1st IO CMD (Land) IO and MDMP
Information IPB
IPB Step IO Focus Analysis Product
MDMP Step IO Focus
IO Planner s Aid
Define the
Receipt of " Conduct initial assessment of info op
Define the
Combined Information
Information
Mission " Determine IO planning requirements
Battlefield
Key Definitions Overlay - Significant
Environment
" Understand IO situation
characteristics of the
Information Operations: (IO) The employment of the
" Analyze HHQ information operation
info environment &
Describe the
Mission
core capabilities of electronic warfare, computer " Define & analyze the info environment and
Describe the
effects on operations
Analysis Information
threat
network operations, psychological operations, military
Battlefield s
Environment s
" Develop IO mission statement & objectives
deception, and operations security, in concert with
Effects
" Seek commander s IO guidance Effects
specified supporting and related capabilities, to affect
or defend information and information systems, and to
COA " ID friendly IO capabilities & vulnerabilities
Threat COG Analysis -
influence decision making. (FM 3-13) " Develop IO concept of support
Development
Critical vulnerabilities
Information Environment: The aggregate of Threat Templates - Who
" Visualize operations in the info environment Evaluate the
Evaluate
COA
individuals, organizations, or systems that collect, " Wargame IO concept of support against makes decisions; what
Threats Info
the Threat
Analysis
how the enemy will employ its information
process, or disseminate information; also included is nodes, links, & systems
System
systems and assets
the information itself. (FM 3-0) the threat uses; how
COA info assets are employed
" Analyze & evaluate IO support to each
Information Superiority: The operational advantage
Comparison
COA
derived from the ability to collect, process, and
COA
disseminate an uninterrupted flow of information while
Information SITEMP -
" Finalize details of the information operation
Determine
Approval
exploiting or denying an adversary's ability to do the
When, where, & why
Determine Threat Actions
" Prepare IO annex & input to base
Orders
same. (FM 3-0)
the threat will seek to
Threat COAs in the Info
order/plan
Production
gain info superiority
Environment
Updated by EWA IIT (Garry Beavers) November 2003
Validity Testing for COGs
Centers of Gravity (COG) COG Analysis Steps
Will destruction, neutralization, or substantial weakening of the
1. Identify potential threat COGs. Visualize the threat as a system of
COG
COG result in changing the threat s COA or denying its objective?
functional components. Based upon how the threat organizes,
COG Analysis
fights, makes decisions, and its physical and psychological
Hierarchy
Does the friendly force have the resources and capability to
strengths and weaknesses, select the threat s primary source of
CC CC CC
accomplish destruction or neutralization of the threat COG? If the
moral or physical strength, power, and resistance.
answer is no , then the threat s identified critical factors must be
reviewed for other critical vulnerabilities, or planners must
2. Identify Critical Capabilities (CC). Each COG is analyzed to
CR CR CR CR
reassess how to attack the previously identified critical
determine what primary abilities (functions) the threat possesses in
vulnerabilities with additional resources.
the context of the battlefield and friendly mission that can prevent
CV CV CV CV CV CV
friendly forces from accomplishing the mission. Each identified CC
must relate to the COG, otherwise it is not critical in the context of
Criteria for CV Analysis (CARVER)
Definitions the analysis.
" Criticality. An estimate of the CVs importance to the enemy. A
3. Identify Critical Requirements (CRs) for each CC. A CR is a
Center of Gravity (COG): Primary source of moral or vulnerability will significantly influence the enemy s ability to
condition, resource, or means that enables threat functions or
conduct or support operations.
physical strength, power, and resistance.
mission. CRs are usually tangible elements such as
" Accessibility. A determination of whether the CV is accessible to
Critical Capability (CC): Primary abilities which merit a communications means, weapons systems, or even geographical
the friendly force in time and place.
areas or features. There may be more than one CR per CC.
COG to be identified as such in the context of a given
" Recuperability. An evaluation of how much effort, time, &
scenario, situation, or mission. resources the enemy must expend if the CV is successfully
4. Identify Critical Vulnerabilities (CVs) for each CR. A CV is a CR, or
affected.
component of a CR, which is vulnerable to attack or influence. As
Critical Requirement (CR): Essential conditions,
" Vulnerability. A determination of whether the friendly force has
the hierarchy of CRs, and CVs are developed, inter-relationships
resources, and means for a critical capability to be fully
the means or capability to affect the CV.
and overlapping between the factors are sought in order to identify
operative.
" Effect. A determination of the extent of the effect achieved if the
CRs and CVs that support more than one CC. When selecting
CV is successfully exploited.
CVs, CV analysis is conducted to pair CVs against friendly
Critical Vulnerability (CV): Critical requirements (or
" Recognizability. A determination if the CV, once selected for
capabilities.
components thereof) which are deficient or vulnerable to
exploitation, can be identified during the operation by the friendly
attack or influence in a manner achieving decisive
force, and can be assessed for the impact of the exploitation.
results.
Example IO Mission and Objectives
Defensive IO Effects
Example Combined Information Overlay (Tactical Corps mission)
EFFECTS DESCRIPTIVE EXPLANATION
PROTECTION Actions taken to guard against espionage or
IO Mission: On order, XX Corps IO disrupts 1st Operational
capture of sensitive equipment and information.
Significant characteristics of each information
Strategic Command (OSC) ground and air defense forces
sub-environment
command and control, influences civilian populace
DETECTION Discover or discern the existence, presence, or
perceptions, and protects Corps critical information in the fact of an intrusion into information systems.
AOR in order to facilitate destruction of 1st OSC forces.
RESTORATION Bring information systems back to their original
Combined Information Overlay
state.
External info flow & influence
IO Objectives:
from neighboring country
Info Sub-Environment A: Northern Plains
" Populace: Group X Majority (80%)
" Disrupt 1st OSC AD C2 in order to prevent coordinated
RESPONSE React quickly to an adversary s information
" Info flow: Primary info source is outside country
" Info infrastructure: Underdeveloped & dilapidated
engagement of XX Corps deep attacks. operations attack or intrusion.
" Support: Largely anti-government regime
" Favors friendly force operations
(FM 3-13)
" Destroy 1st OSC headquarters in order to neutralize
Info Sub-Environment B: Central Mountains
" Populace: Sparsely populated by Group Y
command and control between battlezone and reserve
" Info flow: Information vacuum
" Info infrastructure: Canalized along ground LOCs Possible IO Tasks (Non-Doctrinal)
forces.
" Support: Ambivalent toward government-regime
" No significant impact on friendly force operations
Control Inform
" Disrupt operational reserve CPs and communication
Info Sub-Environment C: Southern Plains
Counter Interdict
" Populace: Densely populated by Group Y (95%)
nets in order to delay employment of reinforcing or
" Info flow: Follows ground LOCs
Counter-Recon Isolate
" Info Infrastructure: Well developed info infrastructure; counterattack forces.
supports military C2; key nodes in cities
Defeat Jam
" Support: Strong support for current government regime
" Influence civilian populace in occupied areas in order to
" Favors enemy operations
Delay Neutralize
minimize interference with XX Corps operations.
Civilian info infrastructure must
Demonstrate Persuade
be interdicted to reduce threat
" Deny SPF detection and identification of XX Corps
Coax Roads Key Nodes Info Flow
advantage Destroy Prevent
main and tactical CPs in order to prevent targeting by
Deter Protect
1st OSC artillery fires.
Engage Secure
Graphic portrayal of information environment
Fix Suppress
Note: Italicized tasks are proposed IO tactical tasks.
Offensive IO Effects
Example Course of Action Sketch
Mission to Task Products
(Deliberate Attack Mission)
How IO will support the
IO concept of support:
IO Mission Statement
command s mission
Map of AO with
objectives and tasks
(Who, What, Where, EFFECTS DESCRIPTIVE EXPLANATION
locations of IO tasks
(for this mission)
When, Why) DESTROY Physically render adversary information useless
or INFOSYS ineffective unless reconstituted.
What IO will do to affect
IO Objectives Information Superiority: 1st OSC unable to conduct
5 synchronized reaction to the Coalition main attack.
5
XX
the info environment
2
2 1
4
1 IO Objectives:
DISRUPT Break or interrupt the flow of information 3
(Effect, Object of Effect 4
" Destroy 1st OSC C2 IOT neutralize C2 between
3-5 Objectives per Phase.
between selected C2 nodes. SPF battlezone and reserve forces.
2
Caution: Each IO Objective [Target], Purpose of
" Influence populace IOT minimize interference with
4
6 Coalition operations.
generates a Wargaming 7
the Effect)
4
6 7
DEGRADE Reduce the effectiveness or efficiency of
IO Element Tasks:
Worksheet.
XX
adversary command and control systems, and 7 PD:
6
1
1. Destroy Corps and Division CPs.
What actions the 3
4
Tasks to IO Elements information collection efforts or means.
2. Destroy forwards observers and recon in zone.
elements will perform to I
EW :
E W
3. Jam Corps-Division C2 nets.
execute the info op DENY Withhold information about Army force
4
PSYOP :
XXX
I
capabilities and intentions that adversaries 3 4. Inform populace of coalition intentions, location
(Task, Purpose)
E W 1
of HA, and DC routes and camps.
TAC
need for effective and timely decision making.
5. Employ TPT in direct support of maneuver units.
XXX
Civil Affairs:
3
Task, Purpose 1
Tasks to Units
6. Distribute HA to DC camps.
Main
DECEIVE Mislead adversary decision makers by
Public Affairs:
manipulating their understanding of reality. 7. Publicize Coalition role in HA support.
How the info operation
Time Line Phase I Phase II Phase III
1
will be conducted
PD 2
EXPLOIT Gain access to adversary command and control
3
EW
5
(Cdr s Intent for IO,
PSYOP 4
systems to collect information or to plant false
6
CA
Info Superiority for the
IO Assessment
or misleading information. PA 7
IO Concept of Support Operation, General Plan
Timeline (by phase) of IO task execution
for IO, Priority of Support, INFLUENCE Cause adversaries or others to behave in a
manner favorable to Army forces.
Restrictions on the
U.S. Army, 1st Information Operations Command (Land) product
Employment of IO)
updated by EWA-IIT (Garry Beavers)
(FM 3-13)
Attack
Main
Wyszukiwarka
Podobne podstrony:
2003 02 Fstab Key to Information on Partitions Volumesus iraqi shia 2003US Army Engineer Diving Operations FM 5 490US Army TM 9 1005 317 10 Operator s Manual For M9 9mm PistolUS Military Field Manual CIAs Psychological Operations in Guerrilla Warefare how NAM was won!us lset report 46tw 2003ECDL 7 Us ugi w sieciach informacyjnychTeoria i metodologia nauki o informacjiplan nauczania technik informatyk wersja 1t informatyk12[01] 02 101informatyka w prawnicza testyWyk6 ORBITA GPS Podstawowe informacjeVA US Top 40 Singles Chart 2015 10 10 Debuts Top 100więcej podobnych podstron