Integrated employment during military operations, of information-related capabilities in concert of lines of operation to disrupt, influence, corrupt, or usurp the decision making process of adversaries.
What is the joint and Army manual that covers IO?
JP3-13 and ADRP1-02
What is IRC’s?
Tools, techniques, or activities employed within a dimension of the information environment that can be used to create effects and operationally desired condition.
What can be considered and IRC?
There is no complete list and it could be all asset sand capabilities at a CDR’s disposal that have the capacity to inform and influence
Describe an Information Officer.
It’s a Special Staff Officer, under the direct supervision of the G-3(S-3), authorized at theater Army through Division.
What is the purpose of IOWG?
SYNCs and deconflicts IRC’s
Analyze the information environment
Identify the opportunities to employ IRC
Assess the risk of employing IRC
Identify the IRC gaps
Coordinate for IO/IRC support
Provide information for OPSEC and MILDEC
Assess the effectiveness of IRC
What are the three interrelated dimensions constructed in Information Environment?
Physical
Informational
Cognitive
All dimensions breaks down the INFO Environment
What are the two types of BIAS?
Cultural and Ethnocentrism
What is some cultural BIAS?
Gender, social -economic status, education, religion, and tribal affiliation
What is some cognitive BIAS?
Confirmation Bias
Cognitive dissonance
Framing
Anchoring
What is the most important product that participate in COG analysis, analysis threat CAPEs, and develops HVT nominations in the IE?
Combined Information Overlay (CIO)
Which Dimension of the IE can we “reach out and touch something?
Physical Dimension
Which Dimension of the IE values INFO and where it exists?
Informational
Which Dimension of the IE values the cultural, religions, gender, etc. that causes a person to interpret information?
Cognitive
What is HVTs?
Its prioritized list of targets developed during IPB of what the enemy needs to be successful
What is COG?
Source of power that provides moral and physical strength, freedom of action, or will to act
By identifying critical Vulnerabilities, what type of tasks are generated?
Implied Task IOT exploit them
When is the CIO developed?
Mission analysis
How is CIO constructed?
COG analysis,
analysis threat CAPEs,
develops HVT nominations in the IE?
How is the IO Objective statement written?
ETAP (Effects, Target, Action, and purpose)
What are the risks associated with task performed by Public Affairs (PA)?
Information fratricide
Say-Do gap
Loss of essential secrecy
Appearance of influence
What are some of the capabilities associated with PAO?
Conducts PA planning and analysis
Conduct and evaluate PA training programs
Facilitates and assess media activities
What are some of the limitations associated with PAO?
CANNOT influence
Limited Assets / resources
Immediate results
What are some CONFLICTS with PA?
OPSEC
IRC contradictory messages
Who approves the MISO program?
SECDEF
How does the MISO planner help IO planners into achieving a specific behavioral response?
It provides a Spo—cific (Supporting Psychological) objectives to that provide a response to a targeted audience
Why is a MISO important to IO planners?
It provides two END products
MISO assessment
Series evaluations that is linked to MOE
What MISO products support IPB and IO Combined Information Overlay? When is it developed?
Psychological characteristics Overlay---Step 2
COG threat analysis—Step 3
Adversary INFO SITEMP—Step 4
What is the purpose of the MISO Series Execution Matrix?
It is a graphic depiction of a series and provides a TARGET
What is some CAO/CMO capabilities relative to IO?
Information exchange
Exploitable activities for other IRCs
ID key civil information
Repetitive contact with target audience
Assess effectiveness of key government officials
Predictive analysis of pattern and indicators
What is some CAO/CMO limitations relative to IO?
Legal considerations
Physical Security
Local culture
Project approval (Title 10 Programs)
What are MILDEC primary targets or objectives focused on?
Adversary decision maker
What are “TARGETS” within Military Deceptions?
The Decision Maker
What does “perception” mean within Military Deceptions?
What the Commander believes to be true
What are conduits within Military Deceptions?
They are the pathways to information.
T or F. Can MILDEC target adversary C2 node? Why?
False, they can only affect them
How is a MILDEC Objective statement written?
Begins as a CAUSE
What is the cornerstone of MILDEC?
DO---Think---See
What makes SLE a valuable IRC for IO?
It provides an interpersonal approach to key Target Audiences IOT develop relationships with host nations Key Leaders
What are the 3 sub-divisions of Electronic Warfare?
Electronic Attack
Electronic Support
Electronic Protection
How can EW support or conflict with other IRCs?
It supports OPSEC, MILDEC, MISO, and CYBER, however it can conflict it in the same ways
What are the common risks in the information environment associated with the use of EW?
EMS Fratricide
INTEL Gaps / loss (Jamming vs collecting)
They are not always available
How many cyber ACTIONS are there in Cyber Operations?
4….
CYBER Attack
Cyber OPE (exploitation)
Cyber Defense
Cyber Security
How many cyber MISSIONS are there in Cyber Operations? Explain the relationships between them
3………
Offensive projective power to apply force
Defensive is to protect data, and networks
DODIN is to protect within the DOD
Cyberspace is ___________ domain within the ____________ environment.
Global…………Information
How is COMCAM tasked by the Army?
FORSCOM handles the Army’s request and tasked by the OPERATIONS Section
How is COMCAM tasked within the Joint environment? What does it provide?
Its tasked by the Joint Forces Information Operations Division (J-39)
COMCAM provides documentation both Still and video
What type of input does IO officer provide ISO OPSEC process?
It identifies critical information related to implied Task
Identifies vulnerability
Select and implements counter or control measures
What is CALI? Describe how it is done within OPSEC?
Capability, Activities, Limitations, and intentions.
It develops a worksheet used to determined critical information that helps the IO provide indicators to support OPSEC
What is the difference in No Strike Targets and Restricted Targets?
No strike targets cannot have any effects and Restricted Targets require a specific engagement
Critical Information are relative to what?
IMPLIED TASK
What is the difference between LINKS and NODES in regard to IO Targeting?
Links are a Behavior and nodes and systems can be Physically touched or action
What are the 3 Activities of IO ASSESSMENTS?
Monitoring
Evaluating
Recommending or directing
What are the components of Measure of Effectiveness (MOE)? (Hint: A toddler stole my beer)
Activity, Target, Subject, Metric, Baseline
What are MOEs and MOPs simply?
Criteria
What are indicators within MOE and MOP?
Insight
What are the 4 inputs to an IO mission statement?
(S,I,E) Tasks
Mission Statement
CDRs Planning Guidance
CDRs Intent
What does the IO Planner contribute to the Risk Management Process?