INFORMATION OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY
*FM 3-13
Field Manual
No. 3-13
Headquarters
Department of the Army
Washington, DC, 6 December 2016
Information Operations
TOCTable of Contents
Introduction
Over the past two decades, Army information operations (IO) has gone through a number of doctrinal evolutions, explained, in part, by the rapidly changing nature of information, its flow, processing, dissemination, impact and, in particular, its military employment. At the same time, a decade and a half of persistent conflict and global engagement have taught us a lot about the nature of the information environment, especially that in any given area of operations, this environment runs the gamut from the most technologically-advanced to the least. Army units employ IO to create effects in and through the information environment that provide commanders a decisive advantage over adversaries, threats, and enemies in order to defeat the opponent’s will. Simultaneously, Army units engage with and influence other relevant foreign audiences to gain their support for friendly objectives. Commanders’ IO contributes directly to tactical and operational success and supports objectives at the strategic level. This latest version of FM 3-13 returns to the joint definition of IO, although it clarifies that land forces must do more than affect threat decision making if they are to accomplish their mission. They must also protect their own decision making and the information that feeds it; align their actions, messages and images; and engage and influence relevant targets and audiences in the area of operations. While the term inform and influence activities has been rescinded, many of the principles espoused in the last version of FM 3-13 carry forward, especially the synchronization of information-related capabilities (IRCs). IRCs are those capabilities that generate effects in and through the information environment, but these effects are almost always accomplished in combination with other information-related capabilities. Only through their effective synchronization can commanders gain a decisive advantage over adversaries, threats, and enemies in the information environment. While capabilities such as military information support operations, combat camera, military deception, operations security and cyberspace operations are readily considered information-related, commanders consider any capability an IRC that is employed to create effects and operationally-desirable conditions within a dimension of the information environment. FM 3-13 contains nine chapters: Chapter 1 provides an overview of information operations. This overview includes an understanding of the operational and information environments; the definition of IO and the definition’s component parts; IO’s purpose; and how IO contributes to combat power. Chapter 2 discusses how IO supports decisive action through three weighted efforts: attack, defend, and stabilize. It also discusses three enabling activities that units must perform to ensure IO supports decisive action effectively. Chapter 3 overviews the roles, responsibilities, relationships, and organizations that lead, plan, support, and conduct IO. It involves the commander down to the individual Soldier. Chapters 4-7 examine IO’s integration into the operations process. Chapter 4 discusses Planning; Chapter 5, Preparation; Chapter 6, Execution; and Chapter 7, Targeting Integration. Chapter 8 examines the assessment of IO. While IO does not employ a separate assessment methodology, it does have unique considerations for which units must account. Chapter 9 discusses IO at brigade and below. It provides insights for units to consider when planning, preparing, executing, and assessing IO at these levels.
Chapter 1Information Operations Overview
1-1. Conflict is fundamentally a contest of wills. Winning this contest requires commanders to employ combat power to execute decisive action across the range of military operations. Combat power is the total means of destructive, constructive, and information capabilities that a military unit or formation can apply at a given time (ADRP 3-0). Combat power is comprised of eight elements, the last six of which are warfighting functions: leadership, information, mission command, movement and maneuver, intelligence, fires, sustainment, and protection. 1-2. Information operations (IO) creates effects in and through the information environment. IO optimizes the information element of combat power and supports and enhances all other elements in order to gain an operational advantage over an enemy or adversary. These effects are intended to influence, disrupt, corrupt or usurp enemy or adversary decision making and everything that enables it, while enabling and protecting friendly decision making. Because IO’s central focus is affecting decision making and, by extension, the will to fight, commanders personally ensure IO is integrated into operations from the start.
Chapter 2Information Operations and Decisive Action
2-1. Unified land operations applies land power as part of unified action to defeat the threat on land and establish conditions that achieve the joint force commander’s end state. Combat power is the primary means by which Army forces apply land power. IO synchronization supports combat power by harnessing the information element to optimize the warfighting functions and leadership. In turn, this optimization enables commanders to seize the initiative through decisive action. 2-2. Decisive action is the continuous, simultaneous combination of offensive, defensive, and stability or defense support of civil authorities tasks (ADRP 3-0). IO contributes to decisive action through the continuous and simultaneous combination and synchronization of IRCs in support of offense, defense, and stability tasks. IO itself is not offensive, defensive, or stabilizing, but contributes to all of these simultaneously by weighting its efforts in such a way that it achieves requisite effects in and through the information environment in support of the commander’s intent. 2-3. To support decisive action effectively, the commander and staff undertake three enabling activities— analyze and depict the information environment, determine IRCs and IO organizations available, and optimize IRC effects. These activities start with understanding and visualizing the information environment in all its complexity. They progress to determining the array of IRCs and IO organizations available to affect the information environment. They culminate with optimizing IRC effects through effective planning, preparation, execution and assessment (see paragraphs 2-12 to 2-22 for a detailed discussion of these enabling activities). WEIGHTED EFFORTS 2-4. IO weighted efforts are broad orientations used to focus the integration and synchronization of IRCs to create effects that seize, retain, and exploit the initiative in the information environment. Commanders, supported by their staffs, visualize and describe how IO will support the concept of operations by aligning and balancing the efforts of defend, attack, and stabilize with corresponding decisive action tasks as shown in figure 2-1 on page 2-2. IO W EIGHTED E FFORT : D EFEND 2-5. When the IO effort necessitates a defend orientation, it seeks to create effects in the information environment that accomplish any one or combination of the following (not all inclusive): Physical dimension. Locking or otherwise physically securing documents, equipment and infrastructure that facilitate decision making. Protecting documents, equipment, and structures from destruction or degradation. Protecting key personnel from attack or exploitation. Using obscurants to mask movements. Informational dimension. Encrypting communications. Preserving the free-flow of information and access to data and information sources. Employing knowledge management principles. Proactively identifying instances of social engineering or malware and keeping virus and other protections current. Using forensics to determine sources of attack. Countering enemy or adversary information efforts. Cognitive dimension. Making decentralized decisions. Checking facts and assumptions. Using precedents or best practices. Using red teaming. 2-6. IRCs that are most often synchronized to achieve a defend orientation in the information environment include, but are not limited to: Cyberspace operations. Electronic warfare. Military deception. MISO. Operations security (OPSECOPSECOperational Security). Physical security. Destruction and lethal actions. Special technical operations. IO W EIGHTED E FFORT : A TTACK 2-7. When the IO effort necessitates an attack orientation, it seeks to create effects in the information environment that accomplish any one or combination of the following (not all inclusive): Physical dimension. Destroying or degrading threat command and control (C2) systems. Degrading or destroying threat leadership. Destroying or impairing threat networks and critical nodes (human or infrastructure). Using feints, ruses, demonstrations, and displays. Informational dimension. Jamming communication and signals. Corrupting data and information. Employing denial of service attacks. Intercepting or misdirecting data or content. Manipulating information provided to adversary leaders. Attacking the enemy’s or adversary’s narrative(s). Using social engineering or spoofing. Cognitive dimension. Creating ambiguity or confusion. Causing an incorrect understanding of friendly intent. Creating hesitancy or procrastination. Enabling overconfidence in false signals and signs; under confidence or uncertainty in the true ones. Degrading support for the threat. Degrading legitimacy of threat narrative(s). 2-8. IRCs that are most often synchronized to achieve an attack orientation in the information environment include, but are not limited to: Cyberspace operations. Electronic warfare. Military deception. MISO. Destruction and lethal actions. Special technical operations. Space operations. Soldier and leader engagement (SLE). IO W EIGHTED E FFORT : S TABILIZE 2-9. When the IO effort necessitates a stabilize orientation, it seeks to create effects in the information environment that accomplish any one or combination of the following (not all inclusive): Physical dimension. Meeting with key leaders, decision makers, or people who can influence the behaviors of others. Visibly demonstrating mutual commitment or support. Establishing, supporting and utilizing new infrastructure or media that increases or enhances quantity and quality of communication between U.S.-led forces and relevant audiences. Identifying and cultivating traditional or indigenous communicators. Aligning Soldier and unit actions with their words and images. Informational dimension. Employing audience-and culturally-attuned messages. Countering threat or adversary information efforts and narratives through coordinated actions. Aligning images and words with unit and individual Soldier actions. Using messages crafted by native speakers and communicators. Nesting messages with higher headquarters themes and messages and strategic communication guidance. Cognitive dimension. Creating support for rule of law, local security forces, and legitimate authority. Enhancing understanding of U.S. operations and desired outcomes. Changing perceptions, attitudes, and, ultimately, behaviors. 2-10. The IRCs that are most often synchronized to achieve a stabilize orientation in the information environment include, but are not limited to: Combat camera. MISO. Presence, posture and profile. Public affairs. Civil affairs operations and civil military operations. SLE, including police engagement. OPSECOPSECOperational Security. Foreign disclosure. IO AND D EFENSE S UPPORT OF C IVIL A UTHORITIES 2-11. IO does not participate in defense support of civil authorities. However, if requested by civil authorities and approved by the Secretary of Defense, select IRCs may support civil authorities in the conduct of their operations. IO ENABLING ACTIVITIES 2-12. To support decisive action, as well as accomplish IO’s purpose, commanders, staffs, and in particular, the IO officer or representative, undertake and accomplish three enabling activities: Analyze and depict the information environment in all its complexity. Determine the array of IRCs and IO organizations (such as Theater IO Groups) available to affect the information environment and the advantages each offers. Optimize the effects of IRCs through effective planning, preparation, execution, and assessment. A NALYZE AND D EPICT THE I NFORMATION E NVIRONMENT 2-13. To achieve advantage in the information environment, commanders, with specialized advice and support from the IO officer, ensure that IO planning is fully integrated into the operations process. This begins with analysis to understand, visualize, and describe the information environment. 2-14. A significant part of what makes the operational environment complex is the information environment because it includes such components as cyberspace, the electromagnetic spectrum, data flow, encryption and decryption, the media, biases, perceptions, decisions, key leaders and decision makers, among many others. What occurs in the physical dimension of the information environment and, more broadly, the operational environment, always has second-and third-order effects in the informational and cognitive dimensions of the information environment. Thus, there must be holistic and nuanced understanding of how these various components and dimensions interrelate and the whole operates. 2-15. This understanding is depicted through a series of information overlays and comprehensive combined information overlays, which vary depending on commanders’ priorities, the nature of the operation, and the type of analysis being conducted. Modeling or mapping social or human networks also enhances this understanding. While complex, the information environment still needs to be captured in a way that the commander can visualize and understand it, draw necessary insights and conclusions, and make informed decisions. The IO officer should not be locked into any specific method for analyzing and depicting the information environment but develop a process and overlays that best serve the commander and, as appropriate, follow unit standard operating procedures. As new technologies and interactive capabilities emerge, they should be incorporated as tools to facilitate the visualization and understanding processes. D ETERMINE IRC S AND IO O RGANIZATIONS A VAILABLE 2-16. The IO officer is the staff focal point for information environment analysis and expertise, as well as IRC synchronization. The two are inextricably linked: effective IRC synchronization can only occur when the information environment is understood fully. Additionally, effective IRC synchronization can also only occur when a single entity can look across all IRCs and articulate their contribution to the fight and how they can mutually support each other. The IO officer, located in the assistant chief of staff, operations (G-3/S-3) staff section, in concert with the IO working group, is this synchronization entity. Three key responsibilities of the IO officer, therefore, are to build rapport with IRC units, determine ways to optimize each IRC’s contribution through synchronization, and facilitate IRC operations and activities by coordinating support for them, while minimizing impediments. 2-17. In addition to building rapport with IRC units, the IO officer must build similar rapport with and knowledge of IO organizations available and the ways they augment and enhance the function’s effectiveness. These units include the 1st IO Command (Land) and the reserve component regionally-aligned Theater IO Groups. 2-18. The IO officer also continually assesses whether the necessary assets and capabilities are available to achieve the commander’s intent and concept of operations. If it is determined that augmentation—by specific IRCs or by IO units—is necessary, the IO officer or appropriate IRC representative requests augmentation or determines alternative courses of action to fulfill its scheme of IO and meet mission objectives. 2-19. Information-related organizations and entities also exist within the interagency and among Unified Action partners. IO officers not only must know these organizations and entities, they must invite their participation whenever feasible, particularly through their ad hoc or habitual membership in the IO working group, which coordinates, synchronizes, and deconflicts the information-related efforts of these partner organizations with its own efforts. O PTIMIZE IRC EFFECTS 2-20. Optimizing IRC effects begins in earnest with receipt of mission and continues throughout the operations process. With information environment analysis and understanding already accounted for, other IO officer tasks necessary to ensure effective IRC synchronization and the optimization of their effects are: Participate in the military decisionmaking process (MDMP) and develop the scheme of IO. Convene and chair the IO working group. Work closely with IRC units and IO units to ensure capabilities are positioned, employed, and supported to fulfill the synchronization plan. Integrate targets within the information environment into the targeting process and develop, maintain and update IRC synchronization matrix. Coordinate and deconflict IRC synchronization with public affairs efforts to ensure unity of effort and compliance with legal and policy limitations and exclusions. Assess IO and IRC effectiveness in achieving planned effects and adjust as necessary. This page intentionally left blank.
