. This reality creates a dynamic set of restraints and constraints that impact military operations. Asymmetrical or hybrid operations are the norm as tailored forces are assembled to meet a wide variety of needs. Accordingly, different levels of modernization are found within the army, among joint or interagency task force members, and between US and coalition forces. Disparities in information and communications technology threaten continuity and interoperability. Information capabilities can offset these variances, providing the force and the connectivity needed to operate effectively. Statutory constraints, international law, federal regulations, and rules of engagement (ROE) may limit a commander's options regarding IO. Laws and regulations, such as those governing the use of the frequency spectrum, public information, PSYOP, and espionage, provide examples of free access to information and INFOSYS and are intended to prevent misuse or abuse of these activities. IO may be further constrained or further enabled as new laws, rules, agreements, and protocols are established and as the international community adjusts to the impact of the information explosion. Simple interference, willful manipulation, and corruption or destruction of data bases or INFOSYS, to include space-based systems, have become increasingly active and sensitive activities. The information web and its continuity or disruption has implications far beyond the military environment, into economic, political, and social dimensions. Competition for the EMS, space-based data systems, communications networks, and webbed computer networks all set the stage for potential interference, both intentional and unintentional. Collateral damage gains new meaning in this environment. The potential for the civilian population to be directly or indirectly affected is present and growing. The laws governing the information environment and the law of land warfare are the guidepost, and every soldier is responsible for preventing violations. Close coordination with the supporting judge advocate is critical to assuring compliance with applicable restraints and constraints. As the Army moves into the Information Age, the features of the battlespace continue to change, and the means and methods of conducting all types of operations also change. Success in any operational environment depends on leadership, discipline, morale, and professional training. Today's operations increasingly depend on intelligence and INFOSYS from tactical through strategic levels to provide critical information on all aspects of the friendly and enemy situation. The seamless and horizontal flow and integration of information provides valuable operational data to support planning and battle command. While the fog of war has thinned, it will never completely disappear. The commander will always face some uncertainty on exact enemy force dispositions, OB, and operations in general, not to mention some degree of uncertainty about the enemy's intentions. That uncertainty will be compounded by artful opponents (military or otherwise) and exacerbated by the consequences of unintentional actions or influences from other sources within the commander's MIE. Information DominanceThe principal objective of IO is to gain information dominance--a relative advantage between the friendly commander's decision process and that of the adversary--and to use that advantage to enhance and enable the elements of combat power. IO are an essential foundation of knowledge-based, combined arms warfare. Likewise, full-dimensional operations require integrated IO. BATTLE COMMAND Army operations are profoundly affected by information and IO in the critical function of battle command. Although battle command remains principally an art, it relies increasingly on the ability to process information and move it rapidly to critical points in the operational area. To achieve the required level of information dominance, the Information Age commander treats IO as he would any other critical element of combat power, by providing guidance and direction to his staff and his subordinate commanders. The commander's personal involvement in the development of the CCIR makes it the principal vehicle for ensuring that his battle command information needs are met. Advances in information technology have made decision making and control of units more technical and quantifiable; yet much of those functions remain well within the realm of art, not science. The commander understands that he will never have all the critical information he wants, when he wants it, and that leading soldiers and units to success will remain largely in the realm of art. Accordingly, he employs IO to retain an information advantage over his opponent. Digital technology enhances C2. It allows the Army to have previously unimaginable amounts of accurate and reliable information. It allows higher commanders to have detailed knowledge about events several echelons below. At the same time, it gives subordinates more information about the bigger picture and about what is happening in other areas of the picture. Based on the RCP, commanders are better able to continuously, and in near-real time, integrate combat power. Technology and time do not change some aspects of battle command. Commanders and staffs will continue to make judgments based on less than perfect information. Likewise, they will have to inspire soldiers to perform their duties in the face of fear and fatigue. Commanders will continue to mold units to levels of high performance through training, chain-of-command development, personnel management, morale, and a positive command climate. Elements The three basic elements of battle command--leadership, decision making, and controlling--are characterized by both continuity and change. Leadership. The commander's leadership continues to provide purpose, direction, and motivation to soldiers and units. Leaders will be better equipped to make informed decisions but will operate within a philosophy that will not change. Decision Making. Decision making is facilitated through much-improved information technologies, maintenance of a relevant, common picture upon which to base decisions, and improved decision-making skills of leaders. Control. Control is facilitated by better communications, to include video broadcasting and private links, new position locating and reporting technologies, greater situational awareness, remotely shared electronic maps, automated decision support aids, and other information technologies and procedures. Challenges The challenges for leaders are to provide purpose, direction, and motivation to forces operating over greater spaces, under greater time pressures, and amid more complex situations. Specific implications of IO as they apply to the commander's art include the following:
STAFF RESPONSIBILITIES To facilitate IO, the commander establishes staff responsibilities for planning and execution. OOTW present unique challenges due to the heavy involvement of the media and other players in the GIE. The staff must consider the actions and reactions of US and foreign governmental and nongovernmental agencies, PVOs, and the media when planning operations. Depending on the situation, IO planning can be a complex undertaking or a relatively routine staff function. The commander's IO cell, however organized, draws upon selected expertise throughout the primary and special staff, with liaison and possibly augmentation from subordinate commands. A number of techniques and a variety of arrangements are available to accomplish these responsibilities. Staff Members Current staff members can integrate IO actions into the operation. This approach uses current staff procedures, processes, and techniques to plan, coordinate, and synchronize IO with the operation. The likely choice for the nonmodernized or partially modernized force is to designate a staff representative to supervise these actions. Process-Oriented Group A process-oriented or ad hoc task group, led by the J3/G3, can integrate and synchronize IO actions. This approach is similar to that used for targeting and deep attack. This too is a viable approach for the partially modernized force or nonmodernized force entering a complex combat or noncombat environment where a number of IO capabilities and or threats exist. Appendix D provides a notional IO structure at Figure D-1. Information Operations Battle Staff A dedicated IOBS can be formed to integrate IO actions. This approach would apply to partially and fully modernized forces. The battle staff would consist of all staff members with a functional responsibility within IO, such as signal, fire support, PA, CA, OPSEC, EW, PSYOP, and battlefield deception. Figure D-2 of Appendix D illustrates a notional IOBS. J3/G3 Staff Since IO are only one facet of the larger operation, albeit an important one, the J3/G3 is the primary manager of information. He outlines and monitors the performance and responsibilities of the staff in processing information to support IO and the knowledge flow. The J3/G3 ensures that the staff collects, analyzes, and presents information that fulfills the CCIR. Specific requests for information from BOSs or other information source data bases are generated to fill specific needs. Routine or standard reports to the staff (established by unit SOPs) are used when information requirements remain stable through operations. The J3/G3, within his overall staff responsibility for integrating IO into the OPLAN, usually designates one individual accountable for all IO actions. Key staff members participating in IO coordination and integration include intelligence, signal, fire support, PA, CA, EW, deception, OPSEC, PSYOP, and logistics personnel. In peacetime operations, the G5, PAO, and specialized staff, such as the SJA or chaplain, participate in IO planning and operations. Even as the role of PA expands, a separation between PA and PSYOP functions must be preserved to maintain the credibility of PA spokespersons and products. While essential coordination between these staff functions may be accomplished through the IO cell, the IO cell PA representative should not also serve as the primary command spokesperson. Army Land Information Warfare Activity C2W requires the commander to develop and sustain staff members who are technically and operationally proficient in C2W. Maintaining C2W staff proficiency is a complex undertaking, demanding extensive training, education, and experience with other services, agencies, and joint commands. To enhance the capability of the Army component to conduct IO, Department of the Army established the Land Information Warfare Activity (LIWA). LIWA acts as the operational focal point for land IW/C2W by providing operational staff support to active and reserve component land component commanders (LCCs) and separate Army commands. LIWA field support teams (FSTs) are tailored to fill the specific needs of a component commander and are specifically earmarked to that land component command. Team members consist of a need-driven mix of PSYOP, deception, OPSEC, EW, and intelligence specialties, along with members of other service components, if required. LIWA FST members support the LCC's staff as it plans, coordinates, and executes IW/C2W in joint and multinational environments. LIWA FST supports commands ranging in size and capability from a numbered Army headquarters to a corps or division when these tactical commands are designated the land component of a joint task force. Appendix B provides information on LIWA support and services. What separates good units from not so good units is the way the unit processes information. Planning ProcessThe IO planning process consists of five basic steps that apply across the three components of IO (operations, RII, and INFOSYS). MISSION ANALYSIS The first step of the process begins as the commander analyzes the mission, formulates his overall concept of operations, and considers how IO can contribute to achieving his mission. Under the direction of the J3/G3, the staff analyzes the command's mission and concept of operations to derive a concept of IO. Simply put, "How can IO support the mission?" The staff must consider both C2-attack and C2-protect. Flexibility is essential, as IO support may shift over the course of the overall operation. During analysis, the staff examines enemy and friendly INFOSYS within the context of the commander's MIE. The staff determines the capabilities both sides require to operate effectively. It also sets out the requirements and conditions needed to establish information dominance. The staff considers nonmilitary INFOSYS influences or capabilities beyond traditional military control--such as local or regional communications networks, radio, television, computer networks (internet or worldwide web), and the news media--that may influence the operation. The examination produces a list of critical nodes and vulnerability analyses.
