Page 1 of 8 123 ... LastLast
Results 1 to 20 of 153

Thread: Information Operations

  1. #1
    Small Wars Journal SWJED's Avatar
    Join Date
    Sep 2005
    Location
    Largo, Florida
    Posts
    3,989

    Default Information Operations

    Information Operations by Andrew Exum, Small Wars Journal

    I have a few questions for the learned readership of Small Wars Journal. The first is, how many of you have ever looked up the official Department of Defense definition for ‘Information Operations?’

    According to JP 3-13, Information Operations, the term is defined as “the integrated employment of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.”

    I am confident there exist more confusing definitions in the U.S. military lexicon, but surely there cannot be too many. In effect, the Department of Defense has taken the term ‘information operations’ as understood by cyberwarfare types and mashed it together with the term ‘information operations’ as understood by those of us waging wars of narratives in Iraq and Afghanistan. The resulting confusion has left us with a definition that tries to be everything to everyone while at the same time leaving us with a shoddy definition to communicate what we’re talking about as counter-insurgency theorist-practitioners when we use the term...
    More at the link.

  2. #2
    Council Member
    Join Date
    Oct 2007
    Posts
    1,444

    Default

    I do not see where the confusion is. I regard field manuals and other publications to be about as useful and exciting as the ingredients label on my box of Lucky Charms (you'll never get your hands on them), but this is one definition that I think is pretty straightforward and fairly accurate.

    Do we use IO as shorthand for psychological operations and message management?
    Some people do, but that is because the use of the term "IO" by those unfamiliar with it was often equated with "talking points" in Bosnia or media relations in general or a military version of "strategic communication", and, of course, the dominance of PSYOP in the field, both in terms of personnel and the leveraging of assets, makes PSYOP and IO synonymous in the minds of many. I think if more officers actually read the definition, as the author has, then the confusion would be resolved. Then again, I know that Mr. Exum is a smart guy, so I guess we should do better.

    Obviously, our definition of IO is different from the definition officially in use.
    Not among the IO practicioners, but...

    ... what do we, as counter-insurgency theorists and practitioners, mean when we use the term “information operations?” ... So who out there can propose an alternate definition, and one which we can offer to those in the field in Iraq and Afghanistan? And is “information operations” even an appropriate term for that to which we’re referring?
    A definition more readily accessible to all should be framed in terms of what we are shooting for: information superiority. To that end, it is basically creating a situation in which you can quickly process accurate information about the operating environment and make accurate assessments from it, you heavily influence the degree to which the enemy can process the information quickly and make accurate decisions from it, and others (the populace in the AO) are perceiving events as you wish them to be perceived.

    The first part - quickly processing information and making accurate assessments from it - is where the surveillance and reconnaissance can come in, even though they are not "core" functions of IO. It is not enough to receive the information; we must also have some confidence in how accurate it is, to include knowing when the enemy is attempting a deception and when the enemy is acting upon false information of our own. And this also explains why the definition seems heavily influence cyberstuff. The speed and ease with which we gather and process information is important and CND is a factor.
    The second part - influencing the degree to which the enemy can process the information quickly - is where core functions like EW and CNO come into play, as well as physical destruction - attacking the means by which he gathers and disseminates information. OPSEC is also at play, by denying him information about your activity and objectives. And whenever OPSEC is at play, related capabilities such as counterintelligence and the sub-function of the core CNO (CND) are also in play.
    The third part - the enemy not being able to make accurate decisions from it - is where deception and counterdeception come into play. The enemy does not know if he is being deceived and does not know if his own deception plans are working.
    The perceptions of others are where PSYOP and PA come in (yes, I dare use those two in the same sentence) - and PSYOP can also be leveraged for many of the other functions, especially deception, which makes it very versatile and helps to explain why PSYOP personnel and resources tend to dominate the IO field.
    Last edited by Schmedlap; 06-26-2008 at 09:51 AM.

  3. #3
    Registered User
    Join Date
    Jun 2008
    Posts
    1

    Default IO for the simple man

    I know what follows is not perfectly in line with the official FM/JP 3-13 definitions. Any time your definition requires a definition (who knows what information superiority is, anyway?) there is a real problem. It seems to me that the official definitions are sooo Cold War.

