Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-and-a-half-years collection of 47,000 files from June 1996 to January 2009 (~6.9 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, cryptome.info, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,100 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


16 June 1997
Source: http://www.atsc-army.org/cgi-bin/atdl.dll/query/download/FM/100-6/fm100-6.zip
(1.11MB - Full document text and images)


FM 100-6
27 AUGUST 1996

By order of the Secretary of the Army:

DENNIS J. REIMER
General, United States Army
Chief of Staff

Official:

JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army


DISTRIBUTION:

Active Army, USAR, and ARNG: To be distributed in accordance with DA Form 12-11E, requirements for FM 100-6 (Qty rqr block no 5425).


FM 100-6

Field Manual
No. 100-6

Headquarters
Department of the Army
Washington, DC, 27 August 1996
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

INFORMATION OPERATIONS

Contents

PREFACE

INTRODUCTION

Chapter 1 OPERATING ENVIRONMENT

  • Geostrategic and Technological Environment
    Threats to the Information Infrastructure
    Challenges
    Information Dominance: The Response to the Challenges

Chapter 2 FUNDAMENTALS

  • Cognitive Hierarchy
    Strategy
    Components of Information Operations
    Information Activities

Chapter 3 OPERATIONS

  • Command and Control Warfare
    Civil Affairs Operations
    Public Affairs Operations

Chapter 4 RELEVANT INFORMATION and INTELLIGENCE

  • Relevant Information
    Intelligence

Chapter 5 INFORMATION SYSTEMS

  • Functions
    Role
    Signal Support
    Future Technology
    Security
    Management

Chapter 6 PLANNING AND EXECUTION

  • Planning
    Execution

[Separate files below]

Appendix A PLANS AND ORDERS (34K)

  • Annex A Major Operations Plan Model: Operational Level
    Annex B Sample C2W Annex

Appendix B RESPONSIBILITIES OF SUPPORTING AGENCIES (16K)

  • Joint Command and Control Warfare Center
    Land Information Warfare Activity

Appendix C PLANNING CONSIDERATIONS (17K)

  • Support Planning Principles
    Signal Support Requirements
    C2W Planning Process

Appendix D STAFF ORGANIZATION AND TRAINING (8K)

  • Organization
    Training

GLOSSARY (29K)

REFERENCES (12K)

INDEX (63K)


Preface

This manual addresses the operational context of information operations (IO), relevant terminology, and the environment of information operations. It supports battle command and provides guidelines for commanders that conduct IO to support all phases of the force-projection operating environment, including planning and executing early entry and force-projection operations in joint and multinational settings.

Military operations occur in peace and war. The traditional focus when discussing information and C2 was electronic warfare (EW), electronic countermeasure (ECM), and electronic counter countermeasure (ECCM) operations that take place during war. The focus of this manual is on command and control warfare (C2W), public affairs (PA), and civil affairs (CA). All are operations that the Army currently uses to gain and maintain information dominance as well as effective C2. Successful operations require effective C2 to transform military capabilities into applied military power. The more effective the force's C2 system, the more completely its capabilities can be realized in peace or war.

As the Army's capstone doctrine for IO, this manual supports soldiers and leaders that execute IO to support military operations. Not only does the doctrine herein provide commanders and their staffs with guidance to conduct information operations, it also serves as the foundation for development of US Army tactics, techniques, and procedures (TTP) manuals. It is also the foundation to refine existing training support packages (TSPs), mission training plans (MTPs), training center and unit exercises, and service school curricula. The manual provides a basis to examine organizations and materiel developments applicable to IO.

This doctrine applies to the total Army--active and reserve components and Army civilians. It is specifically oriented at the operational and tactical levels of military operations. It may be useful to other services, nonmilitary agencies, and allies involved in such operations.

The proponent of this manual is HQ TRADOC. Send comments and recommendations on DA Form 2028 directly to Commander, US Army Combined Arms Center, ATTN: ATZL-SWW-L, Fort Leavenworth, Kansas 66027-1352.

Unless this publication states otherwise, masculine nouns or pronouns do not refer exclusively to men.


Introduction

The Army is embracing a new era characterized by the accelerating growth of information, information sources, and information dissemination capabilities supported by information technology. This new era, the so-called Information Age, offers unique opportunities as well as some formidable challenges. New technology will enhance the Army's ability to achieve situational dominance on land, where the decisive element of victory for our nation has always been critical. At the same time, it will enable adversaries to employ many of these same capabilities. This new technology also allows the Army to transform itself.

The Army is changing the way it does business in the foxhole; in its schools and training centers; and in its doctrine, training, leader development, organizations, materiel development, and soldier development. Responding to the challenges and opportunities of the Information Age, the Army is preparing the warfighter for operations today as well as in the twenty-first century. Information and the knowledge that flows from it empower soldiers and their leaders. When transformed into capabilities, information is the currency of victory.

Information operations integrate all aspects of information to accomplish the full potential for enhancing the conduct of military operations. Information operations are not new. In their simplest form they are the activities that gain information and knowledge and improve friendly execution of operations while denying an adversary similar capabilities by whatever possible means. Effects of IO produce significant military advantage for forces conducting such operations.

Information is an essential foundation of knowledge-based warfare. It enables commanders to coordinate, integrate, and synchronize combat functions on the battlefield. To gain the relative advantage of position (maneuver) and massing of effects (firepower), commanders must act while information is relevant and before the adversary can react. Targeting an adversary's information flow to influence his perception of the situation or prevent him from having or using relevant information contributes directly to decisive operations. As the commander targets the adversary's information systems (INFOSYS), he protects his own. Realizing that absolute and sustained dominance of the information environment is not possible, commanders seek to achieve information dominance at the right place, the right time, and in the right circumstances. They seek information dominance that defines how the adversary sees the battlespace, creating the opportunity to seize the initiative and set the tempo of operations.

  • The accuracy, lethality, and range of modern weapons have forced commanders to disperse their formations, decentralizing control and execution. Massing the effects of these dispersed systems depends on accurate information. Disruption of the flow of information or corruption of the information itself can negate the effects of weapons and systems. Instead of being limited to the physical destruction of people or war machines as the only path to battlefield success, armies now can target information or an adversary's INFOSYS to alter the battlefield chemistry and yield battlefield success.
  • The speed and pervasiveness of data transmission in the Information Age are causing a revolutionary change in the nature of military operations and warfare. Targeting information extends beyond the battlefield and involves more than attacking an adversary's information flow while protecting the friendly information flow. It also requires awareness of, and sensitivity to, information published by nonmilitary sources. These information sources are able to provide tactical-level information in near real time to audiences throughout the world, with the potential of profoundly influencing the context of those operations.
  • IO define the operational situation by generating understanding, providing context, and influencing perceptions. They enable and protect friendly INFOSYS; synchronize force application; connect hierarchical and nonhierarchical systems; link sensors, shooters, and commanders; and degrade, disrupt, or exploit adversary operations by attacking the adversary's command and control (C2). Units conduct IO across the full range of military operations, from operations in garrison, through deployment, to combat operations, to redeployment. IO greatly expand a commander's battlespace, including interaction with the media, industry, joint forces, multinational forces, and computer networks worldwide.
  • Within the context of joint and/or multinational operations, the Army must be able to dominate the information environment in order to perform its missions in any contingency or conflict. The Army's force-projection capability is based upon accurate and timely information. IO can significantly enhance the Army's ability to deter aggression, to effectively execute the full range of operations, and to win decisively in combat.

Notwithstanding the synergy possible with the power of information and information technology, fog and friction will remain; the challenge of sorting out the signals from the noise amidst a mass of expanding data will also remain. Many solutions to the dilemma of uncertainty for the commander are technical. But there can be no information revolution without the human influence and understanding of soldiers and commanders who link and integrate information, technology, and action. IO do not offer any panaceas. Perfect knowledge is not the objective. The military objective remainsóto enter an operational theater capable of achieving superior relative combat power against an enemy, or to establish situational dominance in operations other than war (OOTW).

The Army's keystone doctrine in FM 100-5 describes how the Army thinks about the conduct of operations. This manual, while designed to enhance and enable the operations in FM 100-5, reaches out to accommodate and leverage newly emerging information technologies, especially digitization.

As the Army's capstone publication for information operations, this manual supports the National Military Strategy and explains the fundamentals of IO for the Army. IO doctrine reflects, and goes beyond, the joint military strategy of command and control warfare (C2W), which implements Department of Defense (DOD) information warfare policy. This manual --

  • Identifies information as a major influence on operations at the tactical, operational, and strategic levels.
  • Enables commanders to successfully integrate information, INFOSYS, and their effects across the full range of military operations. Such integration enables and enhances the elements of combat power.
  • Creates synergy, which contributes to increased lethality, survivability, and tempo in combat, as well as highly credible and capable forces in OOTW.

This publication provides Army capstone doctrine and facilitates the transition to the Information Age.


Chapter 1

Operating Environment

Army forces today are likely to encounter conditions of greater ambiguity and uncertainty. Doctrine must be able to accommodate this wider variety of threats. In so doing, the Army is prepared to respond to these worldwide strategic challenges across the full range of possible operations as part of a joint and combined team.

FM 100-5

Commanders and their staffs operating in the Information Age face an increasingly complex environment. Commanders and staffs at all levels will encounter an expanding information domain termed the global information environment (GIE). The GIE contains those information processes and systems that are beyond the direct influence of the military or even the National Command Authorities (NCA), but nevertheless may directly impact the success or failure of military operations. The media, international organizations, and even individuals represent a partial list of GIE players.

This chapter describes the GIE domain and introduces the concept of information dominance as the key element for operating effectively within this new environment. To achieve information dominance, the commander must be able to dominate both the traditional maneuver-oriented battlefield and the military information environment (MIE), defined as that portion of the GIE relevant to his operation. To achieve the latter, the commander directs the acquisition, use, and management of friendly and enemy information and conducts command and control warfare (C2W) attack and protect operations.


GEOSTRATEGIC AND TECHNOLOGICAL
ENVIRONMENTS

Because of rapid advances in technology, especially in the information arena, the geostrategic environment of today has become increasingly complex and will become even more so in the future. Global communications accelerate and expand collective awareness of events, issues, and concerns. They ignite passions, spark new perspectives, crystallize deeply held beliefs, and compel people, nations, organizations and institutions everywhere to examine, define, and act on their interests. While many effects of this phenomenon may be benign and beneficial, others will create turbulence, confusion, chaos, and conflict. Such conflict may extend beyond the traditional battlefield to encompass espionage, sabotage, terrorism, economic competition, and efforts to shape public perceptions.In the Information Age, the United States is in the forefront of exploiting modern information technology to harness the explosive potential of rapid dissemination and use of information. The US economy, social and civil structures, and federal, state, and local governments have become dependent upon the rapid and accurate flow of information. At the same time, America exerts extraordinary influence throughout the world through its multinational media and commercial and entertainment industries. To a lesser degree, America is influenced by similar phenomena exerted from outside its borders. The global information infrastructure (GII) electronically links organizations and individuals around the globe and is characterized by a merging of civilian and military information networks and technologies.Developments in information technology will revolutionizeand indeed have already changedhow nations, organizations, and people interact. The rapid diffusion of information, enabled by technological advances, challenges the relevance of traditional organizational and managerial principles. The military implications of new organizational sciences that examine internetted, nonhierarchical versus hierarchical management models are yet to be fully understood. Clearly, Information Age technology and the management ideas it fosters greatly influence the armed forcesorganizations, equipment, how they train, how they fight, how they protect the force, or how they assist in resolving conflict.

Global Information Environment

  • The global information environment includes--
All individuals, organizations, or systems, most of which are outside the control of the military or National Command Authorities, that collect, process, and disseminate information to national and international audiences.

All military operations take place within the GIE, which is both interactive and pervasive in its presence and influence. Current and emerging electronic technologies permit any aspect of a military operation to be made known to a global audience in near-real time and without the benefit of filters. With easy access to the global or national information network, suppression, control, censorship, or limitations on the spread of information may be neither feasible nor desirable (see Figure 1-1).

Figure 1-1
Figure 1-1. Information Environments (GIE and MIE)

Adversaries and other non-DOD organizations, including many actors, agencies, and influences outside the traditional view of military conflict, intrude into the MIE. Adversaries, perhaps supported by nonaligned nations, will seek to gain an advantage in the GIE by employing battlespace systems and organizations. In addition, the media, think tanks, academic institutions, nongovernment organizations (NGOs), international agencies, and individuals with access to the information highway are all potentially significant players in the GIE. These entities can affect the strategic and operational direction of military operations before they even begin. Independent of military control, their impact is always situationally dependent. Their activities may cause an unanticipated or unintentional effect on military operations. Such actors include--

  • Government agencies such as the Department of State (DOS) or Federal Emergency Management Agency (FEMA).
  • NGOs.
  • Private voluntary organizations (PVOs).
  • International agencies that provide a commercial service, such as the European Space Agency.
  • Agencies that coordinate international efforts, such as the International Committee of the Red Cross or World Health Organization.
  • Social and cultural elements, including religious movements and their leaders.
  • Intelligence and military communications systems of other services, allies, and adversaries.
  • Individuals with the appropriate hardware and software to communicate with a worldwide audience.

As technology enables ever greater numbers of individuals, groups, organizations, and nation states to be linked to the world through the GIE, these actors can be expected to pursue their interests by attempting to manipulate and control the content and flow of information within the MIE.

NEWS MEDIA

The role of the news media will continue to expand. The number of news organizations and their means to gather, process, and disseminate information is increasing exponentially. From the 147 reporters who accompanied the D-Day invasion in World War II, to the 800-plus reporters in Panama during Just Cause, to the 1,300 reporters in the Kuwaiti theater in Desert Storm, the ability and desire of the news media to cover US military operations is a given. Likewise, the demand by the US and international public to know what is happening, consistent with security and propriety, is also a given.

FM 100-5 observes that the impact of media coverage can dramatically affect strategic direction and the range of military operations. Clearly, the effect of written, and, more importantly, visual information displayed by US and international news organizations directly and rapidly influenced the nature of US and international policy objectives and our use of military force in Rwanda, Somalia, and in the former Yugoslavian republic.

INFORMATION INFRASTRUCTURES

Within the GIE, an intricate set of information infrastructures have evolved to link individuals, groups, and nations into a comprehensive network that allows for the increasingly rapid flow of information to all elements having access to the network. In practice, subelement labels are misleading as the information environment has no discrete boundaries. Each subelement is inextricably intertwined, a trend that will only intensify with the continuous application of rapidly advancing technology. This worldwide telecommunications web transcends industry, the media, and the military. It includes both government and nongovernment entities, the GII, the national information infrastructure (NII), and the defense information infrastructure (DII).

Global Information Infrastructure

An interconnection of communications networks, computers, data bases, and consumer electronics that puts vast amounts of information at the user's fingertips. The GII is a term that encompasses all these components and captures the vision of a worldwide, seamless, dynamic web of transmission mechanisms, information appliances, content, and people. Global accessibility and use of information in the GII is especially critical, given the increasing globalization of markets, resources, and economies. The GII--

  • Includes more than just the physical facilities used to store, process, and display voice, data, and imagery. It encompasses a wide array of ever-expanding capabilities, including cameras, scanners, keyboards, fax machines, and more.
  • Electronically links organizations and individuals around the globe and is characterized by a merging of civilian and military information networks and technologies.

National Information Infrastructure

All nations' NIIs are an integral part of the GII. The composition of the NII mirrors the GII, but on a reduced scale. The NII is--

  • A series of components, including the collection of public and private high-speed, interactive, narrow and broadband networks.
  • The satellite, terrestrial, and wireless technologies that deliver content to home, businesses, and other public and private institutions.
  • The information and content that flows over the infrastructure, whether in the form of data bases, the written word, television, or computer software.
  • The computers, televisions, and other products that people employ to access the infrastructure.
  • The people who provide, manage, and generate new information and those that help others to do the same.

Defense Information Infrastructure

DII encompasses transferring information and processing resources, including information and data storage, manipulation, retrieval, and display. The DII connects DOD mission support, command and control (C2), and intelligence computers and users through voice, data imagery, video, and multimedia services. It provides information processing and value-added services to subscribers over the Defense Information Systems Network (DISN).

Military Information Environment

The sphere of information activity called the military information environment is defined as--

The environment contained within the GIE, consisting of information systems (INFOSYS) and organizations--friendly and adversary, military and nonmilitary, that support, enable, or significantly influence a specific military operation.

The MIE, at a minimum--

  • Reaches into space from the home station to the area of operation (AO).
  • Reaches into time, from the alert phase through the redeployment phase.
  • Reaches across purposes, from tactical missions to economic or social end states.
  • Includes people, from deployed soldiers and families at home to local or regional populations and global audiences.

Within the context of the MIE, Army leaders exercising battle command will face many new challenges. They will also have many new operational opportunities. To realize these opportunities, information operations (IO) need to become an integral part of full-dimensional operations. The intertwined relationship between geopolitical strategic factors, technology, and management requires the adoption of a new perspective.

The proliferation of INFOSYS and the global information explosion brings more actors into the battlespace, implies new ways of managing force and forces, compresses the traditional levels of war in time and space, and gives operations a simultaneous and continuous character. A commander's battlespace now includes global information connectivity. As a result, tactical military actions can have political and social implications that commanders must consider as they plan, prepare for, and conduct operations. Know the situation now requires additional focus on nonmilitary factors. Commanders can best leverage the effects of new technology on their organizations by employing new and emerging automated planning and decision aids and new or different methods and techniques of control and management.


THREATS TO THE INFORMATION
INFRASTRUCTURE

The threats to the information infrastructure are genuine, worldwide in origin, technically multifaceted, and growing. They come from individuals and groups motivated by military, political, social, cultural, ethnic, religious, or personal/industrial gain. They come from information vandals who invade INFOSYS for thrill and to demonstrate their ability. The globalization of networked communications creates vulnerabilities due to increased access to our information infrastructure from points around the world. Threats against computers, computer systems, and networks vary by the level of hostility (peacetime, conflict, or war), by technical capabilities, and by motivation (see Figure 1-2). The bottom line is that threats to all forces, from strategic to tactical, exist from a variety of new and different sources, and they exist on a continuing basis even during periods of relative peace.

Figure 1-2
Figure 1-2. Threats to Information Systems

Adversaries have several options to influence or attack opposing INFOSYS and services. Attacks can be designed with a delayed effect, such as corrupting a data base or controlling program as well as immediate actions to degrade or physically destroy. Examples include--

  • Unauthorized access, either to gain information or insert data.
  • Inserting malicious software to cause a computer to operate in a manner other than that intended by its users. This category includes computer viruses, logic bombs, and programs designed to bypass protective programs.
  • Corrupting data through use of malicious software, alteration of data, or use of electronic attack (EA) to make data misleading or useless.
  • Collecting electronic intelligence, whether signals, radiation, or data.
  • Conducting EA actions such as jamming, broadcasting false signals, or generating bursts of electromagnetic pulse (EMP).
  • Using psychological operations (PSYOP) and deception to influence or oppose friendly INFOSYS.
  • Attacking to physically destroy, degrade, or disrupt military communications and control networks or civilian systems upon which military operations rely. Weapons employed in such efforts range from terrorist bombs to artillery, missiles, and direct air attack.
  • Using jamming and deceptive transmissions (EA) to attack commercial communications systems on which the Army relies. In such cases, more than communications can be disrupted. Sensors at all levels of operation can be jammed or triggered to produce misleading information. Both commercial systems and sensors are particularly vulnerable to the effects of EMP.

The effectiveness of military operations can be degraded if the user's confidence in the quality of the data can be eroded. Spurious data or false signals could be transmitted to erode confidence in the accuracy and effectiveness of such critical systems as the global positioning system (GPS).

Sources of Threats

Threats come from a range of sourcesfrom individuals (unauthorized users or insiders) to complex national organizations (foreign intelligence services and adversary militaries). Boundaries between these groups are indistinct, and it is often difficult to discern the origins of any particular incident. For example, actions that appear to be the work of hackers may actually be the work of a foreign intelligence service. Sources include unauthorized users, insiders, terrorists, nonstate groups, foreign intelligence services, and opposing militaries or political opponents.

UNAUTHORIZED USERS

Unauthorized users such as hackers are the source of most of the attacks against INFOSYS in peacetime. While to date, they have mainly targeted personal computers, the threat they pose to networks and mainframe computers is growing.

INSIDERS

Individuals with legitimate access to a system pose one of the most difficult threats from which to defend. Whether recruited or self-motivated, the insider has access to systems normally protected against attack. While an insider can attack a system at almost any time during its lifetime, periods of increased vulnerability for a system include design, production, transport, and maintenance.

TERRORISTS

Terrorists are increasing their use of commercial INFOSYS. Their actions range from unauthorized access, to an information network, up to direct attacks against the infrastructure (bombing, and so forth). Terrorist groups have also been identified using computer bulletin boards to pass intelligence and technical data across international borders.

NONSTATE GROUPS

New players, ranging from drug cartels to social activists, are taking advantage of the possibilities offered by the Information Age. They can acquire, at low cost, the capabilities to strike at their foes' commercial, security, and communications infrastructures. Moreover, they can strike with relative impunity from a distance. Besides attacking opponents directly, these actors use the international news media to attempt to influence global public opinion and shape perceptions of a conflict. They even attempt to inflame dormant issues into conflicts that otherwise would not arise.

FOREIGN INTELLIGENCE SERVICES

Active during periods of both peace and conflict, foreign intelligence services take advantage of the anonymity offered by computer bulletin boards to hide organized collection or disruption activities behind the facade of unorganized hackers. Their primary targets are often commercial and scientific networks rather than direct attacks on the military.

OPPOSING MILITARIES OR POLITICAL OPPONENTS

While the adversary's activities are more traditionally associated with open conflict or war, his manipulation of the news media during peacetime may help frame the situation to his advantage prior to the onset of hostilities.

Level of Hostility

The level of hostility generally reflects the scope and scale of an adversary's actions against friendly INFOSYS. In peacetime, unauthorized access to and use of computers, computer systems, and networks is the greatest current threat. Deliberate use of malicious software by an adversary could be used against communications, transportation, banking, power, and computation systems upon which both industry and the military might depend. We can expect an adversary to use malicious software to assess the vulnerability of our information networks.

As the crisis moves toward overt conflict or war, more direct and far-reaching attacks can arise against information and INFOSYS. Targets can include both units and their supporting infrastructures. Deployed tactical units may face the results of earlier intrusions and insertions, allowing embedded malicious software to cripple systems or degrade communications. By the time a unit is engaged in combat, it could have been subjected to a variety of overt and covert attacks against its INFOSYS.

On the battlefield, reliance on an extensive and potentially fragile communications infrastructure presents a vulnerability that entices exploitation. The initial candidates for attack could be vital information nodes or links such as CPs and communications centers. In addition to striking battlefield information nodes, adversaries can also strike the supporting infrastructure, both on and off the battlefield. Central system support assets such as power sources can be very difficult to repair or replace. Artillery, tactical ballistic missiles, and air power provide the major attack systems for most adversaries today. The ability of an adversary to strike will only grow as more capable systems, such as cruise missiles and precision-guided munitions, proliferate. This ability to strike with precision will be enhanced by the spread of such technologies as GPS, unmanned aerial vehicles (UAVs), and near-real time imagery satellites. If INFOSYS or facilities cannot be destroyed, they can be made untenable through contamination by chemical or biological weapons.


CHALLENGES

Commanders and national leaders face significant and interrelated challenges in dealing with and anticipating the effects of the global visibility of operations and rapid changes in information technology and their impacts in the GIE.