PRIORITIZATION The second step is to prioritize both friendly and enemy critical nodes and vulnerabilities. This part of the process develops potential targets for C2-attack and C2-protect and ensures deconfliction of their integrated effects. For C2-attack purposes, nodes critical to more than one adversary system may have a higher priority. Vulnerability may override criticality, with more critical nodes that are less vulnerable receiving a lower priority. Priorities should be balanced and shifted between C2-attack and C2-protect as required to support the unit mission. The C2-attack product is a prioritization of the list of critical, vulnerable adversary targets from earlier work. Similarly, C2-protect targets should be identified in terms of criticality and vulnerability, then prioritized. CONCEPT OF OPERATIONS The third step of the process is the formulation of an IO concept of operations to influence the adversary's C2 while protecting friendly C2. The G3/J3 reviews his sets of potential C2-attack and C2-protect targets. He assesses available IO capabilities to develop an IO concept of operation that best supports the overall operational mission and is synchronized with the overall concept of operation. Synchronization of IO, both internally (among the five C2W elements and CA and PA) and externally (across the BOSs), is absolutely critical for achieving decisive C2-attack and C2-protect results. The impact of proper synchronization is to focus the effect of the entire range of friendly capabilities to achieve maximum effect at the decisive point in time and space. Although the situation dictates the critical areas for the operation, the commander and staff consider these specific areas in planning:
The battle staff considers all these factors to arrive at an IO concept of operations. The concept is oriented on establishing information dominance in order to give the force dominant battlespace awareness and control of the MIE. A critical tool in developing an effective concept of operation is the synchronization matrix. The synchronization matrix is designed to array time-phased objectives along a horizontal axis against performing units usually organized by BOS along a vertical axis. Within the framework of the matrix, critical tasks that must be performed to achieve the IO objectives are identified, aiding the planner in recognizing the interrelationship between specific tasks and actions and the need to orchestrate them in a manner that maximizes the impact of their execution. See Figure 6-2 for an example of an IO synchronization matrix. EXECUTION Execution begins with tasking those elements that conduct IO missions. The G3/J3 controls and directs both the IO planning and execution phases of the process, with support from the G2 and IO element specialists on the staff. The keys here are--
IO taskings normally become part of the basic order paragraph 3 concept of operations and coordinating instructions. Additional IO details are covered in a separate annex that consolidates applicable IO/C2W into one coherent operational discussion. When a separate IO/C2W annex is written, it should include an IO/C2W synchronization matrix that establishes time lines, responsibilities, sequence of actions, and desired effects. As planning and execution take place, planners should consider a number of factors beyond strict combat capabilities. These include--
Planners must be aware that the counter-IO the adversary launches will likely target US civilian infrastructures. The mere threat of such actions may also generate significant effects, both real and psychological. For example, an adversary's announcement claiming the insertion of a virus into a particular banking institution's computer operation could trigger a panic with major economic repercussions, regardless of the adversary's actual execution of such an attack. FEEDBACK The fifth step is to set up a monitoring and feedback mechanism. A continuous damage or effects assessment process is critical in order for the commander to revise his continuing estimate of the situation and adjust operations. See Appendix A to develop C2W and IO-related planning products. The five-step planning process is illustrated in Figure 6-3.