    We talk about the art of war and we send folks to SAMS to make the proficient in the art of maneuver. IO is nothing more complicated than the art of influence.

    Mao TseTong (sp?), if I may paraphrase, said the population is to the guerilla (insurgent) as water is to fish. Our initial efforts in COIN were something like standing on a riverbank with a fishing pole, congratulating ourselves on every catch and thinking somehow we would eradicate all fishes from the water. To eliminate fish (insurgents) you must make the water (population) untenable for them.

    To achieve that we attempt to control information. The official definition of information superiorty speaks to controlling a greater quantity of information than the opponent. In my opinion, that is irrelevant. We need only to control the right information. All of the original 13 elements of IO play a part. IO (influence) cannot be net-centric because the population we are trying to influence is not net-centric. Regardless of how many hours you spend a day on the internet, you still, at some point, talk to actual people. You still are influenced by your culture, your nation, etc. First we must understand the influences on that population, then focus on what we can affect. While I don't like this terminology, the population, not the insurgent, is the target because the population is the insurgents center of gravity. First identify what it will take to influence the target, then bring that to bear. Just like you would not shoot a T72 with an M16, don't send PSYOP out to a village without water - send the resources to get them water that the insurgent cannot provide. I have heard of Vulnerability Assessment Teams (network stuff) going out to areas with a 30% literacy rate in support of below BDE ops. That reeks of "Sprinkle a little IO on it, the generals will be happy and we can go back to killing bad guys." Bad guys are like potato chips, kill all you want, they'll make more.

    Influence is an art, something not subject to algorithms and cold logic. The current definition simply does not fit into current operations. IO will continue to be nothing more than a point of confusion until a relevant, current definition is provided.

  4. #4
    Council Member
    Join Date
    Jun 2007
    Location
    Newport News, VA
    Posts
    150

    Default

    Quote Originally Posted by MAJHefner View Post
    Influence is an art, something not subject to algorithms and cold logic. The current definition simply does not fit into current operations. IO will continue to be nothing more than a point of confusion until a relevant, current definition is provided.
    Brilliant post. Your paragraph above get right to the point, but unfortunately it is cause for pessimism: institutionally we are obsessed with metrics-based thinking, and only really take seriously that which can be counted. Since arts can't be measured, expect us to remain in a state of confusion.
    He cloaked himself in a veil of impenetrable terminology.

  5. #5
    Council Member Ron Humphrey's Avatar
    Join Date
    Nov 2007
    Location
    Kansas
    Posts
    1,099

    Post Good to see you here too,

    I have agree about the definition and the need for somewhat more implicit guidance. The problem however as several of those among us who've been talking about it for a while know seems to be the my piece of the pie syndrom.

    By this I simply mean that because real Information Operations is and should be inclusive of all the varied areas of study mentioned in joint pubs and more. With this being the case it has been my experience that those of any particular discipline percieve and approach it in that light. The EW guys can naturally find all the different ways to gain information superiority with their systems, the same goes for all other groups and as such what you generally get reflects who you've got.

    The statement I've heard most often has been that it seems to get too complicated when you actually start breaking down all the various components and capabilities and there is often an assumption that those charged with doing it won't be able to do it well enough. I would tend to agree with MAJHEFNER in that
    IO is nothing more complicated than the art of influence.
    . It's just made harder by those who try to place it in their own boxes.

    I would suspect that 99% of what a good IO planner works with and the skill sets used are not much different than what most anyone does within the confines of their own lives on a daily basis. That said OK lets get a definition that is more explicatory, the toughest part is going to be making it such that all who read it don't read too much, or too little into it, but rather accept it for what it is.

    BTW remember I always like to over simplify things
    Last edited by Ron Humphrey; 06-26-2008 at 02:06 PM.
    Any man can destroy that which is around him, The rare man is he who can find beauty even in the darkest hours

    Cogitationis poenam nemo patitur

  6. #6
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Quote Originally Posted by Andrew Exum
    In effect, the Department of Defense has taken the term ‘information operations’ as understood by cyberwarfare types and mashed it together with the term ‘information operations’ as understood by those of us waging wars of narratives in Iraq and Afghanistan.
    This is of course quite true. In my research into cyber warfare I have found a variety of definitions and all most all of them under the heading of information operations. This suggests that cyber warfare, psychological operations, public affairs, and such are subsets of information operations. However, I am not sure that is the truth of it.