Information security

Two commonly recognized facts address why information security (INFOSEC) is an important challenge. First, the Defense Information Systems Agency (DISA) reports that over 95 percent of DOD communications during peacetime travel over the relatively unprotected public switch network (PSN) and are largely outside the direct control or influence of the military. In addition, a significant amount of open-source intelligence is carried by commercial means.

Continuous Operations

Because of the pervasive and intrusive nature of the MIE, preparation for dealing with IO must not wait until a unit receives a warning order to deploy. By that time, the commander and his staff must have already developed plans and procedures for dealing with the myriad aspects and influences in the MIE or risk being rapidly overcome by events.

Policy and Public Opinion

With global visibility, dramatic information displays and expert analyses of military operations in progress can rapidly influence public opinion and, therefore, policy related to the conduct of military operations. The population that receives and potentially reacts to this coverage includes the US public, decision makers, alliance or coalition partners, and other nations. It also includes potential or actual adversaries of the US. The news media will most likely provide 24-hour coverage of all perspectives on the operation.

Global visibility of operations can also affect a commander's decision-making. When the information in the GIE is inaccurate, incomplete, not presented in context, based on rumor or the result of purposeful misinformation or disinformation efforts, a commander may react in haste, make an emotional decision, or make choices that are inconsistent with the real situation, up to and including a termination of an ongoing operation. Effective commanders anticipate how the adversary might attempt to manipulate the news media in order to prevent a potential foe from setting the terms of the conflict in the public arena.

Morale

The global visibility of operations impacts a command's combat power by either enhancing or degrading soldier morale. Soldier spirit and perseverance, the will to win, dedication to the cause, and devotion to fellow soldiers and the unit can be rapidly undermined by what is being said in the GIE. The instant communications capabilities of these INFOSYS often disseminate information to soldierswhether accurate or inaccuratefaster than the military chain of command. Bad news, misinterpretation, inaccurate information, and misinformation (or disinformation) impact families and communities as well as soldiers, affecting their morale and commitment to the objective at hand and potentially undermining the critically important human psychological dimensions discussed in FM 100-5. Nevertheless, Americans on and off the battlefield will continue to have free access to radio, television, and the press and be aware of events and circumstances.

Legal Considerations

Relatively few rules and laws govern the use of or access to many new INFOSYS or technologies. For that reason, IO confront legal challenges and other constraints such as rules of engagement (ROE) or status of forces agreements/status of mission agreements. Tension exists both in peace and during times of conflict. Collection of intelligence, or, simply, information in peacetime, is often limited by policy and/or law. Many policies and laws for using nonmilitary computer systems and other information networks during peacetime are yet to be determined. For example, the control or regulation of access on the internet to protect sensitive information or critical network nodes is largely unaddressed. What are the ROE for the INFOSYS in peace? In war? Close coordination with the supporting judge advocate is critical in confronting IO challenges based on legal considerations.

Because many of the actors and influences in the MIE are outside friendly military control, contracts or legal restrictions may prevent the military from controlling or influencing the use of civilian assets by an adversary. As an example, during hostilities an allied coalition force may depend upon an international agency to change the access codes for an imagery satellite to protect critical information in the area of responsibility (AOR). Without the change, the imagery is available in the open market. An adversary could, under commercial contract, download critical satellite imagery of the geographic region in near-real time as the satellite passed over the ground station.


INFORMATION DOMINANCE:
THE RESPONSE TO THE CHALLENGES

Information dominance is defined as--

The degree of information superiority that allows the possessor to use information systems and capabilities to achieve an operational advantage in a conflict or to control the situation in operations short of war, while denying those capabilities to the adversary.

As we have come to recognize and depend on air superiority as a key condition for military success, information dominance has taken on a similar importance for military operations. This means that friendly knowledge and understanding of the situation must be more certain, more timely, and more accurate than the adversary's, revealing to the friendly commander the conditions that will lead to success. Creating information dominance has two equally important facets:

  • Building up and protecting friendly information capabilities.
  • Degrading enemy information capabilities.

The friendly commander achieves information dominance by gaining a knowledge advantage over an enemy.

The knowledge advantage generated by commanders using innovative technical and human techniques permits the force to more readily seize or retain the overall initiative and increase its lethality and survivability. Building a knowledge advantage requires a highly developed sense of what information is required and an ability to manage the use and dissemination of that knowledge to the right place, at the right time, for the desired purpose.

Successful leaders use the knowledge advantage by combining technical and human information capabilities with a broad intent statement and a clearly articulated concept of operation. Like air power, a ground commander can enjoy levels of knowledge advantage ranging from information supremacy to information parity. An enemy can also achieve a knowledge advantage at our expense. Information also vary dominance can change over space and time; it can by echelon. An Army may achieve information dominance at the operational level but lose it at the tactical level. The notion of information dominance is not new. Throughout history, commanders have sought to leverage the temporary opportunity that comes from an information advantage, whether it comes from knowledge of terrain or satellite imagery.


HISTORICAL PERSPECTIVE

For nearly two hours a succession of young officers, of about the rank of major, presented themselves. Each had come back from a different sector of the front. They were the direct personal representatives of the Commander-in-Chief, and could go anywhere and see anything and ask any questions they liked of any commander, whether at the divisional headquarters or with the forward troops. In turn, they made their reports and were searchingly questioned by their chief to unfold the whole story of the day's battle. This gave Field Marshal Montgomery a complete account of what had happened by highly competent men whom he knew well and whose eyes he trusted. It afforded an invaluable cross-check to the reports from all the various headquarters and from the commanders. I thought the system admirable, and indeed the only way in which a modern Commander-in-Chief could see as well as read what was going on in every part of the front.

Sir Winston Churchill
Triumph and Tragedy, 1953

Directed Telescope

High-performing units are in large part distinguished from other units by their ability to effectively acquire and use information. Historically, high-performing units often gained the information advantage by using nontraditional means and methods. One such method is often referred to as the directed telescope. In concept, the directed telescope acquires information by supplementing the routine information flow, normally by-

  • Going outside the traditional command and its hierarchical information channels.
  • Using special operations units, reconnaissance teams or officers, and special communications networks.

These techniques are still valid and in use today. Modern technological innovations potentially make the advantages gained via the directed telescope technique almost routine. Innovations in sensors, processors, communications, and computers can give commanders immediate access to enemy and friendly situation information and thus a subsequent operational knowledge advantage.

Battlefield Visualization

Creation of an operational knowledge advantage supports the commander's battlefield visualization. Battlefield visualization is the process whereby the commander--

  • Develops a clear understanding of his current state in relation to the enemy and environment.
  • Envisions a desired end state that represents mission accomplishment.
  • Visualizes the sequence of activity that will move his force from its current state to its end state.

A key step toward achieving information dominance is reached when one commander's level of battlefield visualization is significantly greater than his opponent's.

In the past, leveraging a knowledge advantage to decisively achieve a desired end state has been largely an intuitive process. Truly exceptional commanders have almost always possessed this trait; less successful commanders often have not. Information technologies now hold a potential for making this grasp of the battlespace, and the inherent opportunities it affords, more accessible to every leader, from field army to rifle platoon. The effect of these changes will be to enhance battlefield visualization by better supporting leaders with a deliberate and systematic information process based upon building blocks of raw data parsed and collated by both man and machines, synthesized into a coherent whole, and focused upon drawing understanding from the chaos of battle. Additionally, by linking commanders at different echelons, this same technology will enhance situational awareness and promote synchronized operational planning and execution. Ideally, the command will see and think as one.

Situational Awareness

A critical aspect of achieving a knowledge advantage over your adversary is the achievement of a condition of situational awareness throughout the force. Situational awareness includes--

  • A common understanding of the commander's assessment of the situation.
  • The commander's intent.
  • The commander's concept of operation, combined with a clear picture of friendly and enemy force dispositions and capabilities.

IO potentially assure situational awareness appropriate to every level of an organization, down to the individual soldier. Systems being tested and fielded today offer commanders at all levels the potential of a collective, shared understanding of the battlespace. The commander's assessment of the situation, his intent, and the concept of operation provide the framework that applies throughout the organization. This framework fosters increased cohesion and unity of effort in the execution of operations. Figure 1-3 illustrates this relationship.

Figure 1-3
Figure 1-3. Situational Awareness

Situational awareness is inherently local, providing immediate context and relevance for the interpretation and use of new information as it is received by a soldier in a particular situation. The local situation relevant to each level and individual is developed within the common framework and shared vertically and laterally as appropriate. This situation not only retains the advantage of hierarchical structure (common framework and intent) but also adds the advantage of nonhierarchical INFOSYS that enable decentralized adaptation and action to local situations throughout the command.

Developing the flexibility of a nonhierarchical structure places a greater obligation on the commander to clearly articulate his intent and concept of operations. Traditionally, commanders ensured that both intent and concept were understood two echelons up and down in a hierarchical structure. Information technology now makes it possible for a senior commander's intent and concept to be relatively easily shared throughout the command whenever doing so will enhance the operation. The art of command requires clearly stating a common framework with sufficient freedom for local adaptation and application. Proliferation of that understanding, potentially to all leaders on the battlefield, gives the force a singular perspective and a clarity of focus that optimizes its combat power against an opponent or enables it to control a situation in other operations. Denying an adversary a similar capability, such as degrading his situational awareness, is an equally important objective and is addressed in Chapter 3 under C2W.

Expanded Vision

Our traditional operational vision must expand to take full advantage of the potential contribution of IO to dominate the enemy while protecting friendly forces. Before any mental constraints are placed on intent or operational concept, commanders at every level assess those actors and elements that can affect upcoming operations, to include informational aspects. The commanders' assessments include actors and elements both within and outside of their control. The result of this process of thinking about the GIE is a manageable number of informational elements with which commanders decide to deal, which, by definition, constitutes the MIE for a particular operation. This expanded vision of the battlespace can include various combinations of space, time, purpose, and people.

The elements of an IO vision align with the combat functions associated with traditional operations. The MIE equivalent of the tactical advantage of high ground, or the flanking position, might be transformed into an information advantage of local and international recognition that the military operation is legitimate and has international support. Just as successful maneuver gives a commander more options than the enemy, a perception of credibility and support, or an ability to command and control, provides an advantage for informational maneuver. Maintaining this advantage requires constant assessment and adjustment. To this end, PSYOP-supported Special Forces (SF) teams in the countryside, civil affairs (CA) teams in urban areas, reports from PVOs, and media coverage provide a form of reconnaissance and surveillance, just as standard military reconnaissance and surveillance operations provide information that drives subsequent fire and maneuver.

The purpose of firepower in combat is the generation of destructive force against an enemy's capabilities and will to fight. The MIE equivalent of firepower, already included in doctrine, is the employment of lethal and nonlethal, direct and indirect capabilities through C2W. C2W uses deception, PSYOP, electronic warfare (EW), operations security (OPSEC), and destruction to attack an adversary's capabilities. At the same time, C2W protects friendly operations. US armed forces have always employed these capabilities, but they were recently integrated into operations under C2W. This integration improves the friendly targeting process by directing the power of traditional attack, deception, PSYOP, EW, and OPSEC at the adversary's decision cycle, thus gaining control of that cycle and helping generate information dominance.

While the 1993 version of FM 100-5 recognizes the impact of global news coverage on the scope, nature, and duration of major operations, recent events demonstrate that the GIE also affects operations at brigade, battalion, and company levels. Commanders at every level may now find that CA, military police (MP), public affairs (PA), PSYOP, and SF activities that support, enable, or influence operations have become integral to their decision process and operations and require careful coordination and synchronization to achieve maximum effect. Commanders must continue to carefully manage the separation of PA and PSYOP functions to preserve the integrity and credibility of PA operations. The methods of using C2W, PA, and CA together to enhance operations is discussed in detail in Chapter 3.

Activities that affect how operations are seen and perceived by different audiences are an increasingly prevalent and required calculation of battle command and a prerequisite for effectively visualizing battlespace. The requirement to identify the critical audiences, messages, and communications means is not new to leaders. However, it is gaining major significance for successful operations.


HISTORICAL PERSPECTIVE

During the course of the Gulf War, the combined operations of the allied coalition effectively isolated, both physically and psychologically, a large element of Iraqi forces on Faylaka Island. Rather then reduce the island by direct assault, a tactical PSYOP team from the 9th PSYOP Battalion, aboard a UH-1N helicopter, flew aerial loudspeaker missions around the island with cobra gunships providing escort. The message told the adversary below to surrender the next day in formation at the radio tower. The next day 1,405 Iraqis, including a general officer, waited in formation at the radio tower to surrender to the Marine forces without a single shot having been fired.


Open Media Coverage

Besides forcing a broader view of the environment, IO imply closer attention to the media and the global visibility of operations. DOD and Army policy for principles of combat coverage require Army commanders to provide open and independent coverage by the news media as the standard means of providing the American public information about the employment and capabilities of their armed forces. This policy gives commanders and leaders at all levels the clear mission of preparing their soldiers to effectively deal with the media before, during, and after all operations.

The commander's primary tool at division-level and above for dealing with the news media is PA. PA addresses issues that are integral to all levels of war. Below division level, however, the commander has no special staff to discharge this responsibility. Often, brigade and smaller units have to house, support, and escort reporters. Commanders must understand and train their soldiers, as well as themselves, to plan for the presence of media and provide effective interviews to communicate legitimate information to the public, strengthen soldier morale and unit cohesion, and enhance their ability to accomplish their mission.

While the clear intent of this doctrine is to require commanders to pay closer attention to the media and its potential impact upon military operations, it is also clear that doctrine does not sanction in any way actions intended to mislead or manipulate media coverage of military operations. To the contrary, the Army accepts and fully endorses the healthy tension that exists between the normal desire of the media to inform the public as much as possible about military operations and the normal desire of commanders to control the information environment about those same operations to the greatest possible degree.

Information Management

Information management takes on increasing importance in meeting the challenges of global visibility, rapidly changing information technology, and their impact on the GIE. Mountains of data must be acquired and quickly translated into knowledge and understanding. Accomplishing this challenge requires a continuous, cyclical process. Decision-making has become increasingly dynamic and multidimensional. Decisions about current operations must occur simultaneously with decisions and planning about future operations. Decision-making must match the pace with which situational awareness changes.

Information technology now permits the horizontal movement and integration of information and provides a framework for local decision-making, potentially allowing the commander's span of control to increase without losing effectiveness. The dynamics affecting a commander's span of control are critical because the modern battlefield sees forces increasingly separated, leaving large gaps between formations and requiring each cluster of forces to act with greater autonomy within an expanded AO. Dispersion creates more subordinate force clusters, decentralizes decision authority, and creates a major requirement for coordinated effort. The nominal span of control is increased and overall situational awareness is more complicated.

Harnessing the potential of information to transform how the Army operates is critical to its success in the future. However, technology alone cannot provide leaders with automatic battlefield visualization, flawless situational awareness, easily expanded vision, or highly effective information management. In the final analysis, the products of our initiative to harness the potential of information can only support the application of a leader's judgment, wisdom, experience, and intuition to enhance his battle command.


An increase in the amount of information available does not guarantee certainty; in fact, it potentially increases ambiguity. Current staff organizations, procedures, and analytical methods must adjust to master the richer flow, faster pace, and huge volume of information. The challenge is to find better, not just faster, analysis and decision-making procedures.


Chapter 2

Fundamentals

While reflecting the increased complexity and lethality of the modern battlefield, Army doctrine recognizes that advanced weapons and technologies are no better than the skill with which leaders and soldiers employ them against the enemy.
FM 100-5

This chapter outlines the nature of information and the fundamentals of IO by stating what they are, what they apply to, and how they relate to various activities of IO. The chapter discusses the components of IO--operations, relevant information and intelligence (RII), and information systems (INFOSYS). It concludes with a discussion of the six critical activities essential to a sound IO program: acquiring, using, protecting, exploiting, denying, and managing information and INFOSYS.

COGNITIVE HIERARCHY

Information is defined as--

Data collected from the environment and processed into a usable form.

A given piece of data is largely meaningless by itself. Only when data is processed, that is, placed into a situational context, does it gain meaning and become, by definition, information. Knowledge is derived from information. Knowledge is information that has been tested and accepted as factual--

  • Through cognition--the mental process that receives or develops unverified information (beliefs).
  • Through assessment or testing to prove the information.
  • By acceptance of the information as factual.

Commanders and their planners must always be sensitive to the difference between beliefs and knowledge. Untested beliefs, even when commonly held, differ from facts and are, in essence, opinions that can later prove to be wrong. Decisions based upon beliefs instead of facts are always at risk.

Understanding is achieved by using judgment to give knowledge relevance within a specific situational context. Ideally, understanding a situation supports a commander in battlefield visualization and creates the conditions from which plans can be formed and effective actions taken. See Figure 2-1.

Figure 2-1
Figure 2-1. The Cognitive Hierarchy

While it is certainly desirable to achieve full understanding of a situation before making decisions, commanders must be fully prepared to make decisions in an operational environment of ambiguity, characterized by imperfect information and incomplete understanding. Command decision-making will remain an art, not a science, even in the Information Age. A goal of IO is to narrow the gap between the art and science of command decision making.

STRATEGY

The National Military Strategy recognizes that information warfare (IW) is one of many capabilities within the US military elements of national power. IW can support the overall US Government strategic engagement policy during peacetime, crisis, conflict, and postconflict. The ability of the US Government to influence the perceptions and decision making of others greatly impacts the effectiveness of deterrence, power projection, and other strategic concepts.

This paragraph introduces and defines information warfare and explains its relationship with the Army's interpretation--information operations. In times of crisis, information can deter adversaries from initiating actions detrimental to interests of the US Government or its allies or detrimental to the conduct of friendly military operations. If carefully conceived, coordinated, and executed, IW--

  • Contributes to defusing crises.
  • Reduces the period of confrontation and enhances the impact of informational, diplomatic, economic, and military efforts.
  • Forestalls or eliminates the need to employ combat forces.

Information Warfare

Information warfare is the term adopted by the Department of Defense (DOD) and the joint staff to recognize a range of actions taken during conflict to achieve information superiority over an adversary. It is specifically defined in CJCSI 3210.01 as--

Actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one's own information, information-based processes, information systems and computer-based networks.

The objective of IW is to attain a significant information advantage that enables the total force to quickly dominate and control the adversary. The strategic goal of IW is to seize and maintain a decisive advantage by attacking an adversary's NII through exploitation, denial, and influence, while protecting friendly INFOSYS. IW offers either side the chance to strike at a distance with relative safety.

The Army, recognizing that IW as currently defined by DOD is more narrowly focused on the impact of information during actual conflict, has chosen to take a somewhat broader approach to the impact of information on ground operations and adopted the term information operations. The Army has adopted this broader approach to recognize that information issues permeate the full range of military operations (beyond just the traditional context of warfare) from peace through global war. IO implement the IW policy for the land component commander.

Information Operations

Information operations integrate all aspects of information to support and enhance the elements of combat power, with the goal of dominating the battlespace at the right time, at the right place, and with the right weapons or resources. IO are defined as--

Continuous military operations within the MIE that enable, enhance, and protect the friendly force's ability to collect, process, and act on information to achieve an advantage across the full range of military operations; IO include interacting with the GIE and exploiting or denying an adversary's information and decision capabilities.

Units conduct IO across the full range of military operations, from operations in garrison, through deployment, to combat operations, and continuing through redeployment upon mission completion.


COMPONENTS OF
INFORMATION OPERATIONS

Activities to support IO include acquiring, using, protecting, managing, exploiting, and denying information and INFOSYS. These activities take place within three interrelated components of IO: operations, RII, and INFOSYS. These components operate within a battlespace established by the MIE. (See Figure 2-2.) Army organizations conduct these IO activities as part of a dynamic, iterative process to support each component in an integrated full-dimensional operation.

Figure 2-2
Figure 2-2. Information Operations

Operations

C2W, CA, and PA are the three operations the Army currently uses to gain and maintain information dominance and effective C2.

C2W OPERATIONS

C2W is the warfighting application of IW in military operations. The aim of C2W is to influence, deny information to, degrade, or destroy adversary C2 capabilities while protecting C2 capabilities against such actions. C2W is composed of two major branches:

  • Command and control-attack (C2-attack).
  • Command and control-protect (C2-protect).

C2W planning is conducted throughout the military operational continuum, from peacetime through termination of hostilities. In the past, the primary warfighting objective was to concentrate physical and destructive combat power against the adversary's personnel and equipment, that is, tanks, airplanes, artillery, air defense. C2W is discussed in detail in Chapter 3.

By 1986, AirLand Battle further evolved this thinking by linking ground and air operations to achieve depth and synchronization. A paramount consequence of AirLand Battle was the intention to strike at reserve, reinforcing, and second-echelon forces. This led in 1993 to an extended operational strategy of deep operations, with long-range weapons and Special Forces. Looking at high-value targets, deep operations strategy sought to destroy, degrade, deny, and disrupt critical C2 nodes as one of its primary objectives.

Today, C2W operations integrate and synchronize the capabilities of PSYOP, deception, OPSEC, and EW to facilitate the application of appropriate systems and forces to execute IO. While C2W has had a primarily offensive focus in the past, it now includes both C2-attack and C2-protect. Although these two disciplines of C2W have been practiced by successful armies since the beginning of recorded history, modern warfare with its emphasis on information and INFOSYS requires a new perspective. Three factors make C2W considerations critical when operating in today's environment:

  • Continuous, high-volume information flow dictated by the relationship of modern military technology and military operations.
  • Vulnerabilities created by widespread incorporation of advanced technology for INFOSYS and intelligence.
  • The radical improvement in INFOSYS and intelligence capabilities resulting from explosive advances in technology.

The complexity and range of today's MIE increases the difficulty of achieving a comprehensive disruption of an adversary's C2 capabilities through any single attack or application of combat power. This places a premium upon the effective integration and synchronization of friendly physical destruction, EW, deception, and PSYOP to achieve maximum results when launching attacks. Likewise, careful integration and synchronization is also required to fully protect our critical INFOSYS/intelligence architecture from adversary attacks. Without the complete and thorough integration and synchronization of the five C2W elements across both C2-attack and C2-protect, operational effectiveness will be reduced and potential vulnerabilities exposed.

C2-Attack

The goal of offensive C2W, specifically C2-attack, is to gain control over our adversary's C2 function, both in terms of flow of information and level of situational awareness. With effective C2-attack, we can either prevent an adversary from exercising effective C2 or leverage it to our advantage.

C2-attack can strike at the adversary's capabilities at all echelons, targeting personnel, equipment, communications, and facilities in an effort to disrupt or shape adversary C2. RII plays a key role in C2-attack planning and operations, with the creation and maintenance of regional data bases on personal, historical, and cultural influences, intelligence-preparation-of-the battlefield (IPB), and battle damage assessments (BDA)--both soft and hard kill. The principal C2-attack approach for influencing the adversary's C2 is the synchronized application of the six information activities.

C2-Protect

C2-protect seeks to maintain effective C2 of friendly forces by negating or turning to a friendly advantage the adversary's efforts to influence, degrade, or destroy friendly C2 systems. C2-protect is divided into active and passive measures and seeks to limit the vulnerability of forces (personnel, equipment, and information) to hostile action, even as deployed forces face ever-expanding threats and adversary capabilities. C2-protect includes countering an adversary's propaganda to prevent it from affecting friendly operations, options, public opinion, and the morale of friendly troops.

CIVIL AFFAIRS OPERATIONS

CA support to IO provides an integral role of interfacing with critical actors and influences in the GIE. Whether in peace, conflict, or war, conducting military operations, consolidating combat power, and seeking information dominance are improved when leveraging CA support. Although conditions differ across the spectrum of conflict, CA activities establish, maintain, influence, or exploit relations among military forces, civil authorities, and the civilian populace in an AO to facilitate military operations. For example, during Operation Restore Democracy, CA activities informed the local populace through the news media, public discussion, and PSYOP informational products and programs about the reestablishment of the legitimate Haitian government. This created an information exchange that promoted understanding of, confidence in, and positive perception of measures supporting military operations.