EXECUTIONThe force-projection cycle is an excellent framework to discuss how to execute IO. The packaging, timing, and employment of key IO activities is essential to attaining and maintaining information dominance in conducting operations across the full spectrum, to include OOTW. Force-Projection OperationsOur post-Cold War National Military Strategy calls for a primarily CONUS-based Army--one that is capable of rapid power projection on short notice to any region of the globe to decisively defeat a regional adversary. These force-projection operations follow a general sequence of stages that often overlap in space and time. IO considerations and actions apply to all force-projection stages. They focus on ensuring information support to battle command during all joint, multinational, and interagency operations and effective intervention against the adversary's C2. In many situations, GIE organizations will be present in the AOR before Army forces arrive. They will often be well-entrenched, with an established logistical framework and long-standing coordination and liaison arrangements. For example, initially the media may know the AOR better than the military. As it covers the buildup, the media gains a thorough understanding of and forms its own perspective about the situation, particularly in OOTW. The projection of Army forces into the situation is of national interest, with national and international media watching from the moment forces arrive. CA and PA personnel need to deploy early to support the commander and the force in their interactions with these organizations. CA and PA operations not only reduce the potential distractions to a commander but also educate these organizations and facilitate their efforts to provide accurate, balanced, credible, and timely information to local officials and agencies, as well as external audiences. Some unique considerations apply for force-projection operations and OOTW. The friendly communications infrastructure provides the means to integrate C4I capabilities starting from the installation power-projection platform with reach-back capabilities while en route, during initial entry, during buildup, throughout the operation, and during redeployment. The variety of conditions under which the Army is employed in the Information Age requires close IO coordination, integration, and synchronization from the strategic to the tactical level. Figure 6-4 outlines this concept. Force projection, supported by IO, is continuous and seamless and compresses time and space. MOBILIZATION OPERATIONS Mobilization is an information-intensive operation. Once mobilization is declared, the unit's activities include assembling personnel, checking readiness factors, and time-phasing operations to meet force deployment schedules. IO assist in synchronizing arrival, processing, certifying, and moving to final points of departure. The Army depends on information management resources in its sustaining base to accomplish the mobilization process. These resources include--
Most of these systems depend upon the NII for their operation. Many run on standard commercial platforms such as personal computers (PCs), reduced instruction set computing (RISCs), or mainframes. The systems could be expanded or enhanced during a crisis. Their dependence also underscores the importance of engaging the interagency process to help secure the NII from possible attack or compromise. Intelligence activities during the mobilization phase focus on collecting intelligence on probable operational environments and potential adversaries. The staff performs the initial information-based IPB during peacetime. C2W activities during mobilization are predominantly concerned with protecting information. Upon mobilization, protection of information is included in the commander's recall and assembly plans. C2-protect measures protect the availability, integrity, and confidentiality of unclassified and classified information necessary to support mobilization operations. During this stage of force projection, bits of information conveyed in nonsecure public and military radio transmissions, news releases, friendly conversations, telephone calls, trash, and so forth, permit news media personnel or hostile intelligence analysts to piece together US intentions and capabilities. OPSEC and INFOSEC aid the commander in preventing adversaries from collecting information of intelligence value. PREDEPLOYMENT OPERATIONS Commanders establish objectives and unit requirements to set the stage for predeployment activities and seek to preserve friendly assessments and decision-making capabilities. IO integrate the elements of C2W to mask deployment and enhance deception operations. Plans include--