Chapter 3Roles, Responsibilities, Relationships, and Organizations
3-1. Every member of a unit—from the commander, to the staff, to the IO officer or representative, to individual Soldiers and Army civilians—contributes to IO. Also essential to mission success are the IRCs supporting the unit’s IO efforts, as well as any augmenting IO units. Each has a specific role and important responsibilities to fulfill or undertake, as well as vital relationships to forge and sustain, in order to achieve advantage in and through the information environment. THE COMMANDER 3-2. Commanders, at all levels, are responsible for knowing what threats their units face and how to exploit or defeat them. They are their unit’s chief influencers and engage relevant audiences and actors, as necessary, to shape the information environment to their advantage. Commanders rely on their staff and IO officer, in particular, to assist in planning, preparing, executing, and assessing IO. They also personally direct and review analysis of the information environment, issue guidance on the employment and synchronization of IRCs, and direct adjustments based on assessment results. 3-3. Cognizant of the pervasive impact of the information environment on operations and the need to affect this environment to their advantage, commanders are mindful of the following: Every operation has, to some degree, an effect on the information environment. IO planning is integral to operations from the start. Effects in and through the information environment, if essential to success, are part of the commander’s intent. Combat power cannot be optimized without IO. The warfighting functions (particularly movement and maneuver and fires) produce effects in the information environment, whether intentional or not. IO is essential to operational success at all levels, whether or not the unit has an assigned IO officer. All communication can quickly become global and have strategic consequences. IRCs can have lengthy lead times to coordinate and employ, as well as lengthy lag times before their effects are realized. The alignment of words, deeds, and images is essential to building trust and confidence with relevant audiences in the area of operations. IO requires prioritized intelligence support. Effects in the information environment are not always caused as expected; assessment is difficult and benefits from commanders’ interest, prioritization and support. U.S. IO can be constrained by policy and law, while the threat is often unconstrained in its use of information. THE STAFF 3-4. Each staff section collaborates routinely, but to varying degrees, with the IO officer to plan, synchronize, support, and assess IO. Representatives from the G-2 (S-2), G-3 (S-3), assistant chief of staff, plans G-5 (S-5), assistant chief of staff, signal G-6 (S-6) and assistant chief of staff, civil affairs operations (G-9/S-9), in particular, serve as core members of the IO working group. A SSISTANT C HIEF OF S TAFF, G-1 (S-1), P ERSONNEL 3-5. The G-1 (S-1) is the principal staff officer for personnel functions. The G-1 (S-1) processes requirements for individual, team and unit augmentation or attachment. It coordinates reception of these individuals, teams, or units and validates their requirements. It also builds manning documents, as required. Additional IO-related responsibilities include, but are not limited to: Designating a representative to the IO working group. Providing IO-focused instructions in the personnel appendix of the sustainment annex. Reviewing the IO mission and mission, enemy, terrain and weather, troops and support available, time available, and civil considerations from a personnel support perspective. A SSISTANT C HIEF OF S TAFF, G-2 (S-2), I NTELLIGENCE 3-6. The G-2 (S-2) is the principal staff officer for all matters concerning military intelligence, security operations, and military intelligence training. The G-2 (S-2) produces the intelligence used by the IO officer, element, working group and IRCs. IO-related responsibilities of the G-2 (S-2) include, but are not limited to: Participating as a core member of the IO working group and providing intelligence briefings or updates. Providing IO-focused instructions in the intelligence annex. Including requests for information from the IO officer in intelligence reach. Answering information requirements (IRs) submitted by the IO officer. Coordinating with counterintelligence; law enforcement; and information system developers, providers, administrators, and users to ensure timely sharing of relevant information. Preparing a threat assessment of enemy command and control systems, including: Political, economic, social, and cultural influences. Targets and methods for offensive operations. Enemy decision-making processes. Biographical backgrounds of key threat leaders, decision makers, and communicators, and their advisors. Including motivating factors and leadership styles. A comprehensive comparison of enemy offensive information capabilities against friendly IO vulnerabilities. Collecting data to establish an electronic warfare database and command and control target list. Providing intelligence support to military deception operations; specifically: Helping the G-6 (S-6) plan use of friendly information systems as deception means. Establishing counterintelligence measures to protect the military deception operation from detection. A SSISTANT C HIEF OF S TAFF, G-3 (S-3), O PERATIONS 3-7. The G-3 (S-3) is the principal staff officer for all matters concerning training and leader development, operations and plans, and force development modernization. IO-related responsibilities include, but are not limited to: Exercising primary responsibility for IO staff functions and overseeing the IO officer, who is part of the movement and maneuver cell. With assistance from the IO officer, integrating IO planning into the military decisionmaking process. Validating or approving, as necessary, IO officer inputs, actions and outputs. Among the inputs and outputs, the mission statement, scheme of IO, and IO objectives require G-3 (S-3) review, refinement, and emphasis. If additional IRCs or IO units are required, prioritizing and facilitating the augmentation request or request for forces. Tasking units and assets necessary to achieve IO objectives. Providing plans and current operations briefings to IO working group meetings. Integrating information collection into operations, supported by the G-2 (S-2). Ensuring effective coordination and synchronization among the IO officer and IRC staff representatives and other members of the IO working group. A SSISTANT C HIEF OF S TAFF, G-4 (S-4), L OGISTICS 3-8. The G-4 (S-4) is the principal staff officer for all matters concerning sustainment operations. IO-related responsibilities of the G-4 (S-4) include, but are not limited to: Ensuring required resources are included on the baseline resources item list and the commander's track item list. Coordinating sustainment per priorities and requirements. Tracking the operational readiness of IO units and equipment. Providing sustainment capability or vulnerability input to the IO estimate and course of action analyses. Advising the deception and IO working groups on how military operations will affect logistics personnel and equipment. Designating a representative to the IO working group. Providing IO-focused instruction in the sustainment annex. A SSISTANT C HIEF OF S TAFF, G-5 (S-5), P LANS 3-9. The G-5 (S-5) is responsible for incorporating future plans into ongoing operations. The IO officer works closely with the G-5 (S-5) to ensure its efforts to affect the information environment support future plans and provide the commander necessary freedom of action to sustain the initiative and achieve decisive results. When required, the G-5 (S-5) and IO officer work closely to plan and implement deception efforts and ensure objectives are incorporated effectively into plans and operations orders. A SSISTANT C HIEF OF S TAFF, G-6 (S-6), S IGNAL 3-10. The G-6 (S-6) is the principal staff officer for all matters concerning Department of Defense information network operations (also called DODIN operations), applicable portions of defensive cyberspace operations, network transport, information services, and spectrum management operations within the unit’s area of operations. IO-related responsibilities of the G-6 (S-6) include but are not limited to: Coordinating information management with and providing information management data to the G-3 (S-3). Providing a representative to the IO working group. Providing IO-related instructions in relevant annexes and appendices. Directing the actions of subordinate DODIN operations and information management staff elements. Coordinating DODIN operations and information management support of information collection with the G-2 (S-2). Coordinating with the Army Cyber Operations and Integration Center for antivirus software and threat analysis and advisories, after receiving notification of its support from the G-3 (S-3). Coordinating with the regional cyber center for network intrusion devices, information, approved systems, and software, after receiving notification of its support from the G-3 (S-3). A SSISTANT C HIEF OF S TAFF, G-9 (S-9), C IVIL A FFAIRS O PERATIONS 3-11. The G-9 (S-9) is the principal staff officer for all matters concerning civil affairs and civil military operations. The G-9 (S-9) evaluates civil considerations within missions and identifies centers of gravity that are civil in nature. IO-related responsibilities of the G-9 (S-9) include, but are not limited to: Providing a G-9 (S-9) representative to the IO working group. Providing IO-focused instructions in the civil affairs operations annex. Interfacing with IO officer on the use of civil military operations in support of the scheme of IO. Identifying and procuring civilian resources to support the scheme of IO. Advising the military deception officer of implications of military deception operations on civil affairs operations. Coordinating with the IO and psychological operations officers on trends in public sentiments. Coordinating with the IO officer, public affairs officer, and psychological operations officer to ensure messages are not contradictory. THE IO OFFICER 3-12. The IO officer (who heads the IO element at division and higher) or representative (at brigade and below) is the staff focal point for IO. The IO officer is responsible for the following specific tasks, among others: Analyzing the information environment to discern impacts it will have on unit operations and to exploit opportunities to gain an advantage over threat forces. Identifying the most effective IRCs to achieve objectives. Synchronizing IRCs to achieve objectives in the information environment. Assessing the risk, typically described as risk to mission and risk to force, associated with the employment of any capability, product, program or message. Providing input to the synchronization matrix for the use of available IRCs in support of unit operations. Identifying IRC gaps not resolvable at the unit level. Coordinating with other Army, Service, or joint forces to use IRCs to augment existing unit capability shortfalls. Providing information as required in support of operations security (OPSECOPSECOperational Security) at the unit level. Providing information as required in support of military deception at the unit level. Leading the IO working group. Assessing the effectiveness of employed IRCs. 3-13. The IO officer contributes to the overall intelligence preparation of the battlefield (IPB) by assisting the G-2 (S-2) in identifying and evaluating threat information capabilities, as well as the means to influence the population. Additionally, the IO officer submits to the G-2 (S-2) any IRs regarding intelligence shortfalls about the information environment and coordinates with the G-2 (S-2) in developing templates, databases, and other relevant products, including but not limited to: Religion, language, and culture of key groups and decision makers. Agendas of nongovernmental organizations. Size and location of threat IO or information warfare forces and assets. Military and civilian communication infrastructures and connectivity. Population demographics, linkages, and related information. Audio, video, and print media outlets and centers and the populations they service. Location and types of electromagnetic systems and emitters. Network vulnerabilities of friendly, neutral, and threat forces. 3-14. Additional tasks for which the IO officer is responsible include, but are not limited to: Participating in the military decisionmaking process. Developing IRs. Producing information and combined information overlays. Developing the scheme of IO. Through commander’s communication synchronization, contribute to development of the commander’s narrative. Integrating IO into the unit’s targeting process. Deconflicting the employment of IRCs. Ensuring IO-related information is updated in the common operational picture. Integrating external augmentation. 3-15. Not all units are authorized an IO officer or element. Commanders may, therefore, adapt their staff structure to ensure IO objectives and IRC tasks are accomplished and appoint an officer or non-commissioned officer to perform the duties of the IO officer, outlined in this manual. Task organizing for IO is situation-, mission-and commander-dependent. 3-16. A key responsibility of the IO officer is to understand the command relationship with IRC units and build rapport accordingly. Building rapport typically begins with a visit to the IRC site location, an orientation on the IRC’s potential contributions and limitations, and a collaborative determination of ways to optimize the IRC’s effects with other IRCs through synchronization. This rapport-building is ongoing and primarily channeled through the IO working group, although one-on-one conversations will also occur. 3-17. When necessary, the IO officer must be ready to lead the planning and employment of select IRCs not clearly managed by a capability owner or proponent. Examples include, but are not limited to: military deception; OPSECOPSECOperational Security; and Presence, Posture, and Profile. The IO officer is also ready to coordinate for and integrate IRCs that are only found at higher echelons, such as cyberspace operations. INFORMATION-RELATED CAPABILITIES 3-18. IO seeks to optimize the combined effects of selected IRCs through effective planning, synchronization, and assessment. While a single IRC can affect the information environment to friendly advantage, synchronized IRC activities and operations can amplify and unify each other’s effects and produce more efficacious and durable results. For example, variation and repetition of actions and messages tends to increase their overall effect, if not their acceptance. Using different IRCs, in combination, to execute actions and deliver messages, provides this requisite variation. 3-19. IRCs are diverse. In some cases, they are part of the force structure, such as military information support operations (MISO) units, civil affairs units, or combat camera units. Coordination of these IRCs will be with the IRC unit commander, G-3 (S-3), or designed representative. In other cases, IRCs are tasks or activities managed by a staff section, such as military deception, OPSECOPSECOperational Security, or special technical operations. Coordination of these IRCs will occur with the staff element's director or a specified action officer. 3-20. All IRCs units work collaboratively with the IO officer, as well as with other IRCs, to facilitate their synchronization into the IO portion of the concept of operations, also called the scheme of IO. They do this primarily through the IO working group but utilize any venue or engagement to advance their capability’s contribution to the total effort. Most importantly, they articulate their capability’s strengths, limitations, and risks to the commander and staff to facilitate decision making about their employment and synchronization. INFORMATION OPERATIONS SUPPORT UNITS 3-21. The G-3 (S-3), with the assistance of the IO officer, and in concert with organic IRCs, serves as the entry point for external IRCs (excluding public affairs) and IO support units, assets and resources and ensures their integration into overall planning, preparation, execution, and assessment. Among the support organizations that the IO officer helps the G-3 (S-3) to integrate are the 1st Information Operations Command (Land) (1st IO Command) and the reserve component theater information operations groups, which provide a range of IO subject-matter expertise, skills augmentation, and reachback. 1 ST I NFORMATION O PERATIONS C OMMAND (L AND) 3-22. The 1st IO Command, a major subordinate command of the U.S. Army Intelligence and Security Command, is a brigade-sized, multi-compo unit. Under the operational control and tasking authority of the U.S. Army Cyber Command, it provides uniquely tailored IO and cyberspace operations (CO) planning, synchronization, assessment, and reachback support to the Army and other military forces. Consisting of a Headquarters and Headquarters Detachment and two battalions, it augments military forces with tailored IO and cyberspace operations support provided through deployable teams, opposing forces support, reachback planning and analysis, and specialized training to assist units in garrison, during exercises, and during contingency operations. 3-23. 