ATP 7-100.3 describes Chinese tactics for use in Army training, professional education, and leader development. This document is part of the ATP 7-100 series that addresses a nation-state’s military doctrine with a focus on army ground forces and tactical operations in offense, defense, and related mission sets. Other foundational topics include task organization, capabilities, and limitations related to military mission and support functions. ATP 7-100.3 serves as a foundation for understanding how Chinese ground forces think and act in tactical operations.
Tag Archive for Information Operations
Restricted U.S. Army Special Forces Guide to Information Operations
This TC serves as a guide to describe the fundamentals of how to incorporate IO at the tactical and operational level. Appendixes A through F offer tactics, techniques, and procedures (TTP) Special Forces (SF) Soldiers can use to analyze and plan information operations. This TC implements Army and joint IO doctrine established in FM 3-13, Inform and Influence Activities, and Joint Publication (JP) 3-13, Information Operations. This TC reinforces the definition of IO used by Army forces: IO employs the core capabilities of electronic warfare (EW), computer network operations (CNO), Military Information Support operations (MISO), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to affect or defend information and information systems and to influence decisionmaking. This TC is specifically targeted for SF; however, it is also useful to Army special operations forces (ARSOF) and the Army in understanding how SF employs IO.
U.S. Joint Forces Command
Multinational Capability Development Campaign Military Strategic Communication Handbook Draft
Cell phones, smart phones, the Internet, and GPS are increasingly available and are changing the nature of conflict, even in remote areas. Information can now reach out in new ways to global audiences because of the revolution in Information Technology (IT), particularly using cell phones and smart phones. The revival of hybrid warfare manifested in recent developments in the international security environment – such as the Arab Spring, the Ukrainian crisis, the rise of Jihadist-Salafist terrorism, and the European migrant crisis – demonstrates the power of communication, broadly based on IT advantages: messages and perceptions become predominant of physical engagements and strongly impact the behaviour of people. Orchestrated activities carry messages and have a crucial effect on 55 public opinions, decision-making processes, and domestic support.
Department of Defense, Joint Chiefs of Staff, U.S. Army
Joint Staff Strategic Assessment: Maneuver and Engagement in the Narrative Space
This paper was produced in support of the Strategic Multi-layer Assessment (SMA) of the Islamic State of Iraq and the Levant (ISIL) led by Joint Staff J39 in support of the Special Operations Command Central (SOCCENT). The paper leverages and melds the latest thinking of academic and operational subject matter experts in fields of organizational and social dynamics, network analysis, psychology, information operations and narrative development, social media analysis, and doctrine development related to aspects of maneuver and engagement in the narrative space.
(U//FOUO) U.S. Army Division Commander’s Guide to Information Operations
Warfare in the 21st Century necessitates a complete shift in the way we think and the way we fight. More than ever, the use of nonlethal effects is having a profound impact on conflicts. Much of today’s battlefield is in the minds of the public, shaped by the spoken word, cyberspace, media, and other means of strategic communications, as well as by our physical actions. Consequently, melding information with physical operations may very well be decisive in counterinsurgency and other stability operations. By melding information operations with physical operations, the division commander, who is executing a war against an insurgency and simultaneously attempting to pacify a populace, can gain the respect, compliance, and support of the people who may tip the balance in his favor. The enemy has become adept at all means of communications, in particular information operations, and uses his actions to reinforce his message. As a result, he influences not only the indigenous population but also the world as a whole.
Iraq, U.S. Army
(U//FOUO) U.S. Army Operation Iraqi Freedom Information Operations Tactical Commander’s Handbook
This handbook provides the tactical operator, commander, and battle staff with information on planning, executing, assessing, and sustaining information operations (IO). The handbook is based on observations collected in Iraq during July and August 2004 by an IO collection and analysis team (CAAT). The application of this tool is both for training and real-world events the Soldier may encounter in the Iraqi area of operations.
U.S. Special Operations Command
(U//FOUO) U.S. Special Operations Command Joint Civil Information Management Handbook and Manual
The Joint Civil Information Management Tactical Handbook is designed to provide joint procedures and standardized formats for the collection and reporting of civil data to support the Joint Force Commander planning and execution of operations. The publication consolidates the Services’ best tactics, techniques and procedures.