These steps ensure the implementation of IO and set the stage for ongoing military actions. PA operations during predeployment contribute to establishing conditions that lead to confidence in the Army and its readiness to conduct operations while remaining attentive to OPSEC and INFOSEC. As units are identified for possible or actual mobilization, public and media attention increases dramatically. PA operations contribute to a reduction in rumors, misinformation, and uncertainty on the part of soldiers, family members, and the public. During the predeployment phase, tactical INFOSYS continue to be used less than fixed military and civilian systems for routine actions during predeployment. Military systems that link operational and strategic echelons, such as the DISN and the Defense Switch Network (DSN), are the primary dedicated military systems used. Intelligence, logistics, and operational planning require extensive coordination with outside agencies, other services, and so forth, to provide the data required. Intelligence activities continue to revolve around establishing an adversarial data base and an information-based IPB. Component commands require national intelligence and weather data to support detailed planning. Before deployment, the commander's staff should develop CCIR, PIR, CMO, and RISTA plans. C2W actions continue to focus on protecting information through exercising OPSEC procedures. With the support of the higher joint headquarters, as augmented by LIWA, C2W planners consider offensive actions to establish information dominance once the force begins to deploy. Close coordination with PA personnel is required during deception and PSYOP planning to maintain OPSEC and ensure such efforts are not targeted against friendly audiences and, most importantly, US, allied, or coalition media. PA develops assessments for current and future operations. Planning continues for appropriate media inclusion (journalists accompanying units). PA implications of all aspects of the operation are considered to include media attention and public response. Synchronized PA programs contribute to increased soldier understanding, confidence, dedication, discipline, will to win, and public confidence in the Army. PA efforts focus on protecting and enhancing the public support of gravity. DEPLOYMENT OPERATIONS IO are necessary to establish the conditions for deploying forces into an AO. Deploying forces require near-real-time joint and/or interagency communications tailored for rapid deployment, en route operations, and links from strategic through tactical levels. During the deployment stage, staff planning functions intensify. Contingency plans (CONPLANs) and PIR are updated, completed, or adjusted. Commanders and staff planners tap into joint and interagency planning systems and data bases, such as the Joint Operations Planning and Execution System (JOPES) and the Army Mobilization and Operations Planning and Execution System (AMOPES), to determine lift asset availability and sequencing. Intelligence requirements and assessments are continually monitored and adjusted. As forces begin deploying, commanders plan for the impact of force separation and reduced information support through low-capacity systems. They adjust their CCIR to those most critical to maintain situational awareness, training readiness, and mission accomplishment. INFOSYS requirements for deploying forces demand home station, en route, and intertheater/intratheater communications that are secure, flexible, and deployable. These INFOSYS must be capable of interoperating with joint forces, civilian agencies, and multinational or coalition forces. INFOSYS support mission planning with multiple continuous intelligence and logistics links to the deploying/deployed force, home station, major commands, logistics agencies, and national and joint intelligence sources. Deploying forces are highly dependent on CONUS-based intelligence, such as imagery and weather, derived from national or theater-based sensors. The forces require assured and survivable communications to numerous agencies. During deployment, echelons above division execute most of the C2W actions such as deception, PSYOP, and continued OPSEC. ENTRY OPERATIONS IO are necessary to establish the conditions for successful early entry. IO capabilities are deployed into a contingency area with a focus on their ability to gather the information required by the commander while denying the enemy use of his information and IO capabilities. Early entry operations vary by region and mission. In both unopposed and opposed entry, counter-RISTA operations are essential. Air and missile defense is key to successful counter-RISTA operations during the early entry period when forces are most vulnerable. Air and missile defense systems negate enemy airborne RISTA, EW, and C2 platforms while simultaneously protecting key geopolitical assets and the force's critical nodes from air and missile attack. Unopposed Entry Unopposed entry allows for greater use of IO capabilities. Early deploying assets focus IO on the adversary to support forward presence or host nation (HN) forces. Early entry forces rely on split-based communications with CONUS-based elements for most of their intelligence and communications support. Although HN or commercial systems may be available, planner awareness of statutory requirements regarding their use is essential. Opposed Entry When entry is opposed, commanders may have to rely on a limited number of INFOSYS to get the information they need to accomplish the mission. Because information requirements may well overwhelm the capability of available assets, commanders must clearly prioritize their information needs to best focus the use of these limited capabilities. Working within the joint IW/C2W plan, army commands employ their C2W capabilities to satisfy assigned tasks. Successful opposed entry operations can be significantly enhanced by denying the adversary use of his INFOSYS through employment of C2-attack assets. C2-attack could include deceiving or overloading the adversary's INFOSYS and disrupting his use of the EMS. DECISIVE OPERATIONS Commanders visualize the battlespace and develop operational concepts that use common situational awareness and the ability