    As an example network centric warfare has two specific connotations that are worlds apart yet under the same primary heading.

    Example 1: The Arquilla/Ronsfeldt description of network centric warfare is the social networks of individuals and organizations without consideration of technology other than as a force multiplier.

    Example 2: USAF literature describes network centric warfare as the network enabling tools found on the platform and between the weapons platform and command and control constituencies. Technology is the primary element in this paradigm.

    It should be quite obvious that these two definitions are quite far apart yet have communication as a common component. The generalization is that regardless of the technology networks or associations between disparate parts exist and they can be examined and used/defeated based on their cohesion and utilization.

    Then there is cyber warfare. It takes a moment to expand the idea most people have about information technology and computing. Information technology has existed since the written record first leapt from the cave wall to the papyrus scroll. The management and enabling technologies of information have merged with the act of war ever since. Whether it is Caesar tattooing messages to his generals on the shaven scalps of slaves (steganography), or combat telephones in the trenches of World War 1 France for command and control, information conduits are linked to war.

    Thus like land, air, sea warfare and their battle spaces cyber warfare exists in it’s own shared space with them. In 1984 William Gibson on page 8 of “Neuromancer” coined the term “Cyber Space”. Cyber space is a construct and an agreement between entities to define the area we can not see where computers, telephones, and devices communicate and transact on a variety of paths. It is easier to use a known construct and expand upon that then to create a new one out of whole cloth. Cyber warfare exists in that space where command, control, communication, coordination, intelligence, surveillance and reconnaissance (C4ISR) exists.

    When thinking about this space do not artificially limit yourself to the “world wide web” which is fairly small. Digging deeper below the “web” and the “Internet” is the actual battleground. Every unmanned aerial vehicle interacts with this new cyber terrain. The communication infrastructures of the battle groups and artillery units supporting Marines interact with the new terrain. Every message, command, logistics order, telemetry data packet, and email home crosses this terrain.

    I will not go into to much detail as I have likely lost the interest of most people, but there are only five things I can do though I can do them a myriad of different ways. I can block your interaction and deny you the terrain, I can spy on your messages as you send them, I can change the content of your information or command and control, I can make you distrust what have you have received, and finally I can violate the “who” of whom you are speaking. In that I have those five techniques available cyber warfare is linked to the information conduits and information operations paradigm. Even though it is totally discrete much like our two examples of network centric warfare are discrete but linked.

    A variety of technology authors and conflict authors have written about cyber warfare and whether it exists or not. The fact is that all of the elements of cyber warfare have been with us since the beginning of conflict between humans. The metaphors for the information technologies are lifted from the real world aspects of information operations and translated to a new terrain in cyber space. The common refrain that cyber space has little relevancy in the real world as a kinetic attack vector falls quickly to the realization that the network centric battlefield gives the cyber warrior the ability to use the enemies weapons against the enemy.

    Suddenly the cyber-terrain takes on the aspects of a guerilla war where scavenging from the enemy and prosecuting conflict in an asymmetric manner realizes the goals of information advantage and kinetic results in the real world. If I take over your UAV through cyber-warfare and blow up your troops by violating the command-control and telemetry systems that is a real world effect through cyber warfare. If for example the bullets for front line troops in dire need are translated to beans the operational and kinetic capability of the troops is degraded in the real world through the cyber. Is that still in the realm of information operations?

    Quote Originally Posted by Andrew Exum
    My challenge for this website’s readers, then, is the following: what do we, as counter-insurgency theorists and practitioners, mean when we use the term “information operations?” Do we use IO as shorthand for psychological operations and message management?

