08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The employment of the core capabilities of electronic warfare,<br />

computer network operations, psychological operations, military<br />

deception, and operations security, in concert with specified supporting<br />

and related capabilities, to affect or defend information and information<br />

systems, and to influence decision-making. 127<br />

In this case the US <strong>Army</strong> is stating that it foresees five core capabilities but<br />

retained the wording for “supporting and related capabilities.” IO, the manual<br />

asserts, encompasses attacking adversary command and control (C2) and<br />

protecting friendly C2. The proper combination of the two produces IS at<br />

decisive points. More important, however, is the assertion in the manual that IO<br />

allows commanders to mass the effects of the information element of combat<br />

power. IO and automated information systems and communications allow for<br />

staff processes to be shortened and decision cycles to be compressed. This<br />

increases operational tempo. 128<br />

The US Air Force, in their new doctrinal publication Document 2-5,<br />

Information Operations of January 2005, defines an information operation as<br />

Actions taken to affect adversary information and information systems<br />

while defending one’s own information and information systems. Also<br />

called IO. [The definition continues with an Air Force only application]<br />

Information operations are the integrated employment of the core<br />

capabilities of influence operations, electronic warfare operations,<br />

network warfare operations, in concert with specified integrated control<br />

enablers, to influence, disrupt, corrupt or usurp adversarial human and<br />

automated decision making while protecting our own. 129<br />

The second draft of Joint Publication 3-13, Joint Doctrine for<br />

Information Operations of 14 December 2004 defined IO as “the integrated<br />

employment of the core capabilities of electronic warfare, computer network<br />

operations, psychological operations, military deception, and operations<br />

security, in concert with specified supporting and related capabilities, to<br />

influence, disrupt, corrupt or usurp adversarial human and automated decision<br />

127 FM 3-13, Information Operations: Doctrine, Tactics, Techniques, and Procedures,<br />

November 2003, p. 13.<br />

128 Ibid., pp. v, vi.<br />

129 Air Force Document 2-5, Information Operations, 11 January 2005, p. 51 as<br />

downloaded from the Internet. Author’s update as of January 2005.<br />

76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!