The civil-military operations center (CMOC) can be established to interact with key actors and influences in the GIE, such as NGOs, PVOs, and local authorities. CA elements support military operations by applying their skills and experience in public administration, economics, public facilities, linguistics, cultural affairs, and civil information and by collecting information relevant to the commander's critical information requirements (CCIR). CA personnel have an intricate and important role in providing information during both the intelligence cycle and the operational planning cycle.

Commanders include CA operations in their planning guidance. CA planners must consider all available support and information to ensure successful completion of the CA mission. CA forces are well-suited to plan, coordinate, support, and, if directed, supervise various operations to support US objectives.

PUBLIC AFFAIRS OPERATIONS

Most military operations are conducted under the full glare of public scrutiny. National and international news media coverage plays a major role in quickly forming public debate and shaping public opinion. The news media serves as a public forum for the analysis and critique of goals, objectives, and actions. It can impact political, strategic, and operational planning, decisions, and mission success or failure. The reality of near real-time information, processed and transmitted at greater speeds and to wider audiences than in the past, has bridged the gap between what occurs on the ground and the goals and objectives of the National Military Strategy. Therefore, the public affairs officer (PAO) monitors public perceptions and develops and disseminates clear and objective messages about military operations. Moreover, commanders must involve themselves also in this dimension of IO. PA personnel--

  • Assist the commander by working to establish the conditions that lead to confidence in and support of the Army.
  • Support open, independent reporting and access to units and soldiers.
  • Seek a balanced, fair, and credible presentation of information that communicates the Army story through an expedited flow of complete, accurate, and timely information.

The commander uses his internal information program (formerly command information) to inform soldiers about where they fit in, what is expected of them, and how they help accomplish the mission. This information also helps soldiers combat the effects of enemy propaganda or misinformation. Commanders, through their PAO, initiate, direct, and emphasize internal information topics and programs. Every soldier must receive information specific to the operation through command channels and world, national, and local news. The media is an important information channel to the American public; however commanders, staff officers, and soldiers must balance OPSEC and other operational requirements when working with the media.

PA personnel support commanders by assessing the information environment and advising them on the PA implications of current and future operations. Leaders understand the importance of achieving a balanced, fair, and credible presentation of information to both internal and external audiences. Leaders integrate PA into their decision-making process by considering it in their assessment of the situation and development of courses of actions, plans, and orders. Commanders ensure that PA operations are synchronized with other combat functions and promote early coordination of PA, CA, and PSYOP functions during the planning process. A continual exchange of information must exist during execution as well. Although each function has a specific audience, information will overlap, making it crucial that messages are deconflicted and coordinated.

Relevant Information
and Intelligence

Leaders have struggled with how to best capitalize on available information throughout the history of organized warfare. The drive to know as much as possible about their own forces--location, combat effectiveness, current activity--and the enemy's--location, disposition, combat effectiveness, intended actions--has been a durable characteristic of successful commanders, regardless of the time period or nationality. Today, commanders operate in an environment increasingly marked by the rapid flow of information and decisions among strategic, operational, and tactical levels. These factors are complicated by an explosive expansion in the opportunities for access and the manipulation of operationally relevant information by the wide array of individuals, organizations, and systems found in the GIE.

Ultimately, effective C2 depends on ensuring that the right person has the right information at the right time. Intelligence, the commander's source of relevant information about the adversary, takes on increased, even crucial, importance in the Information Age. Because IO give battlespace global connectivity, intelligence on current or potential adversaries must be prepared on a global scale. Interaction with the MIE requires timely intelligence about many aspects of current or potential adversaries, to include cultural, political, and commercial aspects.

Commanders must have information to command. Information allows the commander's decision-execution cycle to function and gives direction to actions by the force to accomplish their operational missions.

The collection, processing, and dissemination of relevant information is the key to achieving situational awareness throughout the force, which creates the opportunity for unity of effort toward mission accomplishment. The commander operates within the GIE, adjusting his MIE to enhance his situational awareness as appropriate for the operation at hand.

The commander focuses on RII requirements. The commander's operational requirements dictate the critical information requirements, which in turn dictate the RII collection effort. To be effective, the unit's intelligence cycle must be managed to provide information based on the priorities in the concept of operations. A key to successful IO is an accurate IPB focused on the MIE. During combat operations intelligence analysts must continually perform an information-oriented BDA to ensure IO remain effective. RII support to IO begins in peacetime and must be continuous throughout all phases of an operation or campaign.

Advances in information technology are mandating changes in how RII support is provided. First, communications connectivity allows broadcast dissemination of information. This incorporates direct downlink of raw data from multiple sensors to multiple echelons simultaneously and the broadcast of finished information products from theater, departmental, or national production agencies to deployed forces. Information can be provided on a push or pull mode to deployed units.

IO requires the fusion of information from a variety of sources. Advances in sensors, processors, and communicators are combining to provide detailed, timely reconnaissance and surveillance of almost any place on the globe. Both military and nonmilitary sources provide information that can be used to produce RII. Open-source intelligence or reporting will provide much order of battle (OB) and technical data. An OB focused on command, control, communications, computers, and intelligence (C4I) includes data collection and information processing systems, command systems, and reconnaissance, intelligence, surveillance, and target acquisition (RISTA) systems.

Successful integration of IO requires an IPB grounded in a thorough understanding of an adversary's capabilities and decision-making style. An IPB based on C4I focuses on an adversary's decision requirements. These are selected in relation to the friendly commander's priority intelligence requirements (PIR) and describe in detail the decisions the adversary must make to conduct his battle plan. From there, the focus shifts to the information sources that feed or influence the adversary's decisions such as sensors, the platforms on which they are deployed, and their supporting C3 systems. The results should include data on current operations, capabilities, and vulnerabilities. RII as a component of IO is addressed in detail in Chapter 4.

Information Systems

INFOSYS collect, process, and disseminate information relating to current and future operations. Automation has made great advances in information processing, but human beings remain the most effective system for determining relevance and fusing information. INFOSYS are those means that enable commanders and their staffs to--

  • Monitor the current situation.
  • Synchronize operations.
  • Integrate and synchronize operations across battlefield operating systems (BOSs).
  • Coordinate joint air and naval support.
  • Update weapon systems targeting parameters.
  • Control close, deep and rear operations as one operation.

ARCHITECTURE

INFOSYS are essential to the effective application of military power. The Army's integrated architecture of advanced INFOSYS maximizes the C2 capabilities of land forces in all operating environments. The road map for exploiting current and future information technologies to enhance Army operations is the Army Enterprise Strategy (AES). The AES and other initiatives like C4I for the Warrior are reinforcing the important contributions INFOSYS make to information-based warfare. Of particular importance is the evolution of the Army's comprehensive information architecture with its three supporting initiatives focused on operational, system, and technical architectures. When completed, this initiative will create a common operating environment (COE) of standardized, interactive systems and templates for the collection, storage, and manipulation of all Army data bases.

Operational Architecture
The operational architecture will establish the required connectivity among processes, functions, information, and organizations. It will show what we do, what information we need to do it, and how often we need to exchange information within the force.

System Architecture
The system architecture seeks to identify relationships among C4I components of systems and create physical connectivity within the information system. It uses an organizational context to show system allocation and network structures and helps document engineering decisions, such as specific information protocols and bandwidth.

Technical Architecture
The technical architecture will establish a set of rules governing the arrangement, interaction, and interdependence of all the parts and elements that together constitute our INFOSYS. It specifies the permissible standards for designing C4I capabilities and is critical to the creation and maintenance of interactive systems.

INTEGRATION

The integration of INFOSYS--both vertically and horizontally--facilitates tactical and operational agility, initiative, depth, synchronization, and versatility essential to Army success in joint and combined operations.

GLOBAL CONNECTIVITY

Global connectivity is essential for linking strategic, operational, and tactical aspects of IO and the ability to project forces worldwide. INFOSYS support operations globally with communications automation architectures, both space- and terrain-based. However configured, INFOSYS can provide such support with a minimum of physical repositioning to support C2, whether in a strategic deployment phase or moving for a tactical attack. Both military and commercial INFOSYS play important roles in this architecture.

Today, the Army applies information technologies to digitize the battlefield by providing integrated C2 that flows across each level of operation or war. The migration of the current Army Command and Control System (ACCS) to the Army Battle Command System (ABCS) incorporates a common C2 operating environment at all echelons. This integration of modern INFOSYS with our tactical units continues to enhance their connectivity, decision-making, and, ultimately, lethality, survivability, and the ability to control the tempo of operations. Advanced weapons system and sensor technologies based on interoperability, digitization, and spectrum supremacy will contribute directly to improved effectiveness of the force. Chapter 5 discusses the Army INFOSYS architecture in detail.

Any military--like any company or corporation--has to perform at least four key functions with respect to knowledge. It must acquire, process, distribute, and protect information, while selectively denying or distributing it to its adversaries and or allies.
Alvin and Heidi Toffler
War and Anti-War: Survival at the Dawn of the 21st Century


INFORMATION ACTIVITIES

IO involves acquiring, using, protecting, exploiting, denying, and managing information and INFOSYS. When effectively executed, these critical activities supplement the human skills of battle command, speed decision making, minimize or eliminate uncertainty, focus combat power, help protect the force, harness organizational capabilities, link the MIE to the GIE, and enhance situational awareness for soldiers and leaders. These activities apply to both information and INFOSYS (hardware, people, organizations, and processes). Although listed sequentially, these activities are concurrent and seamless in their application (see Figure 2-3).

Figure 2-3
Figure 2-3. Information Operations Activities

Acquire

Commanders must consider the nature of the information required before allocating resources to acquire it. Initial questions include--

  • What information is needed?
  • What is the nature of that information?
  • How can that information be acquired?

Necessary information includes mission, enemy, troops, terrain and weather, and time available (METT-T) and the basic who, what, when, where, why questions. The nature of that information includes its accuracy, timeliness, and its overall relevance to the situation in consonance with the CCIR. Considering the available information sources and the nature of that information, commanders develop technical and tactical plans to acquire critical information.

Information can be acquired through personnel, technical means, intelligence collection systems, tactical reporting, and intelligence or information disseminated from other DOD or non-DOD agencies at operational, strategic, or national levels. Collection of information about adversaries and the environment is managed through the RII collection cycle.

Commanders determine the critical information for each operation and publish those requirements through their CCIR. The commander alone decides what information is critical based on the mission, his experience, and the higher echelon commander's intent. The staff may recommend CCIR to the commander as--

  • Priority intelligence requirements to determine what the commander wants or needs to know about the enemy, his purpose, and/or terrain (how I see the enemy).
  • Friendly forces information requirements (FFIR) to allow the commander to determine the combat capabilities of his or adjacent friendly units (how I see myself).
  • Essential elements of friendly information (EEFI) to allow the commander to determine how he must protect the force from the enemy's information-gathering systems (how can I prevent the enemy force from seeing me).

The CCIR is normally noted in paragraph 3d of the operations order/operations plan (OPORD/OPLAN). Information about friendly activities and status is coordinated through unit SOPs and OPLANs. Information is also acquired using a more general information collection cycle focusing on gathering relevant information from other sources and influences in the MIE. The information needs of the commander are not answered by a single source, but by--

  • A combination of his own electronic systems.
  • Operational activities such as reconnaissance and security.
  • Human intelligence (HUMINT) activities.
  • Strategic or national intelligence.
  • Interface with local or international police and news media.

Information is perishable and has a temporal quality that is often controlled by a set of dynamic conditions or decisions. Events can make an item of information irrelevant or so unrepresentative as to portray a highly inaccurate picture of reality. Information beyond a certain age will detract from the commander's situational awareness. Standard operating procedures (SOPs), CCIRs, OPLANs, and collection plans must all be sensitive to perishability of information. Moreover, from a technical perspective, INFOSYS managers must respond by managing the systems and information to enable assured, timely communication and decision making.

Use

The commander is able to see his battlespace through the use of space, air, and ground systems to acquire relevant information and provide a current situation. The commander expands his thinking to include all INFOSYS and organizations accessible in the GIE. Once the data is acquired, analyzed, and collated, the information is used to update and validate a common situational awareness. This common situational awareness provides the basis to refine, continue, or adjust decisions, plans, and operations.

  • Information is focused and used by issuing guidance, prioritizing assets, and establishing requirements.
  • Staffs then refine the guidance into OPLANS or OPORDS. They seek to integrate information at all echelons and plan the use of all available information, regardless of the source.

The most timely, accurate, or relevant information, particularly in operations other than war (OOTW), may come from sources outside the unit or military channels. A unit must make use of both organic and nonorganic INFOSYS. Nonorganic systems are either DOD governmental or non-DOD (GIE). Use of other US Government systems, (DOD and non-DOD) is coordinated with higher commands. Using systems outside the government is more complex. Units can use some services openly and passively, such as listening to, or subscribing to, broadcast media. Units can also make overt use of services such as communications relays or weather forecasting. However, commanders must be aware of the legal and policy limits on their use of any non-DOD INFOSYS.

How the information nets within an organization are linked together can provide multiple conduits for information. Horizontal internetting of INFOSYS at the lowest possible levels provides a deeper, multidimensional picture than traditional, stovepipe reporting.

Protect

While the proliferation of information and information technology can be a great advantage, it is also a potentially significant risk that must be accounted for in every operation. Protection of soldiers and equipment, although not new, has increased in importance in today's information-rich environment. Friendly information and INFOSYS must be protected throughout the battlespace. Operationally, protecting information requires viewing friendly vulnerabilities from the enemy's C2-attack perspective. Commanders must examine the vulnerability of their soldiers and systems to exploitation or attack by an enemy capable of attacking friendly C2 on a wide front by employing EW, destruction, deception, and propaganda.

In order to stop or delay a weapon or system from functioning, an adversary might attack the information or INFOSYS that enable that system. For example, an adversary might introduce a malicious software code through a communications network directly into the Advanced Field Artillery Tactical Data System (AFATDS) to disrupt the sharing and distribution of combat information with other Army and joint C2 systems. Actions taken to protect the capability to operate unconstrained in the MIE battlespace are considered part of C2W (C2-protect).

Information and INFOSYS must be protected at the electronic, physical, and human levels, as described in relationship to the potential threat--all without impeding the overall operation. Security programs that identify threats to C4I systems also take on increased importance while in garrison because the porous and open nature of the GIE makes the C4I information infrastructure vulnerable to attack or exploitation at any time. As part of planning for both battlespace and garrison operations, the signal officer analyzes the unit's information structure to prioritize critical paths, systems, and data for protection. Everything cannot be protected. Therefore, the operations officer must perform a risk management analysis to identify essential information and INFOSYS that must be kept free from disruption or corruption.

Elements of the infrastructure to be protected are data, computers, communications systems, and support facilities. Planners must integrate elements of the GIE into plans to ensure that commanders consider their impact, or potential impact in any operation. Assessment and vulnerability analysis systems must provide the timely and accurate data needed to identify and target threats and potential threats to friendly INFOSYS.

Protecting computer and communications systems from enemy intrusion, disruption, and destruction is an initial basic step in an overall protection approach. However, commanders must also be sensitive to enemy attempts at deception and propaganda. A resourceful enemy may employ propaganda to predispose a commander and his staff toward a specific course of action and then exploit that mindset with a deception operation. IO may often take place under degraded conditions. Besides adversary or accidental actions, natural phenomena may degrade or disrupt equipment or services. Because of the complexity and fragility of INFOSYS, a unit's plans should include procedures for operating without all the information infrastructure.

Exploit

Joint Pub 1-02 describes exploitation as ìtaking full advantage of any information that has come to hand for. . . military operational purposes.î All information environments and systems surrounding an operation, friendly and adversarial, military and nonmilitary, offer chances for exploitation. Generally, exploiting an adversary's INFOSYS is making use of that adversary's INFOSYS data or communications without his knowledge. A flexible approach to exploitation is preferred. The level of exploitation, whether simply monitoring or corrupting data bases, depends on the situation and the desired objective. It may not always mean directly attacking or degrading an adversary's ability to C2. Exploitation involves--

  • Reading the adversary's signals.
  • Intercepting communications.
  • Analyzing signatures.
  • Extracting from data bases.
  • Establishing the order of battle.
  • Taking action to deny, degrade, or manipulate those information capabilities.

Exploitation depends on a thorough understanding of the adversary and the GIE surrounding a potential AO.

Information-gathering and intelligence work must begin in peacetime to establish the analysis of the AO and how potential adversaries operate. Knowledge of the adversary's information infrastructure is as important as knowledge of a potential adversary's strategies, tactics, techniques, and procedures. Knowledge of the adversary's infrastructure will lead to an assessment of personnel, facilities, sensors, processors, and decision-making process. The assessment model asks the question: ìHow reliant is the adversary on the GIE for information?î This in turn affects how the unit (friendly) interacts with the GIE, to include the media, government agencies, NGOs, and foreign governments. Intelligence gained through exploitation supports C2W planning and operations, especially deception, PSYOP, and physical destruction.

Deny

The offensive aspect of IO, C2-attack, makes possible the goal of attacking an adversary simultaneously at all levels with overwhelming force. C2-attack is intended to prevent an adversary from exercising effective C2 of his forces by denying the adversary information or influencing, degrading, or destroying the adversary's information and INFOSYS.

IO gives the commander the means to attack an adversary throughout the depth of the battlespace, far beyond the range of direct or indirect fire systems. The goal is to degrade the adversary's confidence in either his data or his ability to command and control operations. By attacking or confusing his sense of the battlefield, friendly forces gain information dominance and a subsequent relative advantage in applying combat power or controlling a situation in OOTW.

Information denial operations generally require time and occur over relatively large areas. To blind or deafen an adversary requires that most of his major surveillance and reconnaissance systems be influenced or engaged. Therefore, attacks of adversary INFOSYS are normally planned as a series of engagements, contributing to a larger operation or higher objective. These engagements are normally conducted quickly and against a specific target, such as jamming a receiver or using the Army Tactical Missile System (ATACMS) to destroy an adversary's C2 node.

Adversary space-based systems and UAVs pose significant problems. Because of difficulties in locating or engaging these platforms, commanders may be forced to use indirect means, such as camouflage or deception, to counter them. At echelons below corps level, the commander may lack the assets to perform all C2-attack missions, particularly those involving battlefield deception and PSYOP. However, the value in denying an adversary effective command remains important and commanders at all levels need to be prepared to contribute to achieving that objective. Depending on METT-T, the commander might target an element of the adversary's information flow to blind him or prevent effective response. For example, by targeting RISTA, fire direction, or command nets, a commander can limit the effectiveness of an adversary's indirect fire systems.

Commanders must continually assess exploit and deny capabilities to strike an optimum balance that will achieve the greatest payoff in dominating enemy IO. Multiple attack options in IO will result from analysis and assessment of potential targets. Generally, the earlier an adversary's decision-making cycle is disrupted, the greater the effect it can have on his capabilities. It is often more effective to disrupt the adversary's early sensing or decision-making processes rather than trying to disrupt execution of a decision already made. Operational commanders must weigh the relative advantages to be gained by attacking adversary C2 nodes against the potential loss of intelligence from adversary signatures, radiation, or emissions and the need to protect intelligence methods and sources.

Manage

In order to conduct full-dimensional operations, information and INFOSYS require careful coordination and synchronization. With guidance issued, the staff coordinates and integrates information requirements and INFOSYS to synchronize the critical information flow with the operational concept. Management information and INFOSYS must focus on operational requirements that will derive information from reconnaissance, counterreconnaissance, communications, and security operations. Managing information includes managing the electromagnetic spectrum (EMS); deciding what sources and systems to use; ensuring a reliable flow of information between nodes and levels (horizontal and vertical integration); and resolving differences among information from multiple sources.

Operational requirements guide the management of the EMS. The principal functions using the EMS that require planning and control are--

  • Communications.
  • Intelligence collection.
  • Jamming.
  • Resolving electromagnetic interference.

This planning must be an integral part of operations planning--in many cases preceding a decision on a scheme of maneuver or fire support and definitely preceding mission execution.

Effective management of information and assets allows information to flow horizontally and vertically across BOSs to enable effective planning, preparation, decision making, and execution. Information should also flow vertically between echelons to enable concurrent planning. This serves to eliminate duplicate efforts and unnecessary redundancy, which allows systems to deal with time-sensitive, relevant information. It also reduces the signature and noise levels of units in the battlespace. The keys to this effective communications and information flow are connectivity, throughput, and resilience. Units can manage connectivity among their organic assets. The difficulty comes in maintaining horizontal and vertical connectivity outside the unit, particularly when dealing with forces using older or different communications and INFOSYS. Connectivity is accomplished through the maintenance of electronic and human links vertically and laterally outside the unit. When dealing with forces or units less technically capable, teams must be prepared to deploy with specialists or liaison personnel equipped with updated equipment.

Resilience is the ability of INFOSYS, from a technical and management perspective, to provide the necessary connectivity and continuity when INFOSYS are degraded. Additionally, Army leaders and planners must understand how military information and systems interconnect and interact with the GIE. Overreliance on commercial systems, particularly satellites and host nation telecommunications networks, may impose restrictions or limitations. Close management and consistent coordination will help assure the availability, reliability, and timeliness of C4I assets.



Chapter 3

Operations

Commanders seek to apply overwhelming combat power to achieve victory at minimal cost. They integrate and coordinate a variety of functions with the elements of combat power to sustain it at the operational and tactical levels.
FM 100-5

C2W, CA, and PA are interrelated operations that are conducted to support the Army objective of achieving information dominance in any operational environment-combat or peace. This chapter discusses each element of C2W and the functions of CA and PA and how they support achieving information dominance. CA and PA operations provide liaison and connectivity with essential actors and influences in the GIE and interact with specific elements of C2W. Grouping C2W, CA, and PA together as specific IO provides a framework to promote synergy and facilitate staff planning and execution. This idea is reinforced by including the CA and PA staff representatives in the IO cell or on the information operations battle staff (IOBS) in routine staff coordination (see Appendix D). This construct conceptually provides for greater integration and synchronization of CA and PA with the more traditional warfighting elements of C2W.


  1. Joint Pub 3-13.1 states that beyond the five fundamental elements of C2W "other capabilities in practice may be employed as part of C2W to attack and protect." The Army recognizes that C2W is the joint reference point for IO when working with the joint staff and other services in the realm of IW. However, the Army interprets this new paradigm more broadly and recognizes the more comprehensive integration of other information activities as fundamental to all IO; hence the term operations, which includes specifically C2W, CA, and PA.

HISTORICAL PERSPECTIVE

Major emphasis was placed on C2W, CA, and PA activities during Operations Desert Shield and Desert Storm. Commanders integrated OPSEC, military deception, PSYOP, and EW efforts during Desert Shield to pave the way for successful combat operations. During planning for Desert Storm, the senior leadership recognized that Iraq's C2 was a critical vulnerability whose destruction could enable victory with minimal friendly loss. This is evident from the Secretary of Defense's guidance outlining the military objectives for Desert Storm:

  • Neutralize the Iraqi national command authority's ability to direct military operations.
  • Eject Iraqi armed forces from Kuwait.
  • Destroy the Iraqi Republican Guard.
  • Destroy Iraqi ballistic missile and nuclear, biological, and chemical warfare capabilities.
  • Assist in the restoration of the legitimate government of Kuwait.

