SlideShare uma empresa Scribd logo
1 de 26
Information Operations:
What It Is and Why It MattersWhat It Is and Why It Matters
Presentation to AOC EW Asia 2014 Conference
Mr Jeff Malone
Defence Science and Technology Organisation
(Australia)
Scope
• The Origins and Evolution of Information
Operations
• The US Joint Approach to Information
OperationsOperations
• The Role of Electronic Warfare within
Information Operations
• Emerging Issues
The Origins and Evolution of
Information OperationsInformation Operations
Command Control Communications
Countermeasures (C3CM)
• Emerged in the late
1970s
• Based on identified
vulnerabilities in Soviet
C3I systems
• Integrative operational
concept
• Entailed both defensive
and offensive actions
Operation DESERT STORM: The First
Information War (?)
• First major employment
of C3CM
• Also entailed major
Psychological
Operations activities
• Presented a range of
synchronisation and
deconfliction issues
Information Warfare (IW) and
Command and Control Warfare (C2W)
• IW emerges in 1992 – initial definition TOP
SECRET
– Entailed strategic employment of Computer
Network Attack (CNA)
C2W emerges in 1993 – “the operational• C2W emerges in 1993 – “the operational
employment of IW on the battlefield”
– Adds Psychological Operations to the C3CM suite
of activities
– Like C3CM encompasses both offensive and
defensive actions
The Limitations of IW/C2W and the
Emergence of Information Operations (IO)
• Scope of IW/C2W problematic:
– Only applicable in warfighting?
– Only applicable against the Command and Control
target set?
– Only entails specified capabilities?– Only entails specified capabilities?
• By mid 1990s, IO emerges as a more
encompassing term (initially in US Army)
• Instantiated in joint doctrine in 1998
– Joint Publication 3-13, Information Operations
• IO remains the core term (in joint doctrine)
Trends in the Evolution of Information
Operations
• From warfighting only to applicability across
the spectrum of operations
• Expansion from C3I target set to human
decision making more generally (including thedecision making more generally (including the
systems which enable and support decision
making)
• Expansion in the range of information-based
capabilities to be integrated and deconflicted
The US Joint Approach to Information
OperationsOperations
IO: US Joint Doctrinal Definition
• “The integrated employment, during military
operations, of information-related capabilities
in concert with other lines of operation to
influence, disrupt, corrupt, or usurp theinfluence, disrupt, corrupt, or usurp the
decision-making of adversaries and potential
adversaries while protecting our own.”
Source: Joint Publication 3-13, Information Operations, 27 November 2012
Information-Related Capability (IRC)
• “A tool, technique, or activity employed within
a dimension of the information environment
that can be used to create effects and
operationally desirable conditions.”operationally desirable conditions.”
Source: Joint Publication 3-13, Information Operations, 27 November 2012
The Information Environment
Source: Joint Publication 3-13, Information Operations, 27 November 2012
Examples of IRCs
• Electronic Warfare (Electromagnetic Spectrum
Operations)
• Cyberspace Operations
• Operations Security• Operations Security
• Military Deception
• Psychological Operations
• Kinetic Targeting
• (and many others)
Source: Joint Publication 3-13, Information Operations, 27 November 2012
The Role of Electronic Warfare within
Information OperationsInformation Operations
Electronic Warfare
• “Military action involving the use of
electromagnetic and directed energy to
control the electromagnetic spectrum or to
attack the enemy.”attack the enemy.”
Source: Joint Publication 3-13.1, Electronic Warfare, 8 February 2012
Overview of Electronic Warfare
Source: Joint Publication 3-13.1, Electronic Warfare, 8 February 2012
Electronic Warfare and Other IRCs
• Cyberspace Operations
– Can provide a pathway for attacks on wireless networks (or deny them)
• Operations Security
– Electronic Protection contributes to overall defensive posture, from
platform to force level
• Military Deception• Military Deception
– Both a channel for conveying deception message and countering adversary
deception activities
• Psychological Operations
– Provides a channel for dissemination and blocking adversary dissemination
• Kinetic Targeting
– Provides actionable targets for attack
• Intelligence Support (common to all the above)
– Contributes to overall intelligence effort which supports planning,
operations and battle damage assessment/re-tasking
Emerging IssuesEmerging Issues
Access to Spectrum
Mobile Devices and Social Media
Precision Location and Timing
The Evolving Counter-IED Battle
Unmanned and Autonomous Systems
Directed Energy Weapons
ConclusionConclusion
EW-IO-Cyber-EMS Operations
Convergence and SynergiesConvergence and Synergies
Hotel Grand Chancellor Adelaide,
South Australia, 18-19 August 2014