1st IO Command also supports the Army by working to optimize IO interoperability with joint forces, other military forces, inter-agencies, and allies. It provides expeditionary cyberspace operations support to help units identify network vulnerabilities and enable IO. Deployable Modular IO Teams 3-24. Deploys a variety of mission-tailored IO and cyberspace operations teams. The configuration of each deploying team varies to meet operational requirements. Field Support Team 3-25. Provides IO subject-matter expertise to supported commands to assist with the planning, execution and assessment of IO during crisis, contingency, and exercise operations. Field support team members are trained in the operational integration of military deception, electronic warfare, MISO, OPSECOPSECOperational Security, cyberspace operations, and other activities impacting the information environment. Vulnerability Assessment Team 3-26. Assists supported commands in identifying and resolving IO and cyberspace vulnerabilities in order to improve the command’s defensive posture. The vulnerability assessment teams deploy to provide either: Train and Assist (Blue Team) or Emulation of an Adversarial Attack (Red Team) support. Both are capable of assessing the supported command’s OPSECOPSECOperational Security, physical security, and electronic security training and policies to identify vulnerabilities. Both vulnerability assessment teams also assist the supported command in identifying IO and cyberspace vulnerabilities tied to issues associated with unit procedures, equipment, and other resources, and in finding means to resolve or mitigate identified issues. In addition, the vulnerability assessment teams augment the U.S. Army Forces Command mission command assessment teams in conducting pre-deployment home station cybersecurity training, as well as execute the Command Cyber Readiness Inspections for Army Cyber Command in coordination with the Defense Information Systems Agency. OPSECOPSECOperational Security Support Team 3-27. The OPSECOPSECOperational Security support team is part of the 1st IO Command organizational structure, and augments vulnerability assessment teams and executes independent OPSECOPSECOperational Security support team missions. OPSECOPSECOperational Security support teams provide supported commands with OPSECOPSECOperational Security training, assist with developing OPSECOPSECOperational Security programs, and assess unit OPSECOPSECOperational Security programs. World Class Cyber Opposing Force 3-28. Provides cyber and information warfare opposing force support to designated commands during operational training events, such as major exercises and combat training center rotations. This force serves as a non-cooperative, multiple tier (criminal, hybrid, nation state) cyberspace threat opponent that challenges, trains, and develops leaders to successfully operate within a hostile information environment. The World Class Cyber Opposing Force executes its opposing force mission as the exercise dictates, and will operate either as an independent force or as a member of a larger opposing force. Reachback and Training Support 3-29. Provides IO planning support, intelligence analysis, and technical assistance to deployed 1st IO Command support teams, and to other commands requesting reachback support. Reachback tailors its analytical and intelligence efforts and products to support the current and future operations of the supported commands. Lastly, the reachback provides technical support for the execution of vulnerability assessments and World Class Cyber Opposing Force missions. 3-30. The 1st IO Command conducts training instruction throughout the year on the planning, integration and execution of IRCs in both a resident (at Fort Belvoir) and mobile training team format. The 1st IO Command deploys mobile training teams to requesting commands and installations to provide IO and cyberspace training. Deployed mobile training teams have the ability to tailor instruction to meet the specific requirements of the requesting command. A list of the 1st IO Command training courses can be found in the Army Training Requirements and Resources System. T HEATER I NFORMATION O PERATIONS G ROUPS 3-31. The Army relies upon Theater Information Operations Groups to provide enhanced information operations planning, synchronization, and assessment support to Army echelons at theater and army service component command down to brigade level. There are two Theater IO Groups, the 56th and 71st Theater IO Groups, in the U.S. Army National Guard and two Theater IO Groups in the U.S. Army Reserve, the 151st and 152nd Theater IO Groups. Each Theater IO Group consists of a group headquarters, a headquarters and headquarters company, and two IO battalions which mirror each other in their capabilities. 3-32. The mission of the Theater IO Groups is to provide IO subject-matter expertise to a supported command in the form of deployable modular IO teams and a reach back, as well as home station support capability. The Theater IO Groups and its battalion elements do not usually deploy as commands but instead form and deploy purpose-built IO teams designed to provide the necessary IO support required by the requesting command. To enhance the capabilities of the IO teams and reduce preparation time, the Theater IO Groups maintain regional focuses. This focus helps provide the supported command additional regional expertise and capability to plan, synchronize, and assess IRC activities in the conduct of IO within the area of operations. Having a regional focus, however, does not preclude a Theater IO Groups from deploying IO teams and providing IO support to organizations and commands outside of its regional focus area. Deployable Modular IO Teams 3-33. The Theater IO Groups task organize and deploy mission-focused, modular IO teams created from the various capabilities resident within the Theater IO Groups. In the field, the modular IO teams provide the supported command with IO planning, synchronization, assessment, and analysis of the information environment. These teams have the capability to plan, synchronize, and assess OPSECOPSECOperational Security and military deception in the supported command. When dictated by mission requirements, the Theater IO Groups S-2 can attach intelligence specialists to a deployed modular IO team. If a modular IO team is not required, Theater IO Groups can deploy individual elements to meet requested mission support focused on planning, synchronization, and assessment of IRCs. In the creation of the modular IO teams, the Theater IO Groups draw upon the expertise resident in the following Theater IO Groups elements. Army Service Component Command Support Detachment 3-34. Provides the regionally-aligned Army Service Component Command with a culturally-aware, regionally-focused IO planning, synchronization, and assessment capability that can synchronize and assess IO. This detachment provides the supported Army Service Component Command with the expertise to integrate IRCs in concert with other activities into theater security cooperation plans, war plans, and contingency planning. The detachment augments the supported unit’s organic IO element or acts as the supported command’s IO element. It also serves as the base Theater IO Group element for task organization with other Theater IO Groups capabilities to create a theater, Army Service Component Command-level modular team. Field Support Detachment 3-35. Provides a culturally-aware, regionally-focused IO planning, synchronization, and assessment capability that can synchronize and assess IO. This detachment provides the supported command with the expertise to integrate IRCs in concert with other activities into operations plans, operations orders, and contingency planning. It can either augment the supported command’s G-3 (S-3) IO element or serve as that element. It also serves as the base Theater IO Group element for task organization with other Theater IO Groups capabilities to create a Corps and below modular IO team. Military Deception Support Detachment 3-36. Equips the supported command with a regionally-aligned military deception-focused planning, coordination, implementation, and assessment capability. Military deception support detachments are trained to identify deception opportunities, deception conduits and means, and develop plans focused on exploiting those opportunities and means. As part of its support functions, the military deception support detachment develops and maintains social-cultural threat databases to include methods and means of communication (conduits) for input to the targeting process. It can either augment or act as the supported command’s deception cell. Assessment Detachments 3-37. Provide multi-disciplined IO effects assessments. They assess the information environment and integrate IO-related collection and assessment into initial planning. They develop criteria in the form of measures of effectiveness and measures of performance and establish indicators for evaluation. Each indicator represents an IR that should identify a set of sources and staff members who collect the information in the assessment plan. Measures of performance and effectiveness are simply criteria—they require relevant information in the form of indicators for evaluation. OPSECOPSECOperational Security Support Detachments 3-38. OPSECOPSECOperational Security support detachments provide planning, synchronization, implementation, and assessment of OPSECOPSECOperational Security programs to identify friendly critical capabilities, critical vulnerabilities, and critical information in military plans, operations, and supporting activities and prevent exposure to enemy intelligence systems. They determine and advise supported commanders on indicators that threat intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to enemies. In concert with other IRCs, they nominate and employ OPSECOPSECOperational Security measures that eliminate or reduce to an acceptable level, the vulnerabilities of friendly actions to enemy exploitation. Web OPSECOPSECOperational Security Support Detachment 3-39. Administers planning, synchronization, implementation and assessment of web-based OPSECOPSECOperational Security programs to identify friendly critical capabilities, critical vulnerabilities and critical information in military plans, operations, and supporting activities and prevent exposure to enemy intelligence systems. Recommends and advises on OPSECOPSECOperational Security implications to cyberspace operations. Reachback and Home Station Support 3-40. The Theater IO Groups maintain an intelligence support capability designed to produce detailed IO-centric analysis of the operational environment and potential threats (infrastructure; key leaders; information systems; IRCs; composition; vulnerabilities; and friendly, neutral, and threat indigenous networks and their relation to each other) in support of deployed teams. The Theater IO Groups also maintain a habitual relationship with intelligence organizations to provide IO-centric support and products. Deployed teams coordinate with the Theater IO Group’s S-2 and Intelligence Integration Element for information which is used in the development of courses of action, target analysis, and creation of a combined information overlay. The Intelligence Integration Element and Other Support 3-41. Contains intelligence specialists who provide multidiscipline intelligence analysis in support of individual Theater IO Groups elements and deployable modular IO teams. Trained on IO in order to provide tailored intelligence support, these specialists can support from home station, deploy to augment command’s resident IO element, or as members of an IO team. When deployed, these specialists can serve as the focal point for coordination with other intelligence elements. 3-42. In addition to intelligence reachback support, the Theater IO Groups can also provide technical support from home station through the Army Service Component Command support detachments and the web OPSECOPSECOperational Security support detachment. The Army Service Component Command support detachments are capable of providing theater support planning from either home station or on site at the supported theater Army Service Component Command headquarters. The web OPSECOPSECOperational Security support detachment is capable of deploying as part of a modular IO team but more often it provides support from home station where it has assured access to the internet and web based mission command systems. Note : Commanders can request Theater IO Group’s IO team augmentation, reach back support, and home station support by submitting a Request for Forces through their chain of command to their respective Army Service Component Command, where the request for forces will be forwarded to U.S. Army Forces Command for approval. After approval by Forces Command, the request for forces is passed to the National Guard Bureau or the United States Army Reserve for servicing. The employment will consist of mission-tailored and scaled IO teams provided, as needed, to either a single or multiple commands and echelons, or the dedication of the entire IO group to support an Army Service Component Command. In the latter case, the IO group will provide IO support to the Army Service Component Command and its subordinate command structures down to brigade. 56th Theater IO Group: Assigned to the Washington Army National Guard with one battalion located in the Maryland Army National Guard. Regional focus areas are U.S. Pacific Command, U.S. Central Command, and U. S. Northern Command. 71st Theater IO Group: Assigned to the Texas Army National Guard. Regional focus areas are U.S. Southern Command, U.S. Northern Command and U.S. Africa Command. 151st Theater IO Group: Assigned to the U.S. Army Reserve. Regional focus areas are U.S. Africa Command, U.S. European Command, and U.S. Central Command. 152nd Theater IO Group: Assigned to the U.S. Army Reserve. Regional focus areas are U.S. Central Command, U.S. Pacific Command, and U.S. European Command. (To be inactivated FY 2017) INDIVIDUAL SOLDIERS AND ARMY CIVILIANS 3-43. IO seeks to influence adversaries or enemies, as well as foreign audiences to acquiesce to or support our demands or align their actions in concert with the friendly commander’s intent and objectives. One of the most potent and readily-available IRCs to influence these audiences is Soldier and leader engagement. Soldier and leader engagements are interpersonal Service-member interactions with audiences in an area of operations. When Soldiers and leaders, inclusive of Army civilians and contractors, align their words, images, and actions in support of the commander’s communications strategy, they contribute to mission accomplishment in a forceful and enduring way. Additional actions necessary to conduct Soldier and leader engagements include, but are not limited to: Knowing and understanding the commander’s intent. Studying local culture, habits, and ways of communicating. Memorizing approved talking points. Being alert to non-verbal cues or signals on both sides of any conversation or engagement. Following through on commitments. This page intentionally left blank.
Chapter 4Planning
4-1. Planning is the art and science of understanding a situation, envisioning a desired future, and laying out effective ways of bringing that future about (ADP 5-0). Planning helps commanders create and communicate a common vision between commanders, their staffs, subordinate commanders, and unified action partners. Planning results in a plan and orders that synchronize the action of forces in time, space, and purpose to achieve objectives and accomplish missions. 4-2. Commanders, supported by their staffs, ensure IO is fully integrated into the plan, starting with Army design methodology (ADM) and progressing through the military decisionmaking process (MDMP). The focal point for IO planning is the IO officer (or designated representative for IO). However, the entire staff contributes to planning products that describe and depict how IO supports the commander’s intent and concept of operations. The staff also contributes to IO planning during IO working group meetings to include assessing the effectiveness of IO and refining the plan. PLANNING OVERVIEW 4-3. Planning activities occupy a continuum ranging from conceptual to detailed. Conceptual planning involves understanding operational environments and problems, determining the operation’s end state, and visualizing an operational approach to attain that end state. Detailed planning translates the commander’s operational approach into a complete and practical plan. Generally, detailed planning is associated with the science of control including synchronizing forces in time, space, and purpose to accomplish missions. 4-4. ADM helps commanders and staffs with the conceptual aspects of planning. These aspects include understanding, visualizing, and describing operations to include framing the problem and identifying an operational approach to solve the problem. The MDMP helps commanders and staffs translate the commander’s vision into an operations plan or operations order that synchronizes the actions of the force in time, space, and purpose to accomplish missions. Both the problem the commander needs to solve and the specific operation to advance towards its solution have significant information-related aspects. IO AND A RMY D ESIGN M ETHODOLOGY 4-5. ADM is a methodology for applying critical and creative thinking to understand, visualize, and describe unfamiliar problems and approaches to solving them (ADP 5-0). By first framing an operational environment and associated problems, ADM enables commanders and staffs to think about the situation in depth. From this understanding, commanders and staffs develop a more informed approach to solve or manage identified problems. During operations, ADM supports organizational learning through reframing— a maturing of understanding that leads to a new perspective on problems or their resolution. 4-6. Problems typically facing Army forces and unified action partners, within a given area of operations, are human-centered. Human problems are driven by human decision making, which can be affected directly or indirectly through the use of IRCs, including effects produced by movement and maneuver. Therefore, the most essential part of ADM from an IO perspective is framing the current state of the information environment to determine key decision makers and the ways by which their decision process can be altered. This analysis identifies and creates understanding of decision makers’ beliefs, motivations, grievances, biases, and preferred ways of communicating and obtaining information. 4-7. Framing the current state and desired future state of the information environment are key aspects of framing an operational environment and developing an operational approach. The operational approach provides a guide for more detailed IO planning, to include determining the effects necessary to bring about the desired end state in the information environment and the required combinations of IRCs needed to produce these effects. 