During Desert Storm's air operations, the enemy was selectively blinded by EW and physical destruction to mask friendly force movements and operations. Deception operations continued to enforce erroneous enemy perceptions of the CINC's intentions. EW and precision air strikes against C2 targets were used to disorganize and isolate Iraqi forces. When the ground attack commenced, Iraqi forces were close to disintegration, with numerous formations unable to coordinate their efforts. The need for synchronization was an early lesson learned and demonstrated immediate payoffs. Successfully denying Saddam Hussein the ability to command and control his forces substantially reduced casualties on all sides and significantly reduced the time required to achieve coalition objectives.

Fully aware that the enemy, as well as the public at home, was focused on PA coverage of the confrontation, the coalition used that coverage to confuse the enemy by encouraging speculation on the place, time, and size of the impending attack. At the same time, the coalition learned that immediacy of media attention could have unforeseen consequences for its own strategic, operational, and tactical planning. After the cessation of hostilities, CA elements enhanced the restoration of Kuwaiti governmental and social order and responded promptly and effectively to one of the central unanticipated consequences of the war as Iraqi forces created an enormous refugee crisis in the northern Kurdish provinces of Iraq and in southern Turkey.


COMMAND AND CONTROL WARFARE

To be effective, C2W needs to be fully integrated into the commander's concept of the operation and synchronized with other operations. The synchronization of these actions will require rapid and reliable intelligence support and communications. JFCs [joint force commanders] should ensure that the C2W objectives are part of the planning guidance and priorities.
Joint Pub 3-0

C2W directly supports the Army goal of achieving information dominance and winning any conflict or succeeding in any OOTW quickly, decisively, and with minimum casualties. C2W incorporates both the sword against anadversary's C2 system and the shield against the C2-attack actions of the adversary. This combination of both offensive and defensive aspects into an integrated capability provides expanded opportunities for synergy in warfare. C2W allows the Army and individual commanders to accomplish missions with fewer risks, in shorter time frames, and with fewer resources.

Role of C2W

C2W applies to all phases of operations, including those before, during, and after actual hostilities. Even in OOTW, C2W offers the military commander lethal and nonlethal means to achieve the assigned mission while deterring war and/or promoting peace. The offensive aspect ofC2W can slow the adversary's operational tempo, disrupt his plans and ability to focus combat power, and influence his estimate of the situation. The defensive aspects of C2W minimize friendly C2 system vulnerabilities and mutual interference. C2W is defined as--

The integrated use of operations security (OPSEC), military deception, psychological operations (PSYOP), electronic warfare (EW), and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary C2 capabilities, while protecting friendly C2 capabilities against such actions. Command and control warfare applies across the operational continuum and all levels of conflict.

CJCSI 3210.03, 31 March 1996

C2W Elements

The foundation for C2W is robust and redundant command, control, communications, and computer (C4) INFOSYS, coupled with seamless, national-to-tactical, relevant information and intelligence support. The building blocks, or elements, of C2W include-

  • OPSEC.
  • Military deception.
  • PSYOP.
  • EW.
  • Physical destruction.

Thesebuilding blocks contribute to protection of the force and mission accomplishment in various ways, depending on the situation. This situation dependence leads to the building blocks that are shown in a constantly changing pattern in Figure 3-1. The integrated employment of these five elements leads to synergy on the battlefield and results in the most effective execution ofC2-attack and/or C2-protect tasks. The commander drives this C2W process to achieve agility by focusing attacks on the adversary's ability to command and control his forces while simultaneously protecting friendly C2.

Figure 3-1
Figure 3-1. C2W Construct

OPERATIONS SECURITY

Operations security is defined as--

A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities; identifying those actions that can be observed by adversary intelligence systems; determining indicators adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; and selecting and executing measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation.

Joint Pub 3-54

OPSEC is the key to denial. It gives the commander the capability to identify those actions that can be observed by adversary intelligence systems. It can provide an awareness of the potentially friendly indicators that adversary intelligence systems might obtain. Such an awareness could be interpreted or pieced together to derive critical information regarding friendly force dispositions, intent, and/or courses of action that must be protected. The goal of OPSEC is to identify, select, and execute measures that eliminate, or reduce to an acceptable level, indications and other sources of information that may be exploited by an adversary.

OPSEC planning is severely challenged by the new family of global commercial capabilities, to include imaging, positioning, andcellular systems that offer potential adversaries access to an unprecedented level of information against friendly forces. The inevitable presence of the news media during military operations complicates OPSEC. The capability of the media to transmit real-time information to a worldwide audience could be a lucrative source of information to an adversary. OPSEC planners, working closely with PA personnel, must develop the EEFI used to preclude inadvertent public disclosure of critical or sensitive information.

Many different measures impact OPSEC. These includecounterintelligence, information security (INFOSEC), transmission security (TRANSEC), communications security (COMSEC), and signal security (SIGSEC). As more and more of the force is digitized, INFOSEC takes on an ever-growing importance.

MILITARY DECEPTION

Military deception is defined as--

Actions executed to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission.

Joint Pub 3-58

Military deception is the primary means to influence the adversary commander's decisions through distortion, concealment, and/or falsification of friendly intentions, status, dispositions, capabilities, courses of action, and strengths. The goal of deception is to cause the opposing military commander to act in a manner that serves the friendly commander's objectives.


Historical Perspective

Tactical deception had significant positive impacts on the success of Operation Overlord, and, thus the retaking of the European continent in World War II. Deception worked hand in hand with OPSEC to keep the organization and location of the real Overlord cantonments, training sites, dumps, movements, and embarkations carefully hidden. Unbelievable effort was put into creating mock airfields and ports, phony ships, boats, planes, tanks, vehicles, and troop movements, both real and staged. A new era of deception was introduced-the electronic one. German coastal defense radars were destroyed in a calculated pattern. Deception planners purposely left some intact in the Calais region.

The night the invasion was launched, the Allies began massively jamming German radars with chaff. But they purposely did not completely cover their targets. German radar operators could "see" between Allied jamming curtains. And, what they saw was a ghost fleet of small ships towing barges and blimps headed for Calais at eight knots-or the speed of an amphibious fleet. Powerful electronic emitters received the pulse of the German radar and sent it strongly back to the German receivers. For each repetition of this deception it looked to the German operators like a 10,000-ton ship was out there. The small ships also had the recorded sounds of the amphibious assault at Salerno to play over speakers from 10 miles out. German troops ashore could hear the Allies "getting into their landing craft" for the run into the beach. This information threw German intelligence into chaos for several precious hours and played a major role in delaying German counteractions to the actual invasion taking place at Normandy.


PSYCHOLOGICAL OPERATIONS

Psychological operations are defined as--

Operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and, ultimately, the behavior of foreign governments, organizations, groups, and individuals. The purpose of PSYOP is to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.

Joint Pub 3-53

PSYOP are based on projection of truth and credible message. PSYOP are an essential tool in both C2-protect and C2-attack operations. The Army has shown considerable strength in applying both PSYOP and deception to military operations. PSYOP can proliferate discrete messages to adversary C4I collectors, enhance joint combat power demonstrations with surrender appeals, and magnify the image of US technological superiority. PSYOP elements must work closely with other C2W elements and PA strategists to maximize the advantage of IO. As an example, the Army has shown considerable strength in applying both PSYOP and deception to military operations.

PSYOP's main objective in C2-protect is to minimize the effects of an adversary's hostile propaganda and disinformation campaign against US forces. Discrediting adversary propaganda or misinformation against the operations of US/coalition forces is critical to maintaining favorable public opinion.

As an early commander of Combined Task Force Provide Comfort, it is my belief that much of the success achieved during Operation Provide Comfort can be attributed to the successful integration of PSYOP in support of the overall humanitarian assistance mission. Over five million PSYOP products were dispersed over northern Iraq and southeastern Turkey in support of the Operation's goals and objectives. PSYOP is a true force multiplier."
General John M. Shalikashvili

ELECTRONIC WARFARE

Electronic warfare is defined as--

Any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum (EMS) or to attack the enemy. The three major subdivisions within electronic warfare are electronic attack (EA), electronic protection (EP), and electronic warfare support (ES).

Electronic Attack
EA is the use of jamming, electronic deception, or directed energy to degrade, exploit, or destroy the adversary's use of the EMS. EA can attack the adversary anywhere-from his tactical formations, back to his national infrastructure.

Electronic Protection
EP is the protection of the friendly use of the EMS. EP covers the gamut of personnel, equipment, and facilities. EP is part of survivability. As an example, self and area protection systems can interfere with the adversary's target acquisition and engagement systems to prevent destruction of friendly systems and forces.

Electronic Warfare Support
ES is conflict-related information that involves actions tasked by or under the direct control of an operational commander to search for, intercept, identify, and locate sources of intentional and unintentional radiated electromagnetic energy to detect immediate threats. ES is the embodiment of combat information and capitalizes on the timeliness of sensor-to-shooter systems.

PHYSICAL DESTRUCTION

Physical destruction is defined as--

The application of combat power to destroy or neutralize enemy forces and installations. It includes direct and indirect fires from ground, sea, and air forces. Also included are direct actions by special operations forces.

The destruction of a hostile C2 target means that adversary C2 capabilities are degraded for a period of time or, if necessary, permanently shut down. Physical destruction is used only after a full, comparative assessment-strategic-through-tactical perspectives-of the trade-offs between preserving the target versus its destruction.


Historical Perspective

On April 14, 1943, US intelligence experts intercepted and decoded a message revealing that Admiral Isoroku Yamamoto, Commander-in-Chief of Japan's Navy, would be flying to Bougainville in four days. When analysis determined that Bougainville lay just within the extended range of US P-38 fighters at Henderson Field on Guadalcanal, Allied planners recognized the opportunity to strike at the heart of Japanese command and control and strategic planning in the Pacific.

In less than 48 hours, Admiral Chester W. Nimitz's forces planned and coordinated an operation to shoot down Yamamoto's plane and obtained approval from Secretary of the Navy Frank Knox and President Roosevelt.

Yamamoto was known to be invariably punctual, and American planners were confident that his plane would appear over Bougainville on schedule-9:39 am, April 18. At that moment, 16 carefully positioned P-38s from Henderson Field spotted the two Japanese Betty bombers of Yamamoto's party and attacked.

Both aircraft were quickly sent plummeting to the ground, completing a classic information operation that took less than four days from start to finish and rendered irreparable damage to Japanese command and control. The Japanese would feel the impact of this single mission throughout the remainder of the war.


C2W Disciplines

The two disciplines that comprise C2W are C2-attack and C2-protect.

C2-ATTACK

  • C2-attack is defined as--
  • The synchronized execution of actions taken to accomplish established objectives that prevent effective C2 of adversarial forces by denying information to, by influencing, by degrading, or by destroying the adversary C2 system.

C2-Attack Principles

  • The three principles of C2-attack are to-
  • Plan based on the unit's mission, commander's intent, and concept of operations.
  • Synchronize with and support the commander's plan.
  • Take and hold the initiative by degrading the adversary's INFOSYS and forcing the adversary to be reactive. Reactive means that C2-attack slows the adversary's tempo, disrupts the adversary's planning and decision cycles, disrupts the adversary commander's ability to generate combat power, and degrades the adversary commander's means for executing mission orders and controlling subordinate unit operations.

Figures 3-2 and 3-3 illustrate some of the potential relationships between the elements of C2W.

C2-Attack Effects

In general terms, C2-attack has four effects that focus on the adversary's C2 infrastructure and information flow to produce a lower quality and slower decision-making process.

  • First, the adversary is denied information by disrupting his observation, degrading his orientation and decision formulation, and degrading information collection. Information collection can be degraded by destroying collection means, by influencing the information the adversary gets, or by causing the adversary not to collect at all.
  • Second, the adversary commander is influenced by manipulating perception and causing disorientation of his decision cycle.
  • Third, adversary IO are degraded by selectively disrupting C4I systems.
  • Fourth, adversary information capabilities can be neutralized or destroyed by physical destruction of nodes and links. Destruction operations are most effective when timed to occur just before the adversary needs a certain C2 function or when focused on a target that is resource-intensive and hard to reconstitute.

Historical Perspective

Heraclitus of Ephesus in sixth century BC noted that "if you do not expect the unexpected, you will not find it." During the German invasion of the Soviet Union in June 1941, the Germans recognized, but the Russians did not, exploitable deficiencies in the existing Soviet C2 system. Employing the tools of C2W in an interrelated fashion, the Germans were able to effectively disrupt, exploit, and destroy the Soviet C2 system. Using weapons specifically built for C2W, the Germans attacked elements of the Soviet system by air, artillery, and sabotage. The results of these attacks were startling. Due to cross-border German sabotage efforts, many of the Soviet units "did not receive the war alert order when it was issued [from Moscow] on the night of 20-21 June 1941." By 24 June, large gaps had already been torn in the Soviet communications network, thus forcing commanders to rely on easily exploitable, unprotected, radio networks. This, in turn, led to the successful targeting of exposed command posts and associated units throughout the theater. These attacks, because of their effectiveness, led Soviet commanders to prohibit the use of radios because they might give positions away. Using C2W, the Germans had effectively shut down the Soviet C2 system, creating an operational environment that quickly led to a general collapse of the entire eastern front.


Figure 3-2
Figure 3-2. Mutual Support Within the Elements of C2W

Figure 3-3
Figure 3-3. Potential Conflicts Within C2-Attack

C2-PROTECT

  • C2-protect is defined as--
  • The maintenance of effective C2 of ones own forces by turning to friendly advantage or negating adversary efforts to deny information to, to influence, to degrade, or to destroy the friendly C2 system.

C2-protect can be offensive or defensive. Offensive C2-protect uses the five elements of C2W to reduce the adversary's ability to conduct C2-attack. Defensive C2-protect reduces friendly C2 vulnerabilities to adversary C2-attack by employing adequate physical, electronic, and intelligence protection.

C2-Protect Principles

The C2-protect process can best be understood by reverse engineering our C2-attack process. Commanders ask how the adversary can employ destruction, EW, military deception, OPSEC, and PSYOP to disrupt our C2 systems and decision-making process. Having wargamed the adversary's C2-attack courses of action, the commander can develop a comprehensive protect operation, synchronized with the main effort and C2-attack. The commander is guided by the five principles of C2-protect.

  • To gain C2 superiority. This principle includes functions such as the unimpeded friendly processing of information, accurate development of courses of action, valid decision making, and efficient communications to and from subordinates.
  • To stay inside the adversary's decision cycle. This is done by denying, influencing, degrading, and/or destroying the adversary's C2 personnel, equipment, and systems.
  • To reduce the adversary's ability to conduct C2-attack.
  • To reduce friendly C2 vulnerabilities using C2-protect measures. As an example, countering the effects of adversary propaganda or misinformation through PSYOP and PA.
  • To reduce friendly interference in our C2 systems throughout the EMS (deconfliction and coordination).

Historical Perspective

The history of the Information Age is being made now. In 1988 we saw the first well-publicized case of a computer virus. This insidious, self-replicating virus known as the Internet Worm penetrated the computer system at the University of California at Berkeley, corrupting thousands of computers on the internet. A computer emergency response team (CERT) had been created at Carnegie Mellon University. In 1993 they had their first large event as they put out a warning to network administrators that a band of intruders had stolen tens of thousands of internet passwords.

When CERT began in the late 1980s, they processed less than 50 events per year. Now they are in the thousands per year. The military is a target of this attack. Recent stories have told of a 16-year-old who compromised the security of more than 30 military systems and more than 100 other systems before he was caught after a 26-day international electronic manhunt. This experience hints at the impact a professional, well-financed effort could have against computer nets. The lesson this evolving history is showing us vividly today is that the information highway is creating a great vulnerability to US forces. We are all familiar with the security of transmitting information over a radio or telephone. But there is an even greater weak spot now in computers, data bases, software (such as decision-making aids and tools), servers, routers, and switches. This vulnerability exists today and is growing in geometric proportions.


C2-Protect Effects

The effects of C2-protect mirror those of C2-attack. We can deny information the adversary needs to take effective action. We can influence the adversary not to take action, to take the wrong action, or to take action at the wrong time. We can degrade and destroy his capabilities to perform C2-attack against friendly forces. PSYOP and PA supports C2-protect. PSYOP can drive a wedge between the adversary leadership and its populace to undermine the adversary leadership's confidence and effectiveness. The Commander's Internal Information Program (formerly the Command Information Program), publicized by the PAO, can be extremely beneficial in countering adversary propaganda in the US and among the deployed forces. PA specialists, working with PSYOP and intelligence personnel, can also develop information products that commanders can use to help protect soldiers against the effects of adversary disinformation or misinformation.

CIVIL AFFAIRS OPERATIONS

CA activities encompass the relationship between military forces, civil authorities, and people in a friendly or foreign country or area. CA activities support national policy and implement US national objectives by coordinating with, influencing, developing, or controlling indigenous infrastructures in operational areas. CA secures local acceptance of and support for US forces. CA is important to gain information dominance because of its ability to interface with key organizations and individuals in the GIE; for example, CA's traditional relationship with NGOs and PVOs such as the International Committee of the Red Cross.

Commanders fully integrate civil-military operations (CMO) into all operations and use CMO to influence, coordinate, control, or develop civilian activities and civil organizations. CA activities play a command support role in all operational environments and across the operational continuum. However, CA operations are most common when supporting the lower end of the operational spectrum.

Functional Specialties

Many CA activities require specific civilian skills. CA activities most relevant to the GIE and supporting IO are categorized into four major sections:

GOVERNMENT SECTION
Public administration provides liaison to the civilian government.

ECONOMIC SECTION
Economics and commerce monitors government economic and commercial agencies, normally only in a civil administration mission.

PUBLIC FACILITIES SECTION
Public communications allocates civilian communications resources for civilian and military use and directs civil communications agencies as required, normally only in a civil administration mission.

SPECIAL FUNCTIONS SECTION
Civil information advises, assists, supervises, controls, or operates civil information agencies and provides TV, radio, or newspaper services.

Collection Activities

The nature of CA activities and the need for CA personnel to develop and maintain a close relationship with the civilian populace puts them in a favorable position to collect information. CA information collection activities encompass the complete spectrum of cultural, social, political, and economic issues within the present or potential area of operations. In their daily operations, CA personnel deal with people, equipment, and documents that are prime sources of information. Information collected is often important to other units' staff sections or agencies and supports the CCIR.

Information Sources

CA units are included in the information collection plan of the supported unit. CA units report information that meets the criteria of the supported unit's collection plan. Prime sources of information available to CA units include, but are not limited to-

  • Civilians who were housed with, catered to, or associated with enemy personnel.
  • Dislocated civilians and other personnel participating in movement control, relief, or other assistance (normally referred to appropriate intelligence personnel).
  • Government documents, libraries, or archives.
  • Files of newspapers or periodicals.
  • Industrial and commercial records.
  • Technical equipment, blueprints, plans, or information of interest related to transportation, signal, engineer, and medical fields.

Relationships

The information collected can supplement the intelligence effort. US forces need timely and accurate information and intelligence to plan missions, secure the element of surprise, identify and develop targets, and protect US interests across the operational continuum. CA activities are closely tied to the intelligence functions and operations associated with the overall tactical mission.

CA personnel are not, and must not have the appearance of being, intelligence agents. The mission of the unit drives the intelligence cycle. As operational planning begins, so does intelligence planning. Requirements for operational planning are normally for finished intelligence studies, estimates, or briefings. CA planners prepare their estimates from basic intelligence documents that are not primarily written for CA use, such as an area study. Intelligence is the product resulting from the collection, evaluation, and processing of information.

Overall, CA elements collect information that the G2/J2 turns into intelligence. CA forces, if used correctly, can complement theintelligence collection process, especially HUMINT. In some cases, CA elements can also enhance the capabilities of technical intelligence (TECHINT) or intelligence concerning foreign technological development that may have eventual application for military use.

Coordination and Support

All CA activities require close coordination with military forces, US and foreign government agencies, and nonmilitary agencies with a vested interest in military operations. CA planners must consider all available support to ensure successful completion of the CA mission. In most cases, CA planners directly or indirectly support the agencies assigned by law to carry out national policy. CA planning is a command responsibility. It must be coordinated, at a minimum, with all other staff planners. To ensure success, coordination and cooperation with the following are vital to the conduct of all operations: other US staffs and units, host nation military, coalition military, US Government, foreign governments, international agencies, PVOs, and NGOs.

GOVERNMENT AGENCIES

Effective CA activities require close contact between the US military, the Department of State (DOS), and other US Government agencies. Because DOS formulates and implements foreign policy, it has a vested interest in CA activities. In the area of CA, DOS has primary or joint responsibility with DOD for policy. Some examples are matters involving PSYOP, PA, CA, civil information, or other measures to influence the attitude of the populace and plans for turning CA activities over to civilian control at the end of hostilities.

PVOs AND NGOs

The list of PVOs and NGOs that may be found in an AO could be very large. Approximately 350 agencies capable of conducting some form of humanitarian relief operation are registered with the USAID. Commanders must consider the presence and capabilities of PVOs and NGOs and, when appropriate, coordinate and cooperate with their efforts. Because many of these organizations may have been established in the AO in advance of the Army's presence, they may be a good source of information and knowledge.

CA, PSYOP, AND PA ELEMENTS

CA, PSYOP, and PA elements are able to use the same communications media with essentially the same messages but to different audiences. CA and PSYOP personnel address local populations and enemy forces, respectively, while PA personnel address US forces and national and international news media. Popular American public support contributes to the success of CA. CA and PSYOP personnel provide news and information to the local populace on the effects of combat operations.

CIVIL-MILITARY OPERATIONS CENTER

Commanders can establish a CMOC to perform liaison and coordination between the military PVOs and NGOs, as well as other agencies and local authorities. Figure 3-4 illustrates additional GIE players that may interact with the CMOC. Relationships with nonmilitary agencies are based on mutual respect, communication, and standardization of support. NGOs and PVOs have valid missions and concerns, which at times may complicate the mission of US forces. As an example, liaison with an organization that is caring for the sick and injured of the local populace may reveal that human rights abuses are occurring. This information could provoke a response by DOS officials to warn local authorities to stop such abuse from happening, as well as increasing the level of protection for the local population by US forces.

STAFF

CA operations must be integrated into the battle plan, to include providing for timely and accurate reporting of the operation and combating distorted or disinformation disseminated by the adversary. The CA representative to the IOBS-

  • Represents CA concerns in IO.
  • Coordinates with PA and PSYOP representatives to ensure consistency of messages and OPSEC without compromising CA credibility.
  • Prepares CA estimates, assessments, and the annex to the OPLAN/OPORD to identify and integrate CA support.
  • Coordinates the use of local resources, facilities, and support. Examples include civilian labor, transportation, communications, maintenance, or medical facilities, and miscellaneous services and supplies.
  • Provides liaison to local agencies and civilian authorities.
  • Advises on cultural and moral considerations.

In concert with the G2/J2 and chief of staff, the CA staff officer (G5/J5) controls, coordinates, and integrates the CA effort at each echelon. One essential function is to prepare and issue a CA annex as part of the unit's OPORDs or OPLANs. See Appendix A, Annex A.

Figure 3-4
Figure 3-4. Additional GIE Players

Historical Perspective

In the early spring of 1991, in the aftermath of its humiliating defeat at the hands of US-led coalition forces, the Iraqi Army launched a violent attack against the Kurdish minority in northern Iraq. More than half a million refugees fled across the border into southeastern Turkey. Huddling on exposed mountainsides, they promptly began to become ill and die from starvation, exposure to the bitter cold, and various diseases. The world press reported that over a thousand Kurds, especially children and the elderly, were dying each day.

