Reference: New Information Operations Synopsis

Advanced Cyber/IO
0Shares

Military Deception (MILDEC)
Information Engagement (IE)
Command and Control Warfare (C2W)
Information Protection
Operations Security (OPSEC)

Below the line: expansions of each.

Military Deception (MILDEC) MILDEC are actions executed to deliberately mislead adversary military decision makers as to friendly capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission (JP 1-02).

Information Engagement (IE) IE is the integrated employment of public affairs, psychological operations, combat camera, and other means necessary to inform or influence enemy, adversary, neutral and friendly audiences.  It includes the interaction of commanders and soldiers with these audiences.

Command and Control Warfare (C2W) C2W is the integrated use of physical attack, electronic warfare, and computer network operations, supported by intelligence, to degrade or destroy enemy or adversary command and control systems or to deny information to them.

Information Protection Information Protection is active or passive measures that protect and defend friendly information and information systems to ensure timely, accurate, and relevant friendly information.  It denies enemy, adversaries, and others the opportunity to exploit friendly information and information systems for their own purposes.

Operations Security (OPSEC) OPSEC is the process of identifying essential elements of friendly information and subsequently analyzing friendly actions and other activities to identify those actions that can be observed by adversary intelligence systems; determine indicators that adversary intelligence systems might obtain that could be interpreted or pieced together to derive essential elements of friendly information in tome to be useful to adversaries; and select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation (FM 3-13).

Phi Beta Iota: This is the new synopsis for Army Information Operations (IO) and is a considerable improvement over the original kludge.  It continues to neglect intelligence (decision-support) as the non-negotiable foundation for being in touch with reality.  It also neglects the absolutely vital element Whole of Government and Multinational Coalition and Eight Tribes engagement, known professionally as Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing and Sense-Making (M4IS2).

See Also:

2011 Cyber-Command or IO 21 + IO Roots

M4IS2

Financial Liberty at Risk-728x90




liberty-risk-dark