Mais conteúdo relacionado

Mais procurados

The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?Norbert Schepers
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share104016032
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLNilendra Kumar
 
Deterrence Theory in International Relations
Deterrence Theory in International RelationsDeterrence Theory in International Relations
Deterrence Theory in International RelationsBalaram Pradhan
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
International Security 3
International Security 3International Security 3
International Security 3alw1125
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
War and Peace in the 21st century, or Will the World Collapse in the Next 10-...
War and Peace in the 21st century, or Will the World Collapse in the Next 10-...War and Peace in the 21st century, or Will the World Collapse in the Next 10-...
War and Peace in the 21st century, or Will the World Collapse in the Next 10-...Azamat Abdoullaev
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11Dr. Alok Yadav
 
International Humanitarian Law Lecture 18 - Protection of Different Categorie...
International Humanitarian Law Lecture 18 - Protection of Different Categorie...International Humanitarian Law Lecture 18 - Protection of Different Categorie...
International Humanitarian Law Lecture 18 - Protection of Different Categorie...Nilendra Kumar
 
US Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The YearsUS Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The YearsEling Price
 
Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Neil McDonnell
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaJustin Ordoyo
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security EducationValentin Bañaco
 

Mais procurados (20)

The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
Jfc fuller
Jfc fullerJfc fuller
Jfc fuller
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
 
Deterrence Theory in International Relations
Deterrence Theory in International RelationsDeterrence Theory in International Relations
Deterrence Theory in International Relations
 
Deterrence
DeterrenceDeterrence
Deterrence
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
International Security 3
International Security 3International Security 3
International Security 3
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
War and Peace in the 21st century, or Will the World Collapse in the Next 10-...
War and Peace in the 21st century, or Will the World Collapse in the Next 10-...War and Peace in the 21st century, or Will the World Collapse in the Next 10-...
War and Peace in the 21st century, or Will the World Collapse in the Next 10-...
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11
 
Neutrality in International law .pptx
Neutrality in International law .pptxNeutrality in International law .pptx
Neutrality in International law .pptx
 
International Humanitarian Law Lecture 18 - Protection of Different Categorie...
International Humanitarian Law Lecture 18 - Protection of Different Categorie...International Humanitarian Law Lecture 18 - Protection of Different Categorie...
International Humanitarian Law Lecture 18 - Protection of Different Categorie...
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
US Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The YearsUS Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The Years
 
Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
 

Destaque

Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceJeffrey Malone
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsJeffrey Malone
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian PerspectiveJeffrey Malone
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Jeffrey Malone
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations WorkforceJeffrey Malone
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information WarfareJeffrey Malone
 
The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...Jeffrey Malone
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian PerspectiveJeffrey Malone
 

Destaque (9)

Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence Force
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network Operations
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian Perspective
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations Workforce
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian Perspective
 

Semelhante a Information Operations: What It Is and Why It Matters

Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
information-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptinformation-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptMuhammadAbdullah311866
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
 
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxRespond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxcarlstromcurtis
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 

Semelhante a Information Operations: What It Is and Why It Matters (20)

Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Cyber War
Cyber WarCyber War
Cyber War
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
information-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptinformation-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.ppt
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxRespond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 

Último

Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 

Último (13)

Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 

Information Operations: What It Is and Why It Matters

  • 1. Information Operations: What It Is and Why It MattersWhat It Is and Why It Matters Presentation to AOC EW Asia 2014 Conference Mr Jeff Malone Defence Science and Technology Organisation (Australia)
  • 2. Scope • The Origins and Evolution of Information Operations • The US Joint Approach to Information OperationsOperations • The Role of Electronic Warfare within Information Operations • Emerging Issues
  • 3. The Origins and Evolution of Information OperationsInformation Operations
  • 4. Command Control Communications Countermeasures (C3CM) • Emerged in the late 1970s • Based on identified vulnerabilities in Soviet C3I systems • Integrative operational concept • Entailed both defensive and offensive actions
  • 5. Operation DESERT STORM: The First Information War (?) • First major employment of C3CM • Also entailed major Psychological Operations activities • Presented a range of synchronisation and deconfliction issues
  • 6. Information Warfare (IW) and Command and Control Warfare (C2W) • IW emerges in 1992 – initial definition TOP SECRET – Entailed strategic employment of Computer Network Attack (CNA) C2W emerges in 1993 – “the operational• C2W emerges in 1993 – “the operational employment of IW on the battlefield” – Adds Psychological Operations to the C3CM suite of activities – Like C3CM encompasses both offensive and defensive actions
  • 7. The Limitations of IW/C2W and the Emergence of Information Operations (IO) • Scope of IW/C2W problematic: – Only applicable in warfighting? – Only applicable against the Command and Control target set? – Only entails specified capabilities?– Only entails specified capabilities? • By mid 1990s, IO emerges as a more encompassing term (initially in US Army) • Instantiated in joint doctrine in 1998 – Joint Publication 3-13, Information Operations • IO remains the core term (in joint doctrine)
  • 8. Trends in the Evolution of Information Operations • From warfighting only to applicability across the spectrum of operations • Expansion from C3I target set to human decision making more generally (including thedecision making more generally (including the systems which enable and support decision making) • Expansion in the range of information-based capabilities to be integrated and deconflicted
  • 9. The US Joint Approach to Information OperationsOperations
  • 10. IO: US Joint Doctrinal Definition • “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp theinfluence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” Source: Joint Publication 3-13, Information Operations, 27 November 2012
  • 11. Information-Related Capability (IRC) • “A tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions.”operationally desirable conditions.” Source: Joint Publication 3-13, Information Operations, 27 November 2012
  • 12. The Information Environment Source: Joint Publication 3-13, Information Operations, 27 November 2012
  • 13. Examples of IRCs • Electronic Warfare (Electromagnetic Spectrum Operations) • Cyberspace Operations • Operations Security• Operations Security • Military Deception • Psychological Operations • Kinetic Targeting • (and many others) Source: Joint Publication 3-13, Information Operations, 27 November 2012
  • 14. The Role of Electronic Warfare within Information OperationsInformation Operations
  • 15. Electronic Warfare • “Military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy.”attack the enemy.” Source: Joint Publication 3-13.1, Electronic Warfare, 8 February 2012
  • 16. Overview of Electronic Warfare Source: Joint Publication 3-13.1, Electronic Warfare, 8 February 2012
  • 17. Electronic Warfare and Other IRCs • Cyberspace Operations – Can provide a pathway for attacks on wireless networks (or deny them) • Operations Security – Electronic Protection contributes to overall defensive posture, from platform to force level • Military Deception• Military Deception – Both a channel for conveying deception message and countering adversary deception activities • Psychological Operations – Provides a channel for dissemination and blocking adversary dissemination • Kinetic Targeting – Provides actionable targets for attack • Intelligence Support (common to all the above) – Contributes to overall intelligence effort which supports planning, operations and battle damage assessment/re-tasking
  • 20. Mobile Devices and Social Media
  • 26. EW-IO-Cyber-EMS Operations Convergence and SynergiesConvergence and Synergies Hotel Grand Chancellor Adelaide, South Australia, 18-19 August 2014