On April 5, President Bush directed US military forces to "stop the dying." Lieutenant General John M. Shalikashvili, then deputy commander of US Army Europe, was placed in command of the coalition task force Provide Comfort. Elements of several CA units, active and reserve, were redeployed from the Persian Gulf or deployed from Fort Bragg to Turkey under the 353d Civil Affairs Command (USAR), Bronx, New York.

In Turkey, the CA soldiers joined with 10th Special Forces Group to aid overwhelmed relief workers already on the scene. The latter included personnel from the United Nations High Commissioner for Refugees, the US Department of State Office of Foreign Disaster Relief, the Turkish Red Crescent, and more than 40 different civilian humanitarian relief organizations, all of which were attempting to care for the Kurds in 40 or more scattered locations. Shalikashvili's greatest problem became coordinating all the organizations' efforts with the US Air Force-the primary means for transporting emergency supplies into the region.

At US European Command Headquarters in Stuttgart, Germany, an Army Reserve CA captain with the 353d saw a possible solution. The captain, a software engineer in civilian life, joined with three other CA reservists in an intensive three-week effort, first in Stuttgart and later at Incirlik Air Base, Turkey, to design and implement a unique relief supply data base. Their program, later named the Disaster Assistance Logistics Information System (DALIS), combined key data from agencies on the type of aid arriving, storage locations, and intended destinations. DALIS allowed planners to coordinate efforts and deliver the right supplies to the right locations at the right time. These innovative soldiers used the power of the microprocessor to unscramble what threatened to be a logistical, diplomatic, and humanitarian nightmare. By combining data from multiple sources, they provided vital information that reduced redundancy and avoided maldistribution of resources at a critical moment, saving thousands of lives. Using IO, CA soldiers became masters of the situation and made a decisive contribution to the success of Provide Comfort.


PUBLIC AFFAIRS OPERATIONS

Public affairs must be integrated with other battlefield functions to achieve the desired effect of an accurate, balanced, credible presentation of information that leads to confidence in force and the operation
FM 46-1

PA fulfills the commander's obligation to keep the American people and the soldiers informed. PA operations help establish the conditions that lead to confidence in America's Army and its readiness to conduct operations. Army operations are of interest to the public and subject to being covered by the media. PA is therefore a function that supports both combat and noncombat operations and contributes to success in war and other military operations.

Missions

The inherent challenge is for commanders to understand the dynamics of media coverage. The media can potentially have a quick and pervasive impact on their plans and operations. Its coverage of the development of plans and the conduct of operations may impact and influence strategic decisions in a more profound and immediate way than in the past. PA operations enable commanders to effectively operate with the media. Commanders must also have a better appreciation for the immediacy of media coverage such as personal interviews, live versus taped reports, film versus written dispatches, methods of transmission, and so on.

The commander's information needs are not answered by a single source, but by a combination of many systems and functions, including the news media. The advances in information technology provide potential adversaries with the capability to exploit (deny, distort, degrade, or destroy) information. The PAO must have the capability to monitor the national and international media and identify and assess information relevant to the operation.

The missions of PA, PSYOP, and CA involve communicating information to critical audiences to influence their understanding and perception of the operation. Information communication must be fully coordinated to eliminate unnecessary duplication of effort and ensure unity of purpose. Planning for these operations must be synchronized, and the messages they communicate must be truthful and mutually supportive to ensure that credibility is not undermined and mission success is achieved.

The PAO's support to the commander is multidimensional. The PAO advises the commander on media relations and the PA implications of current and future operations and events. He serves as the official command spokesperson and implements the Commander's Internal Information Program. PA focuses on achieving an accurate, balanced, and credible presentation of timely information that communicates the commanders perspective to enhance confidence in the force and the operation. It provides the critical battlefield function of media facilitation by serving as the interface between the media and the force.

With the broad scope and initiative given to soldiers and units today at every level, one of the primary tools the commander uses is the internal information program. Well-informed soldiers are likely to have higher morale and perform better. Soldiers need and want information from both external and internal sources and are interested in the public perception of an operation. Therefore, PA operations use various communication methods and channels to make this information available to soldiers, other Army audiences, and external audiences. The broad range of missions the Army executes today are done in an environment of global visibility. Media coverage can be pivotal to the success of the operation and achieving national strategic goals.

Impact of Change

Every aspect of every operation may be an issue of interest to the media and consequently to the public. Existing and emerging technology puts military operations onto the global stage, often in real time. Soldier actions can induce public reactions, which in turn causes NCA reactions that impact operations without ever engaging US forces. For example, real-time or near real-time reports of the actions of a soldier manning a roadblock, the results of a minor skirmish, or the effects of a major combat action become the subject of discussion. Media personalities, politicians, pundits, critics, academics, and the general public rapidly form positions and opinions, often in pursuit of agendas well beyond the scope and purpose of the operation being reported. They become active participants in the international public debate of events and issues.

Adversaries can also attack the public opinion center of gravity and affect operations without ever engaging US forces. All Army operations can be influenced through planned or inadvertent messages communicated via the GIE. PA and the associated GIE addresses simultaneous effects that are integral to all levels of war (Figure 3-5). In the Information Age, the old separation of public information and internal information activities are compressed.

Providing accurate, timely news, information, and entertainment reduces distractions, rumors, fear, and confusion that could cause stress and undermine efficient operations. Such activities contribute to team building, morale, and unit cohesion. They enhance soldier confidence and understanding. They contribute to ethical behavior, respect for the law of war, private property, the rights of civilians and noncombatants, and human dignity.

Figure 3-5
Figure 3-5. Multiple Levels of Public Affairs

Coordination and Support

PA is a battlefield function and has a direct impact on the conduct of operations. It must be fully integrated into the planning process at all levels and across the full continuum of operations. A member of the PA staff serves on the IOBS (see Appendix D). The PA representative assesses media presence, capabilities, information needs and interests, and content analysis of both traditional media and electronic forums such as those on the internet and electronic bulletin board.

Finally, PA operations must be integrated into the battle plan, to include providing for the timely and accurate reporting of the operation, combating distorted or disinformation disseminated by the adversary. The PA representative to the IOBS-

  • Represents PA concerns in IO.
  • Identifies, assesses, and advises the commander on information and issues with PA implications.
  • Reviews strategic and operational information with PA implications such as events, missions, and propaganda.
  • Coordinates with CA and PSYOP representatives to ensure consistency of messages and OPSEC without compromising PA credibility.
  • Facilitates availability of battlefield information for PA purposes, for example, releasable visual imagery used to inform the public of Army capabilities and accomplishments.

PA is integrated into the OPLAN/OPORD through the PA Annex. Appendix A, Annex A provides the information to implement PA media facilitation, news, information provisions, and force training operations. This annex is coordinated with all staff agencies, especially those that significantly impact the information environment, that is, PSYOP, CA, signal, military intelligence, to ensure that PA activities are synchronized with other activities.


Historical Perspective

At 1800 hours local (Riyadh) on 27 February 1991, the Gulf War CINCCENT and ARCENT commanders agreed that in all likelihood no more than 24 hours of battle remained. At 2100 hours during a briefing for the press corps telecast live around the world, the CINCCENT reflected that opinion and indicated that coalition forces would be pleased to stop fighting when so ordered. The time of the briefing in CONUS (1300 hours EST) ensured a wide audience, including the President of the United States, for at least a portion. Reacting to the briefing, the President and the Chairman of the Joint Chiefs of Staff (CJCS) conferred, and the CJCS called Riyadh from the Oval Office, indicating the President's wish to stop the offensive as soon as practicable. The CINC called his component commanders, stating that the NCA was considering a cease-fire at 0500 (local) on 28 February.

Meanwhile, VII Corps had prepared a double envelopment movement, passing 1st Cavalry Division around to the north of 1st Armored Division, to crush what remained of the Iraqi Republican Guard. The corps intended to execute the double envelopment beginning at 0500 on the 28th. In accordance with an ARCENT warning order concerning the cease-fire, however, VII Corps units assumed a local security posture, focusing on force protection. An ARCENT frag order, published at 0200 and titled "Potential Temporary Cease-Fire," reiterated the 0500 implementation time.

At 0300, CENTCOM notified ARCENT that the President had set 1200 am eastern standard time on 28 February (0800 hours local) as the beginning of the cease-fire time and urged the Army component to inflict the greatest possible damage on the enemy before that hour. Accordingly, ARCENT published a new FRAG order at 0330, calling for the resumption of offensive operations. At 0406, the VII Corps commander ordered his division commanders to execute the double envelopment with a new departure time of 0600, being mindful of the 0800 cease-fire. Difficulties inherent in reordering battle and executing the mission for maximum gain over the next four hours led to confused communications, misunderstood commander's intent, and postwar questions over operational and tactical execution.

In the space of 11 hours, a press conference that included unguarded opinions about the past and future course of a war profoundly affected the strategic, operational, and tactical levels of that war. Commanders on the front lines were neither informed nor consulted on the intent of the public briefing, either before or after it had taken place. The ubiquitousness and immediacy of press reportage effectively erased boundaries between national and theater command authorities and dramatically compressed the time between strategic decision and operational consequences.


Figure 3-6
Figure 3-6. Mutually Supported Roles of C2W, Civil Affairs, and Public Affairs



Chapter 4

Relevant Information and Intelligence

In modern battle, the magnitude of available information challenges leaders at all levels. Ultimately, they must assimilate thousands of bits of information to visualize the battlefield, assess the situation, and direct the military action required to achieve victory.
FM 100-5

This chapter sets the doctrinal foundation for the role of relevant information and intelligence in IO. The chapter discusses the need for relevant information, the criteria to carefully assess such information, and the commander's decision and execution cycle. It also includes information on the role of intelligence in framing relevant information about the adversary.

RELEVANT INFORMATION

Relevant information is defined as--

Information drawn from the military information environment that significantly impacts, contributes to, or is related to the execution of the operational mission at hand.

Relevant information has a direct relationship with the MIE in two important ways:

  • One, the act of collecting, processing, or disseminating relevant information serves as the principal criteria a commander applies, to include an individual, organization, or system as part of the MIE.
  • Two, it is the product or medium drawn from or used by those same players that serves as the basis or currency of IO. See Figure 4-1.

In the past the Army has tended to approach the collection and use of operational information from a specialized perspective. For example, different BOS elements have collected and used information necessary to support their particular functions, such as--

  • Intelligence focused upon information about the adversary and foreign nations.
  • Operators focused on situational information concerning friendly forces.
  • Logisticians focused on friendly force sustainment conditions and requirements.
  • PA and CA focused on the interface between military and nonmilitary sectors.
Figure 4-1
Figure 4-1. Relevant Information

Only a limited amount of such information was shared and that at relatively high levels within the military organizational hierarchy. Information flowed up and down stovepipes with routines that tended to slow the sharing of information across organizational boundaries. Relatively little effort was focused upon the systematic integration or synchronization of information. Normally, numerous specialized, noninteractive data bases were developed and maintained to meet the needs of particular elements on the battlefield.

Because of changes in the information and operational environments, we can now achieve new levels of efficiency and effectiveness in use of information by integrating and synchronizing the collection, processing, and dissemination efforts. Efforts must focus on leveraging the potential operational contribution of information by efficiently collecting and sharing information across all BOS elements.

Assessment Criteria

Because sources of information are imperfect and susceptible to distortion and deception, commanders and planners must carefully assess the quality of the information prior to its use. They can do so using the following six criteria:

  • Accuracy. Information that conveys the true situation.
  • Relevance. Information that applies to the mission, task, or situation at hand.
  • Timeliness. Information that is available in time to make decisions.
  • Usability. Information that is in common, easily understood formats and displays.
  • Completeness. All necessary information required by the decision maker.
  • Precision. Information that has the required level of detail.

As a first priority, information should be accurate and relevant. As a second priority, it should be both timely and in usable form. Finally, information should be as complete and precise as possible. The following rule of thumb supports these relationships: incomplete or imprecise information is better than none at all; untimely or unusable information is the same as none at all; inaccurate or irrelevant information is worse than none at all.

Decision and Execution Cycle

Commanders must have information to command. Information is the medium that allows the commander's decision and execution cycle to function. Information gives direction to actions by the force, provides courses of action for protecting the force, and helps the force accomplish its operational mission. Relevant information drawn from the MIE supports the creation of situational awareness that contributes directly to effective C2 during all stages of the decision and execution cycle. C2 in an environment of situational awareness helps the commander ensure unity of effort toward mission accomplishment. Ultimately, C2 depends on the right person having the right information at the right time.

C2 is a continuous, cyclical process by which a commander makes decisions and exercises authority over his forces to accomplish an assigned mission. A commander's decision and execution cycle has four sequential steps (see Figure 4-2).

  • Step 1. First, the commander is the central element in the entire process of C2. Accordingly, he strives to understand his current situation and environment by acquiring information about his battlespace and the status of relevant forces, both friendly and adversary, using all available sources, including personal observation, sensors, INFOSYS, and spot reports from subordinates.
  • Step 2. Upon mission receipt, the commander combines his understanding of his current environment, visualizes the desired future end state, and develops an initial concept of how to execute the mission.
  • Step 3. Based on his understanding of the situation and his intent, the commander issues guidance and directs a planning process to develop and refine a viable course of action for mission accomplishment. Upon deciding on a course of action, he disseminates his orders to put the operation into motion. During this execution phase, the commander monitors the operation and gauges its results. This brings him full circle to acquire new or additional information from which he begins the cycle again. Throughout the entire cycle, the fog and friction of war continually affect the commander's ability to acquire information, visualize, plan, decide, and execute.
  • Step 4. Since the decision and execution cycle is a continuous process, all parts of the cycle are active at each echelon of command. Commanders collect information, develop situational awareness, and plan for future operations at the same time they conduct current operations. Meanwhile, senior and subordinate commanders gather information and work through decision and execution cycles at their respective levels. Maintaining rapid decision and execution cycles--and thus a rapid tempo of operations--requires that seniors and subordinates alike have an accurate, common picture of the battlespace. From this common picture, a unit gains greater situational awareness with which to exercise initiative during combat or other situations.
Figure 4-2
Figure 4-2. Decision and Execution Cycle

The commander operates within the GIE, adjusting his MIE to enhance his situational awareness as necessary. Moreover, the commander uses his various means in the MIE to ensure that all elements of his force have a common, complete, and relevant situational awareness. This requires a sophisticated INFOSYS that enhances the commander's ability to share, manage, and move information among organizations. The commander also uses his information capabilities to support OOTW. The emphasis during such missions shifts away from the combat focus of C2W operations and starts to take in broader considerations contributing to efficient and effective operations. These operations often involve a variety of GIE players. For example, the G3/J3 works closely with PA and CA officers, among others, to determine critical information requirements pertaining to his AO.

INTELLIGENCE

Intelligence is--

The product resulting from the collection, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas. Also, information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding.

Joint Pub 1-02

Intelligence is also the critical subelement of relevant information that focuses primarily upon foreign environments and the adversary. In support of friendly operations, intelligence helps produce a common, current, and relevant picture of the battlespace that reduces uncertainty and shortens the commander's decision-making process. Against an adversary, intelligence is vital for developing and executing effective C2W operations that degrade and distort the enemy's decision-making process while protecting friendly C2. Intelligence support to IW executed at the strategic and national levels must be leveraged to support C2W and IO conducted at the operational and tactical levels. This effort requires a seamless intelligence-collection process and supporting architecture, providing real-time intelligence products focused on CCIR.

Role of Intelligence

Intelligence provides the commander with an accurate understanding of the threat situation as it relates to current and future operations. Intelligence personnel acquire, use, manage, and exploit information to produce such an understanding. For common situational awareness to be accurate and current, the intelligence effort is continuous. Intelligence collection includes all possible sources, from national-level covert operations through local open sources such as news media, commercial world contacts, academia, and local nationals.

In noncombat operations, HUMINT, open sources, and other government agencies provide timely information to augment the unit's more traditional battle-focused intelligence-collection effort. The intelligence effort provides current, accurate threat and targeting data to weapon systems and intelligence sensors. Their effectiveness is dependent upon the rapid movement of data between collector, processor, decision maker, and shooter. Intelligence supports C2W, focusing on C2-attack and C2-protect.

Intelligence-Enabling Functions

The primary purpose of intelligence is to enable well-informed operational decisions based on an accurate understanding of the situation. The essence of intelligence is to collect, analyze, screen, and present information requested by the commander. Intelligence helps reduce uncertainty for the commander by screening out information that is not relevant to his decision-making process. Intelligence-enabling functions focus on assessing friendly vulnerabilities, understanding the adversary, employing IPB, and assessing battle damages.

ASSESSING FRIENDLY VULNERABILITIES

The first critical step in protecting IO capabilities is to identify specific and potential threats. Potential threats range from the adversary's direct overt and covert actions, to individuals and organizations seeking to exploit military INFOSYS, to natural phenomena. They include a new family of global commercial imaging, cellular telephone, and positioning systems that jointly or separately provide a potential adversary with near real-time information on forces and movements.

The fluid, porous nature of the MIE makes it difficult to protect INFOSYS from possible attacks. Therefore, intelligence provides the commander the necessary information to conduct risk assessments and develop risk management options to protect vital C2 components and capabilities. The risk assessment is based on identification of such factors as specific threat capabilities, technical capabilities, doctrine, and past performance of the threat force. The risk assessment is not a finished document, but a continuous process that is constantly updated to reflect changes in the operating environment, technology, and threat acquisitions. Because C2W offers potential adversaries the chance to strike at the supporting infrastructure of the US force--wherever it is located--the commander and his staff must be aware of threats to their INFOSYS at the home station.

UNDERSTANDING THE ADVERSARY

The effectiveness of C2-attack is predicated on a thorough understanding of an adversary, his C2 system, and his decision-making process. The deeper the understanding, coupled with the tools and techniques to take advantage of such knowledge, the more effective the exploitation of the potential adversary. At all levels of war, intelligence is an operational tool that identifies, assesses, and exploits the enemy's information and C2 systems. Data is required on what information the adversary collects, by what means, what reliability he places on various sources, and how that data is evaluated.

Intelligence personnel must be able to describe the enemy's decision-making process and how direction is sent to subordinates. Detailed intelligence is required on the social and cultural environments and the psychological makeup of the adversary's key leaders and decision makers. How they interact and perceive one another are important aspects of the information necessary to develop effective PSYOP and deception operations. How subordinates execute decisions completes the picture. Having a detailed understanding of the adversary's use of information is necessary in order to determine where and how to effectively influence his actions (see Figure 4-3).

"Know the enemy and know yourself, and you will be victorious."
Sun Tzu (500 BC)

EMPLOYING INTELLIGENCE-PREPARATION-OF-THE-BATTLEFIELD

In this context, IPB is the continuous process used to develop a detailed knowledge of the adversary's INFOSYS. IPB is a continuous process of overlapping and simultaneous actions that produces situation updates on a continuous basis and providing options to the commander. This form of information IPB, as shown in Figure 4-4, is the basis for planning operations, developing C2W courses of action, and targeting. The process builds upon the standard IPB but also requires--

  • An understanding of the adversary's decision-making process and leadership style.
  • Knowledge of the technical requirements on a wide array of INFOSYS.
  • Knowledge of the political, social, and cultural influences at work in the MIE.
  • The ability to conduct highly technical processes to produce C2W course-of-action templates.
  • Identification of and an in-depth understanding of the biographical background of the adversary's key leaders, decision makers, communicators, and advisors.
Figure 4-3
Figure 4-3. Understanding the Adversary

Much of this information should be routinely collected and maintained in national-level data bases and be readily available at the start of a mission.

The IPB actions the intelligence officer accomplishes to support IO include constructing a template of the adversary decision-making process, understanding the information infrastructure of the adversary, and analyzing the adversary's vulnerabilities.

Figure 4-4
Figure 4-4. IPB Considerations in Information Operations

Constructing a Decision-Making Template

The first step in the IPB process is to construct a template of the adversary's decision-making process. This aspect of information IPB focuses on developing an understanding of the leadership/personality profiles of the critical adversary decision makers. It address how they use information to make decisions, how they interact as organizations to make decisions, and how they execute those decisions. This step is linked directly to the ultimate goal of IO, which is to find ways to create a desired response in the adversary decision-making process, to create a relative military advantage, or to achieve the desired end state of the military operation.

Understanding the Adversary's Information Infrastructure.

The second element of IPB is to understand the information infrastructure of the adversary. See Figure 4-3, which depicts how information flows within the unit, organization, and structure. This analysis includes the human interface as a valid form of information distribution and is not limited to only technology assessments. An understanding of how information from outside the adversary's unit, organization, or structure flows must also be developed for the commander's use. This includes understanding the local, regional, and global information environments. CA teams operating in-country can greatly assist in this process.

Analyzing the Adversary's Vulnerabilities.

Next, the intelligence officer analyzes the decision-making template and the infrastructure template to determine adversary vulnerabilities. Vulnerability analysis occurs on two levels.

  • First, system vulnerabilities are identified which can be exploited to cause the desired effects on the decision process.
  • Second, the appropriate attack mechanism and specific entry point (building, floor, air shaft) is determined.

Vulnerability analysis is then extended to include the collateral damage a C2W action may cause on the operating environment. As an example, an option in attacking an adversary's C2 might be to destroy his electrical power infrastructure. However, the strategic cost (political or logistical) of destroying this capability might outweigh the tactical gains. One implication of the GIE is that actions and their consequences are examined across the MIE, as opposed to the battlefield alone.

Developing Options

The decision-making template and the infrastructure template are combined to form a C2-attack course-of-action template. Various courses of action can then be developed and analyzed to determine the best way to use IO to influence, support, or accomplish the overall mission.

ASSESSING BATTLE DAMAGES

BDA serves to confirm or deny previous intelligence estimates and update the IPB. The intelligence system continuously assesses the effectiveness of IO. This BDA allows commanders to adjust IO efforts to maximize effects. An important aspect of this information BDA is timely analysis to determine when exploitable vulnerability is created in the adversary C2 structure. Compared to the way we look at conventional BDA reporting procedures, BDA in IO is not so apparent.

Information BDA is not always reported in terms of physical destruction of a target. The challenge of information BDA is to be able to assess the effects of our efforts without the benefit of physical confirmation. The effects may well be trends, activities, and patterns in future adversary actions. They could be as simple as an absence of activity on a C2 net, combined with an increase of traffic elsewhere, that is, reduced very high frequency/ultrahigh frequency (VHF/UHF) transmissions coupled with observations of increased courier traffic or heavy land line activity. BDA also examines the collateral damage C2W actions may cause to nonmilitary systems and capabilities within a commander's MIE.



Chapter 5

Information Systems

Microprocessing, miniaturization, communications, and space technologies have combined to permit almost real-time intelligence and information sharing, distributed decision making, and rapid execution of orders from a wide variety of forces and systems for concentrated effect.
FM 100-5

INFOSYS allow the commander to view and understand his battlespace, communicate his intent, lead his forces, and disseminate pertinent information throughout his chain of command and his AO. Effective military and nonmilitary INFOSYS help the staff get the right information to the right location in time to allow commanders to make quality decisions and take appropriate actions. This chapter describes how INFOSYS operate as part of IO. Specifically, the focus is on the functions, role, security, and management of INFOSYS. These INFOSYS consist of--

The entire infrastructure, organization, personnel, and components that collect, process, store, transmit, display, disseminate, and act on information.
Joint Pub 6-0

FUNCTIONS

INFOSYS include personnel, machines, manual or automated procedures, and systems that allow collection, processing, dissemination, and display of information. These functions cover all aspects of the organization, providing commanders with an accurate, relevant, common picture and a common situational awareness. Accordingly, a commander should consider his staff as part of the INFOSYS because its chief function is to plan and integrate IO. INFOSYS collect, transport, process, disseminate, and protect information in support of the CCIR. In addition, INFOSYS enable the commander to use information effectively to maintain an accurate view of his battlespace, coordinate the activities of his tactical forces, and help shape his MIE.