4-8. Commanders typically employ a combination of direct and indirect approaches to defeating the enemy. A direct approach attacks the threat's center of gravity or principal strength by applying combat power against it. An indirect approach attacks the enemy’s center of gravity by applying combat power against a series of decisive points that iteratively lead to the defeat of the center of gravity while avoiding the enemy’s strengths. IO contributes to both approaches, especially when the threat's center of gravity or principal strength is information-related. (See ATPATPArmy Techniques Publications 5-0.1, Army Design Methodology for a comprehensive discussion of various techniques used in framing the operational environment, framing the problem, developing an operational approach, and reframing). IO AND THE M ILITARY D ECISIONMAKING P ROCESS 4-9. Commanders use the MDMP to understand the situation and mission confronting them and make informed decisions resulting in an operations plan or order for execution. (See FM 6-0 for a detailed description of the MDMP.) Their personal interest and involvement is essential to ensuring that IO planning is integrated into MDMP from the beginning and effectively supports mission accomplishment. IO planning is integral to several other processes, to include intelligence preparation of the battlefield (IPB) and targeting. (See ATPATPArmy Techniques Publications 2-01.3 for further information on IPB and Chapter 7 of this manual and ATPATPArmy Techniques Publications 3-60 for further information on targeting.) The G-2 (S-2) and fire support representatives participate in the IO working group and coordinate with the IO officer to integrate IO with their activities and the overall operation. Commanders use their mission statement for the overall operation, the IO mission statement, scheme of IO, IO objectives, and IRC tasks to describe and direct IO, as seen in figure 4-1. Scheme of IO 4-10. The scheme of IO is a clear, concise statement of where, when, and how the commander intends to employ and synchronize IRCs, to create effects in and through the information environment to support overall operations and achieve the mission. Based on the commander’s planning guidance, to include IO weighted efforts, the IO officer develops a separate scheme of IO for each course of action (COA) the staff develops. IO schemes of support are written in terms of IO objectives—and their associated weighted efforts—and IRC tasks required to achieve these objectives. For example, the overall scheme may be oriented primarily on defending friendly information but also include attack and stabilize objectives. IO Objectives 4-11. IO objectives express specific and obtainable outcomes or effects that commanders intend to achieve in and through the information environment. In addition to be being specific, these objectives are measurable, achievable, relevant, and time-bounded (or SMART), which facilitates their attainment and assessment (see chapter 8). IO objectives serve a function similar to that of terrain or force-oriented objectives in maneuver operations. They focus the IO effort on achieving synchronized IRC effects, at the right time and place, to accomplish the unit's mission and support the commanders' intent and concept of the operation. 4-12. Accurate situational understanding is key to establishing IO objectives. Operational-and tactical-level IO objectives must nest with strategic theater objectives. Joint and component staffs develop IO objectives to help integrate and synchronize their campaigns and major operations. 4-13. The IO officer develops objectives as part of developing the scheme of IO during COA development. These objectives help the staff determine tasks to subordinate units during COA development and analysis. Tasks 4-14. Tasks are developed to support accomplishment of one or more IO objectives. These tasks are developed specifically for a given IRC. In concert with IRC representatives, the IO officer develops tasks during COA development and finalizes them during COA analysis. During COA development and COA analysis, tasks are discussed in general terms but not assigned to a subordinate unit. During orders production, these tasks are assigned to IRC units. Flexibility and Lead Times 4-15. IO planning requires innovation and flexibility. Some IRCs, such as military information support operations (MISO), operations security (OPSECOPSECOperational Security), and military deception, require a long lead time for planning and preparation. Synchronizing IRCs into multiple lines of operation or effort requires extensive coordination. Achieving certain IO objectives may require senior-leader review and approval and more up-to-date intelligence. For some IRCs, there is a significant lag between execution and assessment of their effects. Planning requires a concentrated information collection effort during preparation and execution to obtain and analyze information for assessing effectiveness. These factors increase the challenges facing planners and decrease the time available to prepare. Nevertheless, early execution of select tasks can enhance efforts to shape the information environment in the area of operations. RECEIPT OF MISSION 4-16. Upon receipt of a mission, the commander and staff perform an initial assessment. Based on this assessment, the commander issues initial guidance and the staff prepares and issues a warning order (WARNORD). Between receiving the commander's initial guidance and issuing the WARNORD, the staff performs receipt of mission actions. During receipt of mission, the IO officer— Reviews and updates the running estimate. Participates in the initial assessment. Provides input to the commander's initial guidance. Provides input to the warning order. Prepares for subsequent planning. R EVIEW AND U PDATE THE R UNNING E STIMATE 4-17. Running estimates are integral to IO planning. A running estimate is the continuous assessment of the current situation, and is used to determine if the current operation is proceeding according to the commander's intent and if planned future operations are supportable (ADP 5-0). Running estimates help the IO officer record and track pertinent information about the information environment leading to a basis for recommendations to the commander. 4-18. The IO officer uses the running estimate to assist with completion of each step of the MDMP. An effective running estimate is as comprehensive as possible within the time available but also organized so that the information is easily communicated and processed. Normally, the running estimate provides enough information to draft the applicable IO sections of WARNORDs as required during planning and ultimately to draft applicable IO sections of the operation order (OPORD) or operation plan (OPLAN). 4-19. Variations on the standard, narrative format, such as the example provided in figure 4-2, enable the IO officer to spotlight facts and assumptions, critical planning factors, and available forces. The latter of these requires input from assigned or available IRCs. The graphical format also offers a clear, concise mechanism for the IO officer to articulate recommended high-payoff targets, commander's critical information requirements, and requests for forces. Maintaining both formats simultaneously provides certain benefits: the narrative format enables the IO officer to cut-and-paste sections directly into applicable sections of orders; the graphical format enables the element to brief the commander and staff with a single slide. 4-20. Running estimate development never stops. The IO officer continuously maintains and updates the running estimate as pertinent information is received. While at home station, the IO officer maintains a running estimate on friendly capabilities. If regionally aligned, the unit prepares its estimate based on research and analysis of the information environment within its region and anticipated mission sets. P ARTICIPATE IN C OMMANDER ’ S I NITIAL A SSESSMENT 4-21. Initial assessment primarily focuses on time and resources available to plan, prepare and begin execution of an operation. The IO officer assesses readiness to participate in ADM and MDMP, as well as what external support might be necessary to ensure effective IO planning. 4-22. During the initial assessment, the IO officer establishes a battle rhythm, including locations, times, preparation requirements, and the anticipated schedule. Upon receiving a new mission, the IO officer begins gathering planning tools, including a copy of the higher command OPLAN or OPORD, maps of the area of operations, appropriate references, and the running estimate. During initial assessment, the IO officer also coordinates with organic, assigned, and available IRCs and subordinate units to gauge their planning readiness. 4-23. Initial time allocation is important to IO because some operations and activities require significant time to produce effects or for assessment. The time available may be a limiting factor for some IRCs. The IO officer identifies activities for which this is the case and includes these limitations in estimates and recommendations. 4-24. The commander determines when to execute time-constrained MDMP. Under time-constrained conditions, the IO officer relies on existing tools and products, either his or her own or those of higher headquarters. The lack of time to conduct reconnaissance requires planners to rely more heavily on assumptions and increases the importance of routing combat information and intelligence to the people who need it. A current running estimate is essential to planning in time-constrained conditions. P ROVIDE I NPUT TO THE C OMMANDER ’ S I NITIAL G UIDANCE 4-25. Commanders include IO-specific guidance in their initial guidance, as required. Examples include authorized movements of IRCs, initiation of information collection necessary to support IO, and delineation of IRs. P ROVIDE I NPUT TO THE I NITIAL W ARNING O RDER 4-26. A WARNORD is issued after the commander and staff have completed their initial assessment and before mission analysis begins. It includes, at a minimum, the type and general location of the operation, initial timeline, and any movements or reconnaissance that need to be initiated. When they receive the initial WARNORD, subordinate units begin parallel planning. 4-27. Parallel planning and collaborative planning are routine MDMP techniques. The time needed to achieve and assess effects in the information environment makes it especially important to successful IO. Effective parallel or collaborative planning requires all echelons to share information fully as soon as it is available. Information sharing includes providing higher headquarters plans, orders, and guidance to subordinate IO officers or representatives. 4-28. Because some IRCs require a long time to plan or must begin execution early in an operation, follow-on WARNORDs may include detailed IO information. Although the MDMP includes three points at which commanders issue WARNORDs, the number of WARNORDs is not fixed. WARNORDs serve a purpose in planning similar to that of a fragmentary order (FRAGORD) during execution. Commanders issue both, as the situation requires. Possible IO officer input to the initial WARNORD includes: Tasks to subordinate units and IRCs for early initiation of approved IO actions, particularly for military deception operations and MISO. Essential elements of friendly information (EEFIs) to facilitate defend weighted efforts and begin the OPSECOPSECOperational Security process. Known hazards and risk guidance. Military deception guidance and priorities. MISSION ANALYSIS 4-29. Commanders and their staff conduct mission analysis to better understand the situation and problem, and to identify the purpose of the operation. It is the most important step in MDMP and consists of 18 sub-steps, many of which are performed concurrently. (See FM 6-0, Chapter 9) The IO officer ensures each output or product from this step includes relevant factors or tie-ins. The IO officer also participates in other staff processes (such as IPB and targeting) to ensure IO is properly integrated. For the IO officer, mission analysis focuses on developing information and products that will be used during the rest of the operations process. A NALYZE H IGHER H EADQUARTERS ’ P LAN OR O RDER 4-30. Mission analysis begins with a thorough examination of the higher headquarters OPLAN/OPORD in terms of the commander's initial guidance. By examining higher echelon plans, commanders and staffs learn how higher headquarters plan to conduct IO and which resources and higher headquarters assets are available. The IO officer researches these plans and orders to understand the— Higher commander's intent and concept of operations. Higher headquarters area of operations and interest, mission and task constraints, acceptable risk, and available assets. Higher headquarters schedule for conducting the operation. Missions of adjacent units. 4-31. Planning to conduct IO without considering these factors may result in an uncoordinated operation, which will hamper overall mission effectiveness. A thorough analysis also helps to determine if additional, external IO support is necessary. P ERFORM I NITIAL I NTELLIGENCE P REPARATION OF THE B ATTLEFIELD 4-32. During mission analysis, the G-2 (S-2) prepares IPB products or updates existing products and the initial IPB is performed upon receipt of the mission. The G-2 (S-2), with assistance and input from other staff elements, uses IPB to define the area of operations/interest, describe its effects, evaluate the threat, and determine threat courses of action. Figure 4-3, on page 4-8, lists possible IO-related factors to consider during each IPB step. During IPB, the IO officer works with the G-2 (S-2) to determine threat capabilities and vulnerabilities in the information environment regarding both the threat and other relevant targets and audiences in the area of operations. Define the Information Environment 4-33. The information environment has always affected military operations. IO officers, working with the G-2 (S-2), use available intelligence to analyze the information environment and the threat’s use of information. This information is submitted to the G-2 (S-2) to answer intelligence gaps that address how information environment factors affect operations. The G-2 (S-2) obtains the information from strategic and national-level databases, country studies, collection assets and, when necessary, other intelligence agencies. 4-34. As part of defining the battlefield environment, the G-2 (S-2) establishes the limits of the area of interest. The area of interest includes areas outside the area of operations that are occupied by threat or other forces/groups that can affect mission accomplishment. This fact is particularly true from an information environment perspective. The ability to obtain and pass information has vastly expanded the capacity of actors to affect areas of operations from anywhere. The IO officer ensures that the G-2 (S-2) considers this factor of the information environment in defining the area of interest for IPB. 4-35. As stated in Chapter 2, one of the enabling activities of IO is analyzing and understanding the information environment in all its complexity. Using the IPB process to accomplish this task, the IO officer develops a series of information overlays, as well as combined information overlays, to depict the information aspects of the operational environment. 4-36. The IO officer provides input to help the G-2 (S-2) develop IPB templates, databases, social network diagrams, and other products that portray information about threats and other key groups or audiences in the areas of operation and interest. These products contain information about each group's leaders and decision makers. Information relevant to conducting IO includes, but is not limited to: Religion, language, culture, and internet activities of key groups and decision makers. Agendas of non-governmental organizations. Military and civilian communication infrastructures and connectivity. Population demographics, linkages, and related information. Location and types of radars, jammers, and other non-communication information systems. Audio, video, and print media outlets and centers; the populations they serve; and their dissemination characteristics, such as frequency, range, language, etc. Command and control or mission command vulnerabilities of friendly, adversary, and other forces or groups. Conduit analysis describing how threat decision makers receive information. 4-37. Threat templates portray how adversaries use forces and assets unopposed by friendly forces and capabilities. Threat templates are often developed before deployment. The G-2 (S-2) and IO officer may add factors from the information environment to a maneuver-based threat template, or they may prepare a separate IO threat template. The situation, available information, and type of threat affect the approach taken. IO-related portions of IPB products become part of paragraph 1b of the running estimate. 4-38. The G-2 (S-2) uses IPB to determine possible threat courses of action and arrange them in probable order of adoption. These courses of action, depicted as situation templates, include threat IRCs. A comprehensive IPB addresses threat offensive and defensive capabilities and vulnerabilities, and it is efficacious to friendly mission analysis to develop situation templates depicting how threats and others may employ these capabilities to achieve advantage. IPB Support of Targeting 4-39. IPB identifies high-value targets (HVTs) and shows where and when they may be anticipated. Some of these HVTs are IO-focused or related, such as a specific population group within an area of operation. The G-2 (S-2) works with the IO officer to develop IO-related HVTs into high-payoff targets (HPTs) for the commander’s approval. The IO officer determines which HPTs are related to one or more objectives and develops tasks to engage those targets during COA development and analysis. Other IPB Products 4-40. IPB identifies facts and assumptions concerning threats and the operational environment that the IO officer considers during planning. These are incorporated into paragraph 2 of the running estimate. The IO officer submits IRs to update facts and verify assumptions. Working with the G-2 (S-2) and other staff sections, the IO officer ensures IRs are clearly identified and requests for information (RFIs) are submitted to the appropriate agency when necessary. IPB may create priority intelligence requirements (PIRs) pertinent to IO planning. The IO officer may nominate these as commander's critical information requirements (CCIRs) and also identify OPSECOPSECOperational Security vulnerabilities. The IO officer analyzes these to determine appropriate OPSECOPSECOperational Security measures. D ETERMINE S PECIFIED, I MPLIED, AND E SSENTIAL T ASKS 4-41. While the staff determines specified, implied, and essential tasks the unit must perform, the IO officer identifies specified IO tasks in the higher headquarters OPLAN or OPORD. The IO officer also develops IO-related implied tasks that support accomplishing identified specified tasks. These identified tasks are the basis of the initial scheme of IO developed during COA development. IO officers look for specified tasks that may involve IO in the higher headquarters OPLAN or OPORD, paying particular attention to: Paragraph 1, Situation. Paragraph 2, Mission. Paragraph 3, Execution, especially subparagraphs on IO, tasks to subordinate units, and CCIRs. Annexes and appendices that address intelligence, operations, fire support, rules of engagement, IO, IRCs, information collection, assessment, and interagency coordination. 