IO Planning

  1. Define Information Operation.
    Integrated employment during military operations, of information-related capabilities in concert of lines of operation to disrupt, influence, corrupt, or usurp the decision making process of adversaries.
  2. What is the joint and Army manual that covers IO?
    JP3-13 and ADRP1-02
  3. What is IRC’s?
    Tools, techniques, or activities employed within a dimension of the information environment that can be used to create effects and operationally desired condition.
  4. What can be considered and IRC?
    There is no complete list and it could be all asset sand capabilities at a CDR’s disposal that have the capacity to inform and influence
  5. Describe an Information Officer.
    It’s a Special Staff Officer, under the direct supervision of the G-3(S-3), authorized at theater Army through Division.
  6. What is the purpose of IOWG?
    • SYNCs and deconflicts IRC’s
    • Analyze the information environment
    • Identify the opportunities to employ IRC
    • Assess the risk of employing IRC
    • Identify the IRC gaps
    • Coordinate for IO/IRC support
    • Provide information for OPSEC and MILDEC
    • Assess the effectiveness of IRC
  7. What are the three interrelated dimensions constructed in Information Environment?
    • Physical
    • Informational
    • Cognitive

    All dimensions breaks down the INFO Environment
  8. What are the two types of BIAS?
    Cultural and Ethnocentrism
  9. What is some cultural BIAS?
    Gender, social -economic status, education, religion, and tribal affiliation
  10. What is some cognitive BIAS?
    • Confirmation Bias
    • Cognitive dissonance
    • Framing
    • Anchoring
  11. What is the most important product that participate in COG analysis, analysis threat CAPEs, and develops HVT nominations in the IE?
    Combined Information Overlay (CIO)
  12. Which Dimension of the IE can we “reach out and touch something?
    Physical Dimension
  13. Which Dimension of the IE values INFO and where it exists?
  14. Which Dimension of the IE values the cultural, religions, gender, etc. that causes a person to interpret information?
  15. What is HVTs?
    Its prioritized list of targets developed during IPB of what the enemy needs to be successful
  16. What is COG?
    Source of power that provides moral and physical strength, freedom of action, or will to act
  17. By identifying critical Vulnerabilities, what type of tasks are generated?
    Implied Task IOT exploit them
  18. When is the CIO developed?
    Mission analysis
  19. How is CIO constructed?
    • COG analysis,
    • analysis threat CAPEs,
    • develops HVT nominations in the IE?
  20. How is the IO Objective statement written?
    ETAP (Effects, Target, Action, and purpose)
  21. What are the risks associated with task performed by Public Affairs (PA)?
    • Information fratricide
    • Say-Do gap
    • Loss of essential secrecy
    • Appearance of influence
  22. What are some of the capabilities associated with PAO?
    • Conducts PA planning and analysis
    • Conduct and evaluate PA training programs
    • Facilitates and assess media activities
  23. What are some of the limitations associated with PAO?
    • CANNOT influence
    • Limited Assets / resources
    • Immediate results
  24. What are some CONFLICTS with PA?
    • OPSEC
    • IRC contradictory messages
  25. Who approves the MISO program?
  26. How does the MISO planner help IO planners into achieving a specific behavioral response?
    It provides a Spo—cific (Supporting Psychological) objectives to that provide a response to a targeted audience
  27. Why is a MISO important to IO planners?
    • It provides two END products
    • MISO assessment
    • Series evaluations that is linked to MOE
  28. What MISO products support IPB and IO Combined Information Overlay? When is it developed?
    • Psychological characteristics Overlay---Step 2
    • COG threat analysis—Step 3
    • Adversary INFO SITEMP—Step 4
  29. What is the purpose of the MISO Series Execution Matrix?
    It is a graphic depiction of a series and provides a TARGET
  30. What is some CAO/CMO capabilities relative to IO?
    • Information exchange
    • Exploitable activities for other IRCs
    • ID key civil information
    • Repetitive contact with target audience
    • Assess effectiveness of key government officials
    • Predictive analysis of pattern and indicators
  31. What is some CAO/CMO limitations relative to IO?
    • Legal considerations
    • Physical Security
    • Local culture
    • Project approval (Title 10 Programs)
  32. What are MILDEC primary targets or objectives focused on?
    Adversary decision maker
  33. What are “TARGETS” within Military Deceptions?
    The Decision Maker
  34. What does “perception” mean within Military Deceptions?
    What the Commander believes to be true
  35. What are conduits within Military Deceptions?
    They are the pathways to information.
  36. T or F. Can MILDEC target adversary C2 node? Why?
    False, they can only affect them
  37. How is a MILDEC Objective statement written?
    Begins as a CAUSE
  38. What is the cornerstone of MILDEC?
  39. What makes SLE a valuable IRC for IO?
    It provides an interpersonal approach to key Target Audiences IOT develop relationships with host nations Key Leaders
  40. What are the 3 sub-divisions of Electronic Warfare?
    • Electronic Attack
    • Electronic Support
    • Electronic Protection
  41. How can EW support or conflict with other IRCs?
    It supports OPSEC, MILDEC, MISO, and CYBER, however it can conflict it in the same ways
  42. What are the common risks in the information environment associated with the use of EW?
    • EMS Fratricide
    • INTEL Gaps / loss (Jamming vs collecting)
    • They are not always available
  43. How many cyber ACTIONS are there in Cyber Operations?
    • 4….
    • CYBER Attack
    • Cyber OPE (exploitation)
    • Cyber Defense
    • Cyber Security
  44. How many cyber MISSIONS are there in Cyber Operations? Explain the relationships between them
    • 3………
    • Offensive projective power to apply force
    • Defensive is to protect data, and networks
    • DODIN is to protect within the DOD
  45. Cyberspace is ___________ domain within the ____________ environment.
  46. How is COMCAM tasked by the Army?
    FORSCOM handles the Army’s request and tasked by the OPERATIONS Section
  47. How is COMCAM tasked within the Joint environment? What does it provide?
    • Its tasked by the Joint Forces Information Operations Division (J-39)
    • COMCAM provides documentation both Still and video
  48. What type of input does IO officer provide ISO OPSEC process?
    • It identifies critical information related to implied Task
    • Identifies vulnerability
    • Select and implements counter or control measures
  49. What is CALI? Describe how it is done within OPSEC?
    Capability, Activities, Limitations, and intentions.

    It develops a worksheet used to determined critical information that helps the IO provide indicators to support OPSEC
  50. What is the difference in No Strike Targets and Restricted Targets?
    No strike targets cannot have any effects and Restricted Targets require a specific engagement
  51. Critical Information are relative to what?
  52. What is the difference between LINKS and NODES in regard to IO Targeting?
    Links are a Behavior and nodes and systems can be Physically touched or action
  53. What are the 3 Activities of IO ASSESSMENTS?
    • Monitoring
    • Evaluating
    • Recommending or directing
  54. What are the components of Measure of Effectiveness (MOE)? (Hint: A toddler stole my beer)
    Activity, Target, Subject, Metric, Baseline
  55. What are MOEs and MOPs simply?
  56. What are indicators within MOE and MOP?
  57. What are the 4 inputs to an IO mission statement?
    • (S,I,E) Tasks
    • Mission Statement
    • CDRs Planning Guidance
    • CDRs Intent
  58. What does the IO Planner contribute to the Risk Management Process?
    • Identifies the Hazard
    • Proposed Control Measures
Card Set
IO Planning
IO Planning