to rapidly and accurately move information about the battlefield. The IO capabilities available to the unit permit surprise and the decisive defeat of the adversary from dispersed positions. Defeat of the enemy is usually accomplished most effectively by countering enemy strengths with dissimilar (asymmetrical) systems and methods. Units begin to conduct offensive C2W operations. This requires friendly commanders to exercise increased control over the tempo of battlefield activities. Tactical commanders leverage their information superiority to employ weapon systems, including joint assets, and to regulate the nature and tempo of enemy actions. To optimize the flow of essential information, commanders prioritize their information requirements through CCIR and SOPs. The IOBS, however constituted, ensures that C2W, PA, and CA are integrated into the commander's concept of operation. This is accomplished as the G3 integrates his IO assets into the operational scheme to get the best possible picture based on the commander's intent. Moreover, the G3 leverages organizations and assets from the GIE, that is, joint and national intelligence assets, to complete the IPB mosaic. Often, the assets available are less than those needed to perform the desired IO. The commander provides the focus to prioritize these IO assets. Constant monitoring of enemy and friendly IO status ensures this information is included in situation updates, IPB, and the commander's RCP of his battlespace. Media and public attention is usually more intense during this phase. PA operations include media facilitation, advising the commander on PA implications of the operation, as well as providing for internal and external audience information needs. PA personnel review strategic and operational information with PA implications, coordinate with CA and PSYOP, and facilitate releasable information. Unity of effort and massing of combat power effects are enabled by enhanced information flow, both vertically and horizontally, among commanders and staff members and supported by military INFOSYS. Tactical units employ military information to fully integrate the systems, capabilities, and functions of the combined arms team into the conduct of decisive operations. Control of decentralized maneuver and engagement is achieved by optimizing the enhanced situational awareness and communication provided by digital connectivity. This ability allows tactical units the opportunity to avoid adversary strengths and detection means while moving into the most advantageous positions to permit the destruction of the enemy force in both offensive and defensive operations. Units exercise the capability to focus and mass the effects of indirect fires against the adversary and to synchronize their effects with maneuver. By employing highly maneuverable artillery, aviation platforms, suites of digital sensors, and intelligent minefield systems, maneuver units establish quick-fire sensor-to-shooter links that acquire, strike, assess, and restrike enemy targets at a high rate and level of lethality. Enhanced situational awareness and communications capabilities allow the maneuver commander to conduct decisive strikes within the enemy depth by employing both organic and supporting fire systems. Commanders use C2-attack to destroy, disrupt, and exploit enemy INFOSYS. By providing the RCP at all echelons, IO facilitate the synchronization of all combat power across the BOSs. In conjunction with air and ground battle plans, commanders must select the proper vulnerable nodes and know whether to destroy or merely disrupt them and when to exploit through C2W. Available IO assets may dictate the arrangement of forces on the ground. Coalitions may be formed with armies that have varying IO technical capabilities. Intelligence can be used to ensure the validity of target nominations, while the C2W planning process can ensure that the appropriate response is directed against that target. Our present theory is to destroy personnel, our new theory should be to destroy commands. Not after the enemy's personnel has been disorganized, but before it has been attacked, so that it may be found in a state of disorganization when attacked. TERMINATION AND POSTCONFLICT OPERATIONS IO enter a new phase upon termination of hostilities. The aftermath of war could leave a significant dislocation of the infrastructure and population in the area of conflict. The potential for renewed conflict should not be discounted. In these circumstances the protection of information by OPSEC, the hand-off of military information to other nonmilitary organizations, and even the continued collection of new information may become necessary. Certain military information is protected, while other military information is required to be released publicly to prevent further bloodshed and permit resumption of normal life. Conscious decisions in the orchestration of these competing demands exist as IO continue. For example, the presence of minefields and their location should be released to all parties to prevent civilian causalities. Dislocations and damage following combat generate requirements for new information. Monitoring, relocating, and providing humanitarian assistance for displaced persons is as much an information problem as it is a logistical one. Destruction of physical infrastructures may dictate that for humanitarian reasons the US leave particular items of equipment in place that would otherwise be redeployed. Such equipment may