4-42. Some IO specified tasks, such as support to the higher headquarters deception plan, become unit objectives. Others, particularly those that address only one IRC, are incorporated under IO objectives as tasks. As the staff identifies specified tasks for the overall operation, the IO officer deduces the steps that are necessary to accomplish these specified tasks. These tasks become IO implied tasks. Once the IO officer identifies specified and implied tasks and understands each task’s requirements and purpose, essential tasks are identified. An essential task is a specified or implied task that must be executed to accomplish the mission. If the command must accomplish an IO task to accomplish its mission, that task is an essential task for the command and is included in the recommended mission statement. R EVIEW A VAILABLE A SSETS AND I DENTIFY R ESOURCE S HORTFALLS 4-43. During this sub-step, the commander and staff determine if they have the assets required to perform the specified, implied, and essential tasks. The IO officer performs this analysis to determine if the requisite capabilities are on hand or available through coordination with higher echelons to achieve the effects in the information environment necessary to support the mission. At echelons below division, units have few organic IRCs other than movement and maneuver; Soldier and leader engagement; and presence, posture, and profile. If additional IRCs are required, the IO officer works with the operations officer to request these capabilities and ensure appropriate authorities exist. (See chapter 9 for further discussion of IO at brigade and below). 4-44. The IO officer compares available IRCs with the tasks that need to be accomplished to identify capability shortfalls and additional resources required. The IO officer considers how the following will affect attainment of IO objectives and whether additional capacity is required— Changes in task organization. Limitations of available units and IRCs. Nature of effects that need to be achieved in the information environment and the tasks to accomplish them. The need for redundancy or repetition to achieve desired effects. The level, quantity, and quality of expertise on hand. D ETERMINE C ONSTRAINTS 4-45. A constraint is a restriction placed on the command by a higher command. A constraint dictates an action or inaction, thus restricting the freedom of action of a subordinate commander (FM 6-0). IO constraints include legal, moral, social, operational, and political factors. They also include limitations imposed by various authorities, such as the Secretary of Defense or U.S. ambassador. Constraints may be listed in the following paragraphs, annexes or appendices of the higher OPLAN/OPORD— Commander's intent and guidance. Tasks to subordinate units. Rules of engagement (no strike list, restricted target list) Civil affairs operations. MISO Fire support. 4-46. Constraints establish limits within which the commander can conduct IO. Constraints may also limit the use of military deception and some OPSECOPSECOperational Security measures. One output of this sub-step is a list of the constraints that the IO officer believes will affect the scheme of IO. I DENTIFY C RITICAL F ACTS AND D EVELOP A SSUMPTIONS 4-47. Sources of facts and assumptions include existing plans, initial guidance, observations, and reports. Some facts concerning friendly forces are determined during the review of the available assets. During IPB, the G-2 (S-2), with assistance from the IO officer and other staff elements, develops facts and assumptions about threats and others, the area of operations, and the information environment. The following categories of information are important to the IO officer— Intelligence on threat commanders and other key leaders. Threat morale. Media and/or press coverage of threat and other relevant audiences in the area of operations. The weather. Dispositions of adversary, friendly, and other key groups. Available troops, unit strengths, and materiel readiness. Friendly force IO vulnerabilities. Threat and other key group IO vulnerabilities. 4-48. The primary output of this sub-step is a list of facts and assumptions that concern IO. These are placed in paragraph 1c of the running estimate. The IO officer prepares and submits to appropriate agencies IO IRs for information that would confirm or disprove facts and assumptions. The IO officer reviews facts and assumptions as information is received and revises facts or converts assumptions into facts. B EGIN R ISK M ANAGEMENT 4-49. Commanders and staffs assess risk when they identify hazards, regardless of type. The IO officer assesses IO-associated risk throughout the operations process. The G-3 (S-3) incorporates the IO risk assessment into the command's overall risk assessment. 4-50. IO-related hazards fall into three categories: OPSECOPSECOperational Security vulnerabilities, including hazards associated with compromise of essential elements of friendly information. Mission command vulnerabilities, including those associated with the loss of critical assets or identified during the vulnerability assessment. Hazards associated with executing IO tasks. 4-51. During mission analysis, the IO officer assesses primarily OPSECOPSECOperational Security-and mission command-related hazards, as well as hazards associated with IO-related specified and implied tasks identified up to this point in mission analysis. The list of task-associated hazards is refined during COA development, after articulating IRC tasks that support IO objectives. The IO element uses experience in previous operations as a means of identifying known or expected hazards, and IRC representatives often best articulate hazards associated with their tasks. 4-52. As with all operations, IO entails risk. Resource constraints, combined with threat reactions and initiatives, reduce the degree and scope of advantage possible in the information environment. Risk assessment is one means commanders use to allocate resources. Staffs identify which hazards pose the greatest threat to mission accomplishment. They then determine the resources required to control them and estimate the benefits gained. This estimate of residual risk gives commanders a tool to help decide how to allocate resources and where to accept risk. (For detailed information on the integration of the risk management process, see ATPATPArmy Techniques Publications 5-19). D EVELOP C OMMANDER ’ S C RITICAL I NFORMATION R EQUIREMENTS AND E SSENTIAL E LEMENTS OF F RIENDLY I NFORMATION 4-53. A commander's critical information requirement (CCIR) is an information requirement identified by the commander as being critical to facilitating timely decision making (JP 3-0). CCIRs include priority intelligence requirements (PIRs) and friendly forces information requirements (FFIRs). Staff sections, including the IO officer, recommend CCIRs to the G-3 (S-3). In a time-constrained environment, the staff may collectively compile this information. The G-3 (S-3) presents a consolidated list of CCIRs to the commander for approval. The commander determines the final CCIRs. 4-54. Establishing CCIRs is one means commanders use to focus assessment efforts. CCIRs change throughout the operations process because the information that affects decision making changes as an operation progresses. 4-55. During planning, staff sections establish IRs to obtain the information they need to develop the plan. Commanders produce CCIRs to support decisions they must make regarding the form the plan takes. 4-56. During preparation, the focus of IRs and CCIRs shifts to decisions required to refine the plan. During execution, commanders establish CCIRs that identify the information they need to make execution and adjustment decisions. 4-57. During mission analysis, the IO officer derives the information needed by the commander to determine how to employ IO during the upcoming operation. The IO officer recommends the IO IRs to be included in the CCIRs. This sub-step produces no IO-specific product unless the IO officer recommends one or more IO IRs as CCIRs. However, at this point, the IO officer should have assembled a list of IO IRs and submitted friendly-force-related IRs to the G-3 (S-3) and threat-related IRs to the G-2 (S-2). 4-58. The following is an example of CCIRs for a stability operation in which an information operation is the decisive operation: Who are the municipality's key players in ethnic violence? What are the interests of the political parties? Who are the formal and informal leaders within the political parties? How can friendly forces exploit political party interests to garner support? Which party represents the majority of the people, but also actively support progress within the municipality? What is the status of IRCs within the area of operations? 4-59. In addition to nominating CCIRs to the commander, the staff also identifies and nominates essential elements of friendly information, or EEFIs. EEFIs are elements of information to protect rather than to collect, and identify those elements of friendly force information that, if compromised, would jeopardize mission success. Although EEFIs are not CCIRs, they have the same priority as CCIRs and require approval by the commander. Like CCIRs, EEFIs change as an operation progresses (FM 6-0). 4-60. Submission of IO-focused requirements for potential inclusion as CCIRs, along with other CCIRs, enable the staff to develop the initial information collection plan. Approval of EEFIs enable the staff to plan and implement friendly force information protection measures, such as provided by military deception and OPSECOPSECOperational Security. D EVELOP THE I NITIAL I NFORMATION C OLLECTION P LAN 4-61. The staff identifies information gaps, especially those needed to answer IRs. The IO officer identifies gaps in information needed to support IO planning, execution and assessment. These are submitted to the G-2 (S-2) as IO IRs. The initial information collection plan sets the priorities for information collection in order to answer CCIRs. The G-3 (S-3) issues the information collection plan as part of a WARNORD, a FRAGORD or an OPORD. Within these orders, the information collection plan is found in Annex L. U PDATE P LAN FOR THE U SE OF A VAILABLE T IME 4-62. At this point, the G-3 (S-3) refines the initial time plan developed during receipt of mission. The IO officer provides input specifying the long lead-time items associated with certain IRC tasks (such as military deception and MISO). Upon receiving the revised timeline, the IO officer compares the time available to accomplish IRC tasks with the command’s and threat’s time lines, and revises the IO time allocation plan accordingly. The IO product for this sub-step is a revised time plan. D EVELOP I NITIAL T HEMES AND M ESSAGES 4-63. Gaining and maintaining the trust of relevant audiences and actors is an important aspect of operations. Faced with a diverse array of individuals, organizations, and publics who affect or are affected by their unit's operations, commanders identify and engage entities vital to operational success. The behaviors of these entities can aid or complicate the friendly forces' challenges as commanders strive to accomplish missions. 4-64. The IO officer does not develop themes and messages. This is done by the public affairs officer and MISO element. The public affairs officer adjusts and refines themes and messages received from higher headquarters for use by the command. These themes and messages are designed to inform specific domestic and foreign audiences about current or planned military operations. The Office of the Secretary of Defense, Department of State, or geographic combatant commander (depending on the operation) provides applicable themes to MISO forces, which then develop actions and messages. The highest level MISO element in theater adjusts or refines the themes depending on the situation. It employs themes and messages as part of planned activities designed to influence specific foreign targets and audiences for various purposes that support current or planned operations. 4-65. The commander and the chief of staff approve all themes and messages used to support operations in their area of responsibility. Although the IO officer does not develop themes and messages, they do assist the G-3 (S-3) and the commander to de-conflict and synchronize IRCs used specifically to execute actions for psychological effect and deliver messages during operations. D EVELOP A P ROPOSED P ROBLEM S TATEMENT 4-66. Problem statements are typically developed during design. If this did not occur prior to mission analysis, it is accomplished during this step of the MDMP. If done during design, the commander and staff revise the problem statement based on their enhanced understanding of the situation. The key is identifying the right problem to solve, because it leads to the formulation of specific solution-sets. In identifying the problem, the commander and staff compare the current situation to the desired end state and list issues that impede the unit from achieving this end state. 4-67. Given the increasing impact of the information environment, the prevailing problem or impeding issues are likely to be information-related. Also, information-related problems can be more complex and multi-dimensional than geographical or technological problems or impediments. Therefore, it is essential to spend the time necessary to articulate the problem and impediments as carefully and clearly as possible. D EVELOP A P ROPOSED M ISSION S TATEMENT 4-68. The G-3 (S-3) or executive officer develops the proposed restated mission based on the force's essential tasks, which the commander approves or modifies. The IO officer provides input based on the current IO running estimate. The mission statement includes any identified IO essential tasks. 4-69. Mission statements should use tactical mission tasks, which are specific activities performed by units while executing a form of tactical operation or form of maneuver (See ATPATPArmy Techniques Publications 3-90.1). IO tasks do not always neatly fit into this framework, as they are rarely terrain-or combined arms-based. However, if they are framed in terms of friendly force actions (for example, influence the population in a certain area) or effects on threat forces (deceive the threat's reserve forces commander), and if they support the commander's intent and planning guidance, then they can be integrated effectively into the restated mission. 4-70. The IO officer also develops an IO mission statement that guides IO execution and ensures IO objectives are accomplished. The IO mission statement is explicitly stated in Appendix 15 (Information Operations) to Annex C (Operations) of the base order. (See FM 6-0, Appendix C, for additional details on functional area mission statements.) P RESENT THE M ISSION A NALYSIS B RIEFING 4-71. The staff briefs the commander on the results of its mission analysis. The mission analysis briefing is an essential means for the commander, staff, subordinates and other partners to develop a shared understanding of the upcoming operation and the interrelationships among the mission variables and elements of combat power. IO input is based on its running estimate, analysis in the foregoing steps, and how IO impacts or is impacted by other areas and functions. Time permitting, the staff employs the outline provided in figure 4-4. D EVELOP AND I SSUE I NITIAL C OMMANDER ’ S I NTENT 4-72. The commander's intent is a clear and concise expression of the purpose of the operation and the desired military end state that supports mission command, provides focus to the staff, and helps subordinate and supporting commanders act to achieve the commander's desired results without further orders, even when the operation does not unfold as planned (JP 3-0). The IO officer develops recommended input to the commander's intent and submits it to the G-3 (S-3) for the commander's consideration. When developing recommended input to the commander's intent, the IO officer assists the commander in visualizing and understanding the information environment, ways it will affect operations, and ways that IO can affect the information environment to the commander’s advantage. D EVELOP AND I SSUE I NITIAL P LANNING G UIDANCE 4-73. After approving the restated mission and issuing the intent, commanders provide additional guidance to focus staff planning activities. As appropriate, the commander includes their visualization of IO in this guidance. Commanders consider the following when developing their IO planning guidance: Aspects of higher headquarters IO policies or guidance that the commander wants to emphasize. Aspects of the mission for which IO is most likely to increase the chance of success or which may be IO-dominant. Risks they are willing to take with respect to IO. IO decisions for which they want to retain or delegate authority. 4-74. Planning guidance focuses on the command's essential tasks. Commanders may give guidance for IO separately or as part of their overall guidance. This guidance includes any identified or contemplated IO objectives, stated in finite and measurable terms. It may also include OPSECOPSECOperational Security planning guidance, military deception guidance, and targeting guidance. 4-75. Factors that the IO officer considers when recommending input to initial planning guidance include: The extent that the command is vulnerable to hostile information-based warfare. Specific IO actions required for the operation. The command's capability to execute specific actions or weighted efforts. Additional information needed to conduct IO. D EVELOP C OURSE OF A CTION E VALUATION C RITERIA 4-76. Course of action (COA) evaluation criteria are used during course of action analysis and comparison to measure the relative effectiveness and efficiency of COAs to another. They are developed during this sub-step to enhance objectivity and lessen the chances of bias. Typically, the chief of staff will develop the criterion and associated weight. The IO officer will propose possible refinement to ensure consideration of IO factors affecting success or failure and then employ approved criteria to score each COA. I SSUE W ARNING O RDER 4-77. As the mission and operation dictate, the WARNORD will include essential IO tasks within the mission statement. It will note changes to task organization involving IRC or IO units and address IO factors in other relevant paragraphs, sections, or annexes, as appropriate. 4-78. Table 4-1 provides a summary of the inputs, actions and outputs required of the IO officer. Only those sub-steps within mission analysis with significant IO activity are listed.