North Atlantic Treaty Organization
NATO Bilateral Strategic Command Information Operations Reference Book
The aim of this reference book is to provide the additional information needed by Information Operations (Info Ops) practitioners to better understand and implement the advising and coordinating function of Info Ops in the staffs throughout all levels of command. The reference book covers the experiences and lessons learned on principles, procedures, and techniques in current operations as well as some basic understanding on how to best integrate the Info Ops function in the new evolving structures (new Peacetime Establishment) and procedures within NATO with respect to effects based thinking and the new Comprehensive Operations Planning Directive.
North Atlantic Treaty Organization
NATO Military Policy on Information Operations
The Information Environment (IE) comprises the information itself, the individuals, organizations and systems that receive, process and convey the information, and the cognitive, virtual and physical space in which this occurs. This environment has seen significant changes in recent years. The importance of worldwide distributed information, the speed at which information is communicated, the role of social media and the reliability of information systems have created a situation in which no Alliance decision or action can be taken without considering its potential impact on the IE. The ubiquitous nature of information and the potential strategic ramifications of tactical actions add to the challenge faced by NATO Commanders. In this new IE it is more difficult to distinguish between the strategic, operational and tactical levels. The coordination, synchronisation and execution of information activities (IA) that deliberately create desired effects in the IE is essential to the Alliance’s successful functioning in peace, crisis and conflict.
North Atlantic Treaty Organization
NATO Allied Joint Doctrine for Information Operations
The purpose of Allied Joint Publication (AJP)-3.10 Allied Joint Doctrine for Information Operations is to explain how Info Ops support the planning, conduct and assessment of operations. The provenance for AJP-3.10 is MC 422/3 NATO Military Policy on Information Operations, which clearly acknowledges the primacy of civil/political direction on information issues and that the policy and subordinate doctrine applies to the military lever of power only. AJP-3.10 is focused on the operational level. It defines and discusses principles of Info Ops, and highlights those particular Info Ops considerations relevant to the conduct of operations, such as the sensitivity to political factors, and the role of non-military entities and emerging technological capabilities in the information environment, both within and external to NATO.
Afghanistan, U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Information Operations in Afghanistan Lessons Learned Report
The effective employment of IO to influence primary target audiences, including the population, local leaders, host nation security forces, government officials, and insurgents, is a key component of counterinsurgency (COIN) operations.
U.S. Army FM 3-13 Inform and Influence Activities Draft Manual
All assets and capabilities at a commander’s disposal have the capacity to inform and influence selected audiences to varying degrees. While specific assets termed as “information-related capabilities” are information-centric in mission and purpose, others are standard capabilities that inform and influence officers use for planning to support commanders’ information strategy and mission objectives. The primary information-related capabilities that support inform and influence activities typically include, but are not limited to, public affairs, military information support operations, combat camera, Soldier and leader engagement, civil affairs, cyber electromagnetic activities, counterintelligence, operations security, military deception, and others so designated by a commander. In addition to the primary information-related capabilities, there are operational capabilities not solely designed to inform or influence that commanders can designate to assist in achieving mission objectives, such as maneuver forces, engineers, and medical units. Success depends on commanders and staffs effectively employing all available operational assets to best shape the information environment.
U.S. Pacific Command
USPACOM Global Information Grid 3.0 Design Presentations
Several US PACCOM Global Information Grid 3.0 Design Presentations from 2010 through 2011.
U.S. Marine Corps
USMC Marine Air-Ground Task Force Information Operations
Marine Corps Warfighting Publication (MCWP) 3-40.4, Marine Air-Ground Task Force Information Operations, operationalizes the concept of information operations (IO). This publication introduces doctrine for employment of IO in support of Marine air-ground task force (MAGTF) operations. IO language and organizations continue to evolve and to be debated. This publication gives Marines a warfighter’s orientation to IO, providing a basis to understand the relevance of IO and a framework to implement IO. This publication is intended for MAGTF planners responsible for both operational and IO planning.
Israel Defense Forces
IDF Brief: Battle for the Narrative in Low Intensity Conflicts
IDF Brief: Battle for the Narrative in Low Intensity Conflicts, March 2005.
U.S. Army Installation Information Infrastructure Architecture Technical Guide
U.S. Army Installation Information Infrastructure Architecture Technical Guide, Distribution Statement C, July 2008.
