information operations
DESCRIPTION
INFORMATION OPERATIONS. Gaining the Knowledge Advantage MAJ Karson Snyder Room 605 11 APR 00. PURPOSE. To inform the Commander and Staff of the 55th ID(M) of the role and importance of Information Operations on today’s battlefield. REFERENCES. FM 100-6 - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/1.jpg)
1
![Page 2: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/2.jpg)
2
Gaining the Knowledge Advantage
MAJ Karson Snyder
Room 605
11 APR 00
INFORMATION INFORMATION OPERATIONSOPERATIONS
![Page 3: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/3.jpg)
3
PURPOSEPURPOSE
To inform the Commander and Staff of the 55th ID(M) of the role and importance of Information Operations on today’s battlefield.
![Page 4: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/4.jpg)
4
REFERENCESREFERENCES
• FM 100-6• CAS3 Handout F 646-7,
“Information Operations at the Division Level,” by Len Nowak, HQ, INSCOM
• DISA Website: www.disa.mil• DIA Website: www.dia.mil
![Page 5: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/5.jpg)
5
OUTLINEOUTLINE
• Overview• Activities• Components• Summary• Conclusion
![Page 6: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/6.jpg)
6
INFO OPS OVERVIEWINFO OPS OVERVIEW1 of 31 of 3
Information Warfare– Actions taken to achieve information
superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one’s own information, information-based processes, information systems, and computer-based networks.
![Page 7: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/7.jpg)
7
INFO OPS OVERVIEWINFO OPS OVERVIEW2 of 32 of 3
![Page 8: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/8.jpg)
8
INFO OPS OVERVIEW INFO OPS OVERVIEW 3 of 33 of 3
![Page 9: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/9.jpg)
9
INFORMATION INFORMATION ACTIVITIESACTIVITIES
• Acquire Information• Use Information• Protect Information• Manage Information• Exploit Information• Deny Information
![Page 10: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/10.jpg)
10
COMPONENTS OF IOCOMPONENTS OF IO
• Operations• Relevant Information & Intelligence
(RII)• Information Systems (INFOSYS)
![Page 11: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/11.jpg)
11
OPERATIONSOPERATIONS
• Command and Control Warfare (C2W)
• Civil Affairs (CA)• Public Affairs (PA)
![Page 12: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/12.jpg)
12
OPERATIONS: COPERATIONS: C22WW
• C2W - Attack– Purpose is to gain control over enemy
C2W functions– Synchronized application of the 6
information activities
• C2W - Protect– Purpose is to maintain effective C2W of
own forces– Passive and active measures
![Page 13: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/13.jpg)
13
OPERATIONS: COPERATIONS: C22W W ConstructConstruct
![Page 14: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/14.jpg)
14
OPERATIONS: CAOPERATIONS: CA
• “Deeds” done• Establish, maintain, or exploit
relations among the military force, civil authorities, and the civilian populace to facilitate military ops
• Coordinated through CMOC
![Page 15: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/15.jpg)
15
OPERATIONS: PAOPERATIONS: PA
• “Words” spoken• Build support for the Army• Facilitate open reporting and
access• Expedite accurate information for
a balanced and fair presentation
![Page 16: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/16.jpg)
16
RIIRII
• Key to achieving situational awareness throughout the force
• Enhanced by technological developments
• Much derived from open sources• C4I focus helps to determine
enemy decision requirements
![Page 17: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/17.jpg)
17
RII: Relevant RII: Relevant InformationInformation
– Information drawn from the military information environment that significantly impacts, contributes to, or is related to the execution of the operational mission at hand
![Page 18: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/18.jpg)
18
RII: IntelligenceRII: Intelligence
– The product resulting from the collection, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas. Also, information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding.
![Page 19: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/19.jpg)
19
INFOSYSINFOSYS1 of 31 of 3
• Architecture– Operational– System– Technical
• Integration• Global Connectivity
![Page 20: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/20.jpg)
20
INFOSYSINFOSYS2 of 32 of 3
![Page 21: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/21.jpg)
21
INFOSYSINFOSYS3 of 33 of 3
• Joint Global Command & Control System (GCCS)
• Army Global Command & Control System (AGCCS)
• Army Battle Command System (ABCS)– Army Tactical Command & Control System (ATCCS)– Force XXI Battle Command Brigade and Below
System (FBCB2)
• Security is key
![Page 22: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/22.jpg)
22
SUMMARYSUMMARY
• Overview• Activities• Components• Summary• Conclusion
![Page 23: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/23.jpg)
23
QUESTIONSQUESTIONS
?
![Page 24: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/24.jpg)
24
CONCLUSIONCONCLUSION
Success on the modern battlefield depends upon good employment of Information Operations and protection of your own assets from enemy Information Operations.
![Page 25: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/25.jpg)
25
END OF BRIEF
![Page 26: INFORMATION OPERATIONS](https://reader035.vdocuments.site/reader035/viewer/2022062315/56815854550346895dc5af76/html5/thumbnails/26.jpg)