    I would say simply yes this is true. The reason for the mashup by the cyber-warfare types is that what ever is created in the real world can likely be translated to the cyber realm fairly quickly.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  7. #7
    Council Member Tom Odom's Avatar
    Join Date
    Oct 2005
    Location
    DeRidder LA
    Posts
    3,949

    Default

    Originally Posted by Andrew Exum
    My challenge for this website’s readers, then, is the following: what do we, as counter-insurgency theorists and practitioners, mean when we use the term “information operations?” Do we use IO as shorthand for psychological operations and message management?
    Andrew,

    In the current operational context, absolutely. In a more conmventional setting probably not--then the cyber war or EW ened would come back into play. That siad, it is NOT always that way. In 94 the world lost the IO war that driected the genocide in Rwanda. We lost the message war. We obviated our roles in the influence war. And we never took up the cudgel part of IO to shut down Radio Milles Collines.

    Tom

  8. #8
    Council Member
    Join Date
    Oct 2005
    Posts
    3,169

    Default Andrew is right

    I tend to agree with Andrew's comments about IO. First, definitions are obviously very important, since we can't comunicate clearly without them. Of course we live in a gray world, but words still have meaning, and should provide as much clarity as possible, and you don't do that with the incorrect use of terms. Unfortunately, the definition of IO presents problems based on its current scope as defined by DoD.

    When IO first developed, it was DoD's response to the rapidly emerging Information Age (largely technology based). It was offensive and defensive in nature, but technically focused. Somehow PSYOP got thrown into the mix, which I think was a serious mistake because we took a needed technical speciality and turned it into the overall art of war. Now IO means everything, so it really means nothing.

    I tend to like the new terms in the Army's FM 3-0, and hope that eventually DoD will develop Joint terms along a similiar line of thought to help clarify the confuse that IO creates.

    Influence Operations: to effect the behavior of the intended audience through coercion, information engagement, presence and conduct.

    Information Engagement: the government's use of integrated employment of public information programs, psychological operations, and support leader and government activities (reparing a school, security force behavior) to influence a target audience.

    While not perfect they are closer to what we are actually doing, but we still a definition for the high technology side of IO for computer attack and defense, etc. Everyone now has their biases, so it will be hard to fix this, but ideally would go to a clean slate and start over with these terms. I really wonder if there is any utility in lumping all those activities under one blanket term to begin with?

  9. #9
    Council Member marct's Avatar
    Join Date
    Aug 2006
    Location
    Ottawa, Canada
    Posts
    3,682

    Default

    Quote Originally Posted by MAJHefner View Post
    Mao TseTong (sp?), if I may paraphrase, said the population is to the guerilla (insurgent) as water is to fish. Our initial efforts in COIN were something like standing on a riverbank with a fishing pole, congratulating ourselves on every catch and thinking somehow we would eradicate all fishes from the water. To eliminate fish (insurgents) you must make the water (population) untenable for them.
    I have always had a problem with this metaphor based on a) the assumed stance of the perceiver and b) the assumption of non-action" by the "water". In regards to IO, again using this metaphor, it implies poisoning or draining the water such that the fish can no longer breath. This might make sense in some COIN situations (e.g. Bolivia), but does it make sense in places such as Afghanistan? Only to a limited degree I would suspect.

    Quote Originally Posted by MAJHefner View Post
    Influence is an art, something not subject to algorithms and cold logic. The current definition simply does not fit into current operations. IO will continue to be nothing more than a point of confusion until a relevant, current definition is provided.
    Quote Originally Posted by Stevely View Post
    Brilliant post. Your paragraph above get right to the point, but unfortunately it is cause for pessimism: institutionally we are obsessed with metrics-based thinking, and only really take seriously that which can be counted. Since arts can't be measured, expect us to remain in a state of confusion.
    Actually, many "arts" can be measured, but the metrics tend to be meaningless to the particular institutional mind-set you are referring to Stevely. Let me give you an example of this: "music", as an art form, is composed of rhythm, pitch and timbre that are produced sequentially through time. Each of these three, let's call them "base measures", can be measured, as can several of the emergent properties coming out of them such as harmonics. Where we run into difficulty is with he measurement of the effects of such emergent properties on humans. In part, this is because the neurology of humans with regards to something like pitch is not fixed at birth but, rather, is fixed at the age of abut 6 months. Furthermore, the interpretation, at a psycho-neurological level, is conditioned by individual experiences with, or conditioning by if you prefer, a given musical genre over time. The reason why I chose the example of music is that, to my mind, it is a good analogy for the more generalized case of "Information Operation".