U.S. Marine Corps
(U//FOUO) U.S. Marine Corps Information Operations April 2010
Information Operations (BOTTOM LINE)
•IT IS NOT:
–All about technology
–Focused on individual capabilities, i.e., PYSOP, EW, CNO, etc
–All about influencing key decision makers and populations through operations within and affecting the information environment
–The art of integrating lethal and non-lethal capabilities to affect the information environment (supports combat operations)
–Employed across the spectrum of conflict and throughout every phase (0-5) of operations
–Consistent with strategic communication goals and synchronized with public affairs
National Security Agency
NSA Global Information Grid Information Assurance Roadmap
NSA Global Information Grid Information Assurance Roadmap, October 26, 2004.
U.S. Army Cyberspace Operations Concept Capability Plan 2016-2028
The U.S. Army Training and Doctrine Command’s assessment of the future operational environment highlights the importance of all aspects of information on the future battlefield. Army forces operate in and among human populations, facing hybrid threats that are innovative, networked, and technologically-savvy. These threats capitalize on emerging technologies to establish and maintain a cultural and social advantage; leveraging these new capabilities for command and control, recruiting, coordinating logistics, raising funds, and propagandizing their message. To operate effectively in this emerging environment, the Army must realign its information “Aim Point.” Army leaders and Soldiers must possess an in-depth understanding of how to leverage information-based capabilities to gain and maintain situational awareness. Understanding how to fight for and leverage the power of information, while denying the adversary’s ability to do the same, will be increasingly critical to success on the future battlefield.
U.S. Army Public Affairs Handbook
Below are some suggestions on why to release information as early as possible:
1. The American public, Congress and the media are entitled to “timely and accurate” information about the military, per the DoD Principles of Information (See Appendix).
2. Early release of information sets the pace and tone for resolution of a problem.
3. If you wait, the story will often leak anyway. If it does, you jeopardize trust and credibility.
Multi-National Corps Iraq
Iraq Detainee Operations Strategic Communication Plan
The concept of strategic communication is an often-discussed topic within government policy circles and at all levels of professional military education. Doctrinal definitions are continually updated and refined to the point that few appear to agree upon the role that strategic communication should play as either a diplomatic function, an aspect of military operational planning, or a process to be executed in the course of national policy. There are, however, a set of key points that all sides seem to agree upon.
Naval Network Warfare Command
Naval Network Warfare Command Brief
•Overview of Naval Network Warfare Command
•PR 11 IPL Goals and Objectives
•Priorities By FORCEnet Pillars
–Communications and Networks (C/N)
–Command and Control Systems (C2)
–Information Operations (IO)
–Intelligence, Surveillance, and Reconnaissance (ISR)
C4ISR OTM E08 Executive Summary
Product Manager Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) On-The-Move (PM C4ISR OTM), is a Research, Development and Engineering Command (RDECOM) Communications-Electronics Research, Development and Engineering Center (CERDEC) organization, chartered in June 2006 to perform integrated C4ISR System of Systems (SoS) Live/Virtual/Constructive (L/V/C) technology demonstrations on a year-round basis.
U.S. Strategic Command
Strategic Command Directive (SD) 527-1
The INFOCON system provides a framework within which the Commander USSTRATCOM (CDRUSSTRATCOM), regional commanders, service chiefs, base/post/camp/station/vessel commanders, or agency directors can increase the measurable readiness of their networks to match operational priorities.
Government Accountability Office
Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical Systems and Information
Since 2005, GAO has reported that DHS has yet to comprehensively satisfy its key cybersecurity responsibilities, including those related to establishing effective partnerships with the private sector. Shortcomings exist in key areas that are essential for DHS to address in order to fully implement its cybersecurity responsibilities (see table). DHS has since developed and implemented certain capabilities, but still has not fully satisfied aspects of these responsibilities and needs to take further action to enhance the public/private partnerships needed to adequately protect cyber critical infrastructure. GAO has also previously reported on significant security weaknesses in systems supporting two of the department’s programs, one that tracks foreign nationals entering and exiting the United States, and one for matching airline passenger information against terrorist watch-list records. DHS has corrected information security weaknesses for systems supporting the terrorist watch-list, but needs to take additional actions to mitigate vulnerabilities associated with systems tracking foreign nationals.