Chapter 5Preparation
5-1. Preparation consists of those activities performed by units and Soldiers to improve their ability to execute an operation (ADP 5-0). Preparation creates conditions that improve friendly force opportunities for success. Because many IO objectives and IRC tasks require long lead times to create desired effects, preparation for IO often starts earlier than for other types of operations. Initial preparation for specific IRCs and IO units (such as 1st IO Command or a Theater IO Group) may begin during peacetime. 5-2. Peacetime preparation by units or capabilities involves building contingency plan databases about the anticipated area of operations. These databases can be used for IO input to IPB and to plan IO to defend friendly intentions, such as network protection and operations security (OPSECOPSECOperational Security). IO portions of contingency plans are continuously updated. Normal IO working group participants maintain their own data to provide the IO officer with the latest information. 5-3. During peacetime, IO officers prepare for future operations by analyzing anticipated area(s) of operations' information environment and likely threat information capabilities. Examples of factors to consider include, but are not limited to— Religious, ethnic, and cultural mores, norms, and values. Non-military communications infrastructure and architecture. Military communication and command and control infrastructure and architecture. Military training and level of proficiency (to determine susceptibility to denial, deception, and IO). Literacy rate. Formal and informal organizations exerting influence and leaders within these organizations. Ethnic factional relationships and languages. 5-4. Preparation includes assessing unit readiness to execute IO. Commanders and staffs monitor preparations and evaluate them against criteria established during planning to determine variances. This assessment forecasts the effects these factors have on readiness to execute the overall operation as well as individual IRC tasks. 5-5. Preparation for IO takes place at three levels: staff (IO officer), IRC units or elements, and individual. The IO officer helps prepare for IO by performing staff tasks and monitoring preparations by IRC units or elements. These units perform preparation activities as a group for tasks that involve the entire unit, and as individuals for tasks that each soldier and leader must complete. 5-6. Chapter 3 of ADRP 5-0 provides a comprehensive overview of preparation activities. The activities most relevant to conducting IO include— Improve situational understanding. Revise and refine plans and orders. Conduct coordination and liaison. Initiate information collection. Initiate security operations. Initiate troop movements. Initiate network preparation. Manage and prepare terrain. Conduct confirmation briefs. Conduct rehearsals. IMPROVE SITUATIONAL UNDERSTANDING 5-7. The IO officer/element must understand and share their understanding of the information environment with the commander and staff. During preparation, information collection begins, which helps to validate assumptions and improve situational understanding. Coordination, liaison, and rehearsals further enhance this understanding. Given the information environment's complexity, this task is never-ending and depends on everyone, not just the IO officer, to update and refine understanding of the information environment. REVISE AND REFINE PLANS AND ORDERS 5-8. Plans are not static; the commander adjusts them based on new information. This information may be the result of analysis of unit preparations, answers to IO IRs, and updates of threat information capacity and capability. 5-9. During preparation, the IO officer adjusts the relevant portions of the operation plan (OPLAN) or operation order (OPORD) to reflect the commander's decisions. The IO officer also updates the IO running estimate so that it contains the most current information about adversary information activities, changes in the weather or terrain, and friendly IRCs. 5-10. The IO officer ensures that IO input to IPB remains relevant throughout planning and preparation. To do this, they ensure that IO input to the information collection plan is adjusted to support refinements and revisions made to the OPLAN/OPORD. 5-11. IO preparation begins during planning. As the IO appendix begins to take shape, IO officer coordination with other staff elements is vital because IO affects every other warfighting function. For example, planning an attack on a command and control (C2) high-payoff target requires coordination with the targeting team. A comprehensive attack offering a high probability of success may involve air interdiction and therefore needs to be placed on the air tasking order. It may involve deep attack: rocket and missile fires have to be scheduled in the fire support plan. Army jammers and collectors have to fly the missions when and where needed. The IO officer ensures the different portions of the OPLAN/OPORD contain the necessary coordinating instructions for these actions to occur at the right time and place. 5-12. Effective IO is consistent at all echelons. The IO officer reviews subordinate unit OPLANs/OPORDs to ensure IO has been effectively addressed and detect inconsistencies. The IO officer also looks for possible conflicts between the command's OPLAN/OPORD and those of subordinates. When appropriate, the IO officer reviews adjacent unit OPLANs/OPORDs for possible conflicts. This review allows the IO officer to identify opportunities to mass IO effects across units. 5-13. OPLAN/OPORD refinement includes developing branches and sequels. Branches and sequels are normally identified during war-gaming (COA analysis). However, the staff may determine the need for them at any time. The G-3 (S-3) prioritizes branches and sequels. The staff develops them as time permits. The IO officer participates in their development as with any other aspect of planning. 5-14. A key focus during preparation is on assessment of the current state of the information environment. This assessment is performed to establish baselines, which are subsequently used when assessing whether IO objectives and IRC tasks were effective in creating desired effects. CONDUCT COORDINATION AND LIAISON 5-15. IO requires all units and elements to coordinate with each other continuously, as well as liaise. Coordination begins during planning; however, input to a plan alone does not constitute coordination. Coordination involves exchanging the information needed to synchronize operations. The majority of coordination takes place during preparation. It is then that the IO officer follows through on the coordination initiated during planning. Exchanging information is critical to successful coordination and execution. Coordination may be internal or external and is enhanced through liaison. I NTERNAL C OORDINATION 5-16. Internal coordination occurs within the unit headquarters. The IO officer initiates the explicit and implicit coordinating activities with other staff sections, as well as within the IO element, if one exists. Much of this coordination occurs during IO working group meetings; however, IO working group members do not wait for a meeting to coordinate. They remain aware of actions that may affect, or be affected by, their functional responsibilities. They initiate coordination as soon as they become aware of a situation that requires it. The IO officer remains fully informed of IO-related coordination. The IO officer corrects or resolves problems of external coordination revealed by command and staff visits and information gathering. During internal coordination, the IO officer resolves problems and conflicts and ensures that resources allocated to support IO arrive and are distributed. Examples of internal coordination include, but are not limited to: Deconflicting military information support operations (MISO) with public affairs activities and products. Monitoring the progress of answers to IO RFIs. Monitoring RFIs to higher headquarters by the G-3 (S-3) current operations. Checking the air tasking order for missions requested by the IO officer/element. Monitoring the movements and readiness of IRCs. Determining space asset status and space weather implications. Participating in the integration of IO-related targets into the targeting process. Continuous monitoring and validation of OPSECOPSECOperational Security procedures, particularly in preparation for military deception. This could include a short statement on physical security, particularly during movement. 5-17. The IO officer remains mindful that training is conducted during planning and preparation. This training occurs as new soldiers and IRCs are integrated into the command and its battle rhythm. Additionally, the IO officer provides training to subordinate elements, as requested, to fill gaps in their IO capacity. 5-18. Internal coordination is especially important to ensure requisite staff support to various IRCs in order to enhance their readiness and effectiveness. Examples include but are not limited to— Electronic warfare (EW). G-2 (S-2)—Coordinates intelligence gathering in support of the EW mission. Recommend the use of EW against adversary systems that use the electromagnetic spectrum. G-3 (S-3)—Coordinates and prioritizes EW targets. G-4 (S-4)—Coordinates distribution of EW equipment and supplies, less cryptographic support. IO officer—Coordinates EW tasks with those of other IRCs and assists with preparation of the cyberspace electromagnetic activities appendix. EW officer—Monitors the preparation of military intelligence units to support EW missions; prepare cyber effects request forms and electronic attack request forms; monitors other staff functions that support or affect EW. MISO. G-2 (S-2)—Prepares intelligence estimate and analysis of the area of operation. G-3 (S-3)—Requests additional MISO units as required. IO officer—Identifies requirements for additional MISO units to the G-3 (S-3). G-4 (S-4)—Prepares logistic support of MISO. Psychological Operations (PSYOP) officer—Prepares the MISO appendix to Annex C. Prepares the MISO estimate. OPSECOPSECOperational Security. G-2(S-2)—Provides data on threat intelligence collection capabilities. IO officer—Determines the EEFIs. G-4 (S-4)—Advises on the vulnerabilities of supply, transport, and maintenance facilities, and lines of communications. G-5 (S-5)—Determines availability of civilian resources for use as guard forces. OPSECOPSECOperational Security officer—Prepares the OPSECOPSECOperational Security estimate and appendix. Provost marshal—Advises on physical security measures. Military deception. G-2 (S-2)—Determines adversary surveillance capabilities. G-3 (S-3)—Coordinates movement of units participating in military deception. G-4 (S-4)—Coordinates logistic support to carry out assigned deception tasks. G-9 (S-9)—Coordinates host-nation support to implement the military deception plan. Military deception officer—Prepares to monitor execution of military deception operation. E XTERNAL C OORDINATION 5-19. External coordination includes coordinating with or among subordinate units and higher headquarters, as well as IO support units, IRCs, and resources that may not be under the unit's control during planning but are necessary to execute the plan. External coordination also includes coordinating with adjacent units or agencies. (Adjacent refers to any organization that can affect a unit's operations in and through the information environment.) This coordination is necessary to integrate IO throughout the force. Examples of external coordination include: Assessing unit OPSECOPSECOperational Security posture. Making sure the military deception operation is tracking with preparation for the overall operation. Periodically validating assumptions. Ensuring military deception operations are synchronized with those of higher, lower, and adjacent units. 5-20. The IO officer remains aware of the effectiveness of cybersecurity tasks taken by the G-6 (S-6). Proper protection of plans and orders, and refinements to them, are essential during operations. 5-21. Coordination with joint, interorganizational, and multinational partners is essential to the conduct of IO, as these entities and organizations affect the information environment and are affected by it. The IO working group is the primary means for this coordination but direct, face-to-face coordination is frequently necessary to ensure unity of effort. L IAISON 5-22. Establishing and maintaining liaison is one of the most important means of external coordination. The IO officer may perform direct liaison but units may select another staff member to be part of the liaison team. Establishing liaison during planning enhances subsequent coordination during preparation and execution. 5-23. Practical liaison can be achieved through personal contact between IO officers or between the IO officer and agencies/organizations involved in affecting the information environment. This coordination is accomplished through exchanging personnel, through agreement on mutual support between adjacent units or organizations, or by a combination of these means. Liaison should, when possible, be reciprocal between higher, lower, and adjacent units/organizations. Liaison must be reciprocal between IO sections when U.S. forces are operating with or adjacent to multinational partners. 5-24. Liaison also has a force protection mission. Where host-nation security forces retain some operational capability, liaison is vital to coordinate actions. They provide intelligence and other related information about conditions in-theater. INITIATE INFORMATION COLLECTION 5-25. Execution requires accurate, up-to-date situational awareness. During preparation, the IO officer updates IRs to ensure the most current information possible. The IO officer also works with the G-2 (S-2) to update collection asset taskings necessary to assess IO. INITIATE SECURITY OPERATIONS 5-26. Security operations serve to protect the force from surprise and threat attacks during preparation. While often considered in terms of specific missions that physically screen, guard, cover, or provide area or local security, security operations should also include IRC tasks that provide these same protections in the informational and cognitive dimensions of the information environment. Military deception, OSPEC, space operations, and cyberspace operations all support security operations. Not including these IRC effects into plans potentially puts the force at risk. INITIATE TROOP MOVEMENTS 5-27. During preparation, IRCs are positioned or repositioned, as necessary, to ensure they can fulfill their assigned tasks. IO unit augmentation and integration also occurs during preparation. INITIATE NETWORK PREPARATION 5-28. IO supports the commander’s ability to optimize the information element of combat power. In terms of establishing and readying the network, units must think in terms of both technical and human networks. Technical networks have to be set up, engineered, tailored, and tested to meet the specific needs of each operation. Similarly, human networks have to be initiated, cultivated, and refined during preparation. The IO officer coordinates the establishment of networks that help shape the information environment favorable to friendly objectives. The goal of establishing each category of network is to ensure the availability, reliability, accuracy, and speed of information to facilitate shared understanding and decision making. MANAGE AND PREPARE TERRAIN 5-29. Terrain management is the process of allocating terrain by establishing areas of operation, designating assembly areas, and specifying locations for units and activities to deconflict activities that might interfere with each other (ADRP 5-0). While terrain is physical and geographic, it is a subset of the operational and information environments. When commanders designate areas of operation, they are simultaneously assigning responsibility to specific portions of the information environment. One of the most important reasons for managing physical terrain is to avoid fratricide. The same rationale exists for the information environment: to avoid information fratricide. For example, the IO officer can ensure control measures are established to deconflict EW activities with MISO efforts to inform the local populace through radio broadcasts. 5-30. Analysis of the information environment during IPB leads to an understanding of aspects of the information environment in which friendly forces have an advantage and in which they are disadvantaged. During preparation, the IO officer, in concert with the IO working group and its members, undertake actions to exploit the advantages and overcome the disadvantages. For example, if cellular phone communication is essential to strengthen coordination between U.S. forces and an indigenous ally and cell towers are non-existent or degraded, mobile towers could be deployed. CONDUCT CONFIRMATION BRIEFINGS 5-31. A confirmation brief is a briefing subordinate leaders give to the higher commander immediately after the operation order is given. It is the leaders’ understanding of the commander’s intent, their specific tasks, and the relationship between their mission and the other units in the operation. The IO officer assists subordinate commanders and their IO representatives with these briefings when the commander’s intent and specific tasks are IO-focused or have aspects related to IO. They also assist subordinate commanders to deduce IO implied tasks and to understand the information environment in their area of operations. CONDUCT REHEARSALS 5-32. The IO officer participates in unit rehearsals to ensure IO is integrated with overall operation and to identify potential problems during execution. The IO officer may conduct further rehearsals of tasks and actions to ensure coordination and effective synchronization of IRCs. Before participating in a rehearsal, the IO officer reviews the plans or orders of subordinate and supporting commands.