    Let's consider how we should break them down analytically (and remember, I'm an academic, not an IO type ).
    1. "Information" - defined as "a difference that makes a difference" (Gregory Bateson) is composed of
      1. something within the environment that may be so classed and,
      2. the perception (or sensing) of that something.
    2. The interpretation of that information; which is composed of
      1. a symbol system that defined what is information within the system,
      2. analytic "tools" (actually symbolic manipulations) of that information to derive "meaning", and
      3. a prescriptive system for action based on interpreted "meaning" (all of this comes from Andrew Abbott's, the System of the Professions).
    3. Actions taken based on the interpretation of that information.
    Now, that is the simplified system, and it gets much more complex later on . In particular, there is another, cross-cutting, dimension to this which deals with the media of communications in all of these steps. All media, barring face-to-face (F2F; which I'll talk about latter), distort the default value of communications for humans (F2F is the default value in that we evolved as a species using this medium) in either (or both) time and space. These distortions effect how the gathering, analysis and conclusions of IO are conducted and interpreted.

    Face-to-face communication is the basic form of communications we, as a species, evolved with and is our "default value" for communicative media. This doesn't mean that people tell the "objective truth" (if such a thing can be told!) when they are talking face to face. What it does mean, however, is that we have a lot of neural circuity that acts to detect "lying", "cheating". Also, F2F communications contains a lot more "information" that we have available for interpretation (e.g. tonality, body language, eye positioning, scent, pitch, rhythm, timbre, etc.). This additional "information" (actually, sensory output) allows for an increased number of emergent properties such as "charisma", "spinning illusions", etc.

    You know, this is turning into a rather long response . I think I'm going to leave it there for now and write up a blog entry on it.

    Marc
    Sic Bisquitus Disintegrat...
    Marc W.D. Tyrrell, Ph.D.
    Institute of Interdisciplinary Studies,
    Senior Research Fellow,
    The Canadian Centre for Intelligence and Security Studies, NPSIA
    Carleton University
    http://marctyrrell.com/

  10. #10
    Council Member
    Join Date
    Oct 2007
    Posts
    1,444

    Default

    I was surprised that there is so much confusion on this issue, but upon searching 3-24 I only found one passing reference to Information Superiority, and it was in Appendix E. However, in the old FMI 3-07.22, I found this, which sums it up pretty well, in my opinion:

    The goal of IO is to gain and maintain information superiority at decisive points. Information superiority is the operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same (FM 3-0).
    I think that much of the discussion on this thread is borne of misperceptions of IO rather than of some defect in the concept of conducting operations in the information environment. The real issue is how we organize our staffs and how we task various assets to accomplish it.

  11. #11
    Council Member wm's Avatar
    Join Date
    Dec 2006
    Location
    On the Lunatic Fringe
    Posts
    1,237

    Default IO in a nutshell (or two)

    IO is really A PAIN:

    Availability
    Privacy
    Authenticity
    Integrity
    Non-repudiation

    In its offensive form (nutshell #1), one denies one's opponent the above attributes of information.
    In its defensive form (nutshell #2), one assures one's own side of the same attributes.

    PSYOPS, OPSEC, EW, Fires, Information Assurance(IA)/Cyberwar, etc. are all TTPs one may use to achieve the above goals. Like pretty much everything else in the world of operations, each is METT-TC dependent.
    Vir prudens non contra ventum mingit
    The greatest educational dogma is also its greatest fallacy: the belief that what must be learned can necessarily be taught. — Sydney J. Harris

  12. #12
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default What are we trying to build?

    Quote Originally Posted by Schmedlap View Post
    I was surprised that there is so much confusion on this issue...
    Could that be because we're trying to pin down a process that is being learned on the fly and is in considerable flux?
    I think that much of the discussion on this thread is borne of misperceptions of IO rather than of some defect in the concept of conducting operations in the information environment. The real issue is how we organize our staffs and how we task various assets to accomplish it.
    True and as wm said:
    ...Like pretty much everything else in the world of operations, each is METT-TC dependent.
    Could it be that the search for clarity and coherence in an effort to simplify (possibly oversimplify???) a very complex and conditional process might obscure the flexibility needed to adapt and cope with multiple changing environments?

    Sounds like a way to inadvertently design a straight jacket to me...