INFOSYS directly support battle command; however, all aspects of land warfare--operations, logistics, planning, and intelligence--depend on a responsive information system infrastructure. INFOSYS are able to simultaneously support current operational deployments and future contingencies. Interoperability and flexibility are critical characteristics of any INFOSYS, especially given the requirement for Army forces to conduct force projection and split-based operations using strategic systems.

  • And to control many is the same as to control few. This is a matter of formations and signals.
  • Sun Tzu, The Art of War

ROLE

The role of INFOSYS is to provide the infrastructure that allows the Army to interface with the GII. INFOSYS enable the integration of all IO activities. INFOSYS form the architecture that--

  • Supports the staff process.
  • Supports the decision-making process.
  • Provides the relevant common picture that helps synchronize force application.
  • Links sensors, shooters, and commanders.
  • Supports C2-attack and C2-protect capabilities.

The accelerated development of information technologies has created new techniques for managing, transporting, processing, and presenting data. These include imagery, video, color graphics and digital overlays, mapping, and data base technology.

With the revolution of information technology, developments in satellite communications, network and computer technology, and the infrastructure of military and nonmilitary INFOSYS combine to provide the commander with a global reach capability. See Figure 5-1. Communications and automation architecture allow for modular C2 support for force tailoring during any phase of an operation. Operations take place in a global environment and demand information from a host of information sources. Military and nonmilitary INFOSYS provide that global capability to support commanders and units across the range of operations. Discussion includes the INFOSYS, the principles that form the foundation for their support, and the direction of future INFOSYS technology.

Figure 5-1
Figure 5-1. Global Communications Network

Military Information Systems

Military INFOSYS integrate fielded and developmental battlefield automation systems and communications to functionally link strategic, operational, and tactical headquarters. INFOSYS maximize available information networks through seamless connectivity as well as C4 interoperability. Figure 5-2 depicts the relationships of strategic, operational, and tactical architectures that tie the many distributed elements into an integrated, interoperable, and cohesive network.

Figure 5-2
Figure 5-2. Seamless Architecture

JOINT GLOBAL COMMAND AND CONTROL SYSTEM

The primary national warfighting C2 information system is the joint Global Command and Control System (GCCS), which interfaces with the Army Global Command and Control System (AGCCS).

ARMY GLOBAL COMMAND AND CONTROL SYSTEM

AGCCS is a seamless C2 system operating at the upper echelons of the ABCS and supports C2 for echelon-above-corps units.

ARMY BATTLE COMMAND SYSTEM

ABCS is the primary Army warfighting C2 INFOSYS and employs a mix of fixed/semifixed installations and mobile networks, depending on the subsystem. ABCS is interoperable with theater, joint, and combined C2 systems across the full range of BOS functions. It is vertically and horizontally integrated at the tactical and operational levels. ABCS provides connectivity to combat information data bases and processes information pertaining to each BOS. In addition to the theater-level AGCCS, the other components of the ABCS include the Army Tactical Command and Control System (ATCCS) and the Force XXI Battle Command Brigade and Below System (FBCB2).

Army Tactical Command and Control System

ATCCS is linked directly to AGCCS, providing the framework of seamless connectivity from brigade to corps. Moreover, it integrates the traditional disparate stovepipe functions into a coherent, seamless infrastructure that binds the BOS together. Figure 5-3 depicts this INFOSYS architecture. Tactical internet capabilities to establish the use and allocation of new IO capabilities offered by digitization of tactical forces are in development. The tactical internet has both operational and systems information architectures. The operational architecture is for required connectivity of force elements and the type and volume of digital information-sharing by elements within the force. The system architecture is for specific hardware and software to provide connectivity and dissemination of battle command information.The two evolving architectures account for predetermined user information exchange requirements throughout the tactical force.

Each node of the tactical internet can provide information services while on the move. Network management is an important feature of the tactical internet and is highly critical to the successful delivery of information across the battlefield. It enables the tactical information manager to track tactical users on the battlefield. It provides a tool to assist in the dynamic configuration of battle command information networks needed to conduct tactical IO.

Force XXI Battle Command Brigade and Below System.

In the near term, the FBCB2 system employs the GPS (POS/NAV) and communicates over the single-channel ground and airborne radio system/enhanced position location reporting system (SINCGARS/EPLRS) and the mobile subscriber equipment/tactical packet network (MSE/TPN). These systems form an integrated network to move information (data) between higher and lower echelons (vertically) and between adjacent organizations (horizontally) without routing through the brigade headquarters. Moreover, FBCB2 provides digital connectivity from brigade to weapons systems or platform level. It transitions from a network of three separate systems to a homogeneous network and system of systems comprised of--

  • Appliqué--a family of laptop-sized computers connected to navigation devices and radios to provide processing and display capabilities to platforms without an embedded processor.
  • Tactical Internet--a battlefield communication systems networked together using commercially based internet protocols.
Figure 5-3
Figure 5-3. Army Information System Architecture

Nonmilitary Information Systems

Information technology is growing exponentially and transforming how the world conducts business, diplomacy, and war, requiring that commanders have a broader and externally oriented view of all sources of INFOSYS when executing IO. Moreover, DOD has limited authority for securing this civilian infrastructure or influencing the content of its products. Technological improvements in mobility, directed-energy weapons, digitization, and sensors continue to reduce factors of time and space and demand faster tempos of operation across vast areas.

Increasing global population, rapidly expanding world economic markets, and unprecedented advances in INFOSYS technology continue to perpetuate a global explosion of information networks of a nonmilitary or commercial nature. These ever-increasing networks are rapidly creating a global web or infosphere of information. Important changes are occurring in broadcast communications technology, computing, and space-based technology. The global nature and speed of news broadcasts can elevate apparently obscure events into international spectacles and has created a market for news known as infotainment. The number of players in the GIE are growing rapidly and sharing new information over computer networks at a steadily increasing rate.

Cellular communications and data compression advances increasingly provide greater communications freedom to individuals in ever wider regions of the globe. These advances enable individual soldiers as well as independent media or other actors to independently reach home using the internet or broadcast and publication sources. Potential sources of immediate information and the number and variety of MIE influences (both intentional and inadvertent) are rapidly multiplying. The cumulative effects of these changes permanently alter the shape of organizations and C4I architectures in ways that are just becoming evident.

  • Networks are, in many fields, supplanting traditional hierarchies as the major organizing concept.
  • In the business world, greater connectivity and access to information at all levels is eliminating much of the status-monitoring functions performed by middle management.
  • New ways of thinking and operating are necessary because elements that are relatively low in an organization now have the information to make and execute decisions.

Like the rest of the nation, the Army relies on elements of an information environment it does not control. These nonmilitary INFOSYS include--

  • US and host nation PSNs and postal and telegraph systems.
  • Commercial communications satellite systems such as intelligence satellites (INTELSAT) and international maritime satellites (INMARSAT).
  • Commercial receivers that use precision, space-based navigation systems such as GPS.
  • Electric power systems that support information networks.
  • Commercially developed software applications.
  • Commercial, international news media.
  • Public-accessed data bases and bulletin boards.

Historical Perspective

In 1944, at the Battle of Arnhem, the British First Airborne Division landed with the wrong radio crystals. They couldn't communicate with the outside, not even to their relief column at Nijmegen, a few miles away. They were isolated, under attack by superior numbers, and surprised at being dropped where they weren't supposed to be. During the entire multiday battle, members of the Dutch resistance in Arnhem were routinely talking to the counterparts in Nijmegen by telephone, because the national telephone system had not been taken down. It never occurred to a single paratrooper to knock on the door of a house and call Nijmegen, because the battlefield had been defined outside the civilian infrastructure. The Dutch underground assumed the paratroopers were talking by radio, and the paratroopers had never thought about using the civilian infrastructure.


The availability of nonmilitary INFOSYS often offer the command an alternative means to satisfy its informational C2 needs, but only after a careful assessment of security risks. As an additional benefit, use of available nonmilitary INFOSYS may reduce the requirement for deployed military information system packages. Operational use of a nonmilitary system allows planners to compensate for system shortages and to meet the surge of information requirements in the early stages of deployment.

The J6/G6 is responsible for standardization of nonmilitary equipment and software used throughout the AO. However, planners have to ensure the deployed modular INFOSYS packages implement open, nonproprietary, commonly accepted standards and protocols to interface with nonmilitary systems. Proper use of INFOSYS creates new challenges at individual user, organization, and system levels. Planners should consider these challenges in IO planning because they will affect the end user and the information management structure.

The user will be challenged by the digitization of the battlefield, by interface requirements between the operator and the system, and by the need to develop effective training strategies. The optimal use of INFOSYS ultimately depends on the availability of quality soldiers and leaders who are trained to employ advanced INFOSYS technology. Organizations will be challenged to develop flexible task-organization strategies that use the INFOSYS to adapt to the wide range of different conditions existing in the GIE. In addition, organizations will improve their battlefield functional capability in a digital environment by using advanced computer applications and tools. System challenges will emerge as a result of--

  • Constantly advancing technology.
  • Uneven distribution of early generation equipment mixed with new, improved digital INFOSYS.
  • Limited EMS availability.
  • The search for commercial-off-the-shelf products available for use within the INFOSYS architecture.

Meeting these challenges will enable and enhance the conduct of future operations.

Signal planning increases the commander's options by providing the requisite signal planning support systems to pass critical information at decisive times, thus leveraging and exploiting tactical success and facilitating future operations.
FM 100-5


SIGNAL SUPPORT

Throughout all force-projection stages, a paramount need exists for a signal support means to transport information from the sustaining base power-projection platform at CONUS installations, through strategic gateways, to the forward-most warfighters. Signal support requirements to fulfill this task are enormous and vary greatly, depending on the type of military operation.

Mission-Essential Tasks

Information battlespace requires an end-to-end, protected, seamless, multigigabyte information-transfer and processing capability for the warfighter to conduct IO virtually anywhere at any time. This capability must be a multimedia system of systems that transports video, imagery, data, and voice information to create an infosphere that the battle commander can plug-in and pull what he needs to visualize the battle from the current state to a successful end state. The signal support mission-essential tasks to project and construct the infosphere are to--

  • Link the force to the infosphere to achieve seamless global connectivity.
  • Transport information with broadband, high-capacity systems optimizing satellites and terrestrial signal support to connect CONUS, installation sustaining bases (ISBs), and joint operational areas (JOAs).
  • Reach back through strategic entry points to power-projection platforms and information fusion centers.
  • Extend the communication range of battle command operations centers and fighting platforms by providing C4 for mobile operations (C4FMO).

Support Enablers

The enabling objective of signal support to IO is to provide the warfighter the capabilities he needs to obtain and share in near real-time. Signal support requires the total integration of all information management functions into a system of systems or ABCS. ABCS provides knowledge-based information that is adaptable and responsive to the commander's IO requirements. The ABCS has a suite of C4 hardware and software capable of collecting, processing, fusing, managing, transporting, disseminating, displaying, and protecting force-level information (status) and force-level control information (intent, plans, orders). The signal support mission-essential tasks to enable IO are to--

Digitize, compress, and broadcast multimedia battle command information in five categories, using increased bandwidth, high-efficiency transport systems. The multimedia categories control, monitor, alert, inquire, and explore critical information.

Encrypt and provide multilevel information security.

Manage information networks with smart software that dynamically allocates throughput capacity on demand and then routes and disseminates information.

Display via ABCS, a three-dimensional interactive knowledge-based relevant common picture (RCP).

While the core of the twentieth century land warfare has been the tank, the core of the twenty-first century will be the computer.

General Gordon Sullivan, CSA (1993)

FUTURE TECHNOLOGY

As technology advances, the conduct of operations will continue to change. Each advance in information technology will--

  • Help leaders form a more complete picture of the battlespace.
  • Generate the potential for faster, higher quality decisions.
  • Support more rapid maneuver in terms of both time and space.
  • Increase a unit's flexibility and agility.

Nevertheless, technology is only an enabling tool. Quality soldiers and well-trained leaders remain the true centerpiece to successfully planning and operating this increasingly digitized and automated information system of systems. The following examples illustrate where information technology could enable military operations by the turn of this century.

  • Today, tactical radio communications networks exist separately with no automatic routing or interconnection between nets. On the future digitized battlefield, a tactical internet capability will enable direct communications among and between virtually all users. This could enable a whole new level of horizontal integration, coordination, and synchronization that will coexist with the current vertical system (Figure 5-4).
  • Direct broadcast satellites enable wide access to information at various echelons in real time or near-real time. This in turn enables a new level of empowerment and self initiative for lower echelons.
  • Image compression and transmission technologies will allow transfer of images and video from numerous sensors and platforms, enabling better understanding of battlespace for planning, rehearsal, and mission execution.
  • Finally, multimedia technology will enable three-dimensional presentation of imagery and graphics to help commanders visualize their battlespace for more effective training, planning, rehearsal, and execution.
Figure 5-4
Figure 5-4. Horizontal and Vertical INFOSYS

SECURITY

Due to the present and ever-increasing dependence upon automated INFOSYS within the Army, INFOSEC and information systems security (ISS) has become critical. In both war and peace, computer systems and networks on which units rely for logistics, personnel, administration, maintenance, and financial data processing and transfer are vulnerable to attack. Often, the internet is a favorite communication platform for intruders. Gaining access to a unit's computer and communications network can be accomplished by a wide range of methods and techniques. Some of the more common methods include--

  • Inserting malicious software through contractors.
  • Tracking software maintenance changes and system operations activities.
  • Alternating access paths or sniffer devices that trap information about traffic and passwords.

These intrusions may be initiated during peacetime or at any point in an operation. It is even possible that a military system could come from the factory with an embedded logic bomb or virus. In the past, new commercial floppy disks used by government agencies have been found to contain a virus upon delivery from the factory.

Accordingly, security measures and procedures must actively as well as passively preserve the confidentiality, integrity, and functionality of INFOSYS. Protection requirements include near-real-time measures that detect intrusions and alterations, then react and counteract by restoring the INFOSYS needed by commanders to support the military operation. A series of security measures that are facets of an overall C2-protect effort ensure ISS. The three primary security measures are--

  • Procedures for quality assurance.
  • Denial of unauthorized intrusion.
  • Hardening of programs.

Historical Perspective

In 1994 a computer hacker operating from the United Kingdom attacked the Rome Air Development Center at Griffiss Air Force Base, NY, where he compromised the security of 30 systems and penetrated more than 100 other systems before being caught in a 26-day international electronic manhunt. The victims included the South Korean Atomic Research Institute, NASA, the Goddard Space Flight Center in Greenbelt, and the Jet Propulsion Laboratory in California.

The Defense Information Systems Agency estimates that DOD experienced 231,000 incidents, or security intrusions, in 1994. These incidents included destruction of data, modification of data or software, stolen data or software, and shut-down of hosts or networks. Affected DOD functions include--

  • Ballistic weapons research.
  • Inventory and property accounting.
  • Knowledge-based simulation.
  • Payroll and business support.
  • Mail hub for postwide electronic mail.
US Senate Permanent
Subcommittee on Investigations, June 1996

Procedures for Quality Assurance

Quality assurance procedures include configuration control and reduction of inadvertent corruption of both data and processes. In order to protect automated INFOSYS, the first step is to understand the threat against them. Security threats to INFOSYS fall into two categories:

  • Compromise of data and information.
  • Denial, corruption, or loss of service.

Protection Against Intrusion

Protection against intrusion into friendly computer networks is accomplished through denying unauthorized entry into these systems. The vast percentage of intrusion results from human error. Training and OPSEC compliance by system managers, operators, and users are the best measures to combat system compromises. In addition, systems administrators must be able to track down intruders.

Hardening of Programs

In addition to tracking down intruders, system programs should be hardened against intruders' attempts to gain vital information or damage information flow. No protection plan is perfect, and protection/restoration resources are finite. OPLANs and OPORDs specify the priorities of protection efforts.

MANAGEMENT

INFOSYS management consists of prioritizing information in a limited communications environment. The primary purpose of automated and manual INFOSYS is to achieve an information advantage by using and managing information for timely and accurate decision making in any type of operation. The focus of battle staffs is to leverage available technology by employing INFOSYS that give the commander the desired information at the right time and the right place. See Appendix C.

General consensus is that the desire for information by higher headquarters is quickly exceeding the subordinate commander's ability to provide it in a timely manner. Commanders at all levels must carefully define their critical requirements.
CALL Newsletter, July 1994

Management Process

All information that the staff provides is predicated upon the commander's intent, concept of operations, and supporting commander's CCIRs. The CCIRs govern the C4I architecture and its use. The CCIRs define the commander's information needs, thus focusing the staff and INFOSYS support on the rapid acquisition, fusion, and analysis of information that yields knowledge-based operations. The INFOSYS augment routine or periodic reports (established by unit SOPs) with specific requests for information from BOSs or other data bases.

Technical Systems Management

The ABCS spans several systems and requires technical management with similar spans. INFOSYS provide an efficient and rapid means of retrieving information, enabling the battle staff to develop and maintain a single, virtual (or logical) data base that satisfies both current and anticipated CCIRs. This allows battle staffs to continue coordinating, integrating, and synchronizing current and future IO. The ABCS, which works primarily at the SECRET classification level, poses both a technical and tactical INFOSYS challenge.

Technically, the network of ABCS devices function as a seamless whole with redundant paths. Data flow among computers does not require intensive operator action. However, understanding and interacting with the information received is generally a user requirement. The INFOSYS architecture covers the entire battlefield, enabling the command and control of forces. This architecture consists of integrated local area networks (LANs), wide area networks (WANs), and battlefield automated systems integrated into a single, seamless system subject only to the requirements of multilevel security (MLS) as depicted in Figure 5-5.

Figure 5-5
Figure 5-5. Battlefield Architecture Information Integration

INFOSYS allow the commander and his staff to distribute critical information between higher, lower, adjacent, joint, and multinational forces. Voice traffic and data distribution are the primary methods of passing this information. Voice traffic includes user-to-user, conference, and broadcast type of transmission. Data distribution includes formal record traffic (joint message text), informal record traffic (facsimile and electronic mail), system-to-system data, and POS/NAV data.

Technical systems management connects all INFOSYS devices into a multilevel secure network that supports the commander's concept of operation and maintains the correct security levels at each network node throughout the battle. Technical systems management requirements include--

  • Planning the INFOSYS network.
  • Planning communications connectivity.
  • Planning network security.
  • Allocating frequencies.
  • Controlling and monitoring the connection of systems devices to one another and to supporting communications systems.
  • Reconfiguring the network as required by the tactical situation or equipment failures.
  • Maintaining the network.
  • Maximizing network performance.

Tactically, the information flow must support the needs of commanders. Commanders and staffs must have the information they need to plan, direct, control, and coordinate an operation. The information must be secure and readily available. Tactical systems management ensures that information is exchanged inside and outside the unit and made available according to the needs of commanders and staffs to support the tactical plan.

Within each BOS, the information flow, processing, and storage are managed according to the needs of the BOS. Flow, processing, and storage of information among BOSs are collectively managed according to the needs of the overall force-level commander. Tactical systems management includes--

  • Planning information exchanges.
  • Planning data base locations and replications.
  • Planning continuity of operations (including security).
  • Controlling and monitoring information exchanges and data base transactions.
  • Implementing continuity of operations plans as required.
  • Planning for degradation of the network.

Appendix C contains detailed information on INFOSYS planning.

Electromagnetic Spectrum Management

In a dynamic battlespace, each echelon of command must effectively contribute to achieving a state of information dominance. To do so, it uses the EMS for its own purposes, while effectively preventing similar use by an adversary. The EMS is a valuable and finite resource. Controlling it is the linchpin for digitization. Commanders must have a battle staff with knowledge of the EMS.

The J6/G6 or signal officer has staff responsibility for battlefield spectrum management. The spectrum manager under his supervision manages all spectrum use. Major considerations in IO planning include deconfliction of frequencies, development of joint signal operating instructions (JSOI), and development of the joint restricted frequency list (JRFL), as well as all other bandwidth requirements levied by intelligence, C2W, CA, PA, and signal elements. These elements must be balanced to ensure that users maximize the EMS effectively.

Uncontested ownership of the EMS is not guaranteed. However, to gain control of the flow and content of information, units must effectively manage the EMS to reduce the likelihood of electromagnetic interference (EMI). For unopposed entry operations, the status of forces agreement made with a host nation defines frequency provisions and procedures to be followed in all frequency and radio regularity matters. Parts of the spectrum are reserved by nations and other international agencies and therefore are not available for use by the US military.

Where agreements do not exist, coordination of frequency use is made through DOS. The United Nations (UN) recognizes the International Telecommunications Union (ITU) as the specialized agency in the telecommunications field. The ITU allocates the international radio frequency spectrum, registers frequency assignments, and coordinates resolving interference. Forced entry operations create the greatest demands for flexible and adaptive spectrum management. An adversary will use the spectrum as he sees fit, creating potential interference with friendly usage. For example, a television station may interfere with combat net radios, yet the OPLAN may call for capturing the station intact for future friendly use, thereby hindering efforts to eliminate the interference. During initial spectrum planning, planners must consider adversary spectrum usage and management and adapt to events as they unfold.

Communications dominate war; they are the most important single element in strategy.
Mann (1907)



Chapter 6

Planning and Execution

JFCs employ air, land, sea, space, and special operations forces in a wide variety of operations...to not only attack the enemy's physical capabilities but also the enemy's morale and will.
Joint Pub 3-0

The challenge for commanders in the twenty-first century is to operate effectively in a dynamic joint and multinational environment against a wide array of threats. Maintaining the information high ground helps commanders meet that challenge. As full-dimensional operations evolve, information and IO become increasingly important to Army operations as the Army executes missions to deter conflict, to compel opponents, to reassure allies and friends, and to provide domestic support. This chapter discusses considerations for planning and executing IO.

PLANNING

IO planners must consider the conditions that affect the Army as it deploys. They must focus on the principal objective of achieving information dominance, and, in doing so, follow a planning process that applies the components of IO correctly in support of military operations.

Employment Considerations

The IO discussed herein depend on a series of considerations and conditions that affect the force-projection army as it deploys and operates to support joint, multinational, and interagency power-projection operations. Figure 6-1 depicts how IO apply across the spectrum of operations and how the use of the IO components, especially C2W operations, increases in times of conflict and war

Information is the currency of victory on the battlefield.
GEN Gordon Sullivan, CSA (1993)

LEVELS OF WAR

The levels of war--strategic, operational, and tactical--provide a useful framework for ordering IO activities within a commander's battlespace. This framework helps clarify IO activities by echelons within the theater across the full range of military operations. In the theater, all land operations are conducted as part of a larger, integrated, joint, multinational, and/or interagency campaign. Under the direction of the NCA, a unified CINC sets the campaign in motion. The campaign is supported by all elements of national power: social, economic, political, and military. The interconnectivity and interoperability of INFOSYS are the critical elements that tie these disparate sources of power together. As described in Chapter 5, INFOSYS connectivity is a prerequisite to success in this multidimensional environment.

Figure 6-1
Figure 6-1. Employment of Information Operations

Strategic Level

At the national and theater levels, the employment of IO techniques offers a series of strategic options for consideration. The potential for nuclear exchange and major power conflicts in the post-Cold War world is diminishing. Therefore, military options to effectively attack a strategic target--while minimizing the potentially devastating social, economic, and political effects of conventional military use--increase in importance. Army IO offer both a potential deterrent capability and coercive capability at all levels of war.

