WFF Information Operations FC.txt

  1. What are Information Operations?
    IO are the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.
  2. Who is responsible for Inform & Influence Activities (IIA)?
    G-7/S-7
  3. What are the capabilities of IO
    • Public Affairs
    • Military Information Support Operations (MISO)
    • Combat Camera
    • Soldier & Leader Engagement
    • Civil Affairs Operations
    • Civil and Cultural Considerations
    • Operations Security
    • Military Deception
    • Cyber Electromagnetic Activities
  4. Considerations for Integrating IIA
    • IIA owns no capabilities
    • IIA works in probabilities, not certainties
  5. What Mission Order Annex contains IIA?
    Annex J
  6. What are the three parts of IO Assessment?
    • The Objective
    • Measures of Effectiveness
    • Measures of Performance
  7. What are the principles of Solder & Leader Engagement?
    • Consistent
    • Culturally Aware
    • Adaptive
    • Credible
    • Balanced
    • Pragmatic
  8. What are the two types of IIA engagements?
    Deliberate & Dynamic
  9. The Information-Influence relational framework is supported at what level?
    The National level
  10. What joint force asset contributes to integrated information operations?
    The combined information operations directorate J-39
  11. What is the Army's 'officer's area of concentration' for Information Operations?
    FA 30 - Information Operations Functional Area
  12. Who has responsibility to plan and integrate IIA operations assets?
    G-7/s-7
  13. Who is lead and who chairs an IIA working group?
    G-7/S-7, S-3, XO, DCO or CDR
  14. What are the three targeting methodologies used by IIA?
    • D3A
    • F2T2EA
    • CARVER
  15. What is F2T2EA?
    Find, Fix, Track, Target, Engage, Assess
  16. What is CARVER?
    • A system to identify and rank specific targets so that attack resources can be efficiently used.
    • Criticality, Accessibility, Recuperability, Vulnerability, Effect and Recognizability
Author
ShawnStanford
ID
180179
Card Set
WFF Information Operations FC.txt
Description
WFF Information Operations
Updated