include temporary bridges that replace destroyed ones, radio broadcast band transmission equipment, and electrical generation or water purification equipment. Information is critical in making these decisions. Further uses of such information are required to adjust Army data bases and unit readiness affected by these actions. When combat operations bring an end to the conflict, deployed forces transition to a period of postconflict operations. The transition to postconflict operations can occur even if residual combat operations are still underway in parts of the AO. Therefore, adjustments to IO must be anticipated and planned to ensure a smooth transition during the critical period after the fighting stops. IO adjustments during postconflict operations focus on providing support for restoring order, reestablishing the HN infrastructure, preparing forces for redeployment, and continuing a presence to allow other elements of national power to achieve strategic aims. The transition plan for postconflict operations prioritizes and plans for information requirements and required connectivity to support civil administration mission activities; CMO such as civil defense, humanitarian assistance, and populace and resources control (PRC); and unified planning with DOS, NGOs, PVOs, and HN officials and agencies. CA personnel are uniquely qualified to advise the commander on these activities that reduce postconflict turmoil and stabilize the situation until international relief organizations or HN agencies assume control. Postconflict operations require close coordination between PA elements and those conducting CMO to ensure consistent, accurate dissemination of information. Internal information programs aid the transition to redeployment and reconstitution by reducing rumors and uncertainty. IO transition planning addresses the smooth retrograde of assets from the theater of operations, while considering the possibility of renewed hostilities. Tactical and mobile information assets should be replaced as soon as possible by the fixed communications and information infrastructure of the HN. Part of this stage may include transition of INFOSYS and operations to DOS, PVOs, NGOs, the HN, or other agencies that represent nonmilitary options to support HN rebuilding. Planning begins at this point for support of the redeployment of friendly forces and continued reconstitution of assets destroyed in the conflict or retained by the HN. REDEPLOYMENT AND RECONSTITUTION Normally, reconstitution and redeployment actions occur in a benign regional environment; however this is not always the case. Sensitivity to the effect information has on the population remains a concern. PSYOP and CA may be used to gain and continue support of the population. Information about Army operations and CMO can be disseminated through local, national, and international media. PA operations do not focus on directing or manipulating public opinion, but on providing accurate, timely information about operations. PA personnel take action when necessary to counter misinformation communicated via the GIE. Intelligence collection may focus on nonbattlefield aspects of the current environment and the potential for new threats or adversaries to emerge. Commanders must remain sensitive to the potential vulnerability of critical nodes or systems to renewed adversary operations and be prepared to shift to alternative means if necessary. In this stage, IO support the redeployment of assets no longer needed or needed for another mission elsewhere. Commanders plan and prioritize their IO to allow a smooth transition for redeployment. Postconflict requirements have a direct impact on the redeployment flow. INFOSYS must integrate contractor and HN asset capabilities into the redeployment flow. Units must be rapidly reconstituted to premobilization levels of readiness. To ensure rapid replacement and refitting for new missions, units must identify lost or incomplete equipment because of the high probability of some information assets being left in theater or not yet replaced by the logistics system. Commanders must continue to emphasize INFOSEC during redeployment operations, especially in the event of ongoing hostilities. Operations Other Than WarMilitary operations other than war usually involve a combination of air, land, sea, space, and special operations forces as well as the efforts of governmental agencies and nongovernmental organizations in a complementary fashion. Army forces face complex and sensitive situations in a variety of OOTW. These range from supporting near hostilities in peace enforcement and peacekeeping operations; through drug interdiction, nation assistance, and humanitarian assistance; to support for US state and local authorities responding to natural disasters or civil unrest. The primary tool for mission accomplishment in conventional military operations is the use of force directed against an adversary. In OOTW, however, such a threat may not be present or may not be clearly defined. The threat in these environments may be rogue elements, thugs, or even the adverse effects of the environment or a natural disaster. Hence, commanders employ a wider range of methods in less conventional ways that involve many more players to accomplish the mission. As such, IO capabilities to support the assigned missions may become essential for success. IO may be one of the most critical and acceptable means of achieving the assigned objectives because ROE may severely