Chapter 6Execution
6-1. Execution of IO includes IRCs executing the synchronization plan and the commander and staff monitoring and assessing their activities relative to the plan and adjusting these efforts, as necessary. The primary mechanism for monitoring and assessing IRC activities is the IO working group. There are two variations of the IO working group. The first monitors and assesses ongoing planned operations and convenes on a routine, recurring basis. The second monitors and assesses unplanned or crisis situations and convenes on an as-needed basis. INFORMATION OPERATIONS WORKING GROUP 6-2. The IO working group is the primary means by which the commander, staff and other relevant participants ensure the execution of IO. The IO working group is a collaborative staff meeting led by the IO officer, and periodically chaired by the G-3 (S-3), executive officer, chief of staff or the commander. It is a critical planning event integrated into the unit's battle rhythm. Figure 6-1 on page 6-2 provides a possible template for the conduct of the IO working group that can be applied at the tactical through strategic levels. Core and other participants are not static; they will fluctuate by level and by mission/situation. P URPOSE 6-3. The IO working group is the primary mechanism for ensuring effects in and through the information environment are planned and synchronized to support the commander's intent and concept of operations. This means that the staff must assess the current status of operations relative to the end state and determine where efforts are working well and where they are not. More specifically, they must ensure targets are identified and nominated at the right place and time to achieve decisive results. The IO working group occurs regularly in the unit's battle rhythm and always before the next targeting working group. The only exception is a crisis IO working group (also referred to as consequence management or crisis action working group), which occurs as soon as feasible before or after an event or incident that will significantly alter the information environment and give the threat operational advantage unless handled quickly and adeptly. I NPUTS /O UTPUTS 6-4. The example in figure 6-1 is not exhaustive. In terms of inputs, it identifies those documents, products, and tools that historically and practically have provided the IO working group the information necessary to achieve consensus and make informed recommendations to the G-3 (S-3) and commander. The outputs listed are those considered essential to ensuring the staff can effectively conduct IO. 6-5. One tool that the IO working group uses to affirm and adjust the synchronized employment of IRCs is the IO synchronization matrix. An updated synchronization matrix is the working group's key output and essential input to the next targeting meeting. A GENDA 6-6. Like other aspects of the IO working group, the proposed agenda is flexible to the needs of the commander and the staff/participants. Figure 6-1 breaks the meeting down by weighted effort, recognizing that some members of the working group may not need to participate in all parts and that classification levels may adjust depending on the capabilities or assets under consideration and discussion. For example, the public affairs officer/representative will likely be present for Parts 1, 2 and possibly 3, but not for Part 4. Another possible agenda format is by time horizon and yet another by phase of the operation. 6-7. Consistent across all agenda formats are the operational and intelligence updates. These updates are designed to ground participants in the current situation and threat, examine how well operations are meeting the concept of operations and determine whether results are advancing the unit toward the desired end state. S TRUCTURE /P ARTICIPANTS 6-8. The IO officer leads and routinely chairs the IO working group. Staff members typically participating in the working group include personnel from the warfighting functional cells (as appropriate to the mission), the coordinating cells, the special staff, IRC managers (organic and augmenting), subordinate unit IO officers, and augmenting IO units or teams. Table 6-1 on page 6-4 provides an example listing of the participants as well as sample responsibilities. IO W ORKING G ROUP IN A NTICIPATION OF / RESPONSE TO CRISIS OR SIGNIFICANT INCIDENT 6-9. The IO working group convenes as soon as feasible before or after an event. Anyone can request the convening of the IO working group to deal with crisis or incident through the IO officer who, in consultation with the G-3 (S-3) and commander, determines the merits of the request and those personnel who should comprise the working group's initial membership. The working group's purpose is to determine the additional measures, activities, and effects that must be undertaken or generated in order to sustain operational advantage in the information environment. The group also seeks to mitigate possible negative consequences resulting from crisis events or incidents, particularly those that would adversely affect U.S. and coalition credibility. Its membership is more ad-hoc than the routine IO working group but also situation dependent. IO RESPONSIBILITIES WITHIN THE VARIOUS COMMAND POSTS 6-10. IO execution involves monitoring and assessing IO as the operation unfolds and requires coordination among the tactical command post (CP) and main CP, which can be challenging. Each monitors different parts of the operation and not all have an assigned functional area 30 or IO officer. Continuous exchange of information among those assigned responsibility for IO at these CPs is essential to ensuring the effective execution of IO. 6-11. The tactical CP directs IO execution and adjusts missions as required. The IO representative or responsible agent— Maintains the IO portion of the common operational picture to support current operations. Maintains information requirement status. Coordinates preparation and execution of IO with maneuver and fires. Recommends adjustments to current IO. Tracks IRCs and recommends repositioning, as required. Tracks applicable targets in conjunction with the G-2 (S-2). Nominates targets for attack. Provides initial assessment of effectiveness. 6-12. The main CP plans, coordinates, and integrates IO. It— Creates and maintains IO aspects of the common operational picture. Maintains the IO estimate. Incorporates answers to IRs and requests for information into the IO estimate. Maintains a current IO order of battle. Deconflicts IO internally and externally. Requests/coordinates IO support with other warfighting function representatives, outside agencies, higher headquarters, and augmenting forces. Identifies future objectives based on successes or failures of current operations.
Chapter 7Targeting Integration
7-1. Targeting is the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities (JP 3-0). IO is integrated into the targeting cycle to produce effects in and through the information environment that support objectives. The targeting cycle facilitates the engagement of the right target with the right asset at the right time. The IO officer or representative is a part of the targeting team, responsible to the commander and staff for all aspects of IO. TARGETING METHODOLOGY 7-2. Army targeting methodology is based on four functions: decide, detect, deliver, and assess (D3A) (see Figure 7-1, page 7-2). The decide function occurs concurrently with planning. The detect function occurs during preparation and execution. The deliver function occurs primarily during execution, although some IO-related targets may be engaged while the command is preparing for the overall operation. The assess function occurs throughout. 7-3. The targeting process is cyclical. The command’s battle rhythm determines the frequency of targeting working group meetings. IO-related target nominations are developed by the IO officer and by the IO working group, which validates all IO-related targets before they are nominated to the targeting working group. Therefore, the IO working group is always scheduled in advance of the targeting working group. DECIDE 7-4. The decide function is part of the planning activity of the operations process. It occurs concurrently with the military decisionmaking process (MDMP). During the decide function, the targeting team focuses and sets priorities for intelligence collection and attack planning. Based on the commander’s intent and concept of operations, the targeting team establishes targeting priorities for each phase or critical event of an operation. The following products reflect these priorities— High-payoff target list. Information collection plan. Target selection standards. Attack guidance matrix. Target synchronization matrix. 7-5. The high-payoff target list is a prioritized list of targets whose loss to the enemy will significantly contribute to the success of the friendly course of action. High-payoff targets (HPTs) are those high-value targets (HVTs) identified during COA development and validated in subsequent steps that must be acquired and successfully attacked for the success of the friendly commander's mission. Examples of IO-related HPTs are threat command and control nodes and intelligence collection assets/capabilities. 7-6. The information collection plan, prepared by the G-3 (S-3) and coordinated with the entire staff, synchronizes the four primary means information collection to provide intelligence to the commander. The G-2 (S-2) ensures all available collection assets provide the required information. Information requirements submitted by the IO officer can require longer lead times to detect targets and dwell times to assess the effects of IRCs directed against these targets. 7-7. Target selection standards establish criteria for deciding when targets are located accurately enough to attack. These criteria are often more complicated for IO, especially when attempting to identify actors and audiences with precision. 7-8. The attack guidance matrix addresses how and when targets are to be engaged and desired effects of the engagement. For IO-related targets, effects are diverse, running the gamut from destruction of assets to changed behaviors. 7-9. The target synchronization matrix is a list of HPTs by category and the agencies responsible for detecting them, attacking them, and assessing the effects of the attacks. It combines data from the high-payoff target list, information collection plan and attack guidance matrix. 7-10. The targeting team develops or contributes to these products throughout the MDMP. The commander approves them during COA approval. The IO officer ensures they include information necessary to engage IO-related targets. IO-related vulnerability analyses done by the G-2 (S-2) and IO officer provide a basis for deciding which IO-related targets to attack. M ISSION A NALYSIS 7-11. The two targeting-related IO products of mission analysis are a list of IO-related HVTs and recommendations for the commander’s targeting guidance. The IO officer works with the G-2 (S-2) during IPB to develop IO-related HVTs, and with other members of the targeting team to develop IO targeting guidance recommendations. Intelligence Preparation of the Battlefield 7-12. IPB includes preparing templates that portray threat forces and assets unconstrained by the environment. The intelligence cell adjusts threat templates based on terrain and weather to create situational templates that portray possible threat COAs. These situational templates allow the intelligence to identify HVTs. The IO officer works with the intelligence cell throughout IPB to identify threat information-related capabilities and vulnerabilities and other key groups in the area of operations. These capabilities and vulnerabilities become IO-related HVTs. Targeting Guidance 7-13. Issued within the commander’s guidance is targeting guidance. This guidance describes the desired effects the commander wants to achieve. IO targeting focuses on HVTs that support critical, information-related threat capabilities that underpin their objectives and are vulnerable to friendly IO exploitation. 7-14. The IO officer develops input to targeting guidance based on the initial mission and available and anticipated IRCs. The IO officer identifies the functions, capabilities, or units to be attacked; the effects desired; and the purpose for the attack. The IO officer uses the targeting guidance to select IO-related HPTs from among identified HVTs. These HPTs are confirmed during COA analysis. 7-15. Targeting guidance is developed separately from IO objectives. IO objectives are generally broad in scope. They encompass all IO weighted efforts (attack, defend, stabilize). The IO officer develops recommendations for targeting guidance that supports achieving objectives. 7-16. When developing IO input to the targeting guidance, the IO officer considers the time required to achieve effects and the time required to determine results. Some IRCs require targeting guidance that allows for the acquisition, engagement, and assessment of targets while the unit is preparing for the overall operation. For example, the commander may want to psychologically and electronically isolate the enemy’s reserve before engaging it with fires. Doing this requires electronic attack of threat command and control systems and military information support operations (MISO) directed at the threat 24 to 48 hours before lethal fires are initiated. Successfully achieving IO objectives for this phase of the operation requires targeting guidance that gives IO-related targets the appropriate priority. C OURSE OF A CTION D EVELOPMENT 7-17. Feasible COAs, that integrate the effects of all elements of combat power, are developed by the staff. The IO officer prepares a scheme of IO that identifies objectives and IRC tasks for each COA. The IRC tasks are correlated with targets on the HVT list. A single IRC or multiple IRCs can be planned against a single HVT. 7-18. For each COA, the IO officer identifies HVTs that will support attainment of an IO objective. IO-related HVTs that subsequently support friendly IO objectives, and that can be engaged by IRCs, become HPTs. The targeting team also performs target value analysis, coordinates and deconflicts targets, and establishes assessment criteria. The IO officer participates in each of these tasks. Target Value Analysis 7-19. The targeting team performs target value analysis for each COA the staff develops. The initial sources for target value analysis are target spreadsheets and target sheets. Target spreadsheets (target folders) identify target sets associated with adversary functions that could interfere with each friendly COA or that are key to adversary success. IO-related targets can be analyzed as a separate target set or incorporated into other target sets. The IO officer establishes any IO-specific target sets. Each target set is assigned a priority based on its contribution to the success of a friendly objective, its impact on an enemy or adversary COA, and friendly capability to service the target. 7-20. The targeting team uses target spreadsheets during the war game to determine which HVTs to attack. The IO officer ensures that target spreadsheets include information on threat capabilities and IO-related HVTs and that the IO target set, if designated, is assigned a value appropriate to IO’s relative importance to each friendly COA. If an IO target set is not designated, the IO officer ensures that IO-related targets are assigned an appropriate priority within the target sets used. 7-21. Target sheets contain the information required to engage a specific target. Target sheets state how attacking the target affects the threat’s operation. The IO officer prepares target sheets for HVTs to analyze them from an IO planning perspective. These HVTs are expressed as target subsets, such as decision makers. Information requirements concerning them include: What influences these decision makers. How they communicate. With whom they communicate. Weaknesses, susceptibilities, accessibility, feasibility, and pressure points. Deconflicting and Coordinating Targets 7-22. The IO officer and working group consider the possible consequences of attacking any target or target set. Their purpose is to identify possible duplication or attenuation of effects. The attack of physical targets always has second-and third-order effects (informational and cognitive) that could diminish or enhance their value to the overall operation. For example, fires that result in the collateral deaths of civilian non-combatants can have a negative cognitive effect, while using fires to destroy the enemy’s fiber network so that it relies on radio communications vulnerable to jamming can have a positive informational effect. Also, the effects achieved by one IRC might compete with or diminish the effects of another IRC. Thus, IRC synchronization and the integration of IO into other lines of effort requires methodical coordination and deconfliction efforts. 7-23. IO working group members consider all targets from their various perspectives. Deconfliction in this context means ensuring that engaging a target does not produce effects that interfere with the effects of other IRC tasks or IO-related targets, or otherwise inhibit mission accomplishment. Coordination ensures that the effects of engaging different targets complement each other and further the commander’s intent. 7-24. IO officers at different echelons may seek to engage the same targets and, possibly, desire different effects. Therefore, IO-focused targeting includes coordinating and deconflicting targets with higher and subordinate units before the targeting working group meets. Some IO-related targets may also be nominated by other staff elements. The IO officer presents the effects required to accomplish the IO objective associated with those targets when the targeting team determines how to engage them. IO officers must also coordinate and deconflict targets with unified action partners whose doctrinal use of IRCs and policies governing their employment differ. Such coordination extends the planning horizon and may limit how IRCs are integrated. 7-25. One way to achieve this coordination and deconfliction is by beginning parallel planning as early as possible in the MDMP. This means that the IO officer and the targeting team should share all pertinent information with subordinate units and adjacent and higher headquarters. Assessment Criteria 7-26. Generally, the effects of lethal attacks can be evaluated quickly using readily observable and quantifiable criteria, such as the percentage of the target destroyed. Assessing nonlethal attacks often requires monitoring the target over time, using a mix of quantitative and qualitative criteria. Establishing meaningful measures of performance and effectiveness for IO-related targets requires formulating a theory or logic of change in relation to IO objectives and the desired end state. The IO officer and working group essentially ask: will successful attack of a specific target or target set contribute to the attainment of the objective and what will the observable actions or activities leading to the desired outcome look like? The logic of change is expressed in terms of the anticipated causal chain that begins when the target is engaged. (See chapter 8 for more detail on the theory or logic of change.) 7-27. IO-related targets attacked by means such as jamming or MISO broadcasts require assessment by means other than those used in battle damage assessment. The IO officer develops post-attack or post-engagement assessment criteria for these targets and determines the information needed to determine how well they have been met. The IO officer prepares IO IRs or RFIs for this information. If these targets are approved, the IO IRs for the approved targets may be recommended to the commander as priority intelligence requirements. If the command does not have the assets to answer these IO IRs, the target is not engaged unless the attack guidance specifies otherwise or the commander so directs. C OURSE OF A CTION A NALYSIS 7-28. COA analysis (war-gaming) is a disciplined process that staffs use to visualize the flow of a battle. During the war game, the staff decides or determines— Which HVTs are HPTs. When to engage each HPT. Which system or capability to use against each HPT. The desired effects of each attack, expressed in terms of the targeting objectives. Which HPTs require battle damage assessment or post-attack/engagement assessment. The IO officer submits IRs for IO-related targets to the G-2 (S-2) for inclusion in the collection plan. Which HPTs require special instructions or require coordination. 7-29. Based on the war game, the targeting team produces the following draft targeting products for each COA: High-payoff target list. Target selection standards. Attack guidance matrix. Target synchronization matrix. High-Payoff Target List 7-30. During mission analysis, the IO officer identifies potential targets, which are vetted by the IO working group. The IO officer takes nominated targets to the next targeting working group and works within that body to get these targets onto the high-payoff target list and approved by the targeting board. Target Selection Standards 7-31. Target selection standards are applied to enemy activities to decide whether the activity can be engaged as a target. Target selection standards are usually disseminated as a matrix. Military intelligence analysts use target selection standards to determine targets from combat information and pass them to fire support assets for attack. Attack systems’ managers, such as fire control elements and fire direction centers, use target selection standards to determine whether to attack a potential target. The intelligence and fires cells determine target selection standards. The IO officer ensures that they consider IO-related targets and establish appropriate standards for engaging them. 7-32. For nonlethal attacks or engagements, the IO officer may have to develop descriptive criteria to supplement or replace criteria developed by the fires cell. For example, target selection standards during a security cooperation operation may describe what constitutes a hostile crowd, such as: a group larger than 25 people, armed with sticks or other weapons, and with leaders using radios or cellular telephones to direct it. Attack Guidance Matrix 7-33. The targeting team recommends attack guidance based on the results of the war game. Attack guidance is normally disseminated as a matrix. An attack guidance matrix includes the following information, listed by target set or HPT: Timing of attacks (expressed as immediate, planned, or as acquired). Attack system assigned. Attack criteria (expressed as neutralize, suppress, harass, or destroy). Restrictions or special instructions. 7-34. Only one attack guidance matrix is produced for execution at any point in the operation; however, each phase of the operation may have its own matrix. To synchronize effects, all lethal and nonlethal attack systems, including MISO and electronic attack, for example, are placed on the attack guidance matrix. The attack guidance matrix is a synchronization and integration tool. It is normally included as part of the fire support annex. However, it is not a tasking document. Attack tasks for unit assets, including IRCs, are identified as taskings to subordinate units and agencies in the body or appropriate annexes or appendixes of the OPLAN/ OPORD. Target Synchronization Matrix 7-35. The target synchronization matrix lists HPTs by category and the agencies responsible for detecting them, attacking them, and assessing the effects of the attacks. It combines data from the high-payoff target list, information collection plan, and attack guidance matrix. A completed target synchronization matrix allows the targeting team to verify that assets have been assigned to each targeting process task for each target. The targeting team may prepare a target synchronization matrix for each COA, or may use the high-payoff target list, target selection standards, and attack guidance matrix for the war game and prepare a target synchronization matrix for only the approved COA. C OURSE OF A CTION C OMPARISON AND A PPROVAL AND O RDERS P RODUCTION 7-36. After war-gaming all the COAs, the staff compares them and recommends one to the commander for approval. When the commander approves a COA, the targeting products for that COA become the basis for targeting for the operation. The targeting team meets to finalize the high-payoff target list, target selection standards, attack guidance matrix, and input to the information collection plan. The team also performs any additional coordination required. After accomplishing these tasks, targeting team members ensure that targeting factors that fall within their functional areas are placed in the appropriate part of the OPLAN/OPORD. DETECT 7-37. This function involves locating HPTs accurately enough to engage them. It primarily entails execution of the information collection plan. All staff agencies, including the IO officer, are responsible for passing to the G-2 (S-2) information collected by their assets that answer IRs. Conversely, the G-2 (S-2) is responsible for passing combat information and intelligence to the agencies that identified the IRs. Sharing information allows timely evaluation of attacks, assessment of IO, and development of new targets. Effective information and knowledge management are, therefore, essential. 7-38. The information collection plan focuses on identifying HPTs and answering PIRs. These are prioritized based on the importance of the target or information to the commander’s concept of operation and intent. When designated by the commander, PIRs can include requirements concerning IO; obtaining answers to these requirements will assist the IO officer in assessing IO. Thus, there is some overlap between detect and assess functions. Detecting targets for nonlethal attacks may require information collection support from higher headquarters. The targeting team adjusts the high-payoff target list and attack guidance matrix to meet changes as the situation develops. The IO officer submits new IO IRs/RFIs as needed. 7-39. During the detect function, the IO officer updates the high-payoff target list and target synchronization matrix. In addition to the information collection plan, the IO officer will use other information sources, particularly culturally-attuned ones that have unique access to or knowledge of the information environment and its various audiences. Examples include atmospheric teams; cultural attaches or advisors; joint, interorganizational or multinational partner cultural experts; interpreters, or indigenous leaders. DELIVER 7-40. This function occurs primarily during execution, although some IO-related targets may be engaged while the command is preparing for the overall operation. The key to understanding the deliver function is to know which assets are available to perform a specific function or deliver a specific effect and to ensure these assets are ready and capable. Examples of delivery methods include but are not limited to: Corps/division/brigade commander. Provincial reconstruction team member or other unified action partner. Host nation government leader. Loudspeaker. Media broadcast. Social media posts and videos. Patrols. 7-41. During this step, the IO officer executes relevant portions of the target synchronization matrix. As IO-related delivery means and methods are multi-faceted and often involve human interaction, this step includes recording the delivery act and keeping detailed accounts or notes of actions taken or the proceedings, discussions, and commitments involved. The IO officer will ensure that required reporting procedures are explained and disseminated in the operations order or as part of the unit’s standard operating procedures. ASSESS 7-42. There are multiple types and levels of assessment. Assessment within D3A specifically focuses on whether the commander’s targeting guidance was met for a specific target. From an IO perspective, such guidance may speak in terms of influence or degraded decision making, which are difficult to quantify. In the case of engagements, for example, assessment will help determine whether messages were retained by the target, whether these messages resulted in changed behavior, and whether reengagement may be necessary. An ongoing consideration in the information environment is that there may be a significant lag between the time of delivery, the effect taking place, and determination of an effect. 7-43. During this step, the IO officer and IRCs evaluate measures of effectiveness and performance to determine if desired effects were achieved. If not, it recommends re-engagement or other actions. OTHER TARGETING METHODOLOGIES 7-44. The D3A method is employed for deliberate targeting. Other methodologies exist to deal with different mission sets and types of units. They are not meant to replace D3A, but complement it. These other methodologies include: Find, fix, track, target, engage, and assess. Find, fix, finish, exploit, analyze, and disseminate. F IND, F IX, T RACK, T ARGET, E NGAGE, AND A SSESS 7-45. This methodology is employed primarily for dynamic targeting, which is targeting that prosecutes targets identified too late, or not selected for action in time to be included in deliberate targeting (JP 3-60). An emergent target of opportunity or a change in the situation may necessitate a change to a planned target. These targets still require confirmation, verification, validation, and authorization, but in a shorter timeframe than deliberate targeting allows. Dynamic targeting focuses on time-sensitive targets and HPTs. From an IO perspective, many targets may be time-sensitive. Examples include: a hard-to-reach or inaccessible key leader, a flash mob, an accident requiring combat camera documentation, or a denial-of-service attack or other disruption to communication flow. (See ATPATPArmy Techniques Publications 3-60.1, Appendix A.) F IND, F IX, F INISH, E XPLOIT, A NALYZE, AND D ISSEMINATE 7-46. This methodology is particularly useful in targeting high-value individuals. A high-value individual is a person of interest who is identified, surveilled, tracked, influenced, or engaged. Though typically used by special operations forces, find, fix, finish, exploit, analyze, and disseminate helps maneuver leaders at all levels with aligning intelligence and operations assets for pinpoint targeting of personalities and exploiting vulnerabilities in a given network. (See ATPATPArmy Techniques Publications 3-60, Appendix B). This page intentionally left blank.