As with nuclear warfare, nations can engage in IO at strategic, operational, and tactical levels. Similar to nuclear warfare, the effects can be widespread or targeted against a narrow range of hostile capabilities. As with nuclear warfare, nations may eventually develop IO capabilities that are perceived to be principally offensive or defensive. National strategies can be supported by building an IO capability based upon varying combinations of C2-protect and C2-attack and other capabilities. From purely a technical viewpoint, the spectrum of candidate information targets and the range of operational alternatives are virtually unlimited.

US Army force component commanders, in support of national and theater strategic objectives, are responsible for employing the full range of their information capabilities during war or OOTW. As part of a national IO strategy, the Army can be called upon to employ its capabilities to support both direct and indirect actions. Occasions have arisen and will continue to arise that dictate the use of Army capabilities outside a purely battlefield context. The Army component commander has capabilities ranging from PSYOP support to deep battle strikes to contribute to joint warfighting operations.

Information and INFOSYS capabilities inextricably link the traditional levels of war. These phenomena require commanders and staffs at each level to understand the information gathered, where the information is required, and the means or connectivity necessary to deliver and/or receive that information. National-level systems (DOD and commercial) are increasingly capable of supporting and enhancing tactical operations (weather, communications, imagery, navigation). The challenge for leaders is to--

  • First know the information is available.
  • Include the requirements for the information in plans and exercises.
  • Understand how to get the information into a system, unit, or headquarters that provides an enhanced operational capability.

In many cases the connectivity is found through other services or through civilian agencies. For example, the long-haul connectivity during Operation Desert Shield/Storm was augmented by commercial satellite terminals. Systems such as the Army High Frequency Electronic Warfare System (AHFEWS), employed at the strategic or operational level with other joint C2W assets, could diminish an opponent's confidence and will to fight before operations begin. Army UAVs could contribute to the domination of OOTW situations as an initial show of strength before the possibility of hostilities occur. If necessary, they could provide the selected intelligence needed to dismantle an adversary's C2 structure. Combined with deception and PSYOP, these contributors to C2W could erode a potential opponent's confidence in his own forces and conceal the OB and intentions of the friendly forces.

Army component commanders strive to support the joint force attack strategy at all levels in order to commit and employ Army capabilities--including C2W, CA, and PA--to the best possible advantage. As with other military activities, IO need to be coordinated and integrated with the OPLAN and JTF campaign plan and synchronized to achieve decisive results. IO offer the prospect of maintaining friendly C2 and situational awareness at a highly dependable level, while simultaneously degrading an adversary's ability to effectively command and control his forces. Such a combination should create a state of information dominance.

Operational Level

At the operational level, IO occur across the full range of operations and are critical to the success of each stage of force projection. In peacetime, IO support--

  • Deterrence and reassurance.
  • General situational awareness.
  • Operational assessments and estimates.
  • Contingency planning.
  • Training in support of the CINC's planning and preparation activities.

During conflict or hostilities, IO implement C2W activities at each level of war. Continuous engagement in IO helps the commander seize and sustain the initiative and synchronize operational capabilities. This allows the commander to control the tempo of operations so that friendly forces can effectively transition from peacetime to wartime operational environments and situations. During Operation Desert Storm, for example, the coalition experienced information dominance in near real time because the enemy's INFOSYS were almost totally disabled.

The linchpin permitting the operational maneuver of coalition forces in Iraq was the enemy's inability to visualize the battlespace. This enabled an entire US corps to move in relatively open desert terrain for distances beyond 200 kilometers and still achieve total operational surprise. The enemy's information flow had been so disrupted and his surveillance capabilities so suppressed that he could not see the battlefield. The success of that operational campaign depended critically on information dominance. Space sensors, aircraft-borne sensors, ground sensors, helicopter-transported Special Forces teams, and Marine drones combined to give the operational commander an accurate and timely picture of the battlespace.


Historical Perspective

If the Iraqi forces moved in daylight, they were subject to immediate attack by coalition air and surface-to-surface missiles. At night, their movements were detected by superior night- capable sensors. They were then attacked by the coalition's all-weather attack aircraft. Further, their use of broadcast media, coupled with a lack of understanding of the coalition's intent, caused them to base their decision cycle on externally filtered information.


Tactical Level

At the tactical level, commanders usually accomplish their missions through combined arms operations. At this level, IO are often limited in scope. While a tactical-level commander uses all aspects of IO, the focus is often on disruption or destruction of enemy INFOSYS or nodes, primarily through EW and physical destruction. The commander maintains access to his INFOSYS through OPSEC, ISS, and EP. Other applications include--

  • Planning and executing C2W.
  • Projecting and constructing the infosphere.
  • Protecting friendly information.
  • Establishing and maintaining user access to battle command information via ABCS.
  • Enabling IO and battlefield visualization.
  • Collecting and producing RII.
  • Attacking the enemy's C2 system.

Information dominance is a temporary tactical condition achievable through a deliberate process. It entails the construction and protection of the information environment, collection of intelligence and relevant information, processing and dissemination of such information, and focused attack against both the enemy's C2 and his eyes and ears. Information dominance facilitates superiority in battlefield visualization at a specific time and place, creating a window of opportunity that is fleeting at best. The commander must seize the opportunity to gain the advantage through effective battle command. Two features are essential to this process: CCIR and tempo.

  • Commander's Critical Information Requirement. The commander must control information, or he runs the risk of being overwhelmed or disoriented by it. CCIR can control the glut of information and separate the true signals from the noise. CCIR cannot be a fixed concept. Like IPB, it must be precise to ensure responsiveness and dynamic to survive.
  • Tempo. The tempo is the time devoted to the tactical decision-making process. Execution must be dramatically compressed. But, because the information dominance advantage is achievable through deliberate action within a specific battlespace, battle command can be better synchronized, resulting in the creation of opportunities that lead to success.

Tactical units, both maneuver and CSS, participate in IO directed by higher headquarters. In some operations, tactical units perform targeting--striking C2 nodes, deception, reconnaissance and surveillance, and PSYOP activities focused on supporting an overall theater-level IO. They are also linked to the layered information environment via a CMOC or the PAO. For example, CMOC connectivity to local governmental, cultural, social, and economic institutions can provide a wealth of information supporting military operations. The PAO facilitates media relations and contact to support friendly forces.


Historical Perspective

One of the earlier applications of C2W was demonstrated during the American Civil War. From the beginning, telegraph lines became an important target of cavalry raiding parties from both sides. Since the Union forces were more extensively equipped with telegraphic systems, they were more vulnerable. This vulnerability was exploited by Confederate troops.

Among the more innovative soldiers were the telegraphers attached to Confederate cavalry commands. Their specialists, who were also qualified as flagmen, rode in the lead as Confederate cavalry units raided Union territory. They switched military traffic to the wrong destinations, transmitted false orders to the headquarters of Union commanders, and cast suspicion upon all orders that came by wire. When they had finished the job, they cut all the wire in sight and took home with them as much as they could roll up in a hurry.


With an expanded vision, tactical field commanders anticipate potential threats of disinformation, enemy PSYOP, and rumors within their command, as well as the potential backwash of public information into their battlespace. Establishing an effective internal information program enhances the morale of soldiers, reinforces the stated unit mission, and supports accurate media reports for both soldiers and their families.

RESTRAINTS AND CONSTRAINTS

An increased awareness of how operations shape and are shaped by the MIE is necessary as commanders and staffs plan, prepare, and execute IO. Because information can and will be interpreted differently by any number of individuals or groups, military operations can affect the economic, political, and social fabric of individual lives, organizations, and nations far beyond the scope and intent of the military operation. This reality creates a dynamic set of restraints and constraints that impact military operations.

Asymmetrical or hybrid operations are the norm as tailored forces are assembled to meet a wide variety of needs. Accordingly, different levels of modernization are found within the army, among joint or interagency task force members, and between US and coalition forces. Disparities in information and communications technology threaten continuity and interoperability. Information capabilities can offset these variances, providing the force and the connectivity needed to operate effectively.

Statutory constraints, international law, federal regulations, and rules of engagement (ROE) may limit a commander's options regarding IO. Laws and regulations, such as those governing the use of the frequency spectrum, public information, PSYOP, and espionage, provide examples of free access to information and INFOSYS and are intended to prevent misuse or abuse of these activities. IO may be further constrained or further enabled as new laws, rules, agreements, and protocols are established and as the international community adjusts to the impact of the information explosion.

Simple interference, willful manipulation, and corruption or destruction of data bases or INFOSYS, to include space-based systems, have become increasingly active and sensitive activities. The information web and its continuity or disruption has implications far beyond the military environment, into economic, political, and social dimensions. Competition for the EMS, space-based data systems, communications networks, and webbed computer networks all set the stage for potential interference, both intentional and unintentional. Collateral damage gains new meaning in this environment. The potential for the civilian population to be directly or indirectly affected is present and growing.

The laws governing the information environment and the law of land warfare are the guidepost, and every soldier is responsible for preventing violations. Close coordination with the supporting judge advocate is critical to assuring compliance with applicable restraints and constraints. As the Army moves into the Information Age, the features of the battlespace continue to change, and the means and methods of conducting all types of operations also change. Success in any operational environment depends on leadership, discipline, morale, and professional training.

Today's operations increasingly depend on intelligence and INFOSYS from tactical through strategic levels to provide critical information on all aspects of the friendly and enemy situation. The seamless and horizontal flow and integration of information provides valuable operational data to support planning and battle command. While the fog of war has thinned, it will never completely disappear. The commander will always face some uncertainty on exact enemy force dispositions, OB, and operations in general, not to mention some degree of uncertainty about the enemy's intentions. That uncertainty will be compounded by artful opponents (military or otherwise) and exacerbated by the consequences of unintentional actions or influences from other sources within the commander's MIE.

Information Dominance

The principal objective of IO is to gain information dominance--a relative advantage between the friendly commander's decision process and that of the adversary--and to use that advantage to enhance and enable the elements of combat power. IO are an essential foundation of knowledge-based, combined arms warfare. Likewise, full-dimensional operations require integrated IO.

BATTLE COMMAND

Army operations are profoundly affected by information and IO in the critical function of battle command. Although battle command remains principally an art, it relies increasingly on the ability to process information and move it rapidly to critical points in the operational area. To achieve the required level of information dominance, the Information Age commander treats IO as he would any other critical element of combat power, by providing guidance and direction to his staff and his subordinate commanders.

The commander's personal involvement in the development of the CCIR makes it the principal vehicle for ensuring that his battle command information needs are met. Advances in information technology have made decision making and control of units more technical and quantifiable; yet much of those functions remain well within the realm of art, not science. The commander understands that he will never have all the critical information he wants, when he wants it, and that leading soldiers and units to success will remain largely in the realm of art. Accordingly, he employs IO to retain an information advantage over his opponent.

Digital technology enhances C2. It allows the Army to have previously unimaginable amounts of accurate and reliable information. It allows higher commanders to have detailed knowledge about events several echelons below. At the same time, it gives subordinates more information about the bigger picture and about what is happening in other areas of the picture. Based on the RCP, commanders are better able to continuously, and in near-real time, integrate combat power.

Technology and time do not change some aspects of battle command. Commanders and staffs will continue to make judgments based on less than perfect information. Likewise, they will have to inspire soldiers to perform their duties in the face of fear and fatigue. Commanders will continue to mold units to levels of high performance through training, chain-of-command development, personnel management, morale, and a positive command climate.

Elements

The three basic elements of battle command--leadership, decision making, and controlling--are characterized by both continuity and change.

Leadership. The commander's leadership continues to provide purpose, direction, and motivation to soldiers and units. Leaders will be better equipped to make informed decisions but will operate within a philosophy that will not change.

Decision Making. Decision making is facilitated through much-improved information technologies, maintenance of a relevant, common picture upon which to base decisions, and improved decision-making skills of leaders.

Control. Control is facilitated by better communications, to include video broadcasting and private links, new position locating and reporting technologies, greater situational awareness, remotely shared electronic maps, automated decision support aids, and other information technologies and procedures.

Challenges

The challenges for leaders are to provide purpose, direction, and motivation to forces operating over greater spaces, under greater time pressures, and amid more complex situations. Specific implications of IO as they apply to the commander's art include the following:

  • Identifying, conceiving, and communicating the unit's purpose remains a complex art. This is largely the commander's domain. Understanding the mission, the intent of the next two higher commanders, and the concept of operation of the parent organization may be easier with improved communications, but the restatement of the mission, the formulation of the intent statement, and the issuance of planning guidance are still functions the commander must perform himself.
  • The current doctrinal approach of mission orders, or decentralized decision-making, is not anticipated to change. The ability to communicate with remote commanders and staffs by video conference and by other electronic means does not eliminate the commander's need to provide implicit direction to subordinates. Information technology enhances the effort by providing a RCP across the BOSs and functions in near real time. During critical actions the commander focuses most of his attention and decision making on the main effort. Therefore, relying on his subordinates to act within his intent and concept is vitally important.
  • Commanders need to motivate their soldiers, as well as their staffs and others, to accomplish difficult tasks under dangerous, trying circumstances. Commanders will continue to inspire and mentor subordinates through face-to-face communications and physical presence. Although it may be difficult, commanders still need to position themselves where they can see the battlefield and where soldiers can see them. Commanders establish interpersonal relationships with their staffs and subordinate commanders. Commanders also contribute to unity of effort by establishing personal relationships among and between commands to foster mutual trust, cooperation, open communications, and teamwork in both national and multinational operations. Commanders remain the leaders that all members of the organization look to for timely decisions and informal feedback.
  • Uncertainty will always exist. The commander may know what the enemy is doing at the moment, but will rarely know why. Sound command judgment is required to determine what the enemy may be doing tomorrow. In addition, no matter how well the commander knows the status of his forces today, he needs to make judgments about what their condition may be tomorrow. Unquantifiable information and information gaps will remain. No matter how much information the commander gathers before making a decision, uncertainty will remain.
  • The ability to process information through risk management enables commanders to avoid unnecessary risks. Identifying, analyzing, and selecting control measures to manage risks gives commanders maximum force protection.

STAFF RESPONSIBILITIES

To facilitate IO, the commander establishes staff responsibilities for planning and execution. OOTW present unique challenges due to the heavy involvement of the media and other players in the GIE. The staff must consider the actions and reactions of US and foreign governmental and nongovernmental agencies, PVOs, and the media when planning operations. Depending on the situation, IO planning can be a complex undertaking or a relatively routine staff function. The commander's IO cell, however organized, draws upon selected expertise throughout the primary and special staff, with liaison and possibly augmentation from subordinate commands. A number of techniques and a variety of arrangements are available to accomplish these responsibilities.

Staff Members

Current staff members can integrate IO actions into the operation. This approach uses current staff procedures, processes, and techniques to plan, coordinate, and synchronize IO with the operation. The likely choice for the nonmodernized or partially modernized force is to designate a staff representative to supervise these actions.

Process-Oriented Group

A process-oriented or ad hoc task group, led by the J3/G3, can integrate and synchronize IO actions. This approach is similar to that used for targeting and deep attack. This too is a viable approach for the partially modernized force or nonmodernized force entering a complex combat or noncombat environment where a number of IO capabilities and or threats exist. Appendix D provides a notional IO structure at Figure D-1.

Information Operations Battle Staff

A dedicated IOBS can be formed to integrate IO actions. This approach would apply to partially and fully modernized forces. The battle staff would consist of all staff members with a functional responsibility within IO, such as signal, fire support, PA, CA, OPSEC, EW, PSYOP, and battlefield deception. Figure D-2 of Appendix D illustrates a notional IOBS.

J3/G3 Staff

Since IO are only one facet of the larger operation, albeit an important one, the J3/G3 is the primary manager of information. He outlines and monitors the performance and responsibilities of the staff in processing information to support IO and the knowledge flow. The J3/G3 ensures that the staff collects, analyzes, and presents information that fulfills the CCIR. Specific requests for information from BOSs or other information source data bases are generated to fill specific needs. Routine or standard reports to the staff (established by unit SOPs) are used when information requirements remain stable through operations.

The J3/G3, within his overall staff responsibility for integrating IO into the OPLAN, usually designates one individual accountable for all IO actions. Key staff members participating in IO coordination and integration include intelligence, signal, fire support, PA, CA, EW, deception, OPSEC, PSYOP, and logistics personnel. In peacetime operations, the G5, PAO, and specialized staff, such as the SJA or chaplain, participate in IO planning and operations. Even as the role of PA expands, a separation between PA and PSYOP functions must be preserved to maintain the credibility of PA spokespersons and products. While essential coordination between these staff functions may be accomplished through the IO cell, the IO cell PA representative should not also serve as the primary command spokesperson.

Army Land Information Warfare Activity

C2W requires the commander to develop and sustain staff members who are technically and operationally proficient in C2W. Maintaining C2W staff proficiency is a complex undertaking, demanding extensive training, education, and experience with other services, agencies, and joint commands. To enhance the capability of the Army component to conduct IO, Department of the Army established the Land Information Warfare Activity (LIWA). LIWA acts as the operational focal point for land IW/C2W by providing operational staff support to active and reserve component land component commanders (LCCs) and separate Army commands.

LIWA field support teams (FSTs) are tailored to fill the specific needs of a component commander and are specifically earmarked to that land component command. Team members consist of a need-driven mix of PSYOP, deception, OPSEC, EW, and intelligence specialties, along with members of other service components, if required. LIWA FST members support the LCC's staff as it plans, coordinates, and executes IW/C2W in joint and multinational environments.

LIWA FST supports commands ranging in size and capability from a numbered Army headquarters to a corps or division when these tactical commands are designated the land component of a joint task force. Appendix B provides information on LIWA support and services.

What separates good units from not so good units is the way the unit processes information.
General Donn Starry, US Army (1978)

Planning Process

The IO planning process consists of five basic steps that apply across the three components of IO (operations, RII, and INFOSYS).

MISSION ANALYSIS

The first step of the process begins as the commander analyzes the mission, formulates his overall concept of operations, and considers how IO can contribute to achieving his mission. Under the direction of the J3/G3, the staff analyzes the command's mission and concept of operations to derive a concept of IO. Simply put, "How can IO support the mission?" The staff must consider both C2-attack and C2-protect. Flexibility is essential, as IO support may shift over the course of the overall operation.

During analysis, the staff examines enemy and friendly INFOSYS within the context of the commander's MIE. The staff determines the capabilities both sides require to operate effectively. It also sets out the requirements and conditions needed to establish information dominance. The staff considers nonmilitary INFOSYS influences or capabilities beyond traditional military control--such as local or regional communications networks, radio, television, computer networks (internet or worldwide web), and the news media--that may influence the operation. The examination produces a list of critical nodes and vulnerability analyses.

  • The C2-attack analysis identifies adversary C2 systems of C2W interest and determines the critical C2 and C2-attack nodes in those systems. The C2-attack focus increases payoff by identifying key target vulnerabilities for offensive action.
  • The C2-protect analysis focuses on the adversary's capability to detect, locate, and attack critical friendly C2 nodes to disrupt the friendly decision-making process. As with C2-attack, intelligence plays a major role by providing information on adversary sensor capabilities, target selection, and attack means. The staff considers the physical destruction, jamming, and intrusion, as well as deception and PSYOP means available to the adversary. The product is a list of critical, vulnerable nodes and processes that must be addressed by C2-protect.

PRIORITIZATION

The second step is to prioritize both friendly and enemy critical nodes and vulnerabilities. This part of the process develops potential targets for C2-attack and C2-protect and ensures deconfliction of their integrated effects.

For C2-attack purposes, nodes critical to more than one adversary system may have a higher priority. Vulnerability may override criticality, with more critical nodes that are less vulnerable receiving a lower priority. Priorities should be balanced and shifted between C2-attack and C2-protect as required to support the unit mission. The C2-attack product is a prioritization of the list of critical, vulnerable adversary targets from earlier work. Similarly, C2-protect targets should be identified in terms of criticality and vulnerability, then prioritized.

CONCEPT OF OPERATIONS

The third step of the process is the formulation of an IO concept of operations to influence the adversary's C2 while protecting friendly C2. The G3/J3 reviews his sets of potential C2-attack and C2-protect targets. He assesses available IO capabilities to develop an IO concept of operation that best supports the overall operational mission and is synchronized with the overall concept of operation. Synchronization of IO, both internally (among the five C2W elements and CA and PA) and externally (across the BOSs), is absolutely critical for achieving decisive C2-attack and C2-protect results. The impact of proper synchronization is to focus the effect of the entire range of friendly capabilities to achieve maximum effect at the decisive point in time and space.

Although the situation dictates the critical areas for the operation, the commander and staff consider these specific areas in planning:

  • Operations--both C2-attack and C2-protect objectives from a friendly and enemy perspective. The basic OPLAN/OPORD and the C2W annex synchronize physical destruction, EW, OPSEC, deception, and PSYOP to maximize C2-attack and C2-protect. Many C2W activities can have the effect of maximizing protection while degrading adversary C2 capabilities. Other influences in the commander's information battlespace can directly impact mission success, for example, the media, governmental and nongovernmental organizations, local or regional social/cultural influences, perceptions, attitudes, and opinions.
  • RII requirements.
  • INFOSYS support requirements.

The battle staff considers all these factors to arrive at an IO concept of operations. The concept is oriented on establishing information dominance in order to give the force dominant battlespace awareness and control of the MIE. A critical tool in developing an effective concept of operation is the synchronization matrix. The synchronization matrix is designed to array time-phased objectives along a horizontal axis against performing units usually organized by BOS along a vertical axis. Within the framework of the matrix, critical tasks that must be performed to achieve the IO objectives are identified, aiding the planner in recognizing the interrelationship between specific tasks and actions and the need to orchestrate them in a manner that maximizes the impact of their execution. See Figure 6-2 for an example of an IO synchronization matrix.

Figure 6-2
Figure 6-2. IO Synchronization Matrix

EXECUTION

Execution begins with tasking those elements that conduct IO missions. The G3/J3 controls and directs both the IO planning and execution phases of the process, with support from the G2 and IO element specialists on the staff. The keys here are--

  • Selecting the best C2-attack capability for the best effect (deny, influence, degrade, destroy).
  • Synchronizing the application of effects to reinforce the five elements of C2W, CA, and PA capabilities (not allow them to conflict). Similarly, protection of C2 nodes needs to be tasked to available means and/or additional protective tactics, techniques, and procedures (TTP) adopted by the force.

IO taskings normally become part of the basic order paragraph 3 concept of operations and coordinating instructions. Additional IO details are covered in a separate annex that consolidates applicable IO/C2W into one coherent operational discussion. When a separate IO/C2W annex is written, it should include an IO/C2W synchronization matrix that establishes time lines, responsibilities, sequence of actions, and desired effects.

As planning and execution take place, planners should consider a number of factors beyond strict combat capabilities. These include--

  • The opportunity cost of an action--that is, what is the trade-off between attacking or destroying an adversary's capability now or exploiting that capability for future gain? As an example, destroying key C2 facilities may give the operational commander freedom of action by denying the enemy effective C2 of his forces. However, the opportunity cost of this action would be to deny national signal intelligence (SIGINT) systems a valuable link to the opponent's NCA. Therefore, the national command level would lose information about the adversary's national-level intent and resolve. Similarly, destroying an air defense network may give the tactical commander local air superiority, but it may also eliminate the only means the operational-level commander has to track or identify enemy formations.
  • Legal and policy restrictions and ROE--in order to understand their impact on the linkage between the levels of war. Target planners are required to know the ROE as well as the laws and policy governing the attack of certain persons, places, or things. How does the commander deal with the commercial computer network, the local/regional phone network, or the cellular data net that not only supports the military effort but also the civilian population, commerce, and industry? Other considerations include when and what information to release to the media, NGOs, and PVOs.

Planners must be aware that the counter-IO the adversary launches will likely target US civilian infrastructures. The mere threat of such actions may also generate significant effects, both real and psychological. For example, an adversary's announcement claiming the insertion of a virus into a particular banking institution's computer operation could trigger a panic with major economic repercussions, regardless of the adversary's actual execution of such an attack.

FEEDBACK

The fifth step is to set up a monitoring and feedback mechanism. A continuous damage or effects assessment process is critical in order for the commander to revise his continuing estimate of the situation and adjust operations. See Appendix A to develop C2W and IO-related planning products. The five-step planning process is illustrated in Figure 6-3.


EXECUTION

The force-projection cycle is an excellent framework to discuss how to execute IO. The packaging, timing, and employment of key IO activities is essential to attaining and maintaining information dominance in conducting operations across the full spectrum, to include OOTW.

Figure 6-3
Figure 6-3. IO Planning Process

Force-Projection Operations

Our post-Cold War National Military Strategy calls for a primarily CONUS-based Army--one that is capable of rapid power projection on short notice to any region of the globe to decisively defeat a regional adversary. These force-projection operations follow a general sequence of stages that often overlap in space and time. IO considerations and actions apply to all force-projection stages. They focus on ensuring information support to battle command during all joint, multinational, and interagency operations and effective intervention against the adversary's C2.

In many situations, GIE organizations will be present in the AOR before Army forces arrive. They will often be well-entrenched, with an established logistical framework and long-standing coordination and liaison arrangements. For example, initially the media may know the AOR better than the military. As it covers the buildup, the media gains a thorough understanding of and forms its own perspective about the situation, particularly in OOTW. The projection of Army forces into the situation is of national interest, with national and international media watching from the moment forces arrive. CA and PA personnel need to deploy early to support the commander and the force in their interactions with these organizations. CA and PA operations not only reduce the potential distractions to a commander but also educate these organizations and facilitate their efforts to provide accurate, balanced, credible, and timely information to local officials and agencies, as well as external audiences. Some unique considerations apply for force-projection operations and OOTW.

The friendly communications infrastructure provides the means to integrate C4I capabilities starting from the installation power-projection platform with reach-back capabilities while en route, during initial entry, during buildup, throughout the operation, and during redeployment. The variety of conditions under which the Army is employed in the Information Age requires close IO coordination, integration, and synchronization from the strategic to the tactical level. Figure 6-4 outlines this concept. Force projection, supported by IO, is continuous and seamless and compresses time and space.

MOBILIZATION OPERATIONS

Mobilization is an information-intensive operation. Once mobilization is declared, the unit's activities include assembling personnel, checking readiness factors, and time-phasing operations to meet force deployment schedules. IO assist in synchronizing arrival, processing, certifying, and moving to final points of departure. The Army depends on information management resources in its sustaining base to accomplish the mobilization process. These resources include--

  • The Standard Army Management Information System (STAMIS).
  • FORSCOM's Mobilization Level Application Software (MOBLAS).
  • TRADOC's Reception Battalion Automated Support System (RECBASS).
  • DOD INFOSYS such as the Defense Joint Military Pay System (DJMS) and the Defense Enrollment Eligibility Reporting System (DEERS).
Figure 6-4
Figure 6-4. Army Force-Projection Cycle

Most of these systems depend upon the NII for their operation. Many run on standard commercial platforms such as personal computers (PCs), reduced instruction set computing (RISCs), or mainframes. The systems could be expanded or enhanced during a crisis. Their dependence also underscores the importance of engaging the interagency process to help secure the NII from possible attack or compromise.

Intelligence activities during the mobilization phase focus on collecting intelligence on probable operational environments and potential adversaries. The staff performs the initial information-based IPB during peacetime.

C2W activities during mobilization are predominantly concerned with protecting information. Upon mobilization, protection of information is included in the commander's recall and assembly plans. C2-protect measures protect the availability, integrity, and confidentiality of unclassified and classified information necessary to support mobilization operations. During this stage of force projection, bits of information conveyed in nonsecure public and military radio transmissions, news releases, friendly conversations, telephone calls, trash, and so forth, permit news media personnel or hostile intelligence analysts to piece together US intentions and capabilities. OPSEC and INFOSEC aid the commander in preventing adversaries from collecting information of intelligence value.

PREDEPLOYMENT OPERATIONS

Commanders establish objectives and unit requirements to set the stage for predeployment activities and seek to preserve friendly assessments and decision-making capabilities. IO integrate the elements of C2W to mask deployment and enhance deception operations. Plans include--

  • Engagement of the adversary's INFOSYS.
  • Identification of tasks, C2W target sets, specific procedures, and coordinating instructions--all displayed within a detailed IO synchronization matrix.

These steps ensure the implementation of IO and set the stage for ongoing military actions.

PA operations during predeployment contribute to establishing conditions that lead to confidence in the Army and its readiness to conduct operations while remaining attentive to OPSEC and INFOSEC. As units are identified for possible or actual mobilization, public and media attention increases dramatically. PA operations contribute to a reduction in rumors, misinformation, and uncertainty on the part of soldiers, family members, and the public.

During the predeployment phase, tactical INFOSYS continue to be used less than fixed military and civilian systems for routine actions during predeployment. Military systems that link operational and strategic echelons, such as the DISN and the Defense Switch Network (DSN), are the primary dedicated military systems used. Intelligence, logistics, and operational planning require extensive coordination with outside agencies, other services, and so forth, to provide the data required.

Intelligence activities continue to revolve around establishing an adversarial data base and an information-based IPB. Component commands require national intelligence and weather data to support detailed planning. Before deployment, the commander's staff should develop CCIR, PIR, CMO, and RISTA plans.

C2W actions continue to focus on protecting information through exercising OPSEC procedures. With the support of the higher joint headquarters, as augmented by LIWA, C2W planners consider offensive actions to establish information dominance once the force begins to deploy. Close coordination with PA personnel is required during deception and PSYOP planning to maintain OPSEC and ensure such efforts are not targeted against friendly audiences and, most importantly, US, allied, or coalition media.

PA develops assessments for current and future operations. Planning continues for appropriate media inclusion (journalists accompanying units). PA implications of all aspects of the operation are considered to include media attention and public response. Synchronized PA programs contribute to increased soldier understanding, confidence, dedication, discipline, will to win, and public confidence in the Army. PA efforts focus on protecting and enhancing the public support of gravity.

DEPLOYMENT OPERATIONS

IO are necessary to establish the conditions for deploying forces into an AO. Deploying forces require near-real-time joint and/or interagency communications tailored for rapid deployment, en route operations, and links from strategic through tactical levels.

During the deployment stage, staff planning functions intensify. Contingency plans (CONPLANs) and PIR are updated, completed, or adjusted. Commanders and staff planners tap into joint and interagency planning systems and data bases, such as the Joint Operations Planning and Execution System (JOPES) and the Army Mobilization and Operations Planning and Execution System (AMOPES), to determine lift asset availability and sequencing. Intelligence requirements and assessments are continually monitored and adjusted. As forces begin deploying, commanders plan for the impact of force separation and reduced information support through low-capacity systems. They adjust their CCIR to those most critical to maintain situational awareness, training readiness, and mission accomplishment.

INFOSYS requirements for deploying forces demand home station, en route, and intertheater/intratheater communications that are secure, flexible, and deployable. These INFOSYS must be capable of interoperating with joint forces, civilian agencies, and multinational or coalition forces. INFOSYS support mission planning with multiple continuous intelligence and logistics links to the deploying/deployed force, home station, major commands, logistics agencies, and national and joint intelligence sources.

Deploying forces are highly dependent on CONUS-based intelligence, such as imagery and weather, derived from national or theater-based sensors. The forces require assured and survivable communications to numerous agencies. During deployment, echelons above division execute most of the C2W actions such as deception, PSYOP, and continued OPSEC.

ENTRY OPERATIONS

IO are necessary to establish the conditions for successful early entry. IO capabilities are deployed into a contingency area with a focus on their ability to gather the information required by the commander while denying the enemy use of his information and IO capabilities. Early entry operations vary by region and mission. In both unopposed and opposed entry, counter-RISTA operations are essential. Air and missile defense is key to successful counter-RISTA operations during the early entry period when forces are most vulnerable. Air and missile defense systems negate enemy airborne RISTA, EW, and C2 platforms while simultaneously protecting key geopolitical assets and the force's critical nodes from air and missile attack.

Unopposed Entry

Unopposed entry allows for greater use of IO capabilities. Early deploying assets focus IO on the adversary to support forward presence or host nation (HN) forces. Early entry forces rely on split-based communications with CONUS-based elements for most of their intelligence and communications support. Although HN or commercial systems may be available, planner awareness of statutory requirements regarding their use is essential.

Opposed Entry

When entry is opposed, commanders may have to rely on a limited number of INFOSYS to get the information they need to accomplish the mission. Because information requirements may well overwhelm the capability of available assets, commanders must clearly prioritize their information needs to best focus the use of these limited capabilities.

Working within the joint IW/C2W plan, army commands employ their C2W capabilities to satisfy assigned tasks. Successful opposed entry operations can be significantly enhanced by denying the adversary use of his INFOSYS through employment of C2-attack assets. C2-attack could include deceiving or overloading the adversary's INFOSYS and disrupting his use of the EMS.

DECISIVE OPERATIONS

Commanders visualize the battlespace and develop operational concepts that use common situational awareness and the ability to rapidly and accurately move information about the battlefield. The IO capabilities available to the unit permit surprise and the decisive defeat of the adversary from dispersed positions. Defeat of the enemy is usually accomplished most effectively by countering enemy strengths with dissimilar (asymmetrical) systems and methods. Units begin to conduct offensive C2W operations. This requires friendly commanders to exercise increased control over the tempo of battlefield activities. Tactical commanders leverage their information superiority to employ weapon systems, including joint assets, and to regulate the nature and tempo of enemy actions.

To optimize the flow of essential information, commanders prioritize their information requirements through CCIR and SOPs. The IOBS, however constituted, ensures that C2W, PA, and CA are integrated into the commander's concept of operation. This is accomplished as the G3 integrates his IO assets into the operational scheme to get the best possible picture based on the commander's intent. Moreover, the G3 leverages organizations and assets from the GIE, that is, joint and national intelligence assets, to complete the IPB mosaic. Often, the assets available are less than those needed to perform the desired IO. The commander provides the focus to prioritize these IO assets. Constant monitoring of enemy and friendly IO status ensures this information is included in situation updates, IPB, and the commander's RCP of his battlespace.

Media and public attention is usually more intense during this phase. PA operations include media facilitation, advising the commander on PA implications of the operation, as well as providing for internal and external audience information needs. PA personnel review strategic and operational information with PA implications, coordinate with CA and PSYOP, and facilitate releasable information.

Unity of effort and massing of combat power effects are enabled by enhanced information flow, both vertically and horizontally, among commanders and staff members and supported by military INFOSYS. Tactical units employ military information to fully integrate the systems, capabilities, and functions of the combined arms team into the conduct of decisive operations. Control of decentralized maneuver and engagement is achieved by optimizing the enhanced situational awareness and communication provided by digital connectivity. This ability allows tactical units the opportunity to avoid adversary strengths and detection means while moving into the most advantageous positions to permit the destruction of the enemy force in both offensive and defensive operations. Units exercise the capability to focus and mass the effects of indirect fires against the adversary and to synchronize their effects with maneuver. By employing highly maneuverable artillery, aviation platforms, suites of digital sensors, and intelligent minefield systems, maneuver units establish quick-fire sensor-to-shooter links that acquire, strike, assess, and restrike enemy targets at a high rate and level of lethality.

Enhanced situational awareness and communications capabilities allow the maneuver commander to conduct decisive strikes within the enemy depth by employing both organic and supporting fire systems. Commanders use C2-attack to destroy, disrupt, and exploit enemy INFOSYS. By providing the RCP at all echelons, IO facilitate the synchronization of all combat power across the BOSs. In conjunction with air and ground battle plans, commanders must select the proper vulnerable nodes and know whether to destroy or merely disrupt them and when to exploit through C2W.

Available IO assets may dictate the arrangement of forces on the ground. Coalitions may be formed with armies that have varying IO technical capabilities. Intelligence can be used to ensure the validity of target nominations, while the C2W planning process can ensure that the appropriate response is directed against that target.

Our present theory is to destroy personnel, our new theory should be to destroy commands. Not after the enemy's personnel has been disorganized, but before it has been attacked, so that it may be found in a state of disorganization when attacked.
Extracted from J.F.C. Fuller's memorandum
"Strategic Paralysis as the Object of the Decisive Attack," May 1918

TERMINATION AND POSTCONFLICT OPERATIONS

IO enter a new phase upon termination of hostilities. The aftermath of war could leave a significant dislocation of the infrastructure and population in the area of conflict. The potential for renewed conflict should not be discounted. In these circumstances the protection of information by OPSEC, the hand-off of military information to other nonmilitary organizations, and even the continued collection of new information may become necessary. Certain military information is protected, while other military information is required to be released publicly to prevent further bloodshed and permit resumption of normal life. Conscious decisions in the orchestration of these competing demands exist as IO continue. For example, the presence of minefields and their location should be released to all parties to prevent civilian causalities.

Dislocations and damage following combat generate requirements for new information. Monitoring, relocating, and providing humanitarian assistance for displaced persons is as much an information problem as it is a logistical one. Destruction of physical infrastructures may dictate that for humanitarian reasons the US leave particular items of equipment in place that would otherwise be redeployed. Such equipment may include temporary bridges that replace destroyed ones, radio broadcast band transmission equipment, and electrical generation or water purification equipment. Information is critical in making these decisions. Further uses of such information are required to adjust Army data bases and unit readiness affected by these actions.

When combat operations bring an end to the conflict, deployed forces transition to a period of postconflict operations. The transition to postconflict operations can occur even if residual combat operations are still underway in parts of the AO. Therefore, adjustments to IO must be anticipated and planned to ensure a smooth transition during the critical period after the fighting stops. IO adjustments during postconflict operations focus on providing support for restoring order, reestablishing the HN infrastructure, preparing forces for redeployment, and continuing a presence to allow other elements of national power to achieve strategic aims.

The transition plan for postconflict operations prioritizes and plans for information requirements and required connectivity to support civil administration mission activities; CMO such as civil defense, humanitarian assistance, and populace and resources control (PRC); and unified planning with DOS, NGOs, PVOs, and HN officials and agencies. CA personnel are uniquely qualified to advise the commander on these activities that reduce postconflict turmoil and stabilize the situation until international relief organizations or HN agencies assume control.

Postconflict operations require close coordination between PA elements and those conducting CMO to ensure consistent, accurate dissemination of information. Internal information programs aid the transition to redeployment and reconstitution by reducing rumors and uncertainty. IO transition planning addresses the smooth retrograde of assets from the theater of operations, while considering the possibility of renewed hostilities. Tactical and mobile information assets should be replaced as soon as possible by the fixed communications and information infrastructure of the HN. Part of this stage may include transition of INFOSYS and operations to DOS, PVOs, NGOs, the HN, or other agencies that represent nonmilitary options to support HN rebuilding. Planning begins at this point for support of the redeployment of friendly forces and continued reconstitution of assets destroyed in the conflict or retained by the HN.

REDEPLOYMENT AND RECONSTITUTION

Normally, reconstitution and redeployment actions occur in a benign regional environment; however this is not always the case. Sensitivity to the effect information has on the population remains a concern. PSYOP and CA may be used to gain and continue support of the population. Information about Army operations and CMO can be disseminated through local, national, and international media. PA operations do not focus on directing or manipulating public opinion, but on providing accurate, timely information about operations. PA personnel take action when necessary to counter misinformation communicated via the GIE.

Intelligence collection may focus on nonbattlefield aspects of the current environment and the potential for new threats or adversaries to emerge. Commanders must remain sensitive to the potential vulnerability of critical nodes or systems to renewed adversary operations and be prepared to shift to alternative means if necessary.

In this stage, IO support the redeployment of assets no longer needed or needed for another mission elsewhere. Commanders plan and prioritize their IO to allow a smooth transition for redeployment. Postconflict requirements have a direct impact on the redeployment flow. INFOSYS must integrate contractor and HN asset capabilities into the redeployment flow.

Units must be rapidly reconstituted to premobilization levels of readiness. To ensure rapid replacement and refitting for new missions, units must identify lost or incomplete equipment because of the high probability of some information assets being left in theater or not yet replaced by the logistics system. Commanders must continue to emphasize INFOSEC during redeployment operations, especially in the event of ongoing hostilities.

Operations Other Than War

Military operations other than war usually involve a combination of air, land, sea, space, and special operations forces as well as the efforts of governmental agencies and nongovernmental organizations in a complementary fashion.
Joint Pub 3-0

Army forces face complex and sensitive situations in a variety of OOTW. These range from supporting near hostilities in peace enforcement and peacekeeping operations; through drug interdiction, nation assistance, and humanitarian assistance; to support for US state and local authorities responding to natural disasters or civil unrest.

The primary tool for mission accomplishment in conventional military operations is the use of force directed against an adversary. In OOTW, however, such a threat may not be present or may not be clearly defined. The threat in these environments may be rogue elements, thugs, or even the adverse effects of the environment or a natural disaster. Hence, commanders employ a wider range of methods in less conventional ways that involve many more players to accomplish the mission. As such, IO capabilities to support the assigned missions may become essential for success. IO may be one of the most critical and acceptable means of achieving the assigned objectives because ROE may severely restrict the use of conventional military weapons.

In OOTW, as in other operations, military IO capabilities are not the only assets the commander may have available. Non-DOD, state, and local agencies; international organizations; military or paramilitary forces; and private organizations may also be available to contribute to IO. These players may offer a variety of services and resources, both military and nonmilitary, from within the GIE. This expanded field of individual and organizational senders and receivers of information, with varying methods of operation and focus, add a variety of INFOSYS needs. Interoperability, cooperation, coordination, and liaison may significantly increase resource requirements.


Historical Perspective

Projection of information is essential to successful military operations. During Operation Restore Hope in Somalia in 1992-1993, a peace operation, the 10th Mountain Division (LI) adjusted its mission analysis and tracking by establishing information dissemination as a BOS. This BOS included PA, PSYOP, and information for soldiers. The division considered full integration of these activities into all aspects of the operation as critical to success.


COORDINATION AND LIAISON

IO can be extremely complex and demanding. The Army is often faced with formidable infrastructure and interoperability challenges, both at home for domestic support operations and abroad for multinational operations, often in austere environments.

To provide coherence to information efforts, IO planning must be in sufficient detail and coordinated with all participating agencies. This requires extensive coordination and liaison. As an example, CA, PSYOP, and PA elements are able to use the same communications media with essentially the same messages but to different audiences. CA and PSYOP personnel address local populations and enemy forces, respectively, while PA personnel address US forces and national and international news media. Employment of C2W, intelligence, and INFOSYS capabilities requires coordination to ensure the synchronization of operations among participating organizations. Since military and civilian systems are often incompatible, military and supported agency communication planners must coordinate as early as possible in the operation. The Army may be required to coordinate IO with the following organizations:

United States Agencies
The Army may coordinate with non-DOD agencies in the broad spectrum of OOTW, especially when the Army is placed in a supporting role to US agencies during domestic support operations. FMs 100-19 and 100-23 and Joint Pub 3-08 list and describe various agencies requiring consideration. Among these is the United States Information Agency (USIA), which is especially pertinent for the conduct of public diplomacy information efforts conducted in foreign countries.

United Nations
The nations involved in specific UN operations rely on shared, relevant, and pertinent data concerning the situation and parties involved in the operation. IO help synthesize this data for a common understanding of threatened interests, to determine relevant and attainable objectives, and to achieve unified efforts. The methodology for exchanging intelligence information should be conceived and exercised well before operations begin. US intelligence personnel know and understand foreign disclosure policy and procedures. They generally obtain necessary foreign disclosure authorization from the Defense Intelligence Agency.

NGOs and PVOs
The number of NGOs and PVOs that may be found in a commander's AO could be extensive. NGOs and PVOs can be valuable sources of information that commanders involved in IO should consider. Commanders may also need to create centralized control and liaison structures, such as CMOCs or emergency operations centers (EOCs), to facilitate coordinated efforts with NGOs. See FM 100-23-1.

Local Assets
Local assets may provide the capability to support and secure the temporary setup of IO--telephone towers, satellites, ground cables, or other utilities that would allow commanders to achieve assigned objectives or tasks. Also, some localities may have the equivalent of non-DOD agencies. The US embassy or consulate can be contacted for assistance in establishing liaison with these agencies. These agencies may provide invaluable assistance in these environments.

SPECIAL CONSIDERATIONS

All operations require gathering and dissemination information, as well as some form of intelligence. Since intelligence is a restrictive term, the preferred terminology in UN operations is information-gathering and dissemination. Accurate information is essential for planning PSYOP, OPSEC, EW, destruction, and deception operations.

By gathering information from soldiers, NGOs, PVOs, and civilians personally involved in the day-to-day operation, a commander can gauge the mission's effectiveness and better plan current and future IO. Maximum use should be made of open-source information. When practical, tactical information-gathering systems should be used so that information may be disseminated to UN/coalition forces, NGOs and PVOs, and other government agencies. However, parties to a conflict in peacekeeping operations or civilians in other operations may perceive information-gathering as intrusive or hostile. Therefore, intelligence activities must always be sensitive to legal constraints and/or maintaining the trust of the parties involved. The perception of impartiality is important for the protection of the peacekeeping force. Important intelligence considerations include the following:

  • Every item of operational information becomes potentially important during OOTW.
  • Personnel have to be information-conscious at all times.
  • Participants must remain constantly alert to what takes place around them and to any change or inconsistency in the behavior, attitude, and activities of the military and civilian populace.

Information-gathering assets, sources, and agencies include those used in conventional operations as well as some that are not normally considered. Intelligence personnel will make traditional use of all organic or attached collection assets. However, they may also use other sources and agencies such as the local news media, NGOs, PVOs, international organizations, and exchanges with local police, governments, and militaries. Dissemination of intelligence is conducted using standard intelligence report formats. Intelligence personnel pass information to liaison officers (LOs) who pass intelligence products to parties requiring them in joint or multinational operations.

Although not peacetime operations, CA and PSYOP are critical operations that aid commanders in accomplishing their peacetime objectives. Commanders must understand CA and PSYOP abilities to support US and allied armed forces. PSYOP is a vital force employed to optimize the influence of US national policy on foreign target audiences, whether neutral, hostile, or friendly. In other operations, PSYOP provide the commander with the capability to project the purpose and mission of US forces and to influence target audience behavior to support the commander's mission. For PSYOP to achieve maximum effectiveness, planners must include them early in the planning process. In crisis situations, rapid production and dissemination of accurate information to the population are critical. PSYOP personnel can provide the commander with real-time analysis of the perceptions and attitudes of the civilian population and the effectiveness of the information being disseminated.

Signal support to OOTW missions requires the same detailed planning as any other operation. However, the scope and scale of planning may actually increase when the commander is considering or is confronted with--

  • Nonmilitary INFOSYS such as commercial and local communications services. The operational principles of signal support apply.
  • Interfaces among military and commercial communications, INFOSYS, and networks. Most civil and military communications systems are incompatible because of different equipment, frequency allocations, and usage parameters. For these reasons, military and civilian communications planners must exchange knowledgeable communications support personnel and compatible equipment to ensure connectivity is maintained between military and civilian operations centers. This exchange of personnel and equipment can occur at any level and should be implemented and modified as the situation dictates.



Table of Contents