    Or is that a strait jacket...

  13. #13
    Council Member
    Join Date
    Oct 2005
    Posts
    3,169

    Default

    http://www.army.mil/professionalwrit...05/5_05_3.html

    The "IO Roadmap" provides strategic-level IO guidance for the current security environment defined in the latest QDR and NSS. The draft update of JP 3-13 incorporates the "IO Roadmap" and a new DOD IO definition: "The integrated employment of the specified core capabilities of Electronic Warfare [EW], Computer Network Operations (CNO), PSYOP [psychological operations], Military Deception, and Operations Security [OPSEC], in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decisionmaking, while protecting our own."9 The "IO Roadmap" groups IO elements in the following categories:

    -Core capabilities (EW, CNO, OPSEC, military deception, PSYOP).

    -Support capabilities (information assurance, physical security, counterintelligence, physical attack).

    -Related capabilities (public affairs, civil-military operations).10
    http://www.fas.org/irp/agency/army/t...d_doctrine.htm

    This post is somewhat dated, but contains some worthwhile observations:

    The strategy of using IO within military operations has a long history. The Army focuses on IO as an overarching strategy with a variety of capabilities that influence an adversary. Sun Tzu focused on the mind of the opponent in much the same way one would moving chess pieces to attain checkmate in a game of chess. The ultimate objective is gaining information superiority.

    IO is not just the current trend of technology—it is the use of many aspects information targeted to achieve a specific affect or influence the adversary. Examples of IO include electronic warfare (EW), computer network attack systems, deception, and psychological operations using human factors to target as pressure points throughout an operation. The information environment is an aggregate of individuals, organizations, or systems that collect, process, or disseminate information; this environment also includes the information itself. The use of information and information technologies to influence the outcomes of conflicts has become a hot topic in the military and intelligence community. The increasing number of computer “hacking” incidents in both the private and public sectors has risen exponentially. The legal and policy issues of IO in this technology-driven environment are also under review. The use of “information as a weapon” within this ever-changing state of technology involves a tremendous amount of collection and analysis to support a specific outcome.

    Given this realization, what are the expectations of and support for each echelon regarding IO?
    There is more at each link, but with the exception of computer network attack, which the J3 doesn't control (in most cases), what is new? It is still unclear (despite statement to the contrary in this forum) on the purpose and intent of lumping all these activities under the IO umbrella. Having worked on a few joint operations, I have not yet seen the pratical value of IO as a stand alone doctrine. It does force people to play lip service to it, but the overall integration has been relatively lame in most cases (despite some cool looking power point slides that indicate otherwise). In my opinion, the failure to fully realize the power of IO is the failure to clarify how it should be integrated successfully in planning and operations. Clarifying isn't simplifying it, clarifying a complex concept is hard work.

    For those who say there is no problem, I doubt they are current planner or operators, because I still enjoy listening to the SAMS graduates, NPS graduates, and senior officers sitting around debating IO. All of the conversations are informative, but they also indicate a level of immaturity of our current IO doctrine.

    Of course it needs to be done, and it always has, I'm not underestimating the power of what IO attempts to accomplish, but rather would we and could we accomplish it anyway without IO doctrine? Since at least WWII we used EW, PSYOP, Deception and OPSEC with varying degrees of success. Did IO doctrine make us better? If so, how?

    By all means we should continue to develop/improve our doctrine related to influence and the incorporation of advanced information technology to support defensive and offensive operations, but is there really a need to lump everything under one IO umbrella or is it just operations?

  14. #14
    Council Member
    Join Date
    May 2008
    Location
    Lorton, VA
    Posts
    13

    Default

    I think the basic problem for the JP 3-13 definition is that it starts off defining the components and then tells us what they do. I do not believe the definition of IO should list the components, plain and simple. If the definition for IO is too broad and vague, then deal with it, change it into something useful.

    The components should be listed, but elsewhere in JP 3-13. Chances are, if this is done, the number of components will suddenly increase. The simple premise is that everything can influence, everything should be considered for its effect on the targeted decision-maker, group of people or a general population. Dropping a kinetic bomb on a target might take out a telephone switch, a fiber-optic hub or a bad-guy, ALL of these will have meaning to selected person(s).