Chapter 8Assessment
8-1. Assessment precedes and guides the other activities of the operations process. It is also part of targeting. In short, assessment occurs at all levels and within all operations and has a role in any process or activity. The purpose of assessment is to improve the commander's decision making and make operations more effective. Assessment is a key component of the commander's decision cycle, helping to determine the results of unit actions in the context of overall mission objectives. Assessment provides information about the current state of the operational environment, the progress of the operation, and recommendations to mitigate or overcome discrepancies between actual and predicted progress. It also reveals how specific capabilities, such as IRCs, contribute to this progress. Commanders adjust operations based on assessment results to ensure objectives are met and the military end state is achieved. ASSESSMENT PRIORITIZATION 8-2. Assessment has little value unless it meets the needs of its users. It does this by supporting two critical aspects of mission command: shared understanding and decision making. When prioritized and resourced adequately, assessment facilitates a more detailed shared understanding among the commander, staff, and other stakeholders about how the operation is progressing. Regardless of the level or frequency of assessment data collection, staffs will provide the commander ongoing assessment updates. 8-3. Staff assessments, along with those received from higher headquarters or unified action partners, combine with the commander's personal assessment to create an overall assessment, which informs the commander's subsequent decisions. The commander may decide to stay the current course or to issue a FRAGORD to reprioritize missions or tasks, terminate or initiate activities, or redirect resources or the allocation of forces to achieve overall mission objectives. The commander can also direct the development of a new operational approach or plan, if necessary. 8-4. IO contributes to overall operations assessment by examining efforts in and through the information environment. IO-focused assessment is an integral part of the unit's assessment plan, which is discussed broadly in ADRP 5-0 and in detail in FM 6-0. ADRP 5-0 provides overarching guidance on assessment; however, there are unique considerations to the assessment of IO that commanders and staffs take into account. ASSESSMENT RATIONALE 8-5. Assessment or evaluation is a judgment of merit of an action or operation as to whether it achieved its intended outcome(s). It supports planning, improves effectiveness and efficiency of operations, and enforces accountability. These three purposes correspond to three types of evaluation: formative, process, and summative. 8-6. Formative evaluation supports planning by examining whether an operation or program is being designed to meet its intended purpose. In terms of IO, it involves testing messages, determining baselines, analyzing audiences, and developing the logic by which the operation will create influence. 8-7. Process evaluation occurs primarily during execution and serves to enhance effectiveness and efficiency, as well as facilitate in-process decision making. In terms of IO, it assesses whether the scheme of IO is being executed as planned. If the scheme is not going as planned, process evaluation facilitates decisions that lead to corrective action. 8-8. Summative evaluation occurs post-execution and supports decision making and accountability. While process evaluation supports decisions that adjust activities or efforts as the operation unfolds, summative evaluation supports decisions about the overall operation and whether it achieved the commander's intent. It leads to the determination of those aspects of the operation to sustain and those to eliminate or curtail should a similar operation be undertaken in the future. 8-9. In addition to supporting users such as the IO officer, the IO working group, IRC managers, other staff sections, and the commander, operations assessment feeds higher headquarters assessment and, oftentimes, external entities, such as governmental leadership. IO efforts, in particular, often elicit congressional scrutiny and commander-led assessment ensures units are ready to demonstrate the effectiveness of their influence efforts. 8-10. Assessment is most valuable when operations or operational efforts are not working as planned because it helps the commander and staff figure out why and take corrective action. Units should avoid using assessment to justify decisions already made or merely to check the box. Assessment without the intent to employ its results is a waste of time and resources. PRINCIPLES THAT ENHANCE THE EFFECTIVENESS OF IO ASSESSMENT 8-11. Assessment effectiveness is enhanced when it adheres to the following principles or best practices: Uses clear, realistic and measurable objectives. Begins with planning. Employs an explicit logic of the effort. Is continual and consistent over time. Is iterative. Is prioritized and resourced. 8-12. Assessment is more effective when IO objectives are specific, measurable, achievable, relevant and time-bound. Creating clear, realistic, and measurable objectives can be challenging early on, as initial guidance from higher might lack clarity. The IO officer asks clarifying questions but also proactively establishes the most specific, measurable, achievable, relevant, and time-bound objectives possible and provides them to higher headquarters for review and refinement. The IO officer also tests its objective statements with relevant stakeholders, most especially the IRCs that contribute to the attainment of these objectives. 8-13. Because IO creates effects in and through the information environment to influence, disrupt, corrupt, or usurp threat and other audience behavior and decision making, it is necessary to understand what the desired behavior looks like. This understanding drives the planning necessary to achieve the desired outcome. In other words, effective planning for IO cannot occur unless assessment is part of the operations process from the beginning. 8-14. Unlike fires, whose effects are rapidly discernable, effects in the information environment may not be immediate and their causality can be difficult to determine. An essential part of planning and assessing IO is the need to develop an explicit logic of the effort for each objective or effect. The logic of the effort makes explicit how specific efforts lead to the attainment of objectives. The value of this logic is that its assumptions are made explicit and can become hypotheses that can then be tested and, if necessary, refined. Figure 8-1 on page 8-3 provides a simple example of a logic statement and how it evolves when its hypothesis is tested. More complex examples would include additional threat counter-measures that would test each successive hypothesis and the refinement of the IRC mix necessary to create as foolproof a logic as possible, balanced against risk, available assets, time, and cost. 8-15. Since IO objectives are primarily articulated in terms of a change in one (or more) dimensions of the information environment, a baseline is required to assess progress toward or attainment of the objective. A baseline captures the current state of a person, place, or thing. 8-16. Because evaluation is essential to planning, operational effectiveness and efficiency, and decision making and accountability, it is continual. More important for IO assessment is the fact that objectives are often measured in terms of patterns or trends in behavior. If assessment is not continual and consistent, these patterns or trends become difficult or impossible to detect and measure. 8-17. IO assessment is iterative because, in most instances, IO is iterative. Rarely does a single capability produce a singular and decisive effect that is readily and fully measurable. Effects in the information environment take time to unfold and become fully visible. Indicators are used to show progress towards the desired cumulative outcome, but because progress takes time, things change. The environment changes, the logic of change changes, and the indicators of progress change. In the face of these changes, measures are iteratively refined, corrected and reapplied. 8-18. To be effective, assessment requires commander emphasis, prioritization, and allocation of resources. This requirement does not mean that every activity, event, or operation requires an equal investment in or level of assessment. Through their guidance and direction, commanders make clear their assessment priorities and ensure that IO assessment receives due emphasis and support. IO ASSESSMENT CONSIDERATIONS 8-19. Assessment of IO in general and of specific effects in the information environment require careful development of measures of effectiveness and performance, as well as identification of indicators that will best signal achievement of these measures and desired outcomes. Assessment in the information environment is not easy and adherence to the following considerations will aid in making IO assessment more effective. M EASURES OF E FFECTIVENESS 8-20. A measure of effectiveness is a criterion used to assess changes in system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect (JP 3-0). Measures of effectiveness help measure changes in conditions, both positive and negative. They are commonly found and tracked in formal assessment plans. 8-21. Time is a factor when assessing IO and developing measures of effectiveness. The attainment of IO objectives leading to the commander's desired end state often requires days or months to realize. It is essential, therefore, to have a baseline from which to measure change and also to time-bound the change. Time-bounding makes clear how long it will take before the change is observed. It helps to set necessary expectations, foster patience, and avoid a rush to judgment. If a behavioral objective is anticipated to take considerable time, assessment planning may choose to break the objective into smaller increments, each with more immediate observable outcomes. Finally, it is also important to analyze and understand the cultural relevance of time in the area of operations and account for and adapt to it. 8-22. Developing informational, behavioral and sentiment baselines often requires significant time and resource investments. Sentiment baselines, such as those determined through surveys or interviews, may require contracted labor to accomplish. The IO officer must factor in the lead time necessary to contract a third-party, provide it time to develop the survey instrument, administer the survey, and tabulate and report on the results. 8-23. Commanders and staffs, particularly the IO officer, must account for the order of effects when assessing IO or, more broadly, any effect. For example, an effect in the physical dimension (1st order) can resonate in unexpected ways in the informational and cognitive dimensions (2nd and 3rd orders). During Operation Enduring Freedom, night raids, while operationally necessary to root out insurgents, caused significant backlash among the indigenous population, local leaders, and the national government. Part of the IO officer's task is to anticipate second-and third-order effects and conduct a risk analysis to determine if potential higher-order effects outweigh the benefits of achieving lower-order effects. The aim is to amplify intended consequences in all dimensions of the information environment, while mitigating unintended consequences. 8-24. Units must account for directness of effect and understand the difference between causational linkages and correlational ones. Certain effects, even desired ones, may not be directly tied to friendly efforts in the information environment; however, friendly forces may still be held accountable for these effects and must react appropriately. This fact underlines the importance of developing a logic of the effort for each IO objective. This logic explicitly states how synchronized IRCs will lead to the desired change expressed in the objective. The logic also differentiates planned activities from other possible contributing factors and articulates expected outputs and outcomes. 8-25. Effectiveness in the cognitive dimension typically requires variety and repetition. Rarely does a single tactic, task, method, action, or message change behavior. Assessment plans must therefore build in varied actions and repeated messages and measure their cumulative effect. M EASURES OF P ERFORMANCE 8-26. A measure of performance is a criterion used to assess friendly actions that is tied to measuring task accomplishment (JP 3-0). Measures of performance help answer questions such as "Was the action taken?" or "Were the tasks completed to standard?" A measure of performance confirms or denies that a task has been properly performed. Measures of performance are commonly found and tracked at all echelons in execution matrixes. They are also commonly used to evaluate training. 8-27. There is no definitive number of tasks to support a given objective; therefore, there is no definitive number of measures of performance to support any given measure of effectiveness. Again, variety and repetition necessitate that multiple tasks typically support each objective and the corresponding measure of performance is the means to confirm or deny that each task is executed in the first place and properly performed. 8-28. Delivery, especially means of delivery, is a critical consideration when developing IRC tasks and their associated measures of performance, particularly when it comes to message delivery. No matter how well-crafted the message, if delivery assets are unavailable or only available in insufficient number, the objective will likely not be achieved. Means of delivery should also be considered in terms of accessibility and acceptability to the target audience. For example, if only a small percentage of the population listens to radio or watches television then these means should not be the only means of delivery considered. I NDICATORS 8-29. An indicator is an item of information that provides insight into a measure of effectiveness or measure of performance (ADRP 5-0). Indicators take the form of reports from subordinates, surveys and polls, and information requirements. Indicators help to answer the question "What is the current status of this measure of effectiveness?" A single indicator can inform multiple measures of effectiveness. 8-30. Not everything observed is an indicator and not every indicator is a sign of progress. Indicators of psychological effects or changes in sentiment are not always easy to detect or may not be markers of the desired behavior change. The upshot of these facts is that establishing indicators requires rigorous effort in order to select those observable and measurable signs or signals that are reflective of changed behavior. Often behavior change is incremental and being able to detect the intervening steps to large-scale behavior change is essential to measuring progress. Again, in-depth knowledge is required of those targets or audiences for whom behavior change is required to achieve the commander's desired end state. 8-31. Measuring progress requires the ability to detect both micro and macro indicators simultaneously. The IO officer must, therefore, coordinate with the G-2 (S-2) in order to know what collection assets are available and the types of information that each provides and how this information helps create actionable knowledge. Soldiers are a vital collection asset. The IO officer should invest time to train all Soldiers on observation techniques that enable them to spot and discriminate meaningful indicators and ways to report what they see. 8-32. The IO officer should employ a variety of means to identify indicators, validate or corroborate conclusions about them, and measure progress. Some of the more commonly used sources are: Information collection assets Military Information Support Operations (MISO) teams Soldier and leader engagements Civil-military operations Polling and surveys (which primarily measure attitudes, not motivations) Media monitoring and analysis Patrol and spot reports Information sharing with unified action partners Conversations with local leaders, partners, and trusted agents Passive monitoring (atmospherics) 8-33. Figure 8-2 portrays the relationship between objectives (the change that needs to happen) and measures of performance, indicators, and measures of effectiveness. The logic of the effort is shown as a relationship between available, selected, and synchronized IRCs and the effects expected over time. While the figure suggests that this logic is generic, it is not. It is unique to every objective and combination of IRCs. This page intentionally left blank.
Chapter 9Brigade and Below Information Operations
9-1. IO integration and synchronization activities are essential to mission success at all levels. At brigade and below, units synchronize fewer IRCs but their effects are more immediate and, proportionately, more integral to achieving unit objectives. Brigade and below and especially small-unit operations require Soldiers to be ready and capable of effectively engaging the local populace while part of patrols, convoys, and tactical actions. Brigade and below operations also take advantage of effects being achieved by IRCs at higher levels and makes them relevant to a unit’s area of operations. 9-2. As an example, IO considerations during patrols expand the purpose of patrols beyond combat operations and reconnaissance. Patrols always create effects in the information environment. In addition to gathering information, patrols can execute psychological actions, deliver messages, disseminate information, and influence target audiences through presence and direct interaction. Lower-echelon units must therefore shape this presence to reinforce the commander’s intent. Their presence is further shaped and amplified through the use of available higher-echelon IRCs, such as military information support operations (MISO), public affairs, and civil affairs operations. Individual Soldiers must be able to engage the local population and deliver messages in such a way that they influence target and audience behavior in accordance with objectives. PRESENCE, PROFILE, AND POSTURE 9-3. Presence, profile and posture are interrelated terms that define and describe a unit's visual, aural, and oral presentation to others. Everything a unit or Soldier does speaks, in some manner, to those who witness or hear it. Presence, profile and posture are an active means by which units can shape sentiments through physical, visual, and audible actions. P RESENCE 9-4. Presence, the act of being physically present, always sends a message. Presence can be menacing or reassuring, depending on the situation. Absence, or the lack of presence, can create perceptions that work for or against the unit’s aims. Being very conscious and deliberate about being present or absent can be a powerful form of influence and should not be left to chance. Once units determine that presence is required, or that there is no choice but to be present, how they convey that presence is important. Both profile and posture address the way that units, patrols, and Soldiers are present. P ROFILE 9-5. Profile is about the degree of presence, both in terms of quantity and quality. Quantity is reflected in how much a unit is present, as in its footprint or task organization. Quality speaks to the nature of that presence, as in its current capability, as well as its reputation. 9-6. During the conduct of offensive-and defensive-focused operations, a unit tends to optimize its profile, not simply in number of forces but in terms of all assets or effects it can bring to bear. Here is where an information-related capability (IRC) like military deception can play a significant role. It allows commanders to make their force appear larger or more substantial than it is. In contrast, during stability-focused operations, the aim is often to keep one’s profile to a minimum—to conduct an operation with the smallest force necessary to ensure force protection but not appear unduly threatening. Therefore, a unit’s profile may be both minimized and optimized through partnership efforts with local national security forces. 9-7. Quality of presence significantly affects perceptions or sentiments, either positively or negatively, and requires continual vigilance. Soldiers and leaders must be conscious of their personal profile and actively work to build and preserve their credibility. P OSTURE 9-8. Posture is an expression of attitude. Whether active or passive, threatening or non-threatening, or defensive or welcoming. Posture dictates how units or Soldiers appear to others and how they act towards them. 9-9. Posture is determined by the operational environment and necessity. For example, if force protection is paramount, a unit might decide to wear full protection and appear more aggressive in its stance and movements. If persuading the local population to support an upcoming change to the way biometrics are gathered is paramount, a unit might decide to wear soft hats and no body armor. 9-10. The relationship between posture and profile enables one to counterbalance the other. A unit at a numerical disadvantage can compensate through an aggressive posture. Conversely, a unit with more than enough forces can soften its posture, appropriate to the situation. SOLDIER AND LEADER ENGAGEMENTS 9-11. Like presence, profile and posture, Soldier and leader engagement (SLE) is an IRC that every unit inherently has at its disposal and for which it is responsible to employ. Patrols conduct deliberate SLE as part of their mission but must be ready to conduct dynamic SLEs; that is, unplanned engagements with local audiences with whom they come in contact during the routine conduct of the patrol. While these interactions may be impromptu, they still benefit from prior planning and training. Themes, messages, and talking points provide Soldiers with the necessary guidance to communicate with target audiences, whether deliberately engaged or inadvertently encountered. 9-12. Planning for dynamic SLEs is integral to planning the patrol. It involves anticipating individuals and groups that the patrol might encounter and developing appropriate response scenarios. Further, it involves reviewing and, to the extent necessary, memorizing the commander’s intent, desired end state and narrative, and the messages and talking points that support them. Perhaps most important of all, it means having Soldiers rehearse the response scenarios to a point where they can engage local foreign audiences with confidence, competence, and nuance. LEVERAGING OTHER IRCS 9-13. At the brigade level, the S3 coordinates with IRC experts and other members on the staff to support tactical-level operations and produce desired effects in and through the information environment. These capabilities are generally requested through the target nomination process and coordinated with the higher headquarters. Common IRCs include, but are not limited to: MISO. Civil Affairs Operations. Combat Camera. Electronic Warfare. Space Operations. Cyberspace operations. Military Deception. Special Technical Operations. M ILITARY I NFORMATION S UPPORT O PERATIONS (MISO) 9-14. A MISO detachment typically supports a brigade combat team. The detachment commander and non-commissioned officer in charge serve on the brigade combat team staff as planners and coordinators of influence activities. They employ subordinate tactical teams to conduct engagement activities, execute psychological actions, deliver messages, use loudspeakers for message delivery and tactical military deception, and for collecting information on the operational environment. Product development and production is a company-level and above function and requires coordination for dedicated support or tailored messages and are subject to applicable or required authorities within the given area of operations. C IVIL A FFAIRS O PERATIONS 9-15. When planning a patrol, consideration must be given to civil affairs operations that may be ongoing or recently completed in the area that the patrol will occur. Spotlighting or reinforcing these operations, whether through talking points or by presence at the project site, can help reinforce their benefits. 9-16. Civil affairs operations units often develop novelty items that resonate with indigenous audiences, such as school supplies, radios, and sports equipment or apparel. Patrols can employ these items to increase the effects of their engagements and interactions favorably. Commanders can facilitate the development and use of these items by providing access to funding sources and implementing streamlined approval processes. However, these items simply provide the venue to engage an audience and deliver the desired message. They are not the sole purpose of Soldier and leader engagements. C OMBAT C AMERA 9-17. Combat camera provides several benefits to patrols. First, combat camera can record engagements for historical purposes. Second, combat camera images can be used for future public affairs or MISO products. They can also be used to counter threat propaganda. If combat camera assets are not available, units can designate one or more Soldiers to use unit-issued or personal cameras; however, the unit must have a procedure in place for the review, clearance, and disposition of any images taken. T ECHNICAL AND S PECIAL C APABILITIES 9-18. Electronic warfare assets can be coordinated to support operations by jamming, broadcasting, or spoofing to gain information environment effects that support and reinforce maneuver actions. Space assets can be requested to assist with reconnaissance, surveillance, communications, and imagery support. Requests for assets may have to go through the S-2 or S-6, depending on the specific capability and its intended use. 9-19. Tactical military deceptions can be employed to influence a threat decision maker to take actions that give the friendly force a position of relative advantage. Special technical operations can be employed to create effects within the unit’s area of operations that cannot be accomplished by available assets or that would cause too great a risk. Effects in cyberspace may be requested to protect, exploit, or deny the threat the ability to collect or disseminate information in and through cyberspace. This page intentionally left blank.
Appendix AIO Input to Operation Plans and Orders
A-1. Commanders and staffs use Appendix 15 (Information Operations) to Annex C (Operations) to operation plans and orders to describe how information operations (IO) will support operations described in the base plan or order. The IO officer is the staff officer responsible for this appendix. A-2. The Appendix 15 (Figure A-1) that appears on pages A-2 through A-4 is a guide and should not limit the information contained in an actual Appendix 15. Appendix 15 should be specific to the operation being conducted; thus, the content of actual Appendix 15s will vary greatly.
Glossary
Index
Entries are by paragraph number. 1st Information Operations Command (Land), 3-21—3-22