restrict the use of conventional military weapons. In OOTW, as in other operations, military IO capabilities are not the only assets the commander may have available. Non-DOD, state, and local agencies; international organizations; military or paramilitary forces; and private organizations may also be available to contribute to IO. These players may offer a variety of services and resources, both military and nonmilitary, from within the GIE. This expanded field of individual and organizational senders and receivers of information, with varying methods of operation and focus, add a variety of INFOSYS needs. Interoperability, cooperation, coordination, and liaison may significantly increase resource requirements. Historical Perspective Projection of information is essential to successful military operations. During Operation Restore Hope in Somalia in 1992-1993, a peace operation, the 10th Mountain Division (LI) adjusted its mission analysis and tracking by establishing information dissemination as a BOS. This BOS included PA, PSYOP, and information for soldiers. The division considered full integration of these activities into all aspects of the operation as critical to success. COORDINATION AND LIAISON IO can be extremely complex and demanding. The Army is often faced with formidable infrastructure and interoperability challenges, both at home for domestic support operations and abroad for multinational operations, often in austere environments. To provide coherence to information efforts, IO planning must be in sufficient detail and coordinated with all participating agencies. This requires extensive coordination and liaison. As an example, CA, PSYOP, and PA elements are able to use the same communications media with essentially the same messages but to different audiences. CA and PSYOP personnel address local populations and enemy forces, respectively, while PA personnel address US forces and national and international news media. Employment of C2W, intelligence, and INFOSYS capabilities requires coordination to ensure the synchronization of operations among participating organizations. Since military and civilian systems are often incompatible, military and supported agency communication planners must coordinate as early as possible in the operation. The Army may be required to coordinate IO with the following organizations:
United States Agencies
United Nations
NGOs and PVOs
Local Assets SPECIAL CONSIDERATIONS All operations require gathering and dissemination information, as well as some form of intelligence. Since intelligence is a restrictive term, the preferred terminology in UN operations is information-gathering and dissemination. Accurate information is essential for planning PSYOP, OPSEC, EW, destruction, and deception operations. By gathering information from soldiers, NGOs, PVOs, and civilians personally involved in the day-to-day operation, a commander can gauge the mission's effectiveness and better plan current and future IO. Maximum use should be made of open-source information. When practical, tactical information-gathering systems should be used so that information may be disseminated to UN/coalition forces, NGOs and PVOs, and other government agencies. However, parties to a conflict in peacekeeping operations or civilians in other operations may perceive information-gathering as intrusive or hostile. Therefore, intelligence activities must always be sensitive to legal constraints and/or maintaining the trust of the parties involved. The perception of impartiality is important for the protection of the peacekeeping force. Important intelligence considerations include the following:
Information-gathering assets, sources, and agencies include those used in conventional operations as well as some that are not normally considered. Intelligence personnel will make traditional use of all organic or attached collection assets. However, they may also use other sources and agencies such as the local news media, NGOs, PVOs, international organizations, and exchanges with local police, governments, and militaries. Dissemination of intelligence is conducted using standard intelligence report formats. Intelligence personnel pass information to liaison officers (LOs) who pass intelligence products to parties requiring them in joint or multinational operations. Although not peacetime operations, CA and PSYOP are critical operations that aid commanders in accomplishing their peacetime objectives. Commanders must understand CA and PSYOP abilities to support US and allied armed forces. PSYOP is a vital force employed to optimize the influence of US national policy on foreign target audiences, whether neutral, hostile, or friendly. In other operations, PSYOP provide the commander with the capability to project the purpose and mission of US forces and to influence target audience behavior to support the commander's mission. For PSYOP to achieve maximum effectiveness, planners must include them early in the planning process. In crisis situations, rapid production and dissemination of accurate information to the population are critical. PSYOP personnel can provide the commander with real-time analysis of the perceptions and attitudes of the civilian population and the effectiveness of the information being disseminated. Signal support to OOTW missions requires the same detailed planning as any other operation. However, the scope and scale of planning may actually increase when the commander is considering or is confronted with--
|