    The scary thing to many conventional thinkers is that this threatens the old style of thinking, it would present a Revolution in Military Affairs, of sorts.

    One of the major drawbacks would be a huge increase in the wargaming efforts required for planning, and there can be no handwave for this. Not only will the S/G/J-2 be required to play the part of the enemy, but might have to represent the population - it might require a whole new player. Depending on the situation someone might have to roleplay a religious group, another might play tourists, another might play affected diplomats, another might play the population in surrounding countries.

    This is more an eventuality, actually, IMHO.

  15. #15
    Registered User MTanji's Avatar
    Join Date
    Jan 2007
    Posts
    4

    Default

    You have highlighted a long-standing issue that has yet to be addressed with any level of effort as far as I know: IO tends to be what you want it to mean based on your discipline. Spend time in cyber-centric shops and they will tell you they do IO; same goes for PSYOP orgs or shops full of head shrinkers. Do they all do _aspects_ of IO? Sure. Who does IO writ-large? No one and that's always been our problem. Doctrine we have, organization, not so much. Find me any other military discipline that does not have a single proponent or "parent."

    One could argue that since discrete parts of IO can be used in a lot of places in a lot of ways that it makes sense to roll your own as you go along. The problem with that is self evident with the duplication, repetition and sometimes cross-purposes we've been running into over the past decade-plus. There is nothing like standing up in front of an allied audience explaining US IO doctrine and then not having a decent answer to the obvious questions: "So is this how you are organized?" and "Where is your national IO office?"

    There was a time when I knew personally or by reputation most if not all the major players in the IO space (IW back in the day). Just a few years later that was not the case. Is that good or bad? It's good in the sense that people recognize the value and we achieved critical mass; bad in that it is in essence a Hydra we can't get our hands around.
    =====
    Michael Tanji
    michael.tanji@threatswatch.org

  16. #16
    Council Member
    Join Date
    Oct 2005
    Posts
    3,169

    Default It isn't a revolution

    The scary thing to many conventional thinkers is that this threatens the old style of thinking, it would present a Revolution in Military Affairs, of sorts.
    Joelhar, I think you made a couple of good points, but I'm not so sure this is a Revolution in Military Affairs. I do agree every action can influence behavior. Once upon a time we just called this operational art, and if the various specialists (deception, intelligence, Operations Security, Electronic Warfare, etc.) understood their commander's intent and the strategic through tactical objectives, they were able to effectively apply their trade. PSYOP and influence operations have always been and will remain paramount, the advent of IO doctrine didn't change that, if anything it created unneeded confusion.

    I'm not hard set against IO doctrine, but I agree that defining it with a few components is very misleading and not helpful.

    The simple premise is that everything can influence, everything should be considered for its effect on the targeted decision-maker, group of people or a general population. Dropping a kinetic bomb on a target might take out a telephone switch, a fiber-optic hub or a bad-guy, ALL of these will have meaning to selected person(s).
    Thus if this statement is true, do we need a separate speciality area that requires its own doctrine or is it just part of operational art?
    Last edited by Bill Moore; 06-26-2008 at 10:29 PM.

  17. #17
    Council Member Rockbridge's Avatar
    Join Date
    Aug 2007
    Location
    Virginia
    Posts
    28

    Default IO really isn't as hard as we make it

    Well, this is a fascinating discussion about what we think the definition of IO should be versus trying to figure out how to work with the definition that we've got. The longer we continue to debate "how come," the longer it will take to get things going in the right direction. All the debates about whether the definition of IO in JP 3-13 definition fits "what we're really doing downrange" appear to be lacking in the distinction among tactical, operational, and strategic applications of IO, which clearly employ different assets and different methods.

    To answer the earlier question about whether or not IO should be used as shorthand for PSYOP and message management by Irregular Warfare practicioners, the answer is simple: "Only if you have no interest in being doctrinally correct." The Irregular Warfare Joint Operating Concept specifically states on p36 that Information Operations fits into the current concept for Irregular Warfare, thusly "Conduct information operations (operations security, information security, military deception, PSYOP, electronic warfare, computer network attack and defense; and physical destruction) in support of IW campaign objectives." Although the IW JOC itself got the definition of IO wrong (why should JOCs be constrained by doctrine??), the intent is clearly to employ a lot more than just PSYOP and message management. With regard to the use of IO as shorthand for "PSYOP and message management," it clearly sounds like a tactical (or possibly operational) application of IO by an element that doesn't have any other assets. In other words, IO for a unit that only has PSYOP and "messaging" assets will obviously only include those assets. Other units with more assets will conduct a wider variety of operations and use more assets when they conduct IO.

