27.01.2015 Views

Joint Publication 3-13, Information Operations - The Global ...

Joint Publication 3-13, Information Operations - The Global ...

Joint Publication 3-13, Information Operations - The Global ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter I<br />

techniques include, but are not limited to, deception, electronic attack (EA), computer network attack<br />

(CNA), propaganda and psychological operations, and supporting signals intelligence (SIGINT)<br />

operations.<br />

h. With the free flow of information present in all theaters, such as television, phone, and Internet,<br />

conflicting messages can quickly emerge to defeat the intended effects. As a result, continuous<br />

synchronization and coordination between IO, public affairs (PA), public diplomacy (PD), and our allies<br />

is imperative, and will help ensure that information themes employed during operations involving neutral<br />

or friendly populations remain consistent.<br />

i. Legal Considerations in IO. IO may involve complex legal and policy issues requiring<br />

careful review. Beyond strict compliance with legalities, US military activities in the information<br />

environment as in the physical domains, are conducted as a matter of policy and societal values<br />

on a basis of respect for fundamental human rights. US forces, whether operating physically<br />

from bases or locations overseas or from within the boundaries of the US or elsewhere, are<br />

required by law and policy to act in accordance with US law and the law of armed conflict<br />

(LOAC).<br />

4. Principles of <strong>Information</strong> <strong>Operations</strong><br />

a. Success in military operations depends on collecting and integrating essential information<br />

while denying it to the adversary and other TAs. IO encompass planning, coordination, and<br />

synchronization of the employment of current capabilities to deliberately affect or defend the<br />

information environment to achieve the commander’s objectives. Figure I-3 describes how IO<br />

is integrated into joint operations.<br />

(1) Core capabilities (EW, CNO, PSYOP, MILDEC, and OPSEC) are integrated<br />

into the planning and execution of operations in the information environment.<br />

(2) Supporting IO capabilities (information assurance [IA], physical security, physical<br />

attack, counterintelligence [CI], and combat camera [COMCAM]) have military purposes other<br />

than IO but either operate in the information environment or have impact on the information<br />

environment.<br />

(3) Related IO capabilities (PA, civil-military operations [CMO], and defense support<br />

to public diplomacy [DSPD]) may be constrained by US policy or legal considerations. While<br />

these capabilities have common interfaces with IO, their primary purposes and rules make them<br />

separate and distinct. As a result, it is essential that commanders and their staffs coordinate their<br />

efforts when exercising their functions within the information environment.<br />

b. IO are primarily concerned with affecting decisions and decision-making processes,<br />

while at the same time defending friendly decision-making processes. Primary mechanisms<br />

used to affect the information environment include: influence, disruption, corruption, or usurpation.<br />

I-6<br />

JP 3-<strong>13</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!