    We seem to expend a lot of energy worrying about how "my IO doesn't look like your IO" when the real objective of IO is not to employ a specific set of capabilities, but to employ all available capabilities in order to influence the thoughts and actions of adversary and neutral parties. Fortunately, that includes killing those who need to be killed so they don't have thoughts or actions any more.

    This stuff really isn't that difficult.
    You can get more with a kind word and a gun than you can with a kind word alone

  18. #18
    Council Member
    Join Date
    Oct 2007
    Posts
    1,444

    Default

    Quote Originally Posted by Ken White View Post
    Could that be because we're trying to pin down a process that is being learned on the fly and is in considerable flux?
    My surprise was not that we are wrangling with process. I think that is one issue that needs to be fixed. As I wrote, "The real issue is how we organize our staffs and how we task various assets to accomplish it." Instead, I was surprised that there is a fundamental confusion/disagreement as to what information superiority is. How do we organize the staffs and C2 relationships with the assets if we can’t even agree upon what we’re using them for? But, upon reading the comments here and upon further reflection on the level of understanding that I have seen demonstrated in various units, I guess this should not surprise me.

    What information superiority is, is pretty straightforward and merits very little discussion or elaboration...

    The goal of IO is to gain and maintain information superiority at decisive points. Information superiority is the operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same (FM 3-0).
    I think if more commanders and staff know what information superiority is, then they will rather quickly figure out how to achieve it. Unfortunately, I doubt that most commanders or staff know what information superiority is. Otherwise, they would not be notorious for wanting to "sprinkle in some IO" with their operations as a last minute modification to a plan.

    Maybe we need a PSYOP TPDD to print up some handbills as part of an awareness campaign. Do a leaflet drop over Leavenworth.

  19. #19
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default That'll work...

    Quote Originally Posted by Schmedlap View Post
    ...Maybe we need a PSYOP TPDD to print up some handbills as part of an awareness campaign. Do a leaflet drop over Leavenworth.
    That and move the 'doctrine' writing out of the hands of the Snowbirds and Blackbirds. I kid, Guys, I kid...

    Definitions are good but they can also be constricting. In an area of effort that really follows Moore's law with respect to development and major change speed, too much specificity might be a bad thing. Can a generic joint service definition for much of anything really be judged applicable to all services at all echelons in all environments? Perhaps -- but once you get out of hardware, I've never seen it work. Excessive centralization stifles creativity and initiative.

    As Bill Moore said, this is operator stuff and it's not all that new, we just bundled some things. Every time we do that -- and we do it about every ten years or so -- it initially creates some confusion. That usually gets sorted out in a few months.

    There are a lot of FlagOs getting big bucks and many hassles and they're smart guys with mostly decent staffs; they can work out what they need for their job without a lot of undue precision...
    Last edited by Ken White; 06-27-2008 at 12:58 AM.

  20. #20
    Council Member
    Join Date
    Oct 2005
    Posts
    3,169

    Default Information superiority?

    Originally Posted by Schmedlap
    ...Maybe we need a PSYOP TPDD to print up some handbills as part of an awareness campaign. Do a leaflet drop over Leavenworth.
    The real issue is how we organize our staffs and how we task various assets to accomplish it
    I didn't see information superiority in the IO definition, but I think information superiority is a great "objective", but it will involve more than the five or so disciplines listed in the IO definition.

    I like the term information superiority, simply state it as a goal/objective, and then organize the staff to accomplish it. I think that answers the mail? That allows for maxium flexability based on each unique situation. I'll still argue there is nothing "simple" about this. It is a very complex endeavor, and one that I have rarely seen done well. The "value" of IO and information superiority is its impact on accomplishing the mission, so lets say the definition is simple, that still doesn't equate to success in accomplishing it.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •