Главная Manuals FM 3-13 Information Operations: Doctrine, Tactics, Techniques, and Procedures (NOVEMBER 2003)
|
|
|
_________________________________________________________________________________ Glossary
EA relies on the electromagnetic specturem. An example of the
two operations is the following: sending a code or instruction to a
central processing unit that causes the computer to short out the
power supply is CNA. Using an electromagnetic pulse to destroy a
computer’s electronics and causing the same result is EA.
(JP 1-02)
computer network defense (joint) Defensive measures to protect and defend information,
computers, and networks from disruption, denial, degradation, or
destruction. (JP 3-51)
*computer network exploitation Enabling operations and intelligence collection to gather
data from target or adversary automated information systems or
networks. (This definition is consistent with joint initiatives and
is being staffed as a possible joint definition.)
*computer network operations Computer network attack, computer network defense, and
related computer network exploitation enabling operations. (This
definition is consistent with joint initiatives and is being staffed
as a possible joint definition.)
COMSEC
communications security
constraint
A restriction placed on the command by a higher command. A
constraint dictates an action or inaction, thus restricting the free-
dom of action the subordinate commander has for planning. (FM 5-0)
control
(Army) Within command and control, the regulation of forces and
battlefield operating systems to accomplish the mission in
accordance with the commander’s intent. It includes collecting,
processing, displaying, storing, and disseminating relevant infor-
mation for creating the common operational picture, and using
information, primarily by the staff, during the operations process.
(FM 6-0)
COP
common operational picture
COS
chief of staff
counterdeception
(joint) Efforts to negate, neutralize, diminish the effects of, or
gain the advantage from a foreign deception operation.
Counterdeception does not include the intelligence function of
identifying foreign deception operations. (JP 3-13)
counterintelligence
(joint) Information gathered and activities conducted to protect
against espionage, other intelligence activities, sabotage, or as-
sassinations conducted by or on behalf of foreign governments or
elements thereof, foreign organizations, or foreign persons, or in-
ternational terrorist activities. (JP 3-13)
counterpropaganda
Programs of products and actions designed to nullify propaganda
or mitigate its effects. (FM 3-05.30)
CP
command post
criteria of success
Information requirements developed during the operations proc-
ess that measure the degree of success in accomplishing the unit’s
Glossary-5
FM 3-13 __________________________________________________________________________________
mission. They are normally expressed as either an explicit
evaluation of the present situation or forecast of the degree of
mission accomplishment. (FM 6-0)
*critical asset list
A list of intelligence, surveillance, and reconnaissance elements,
and elements of the command’s command and control system,
whose loss or functional disruption would jeopardize mission
accomplishment.
CSS
combat service support
DA
Department of the Army
DC
dislocated civilian
DCSINT
deputy chief of staff for intelligence
DCSIO
deputy chief of staff for information operations
D-day
(joint) The unnamed day on which a particular operation com-
mences or is to commence.
*deceive
To cause a person to believe what is not true.
deception event
(joint) A deception means executed at a specific time and location
in support of a deception operation. (JP 3-58)
deception means
(joint) Methods, resources, and techniques that can be used to
convey information to the deception target. There are three
categories of deception means: a. physical means—Activities
and resources used to convey or deny selected information to a
foreign power. (Examples include military operations, including
exercises, reconnaissance, training activities, and movement of
forces; the use of dummy equipment and devices; tactics; bases,
logistic actions, stockpiles, and repair activity; and test and
evaluation activities.) b. technical means—Military materiel
resources and their associated operating techniques used to
convey or deny selected information to a foreign power through
the deliberate radiation, re-radiation, alteration, absorption, or
reflection of energy; the emission or suppression of chemical or
biological odors; and the emission or suppression of nuclear
particles. c. administrative means—Resources, methods, and
techniques to convey or deny oral, pictorial, documentary, or
other physical evidence to a foreign power. (JP 3-58)
deception objective
(joint) The desired result of a deception operation expressed in
terms of what the adversary is to do or not to do at the critical
time and/or location. (JP 3-58)
deception story
(joint) A scenario that outlines the friendly actions that will be
portrayed to cause the deception target to adopt the desired
perception. (JP 3-58)
deception target
(joint) The adversary decisionmaker with the authority to make
the decision that will achieve the deception objective. (JP 3-58)
*deception working group
A group tailored to bring together the special technical skills
required to conduct a specific military deception operation.
Glossary-6
_________________________________________________________________________________ Glossary
*defense in depth In information operations, the integration of the capabilities of
people, operations, and technology to establish multi-layer, multi-
dimension protection.
defensive information operations (Army) The integration and coordination of policies and
procedures, operations, personnel, and technology to protect and
defend friendly information and information systems. Defensive
information operations ensure timely, accurate, and relevant
information access while denying adversaries the opportunity to
exploit friendly information and information systems for their
own purposes. (FM 3-0)
*degrade
In information operations, using nonlethal or temporary means to
reduce the effectiveness or efficiency of adversary command and
control systems and informtion collection efforts or means.
denial of service
Action or actions that result in the inability of an automated
information system or any essential part to perform its desig-
nated mission, either by loss or degradation of operational capa-
bility.
*deny
In information operations, entails withholding information about
Army force capabilities and intentions that adversaries need for
effective and timely decisionmaking.
desired perception
(joint) In military deception, what the deception target must be-
lieve for it to make the decision that will achieve the deception
objective. (JP 3-58)
destroy
To damage a combat system so badly that it cannot perform any
function or be restored to a usable condition without being en-
tirely rebuilt. (FM 3-90)
det
detachment
*detect
To discover or discern the existence, presences or fact of an
intrusion into information systems.
*disinformation
Information disseminated primarily by intelligence organizations
or other covert agencies designed to distort information, or de-
ceive or influence United States decisionmakers, United States
forces, coalition allies, key actors, or individuals by indirect or un-
conventional means.
DISA
Defense Information Systems Agency
DISN
Defense Information Systems Network
*disrupt
In information operations, breaking or interrupting the flow of
information between selected command and control nodes.
div
division
DOD
Department of Defense
DODD
Department of Defense Directive
DODDIP
Department of Defense Defense Intelligence Production Program
Glossary-7
FM 3-13 __________________________________________________________________________________
DOS Department of State
DS direct support
DSM decision support matrix
DSO deception staff officer
DTG date-time group
DWG deception working group
EA electronic attack
EAC echelons above corps
EEFI essential elements of friendly information
electromagnetic deception (joint) The deliberate radiation, reradiation, alteration, suppres-
sion, absorption, denial, enhancement, or reflection of electromag-
netic energy in a manner intended to convey misleading informa-
tion to an enemy or to enemy electromagnetic dependent weap-
ons, thereby, degrading or neutralizing the enemy’s combat capa-
bility. Among the types of electromagnetic deception are: a. ma-
nipulative electromagnetic deception—Actions to eliminate re-
vealing, or convey misleading, electromagnetic telltale indicators
that may be used by hostile forces; b. simulative electromagnetic
deception—actions to simulate friendly, notional, or actual capa-
bilities to mislead hostile forces; imitative electromagnetic decep-
tion—the introduction of electromagnetic energy into enemy sys-
tems that imitates enemy effusions. (JP 3-51)
electromagnetic spectrum
(joint) The range of frequencies o f electromagnetic radiation from
zero to infinity. It is divided into 26 alphabetically designated
bands. (JP 3-13.1)
electronic attack
See electronic warfare.
electronic protection
See electronic warfare.
electronic warfare
(joint) Any military action involving the use of electromagnetic
and directed energy to control the electromagnetic spectrum or to
attack the enemy. The three major subdivisions within electronic
warfare are: electronic attack, electronic protection, and elec-
tronic warfare support. a. electronic attack—that division of elec-
tronic warfare involving the use of electromagnetic energy, di-
rected energy, or antiradiation weapons to attack personnel, fa-
cilities, or equipment with the intent of degrading, neutralizing,
or destroying enemy combat capability and is considered a form of
fires. Electronic attack includes: (1) actions taken to prevent or
reduce an enemy’s effective use of the electromagnetic spectrum,
such as jamming and electromagnetic deception, and (2) employ-
ment of weapons that use either electromagnetic or directed en-
ergy as their primary destructive mechanism (lasers, radio fre-
quency weapons, particle beams). b. electronic protection—that
division of electronic warfare involving passive and active means
taken to protect personnel, facilities, and equipment from any
Glossary-8
_________________________________________________________________________________ Glossary
effects of friendly or enemy employment of electronic warfare that
degrade, neutralize, or destroy friendly combat capability. c. elec-
tronic warfare support—that division of electronic warfare in-
volving actions tasked by, or under direct control of, an opera-
tional commander to search for, intercept, identify, and locate or
localize sources of intentional and unintentional radiated elec-
tromagnetic energy for the purpose of immediate threat recogni-
tion, targeting, planning and conduct of future operations. Thus,
electronic warfare support provides information required for deci-
sions involving electronic warfare operations and other tactical
actions such as threat avoidance, targeting, and homing. Elec-
tronic warfare support data can be used to produce signals intel-
ligence, provide targeting for electronic or destructive attack, and
produce measurement and signature intelligence. (JP 3-51)
electronic warfare support See electronic warfare.
ENCOORD engineer coordinator
enemy an individual or group engaging Army forces in combat
EP electronic protection
ES electronic warfare support
essential elements of friendly information (Army) The critical aspects of a friendly opera-
tion that, if known by the enemy, would subsequently compro-
mise, lead to failure, or limit success of the operation, and there-
fore must be protected from enemy detection. (FM 3-0)
EW
electronic warfare
EWO
electronic warfare officer
execution decision
The selection, during preparation and execution, of a course of
action anticipated by the order. (FM 6-0)
*exploit
In information operations to gain access to adversary C2 systems
to collect information or to plant false or misleading information.
FA
field artillery
FARP
forward arming and refueling point
*feedback
Information that reveals how the deception target is responding
to the deception story and if the military deception plan is working.
FECC
fires and effects coordination cell
FFIR
friendly forces information requirements
*field support team
A team that provides direct support information operations to the
ARFORs and joint task forces of land components of combatant
commands, and corps and divisions as requested.
firmware
Computer programs contained permanently in a hardware device
as a read-only memory.
FLOT
forward line of own troops
Glossary-9
FM 3-13 __________________________________________________________________________________
*forms of uncertainty In military deception, means of shaping the deception target’s
perceptions. Increasing uncertainty aims to confuse the deception
target. Reducing uncertainty aims to reinforce the deception tar-
get’s predispositions.
FM frequency modulated
FRAGO fragmentary order
friendly forces information requirements Information the commander and staff need about
the forces available for the operation. (FM 6-0)
FSE
fire support element
FST
field support team
FSCOORD
fire support coordinator
full spectrum operations
The range of operations Army forces conduct in war and military
operations other than war. (FM 3-0)
G-1
assistant chief of staff, human resources
G-2
assistant chief of staff, intelligence
G-3
assistant chief of staff, operations
G-4
assistant chief of staff, logistics
G-5
assistant chief of staff, civil-military operations
G-6
assistant chief of staff, command, control, communications, and
computer operations (C4OPS)
G-7
assistant chief of staff, information operations
Global Information Grid
(joint) The globally interconnected, end-to-end set of information,
capabilities, associated processes and personnel for collecting,
processing, storing, disseminating and managing information on
demand to warfighters, policy makers, and support personnel.
The GIG includes all owned and leased communications and com-
puting systems and services, software (including applications,
data, security services, and other associated services necessary to
achieve information superiority). It also includes National Secu-
rity Systems as defined in Section 5142 of the Clinger-Cohen Act
of 1996. The GIG supports all Department of Defense, National
Security, and related Intelligence Community missions and func-
tions (strategic, operational, tactical, and business), in war and in
peace. The GIG provides capabilities from all operating locations
(bases, posts, camps, stations, facilities, mobile platforms, and
deployed sites). The GIG provides interfaces to coalition, allied,
and non-DOD users and systems. (JP 1-02)
grp
group
hazard
(joint) A condition with the potential to cause injury, illness or
death of personnel; damage to, or loss of, equipment or property;
or mission degradation. (JP 1-02)
HF
high frequency
Glossary-10
_________________________________________________________________________________ Glossary
H-hour
(joint) The specific hour on D-day at which a particular operation
commences.
high-payoff target
(joint) A target whose loss to the enemy will significantly
contribute to the success of the friendly course of action. High-
payoff targets are those high-value targets, identified through
war-gaming, that must be acquired and successfully attacked for
the success of the friendly commander’s mission. (JP 1-02)
high-value target
(joint) A target the enemy commander requires for the successful
completion of the mission. The loss of high-value targets would be
expected to seriously degrade important enemy functions
throughout the friendly commander’s area of interest. (JP 1-02)
HN
host nation/host-nation
HPT
high-payoff target
HPTL
high-payoff target list
hq
headquarters
HUMINT
human intelligence
HVT
high-value target
IA
information assurance
IANM
information assurance network manager
IASO
information assurance security officer
ID
infantry division
IDC
information dominance center
IM
information management
IMINT
imagery intelligence
incident
(joint) In information operations, an assessed event of attempted
entry, unauthorized entry, or an information attack on an auto-
mated information system. It includes unauthorized probing and
browsing; disruption or denial of service; altered or destroyed in-
put, processing, storage, or output of information; or changes to
information system hardware, firmware, or software characteris-
tics with or without the users’ knowledge, instruction, or intent.
(JP 3-13)
indicator
(joint/NATO) In intelligence usage, is an item of information
which reflects the intentions or capability of a potential enemy to
adopt or reject a course of action. (JP 1-02)
*indicator feedback
Information that indicates whether and how the deception story
is reaching the deception target.
*influence
To cause adversaries or others to behave in a manner favorable to
Army forces.
INFOCON
information operations conditions
Glossary-11
FM 3-13 __________________________________________________________________________________
information
(Army) (1) In the general sense, the meaning humans assign to
data. (2) In the context of the cognitive hierarchy, data that have
been processed to provide further meaning. (FM 6-0)
information assurance
(joint) Information operations that protect and defend informa-
tion and information systems by ensuring their availability, in-
tegrity, authentication, confidentiality, and nonrepudiation. This
includes providing for restoration of information systems by in-
corporating protection, detection, and reaction capabilities.
(JP 3-13)
information environment
(joint) The aggregate of individuals, organizations, or systems
that collect, process, or disseminate information; also included is
the information itself. (JP 3-13)
*informational fratricide
The results of employing information operations elements in a
way that causes effects in the information environment that
impede the conduct of friendly operations or adversly effect
friendly forces.
information management
The provision of relevant information to the right person at the
right time in a usable form to facilitate situational understanding
and decisionmaking. It uses procedures and information systems
to collect, process, store, display, and disseminate information.
(FM 3-0)
information operations
The employment of the core capabilities of electronic warfare,
computer network operations, psychological operations, military
deception, and operations security, in concert with specified
supporting and related capabilities, to affect or defend informa-
tion and information systems, and to influence decisionmaking.
(This definition supersedes the definition of information
operations in FM 3-0. It is consistent with joint initiatives.)
information security
(joint) The protection and defense of information and information
systems against unauthorized access or modification of informa-
tion, whether in storage, processing, or transit, and against denial
of services to authorized users. Information security includes
those measures necessary to detect, document, and counter such
threats. Information security is composed of computer security
and communications security. (JP 3-13)
information superiority
(Army) The operational advantage derived from the ability to col-
lect, process, and disseminate an uninterrupted flow of informa-
tion while exploiting or denying an adversary’s ability to do the
same. (FM 3-0)
information systems
(Army) The equipment and facilities that collect, process, store,
display and disseminate information. This includes computers—
hardware and software—and communications, as well as policies
and procedures for their use. (FM 3-0)
IO
information operations
*IO assets
Organic, assigned and attached units with information operations
capabilities.
Glossary-12
_________________________________________________________________________________ Glossary
*IO capabilities Units or systems that support the accomplishment of information
operations tasks.
*IO cell A grouping of staff officers to synchronize IO throughout the
operations process.
*IO concept of support A clear, concise statement of where, when, and how the com-
mander intends to focus the information element of combat power
to accomplish the mission.
*IO mission statement A short paragraph or sentence describing what the commander
wants information operations to accomplish and the purpose for
accomplishing it.
*IO objectives Clearly defined, obtainable aims that the commander intends to
achieve using information operations elements/related activities.
*IO resources Information-operations-capable units not assigned or attached to
the command, but whose capabilities are available to conduct in-
formation operations.
*IO tasks Tasks developed to support accomplishment of one or more IO
objectives.
IOVAT information operations vulnerability assessment team
*IO vulnerabilities Deficiencies in protective measures that may allow an adversary
to use information operations capabilities against friendly infor-
mation systems or command and control systems.
*IO vulnerability assessment team A team designed to enhance army force protection
through the Army commander’s ability to incorporate defensive
information operations into peacetime operations, operational and
contingency missions, training and exercises.
infostructure The hardware, software, and communications information
technologies and associated architectures and facilities that en-
sure universal access, security, privacy, and reliability of Army
networks. (FM 6-02.71)
IN infantry
INFOSYS information systems
INSCOM United States Army Intelligence and Security Command
intelligence
(joint) (1) The product resulting from the collection, processing,
integration, analysis, evaluation, and interpretation of available
information concerning foreign countries or areas. (2) Information
and knowledge about an adversary obtained through observation,
investigation, analysis, or understanding.
intelligence preparation of the battlefield A systematic approach to analyzing the enemy
and environment (for example, weather, terrain and civil consid-
erations) in a specific geographic area. It integrates enemy doc-
trine with the weather, terrain, and civil considerations as they
relate to the mission and the specific environment. This is done to
Glossary-13
FM 3-13 __________________________________________________________________________________
determine and evaluate enemy capabilities, vulnerabilities, and
probable courses of actions. (FM 34-130)
IPB
intelligence preparation of the battlefield
IPIP
International Public Information Program
IPW
interrogation, prisoner of war
IR
information requirement
ISR
intelligence, surveillance, and reconnaissance
JCS
Joint Chiefs of Staff
JFACC
joint force air component commander
JFC
joint force commander
JFLCC
joint force land component commander
JOA
joint operations area
JP
joint publication
JRA
joint rear area
JSEAD
joint suppression of enemy air defenses
JTF
joint task force
key tasks
Those tasks the force as a whole must perform, or conditions the
force must meet, to achieve the end state and stated purpose of
the operation. (FM 6-0)
LAN
local area network
LOC
line of communications
log
logistic/logistics
LZ
landing zone
manipulative electromagnetic deception See electromagnetic deception.
MARFOR Marine Corps forces
MASINT measurement and signature intelligence
MCS mobility/countermobility/survivability
MD military deception
MDMP military decisionmaking process
MDO military deception officer
MEB Marine expeditionary brigade
METT-TC A memory aid used in two contexts: (1) In the context of
information management, the major subject categories into which
relevant information is grouped for military operations: mission,
enemy, terrain and weather, troops and support available, time
available, civil considerations. (2) In the context of tactics, the
major factors considered during mission analysis. (FM 6-0)
Glossary-14
_________________________________________________________________________________ Glossary
MI
military intelligence
military deception
(joint) Actions executed to deliberately mislead adversary military
decisionmakers as to friendly military capabilities, intentions,
and operations, thereby causing the adversary to take specific ac-
tions (or inactions) that will contribute to the accomplishment of
the friendly mission. The five categories of military deception are
as follows: a. strategic military deception—Military deception
planned and executed by and in support of senior military com-
manders to result in adversary military policies and actions that
support the originator’s strategic military objectives, policies, and
operations. b. operational military deception—Military decep-
tion planned and executed by and in support of operational-level
commanders to result in adversary actions that are favorable to
the originator’s objectives and operations. Operational military
deception is planned and conducted in a theater to support cam-
paigns and major operations. c. tactical military deception.
Military deception planned and executed by and in support of tac-
tical commanders to result in adversary actions that are favorable
to the originator’s objectives and operations. Tactical military de-
ception is planned and conducted to support battles and engage-
ments. d. Service military deception. Military deception
planned and executed by the Services that pertain to Service sup-
port to joint operations. Service military deception is designed to
protect and enhance the combat capabilities of Service forces and
systems. e. military deception in support of operations se-
curity (OPSEC). Military deception planned and executed by
and in support of all levels of command to support the prevention
of the inadvertent compromise of sensitive or classified activities,
capabilities, or intentions. Deceptive OPSEC measures are de-
signed to distract foreign intelligence away from, or provide cover
for, military operations and activities. (JP 3-58)
*misinformation
Incorrect information from any source that is released for un-
known reasons or to solicit a response or interest from a nonpoli-
tical or nonmilitary target.
mm
millimeter
MOS
military occupational specialty
MP
military police
MSE
mobile subscriber equipment
mutual support
Support that units render to each other against an enemy
because of their assigned tasks, their position relative to each
other and to the enemy, and their inherent capabilities. (JP 1-02)
mtg
meeting
NATO
North Atlantic Treaty Organization
NAVFOR
Navy forces
NBC
nuclear, biological, and chemical
Glossary-15
FM 3-13 __________________________________________________________________________________
near real-time Pertaining to the timeliness of data or information which has
been delayed by the time required for electronic communication
and automatic data processing. This implies that there are no
significant delays. (JP 1-02)
NETOPS network operations
network operations The collaborative, integrated management of networks, informa-
tion systems, and resources that provide a common operation pic-
ture. (FM 6-02.71)
NGO nongovernmental organization
NLT not later than
nongovernmental organizations Transnational organizations of private citizens that main-
tain a consultative status with the Economic and Social Council of
the United Nations. Nongovernmental organizations may be pro-
fessional associations, foundations, multinational businesses, or
simply groups with a common interest in humanitarian assis-
tance activities (development and relief). “Nongovernmental or-
ganizations” is a term normally used by non-United States or-
ganizations. (JP 3-16) (In FM 3-13, nongovernmental organiza-
tions include private voluntary organizations.)
offensive information operations (Army) The integrated use of assigned and supporting
capabilities and activities, mutually supported by intelligence, to
affect enemy decisionmakers or to influence others to achieve or
promote specific objectives. (FM 3-0)
operations process
The activities performed during operations: plan, prepare, and
execute with continuous assessment. (FM 6-0)
*operations security
(Army) A process of identifying essential elements of friendly
information and subsequent analyzing friendly actions attendant
to military operations and other activities to: a. identify those
actions that can be observed by adversary intelligence systems; b.
determine indicators hostile intelligence systems might obtain
that could be interpreted or pieced together to derive critical
information in time to be useful to adversaries; and c. select and
execute measures that eliminate or reduce to an acceptable level
the vulnerabilities of friendly actions to adversary exploitation.
OPLAN
operation plan
OPORD
operation order
*opposing information
Intentional or unintentional truth-based information from any
source that represents an opposing view.
OPSEC
operations security
*OPSEC indicator
(Army) Friendly detectable actions and open-source information
that can be intercepted or pieced together by an adversary to de-
rive essential elements of friendly information.
*OPSEC measures
Methods and means to gain and maintain essential secrecy about
essential elements of friendly information.
Glossary-16
_________________________________________________________________________________ Glossary
*OPSEC planning guidance (Army) The blueprint for operations security planning. It defines
the essential elements of friendly information, taking into account
friendly and adversary goals, probable adversary knowledge,
friendly deception objectives, and adversary collection capabili-
ties. It also should outline provisional operations security meas-
ures.
OPSEC vulnerabilities
(joint) A condition in which friendly actions provide operations
security indicators that may be obtained and accurately evaluated
by an adversary in time to provide a basis for effective adversary
decisionmaking. (JP 1-02)
PA
public affairs
PAO
public affairs officer
*perception feedback
Information that indicates whether the deception target is
responding to the deception story.
perception management
(joint) Actions to convey and/or deny selected information and
indicators to foreign audiences to influence their emotions, mo-
tives, and objective reasoning; and to intelligence systems and
leaders at all levels to influence official estimates, ultimately re-
sulting in foreign behaviors and official actions favorable to the
originator’s objectives. In various ways, perception management
combines truth projection, operations security, cover, deception,
and psychological operations. (JP 3-13)
*perceptions
Mental images the commander wants the deception target to be-
lieve are real.
*physical destruction
The application of combat power to destroy or degrade adversary
forces, sources of information, command and control systems, and
installations. It includes direct and indirect fires from ground,
sea, and air forces. Also included are direct actions by special op-
erations forces.
physical means
See deception means.
physical security
(joint) That part of security concerned with physical measures
designed to safeguard personnel; to prevent unauthorized access
to equipment, installations, material, and documents; and to
safeguard them against espionage, sabotage, damage, and theft.
(JP 3-13)
planning
The means by which the commander envisions a desired outcome,
lays out effective ways of achieving it, and communicates to his
subordinates his vision, intent, and decisions, focusing on the re-
sults he expect to achieve. (FM 3-0)
PIR
priority intelligence requirement
priority intelligence requirements (joint/NATO) Those intelligence requirements for which a
commander has an anticipate and stated priority in the task of
planning and decisionmaking. (JP 1-02)
Glossary-17
FM 3-13 __________________________________________________________________________________
propaganda
Any form of communications in support of national objectives de-
signed to influence the opinions, emotions, attitudes, or behavior
of any group in order to benefit the sponsor, either directly or in-
directly. (JP 3-53)
*protect
All actions taken to guard against espionage or capture of
sensitive equipment and information.
psychological operations
(joint) Planned operations to convey selected information and
indicators to foreign audiences to influence their emotions, mo-
tives, objective reasoning, and ultimately the behavior of foreign
governments, organizations, groups, individuals. The purpose of
psychological operations is to induce or reinforce foreign attitudes
and behavior favorable to the originator’s objectives. (JP 3-53)
PSYOP
psychological operations
public affairs
(joint) Those public information, command information, and
community relations activities directed toward both the external
and internal publics with interest in DOD. (JP 3-61)
R&D
research and development
RCERT
regional computer emergency response team
real time
(joint) Pertaining to the timeliness of data or information which
has been delayed only by the time required for electronic commu-
nication. This implies that there are no noticeable delays. (JP 1-
02)
REC
radio electronic combat (scenario use only)
reconnaissance
(joint) The mission undertaken to obtain by visual observation or
other detection methods, information about the activities and re-
sources of an enemy or potential enemy, or to secure data con-
cerning the meteorological, hydrographic, or geographic charac-
teristics of a particular area. (JP 1-02)
relevant information
All information of importance to commanders and staffs in the
exercise of command and control. (FM 3-0)
*respond
In informations operations is to act positively to an adversary’s IO
attack or intrusion.
*restore
To bring information systems back to their original state.
RFI
request for information
RLF
Rendovan Liberation Front (scenario use only)
RI
relevant information
risk management
(joint) The process of identifying, assessing, and controlling risk
arising from operational factors, and making decisions that
balance risk cost with mission benefits. (JP 1-02)
ROE
rules of engagement
RTOC
rear tactical operations center
Glossary-18
_________________________________________________________________________________ Glossary
SA
systems administrator
SBCT
Stryker brigade combat team
SCI
sensitive compartmented information
SEAD
suppression of enemy air defense
SED
simulative electronic deception
SEP
signals intelligence end products
SIGINT
signals intelligence
situational understanding
The product of applying analysis and judgment to the common
operational picture to determine the relationships among the fac-
tors of METT-TC. (FM 3-0)
situation template
(joint) A depiction of assumed adversary dispositions, based on
adversary doctrine and the effects of the battlespace if the
adversary should adopt a particular course of action. In effect, the
situation templates are the doctrinal templates depicting a
particular operation modified to account for the effects of the
battlespace environment and the adversary’s current situation
(training and experience levels, logistic status, losses,
dispositions). Normally, the situation template depicts adversary
units two levels of command below the friendly force, as well as
the expected locations of high-value targets. Situation templates
use time-phase lines to indicate movement of forces and the
expected flow of the operation. Usually the situation template
depicts a critical point in the course of action. Situation templates
are one part of an adversary course of action model. Models may
contain more than one situation template.
SJA
staff judge advocate
SMDC
US Army Space and Missile Defense Command
SME
subject matter expert
SOCCE
special operations command and control element
SOCOM
United States Army Special Operations Command
SOCOORD
special operations coordinator
SOP
standing operating procedure
SPF
special purpose forces (scenario use only)
STRATCOM
United States Strategic Command
*subordinate deception objective A restatement of the deception objective in terms that re-
flect the deception target’s point of view.
*supporting perceptions Mental images that enhance the likelihood that the deception tar-
get will form the desired perceptions and accept them as true.
surveillance
(joint) The systematic observation of aerospace, surface or subsur-
face areas, places, persons, or things by visual, aural, electronic,
photographic or other means. (JP 1-02)
Glossary-19
FM 3-13 __________________________________________________________________________________
tac
tactical (used with CP [command post])
TACON
tactical control
tactical combat force
(joint) A combat unit, with appropriate combat support and
combat service support assets, that is assigned the mission of
defeating Level III threats. (JP 1-02)
tactical risk
Risk concerned associated with hazards that exist because of the
presence of either the enemy or an adversary. (FM 100-14)
TACWAN
tactical wide area network
TAD
target acquisition detachment
TBD
to be determined
TCF
tactical combat force
technical means
See deception means.
tempo
The rate of military action. (FM 3-0)
TF
task force
tgt
target/targeting
tm
team
TOT
time on target
TPFDD
time-phased force and deployment data
TSM
target synchronization matrix
TSS
target selection standards
TTP
tactics, techniques, and procedures
TVA
target value analysis
UAV
unmanned aerial vehicle
UAV-SR
unmanned aerial vehicle-short range
*unwitting actor
An individual participating in the conduct of a military deception
operation without personal knowledge of the facts of the deception.
US
United States
USAID
United States Agency for International Development
USAJFKSWCS
United States Army John Fitzgerald Kennedy Special Warfare
Center and School
USC
United States Code
USIA
United States Information Agency
VA
vulnerability assessment
VAP
vulnerability assessment program
VAT
vulnerability assessment team
VHF
very high frequency
Glossary-20
_________________________________________________________________________________ Glossary
WARNO warning order
*witting actor An individual participating in the conduct of a military deception
operation who is fully aware of the facts of the deception.
wpns weapons
WTEM weather, terrain and environmental monitoring
WMD weapon/weapons of mass destruction
Glossary-21
Bibliography
When a field manual has been published under a new number, the old number
follows in parentheses.
DOCUMENTS NEEDED
These documents must be available to the intended uses of this publication. Most
joint publications are available online: http://www.dtic.mil/doctrine/doctrine.htm.
Most Army doctrinal publications are available online: http:// 155.217. 58.58.
JP 3-13. Joint Doctrine for Information Operations. 9 October 1998.
JP 3-51. Joint Doctrine for Electronic Warfare. 7 April 2000.
JP 3-53. Doctrine for Joint Psychological Operations. 10 July 1996.
JP 3-54. Joint Doctrine for Operations Security. 24 January 1997.
JP 3-57. Joint Doctrine for Civil-Military Operations. 8 February 2001.
JP 3-58. Joint Doctrine for Military Deception. 31 May 1996.
FM 3-0. Operations. 14 June 2001.
FM 5-0 (101-5). Army Planning and Orders Production. TBP.
When published, FM 5-0 will supersede that portion of FM 101-5 not
superseded by FM 6-0.
FM 6-0. Mission Command: Command and Control of Army Forces, 11 August
2003.
FM 6-0 supersedes chapters 1 through 4 and 6, and appendixes G, and I
through L of FM 101-5.
FM 6-20-10. Tactics, Techniques, and Procedures for the Targeting Process. 8 May
1996.
FM 6-20-10 will be republished as FM 3-60.
READINGS RECOMMENDED
These sources contain relevant supplemental information.
JOINT PUBLICATIONS
Most joint publications are available online: http://www.dtic.mil/doctrine/
doctrine.htm.
JP 1-02. DOD Dictionary of Military and Associated Terms. 5 June 2003, as
amended.
JP 2-0. Doctrine for Intelligence Support to Joint Operations. 9 March 2000.
JP 3-0. Doctrine for Joint Operations. 10 September 2001.
JP 3-09. Doctrine for Joint Fire Support. 12 May 1998.
Bibliography-1
FM 3-13 __________________________________________________________________________________
JP 3-61. Doctrine for Public Affairs in Joint Operations. 14 May 1997.
JP 5-0. Doctrine for Planning Joint Operations. 13 April 1995.
JP 5-00.2. Joint Task Force (JTF) Planning Guidance and Procedures. 13
January 1999.
JP 6-0. Doctrine for Command, Control, Communications, and Computer (C4)
Systems Support to Joint Operations. 30 May 1995.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: http://155.217.58.58/
atdl.htm. Army regulations are produced only in electronic media. Most are
available online: http://www.usapa.army.mil/USAPA_PUB_search_ p.asp.
AR 190-13. The Army Physical Security Program. 30 September 1993.
AR 360-1. The Army Public Affairs Program. 15 September 2000.
AR 380-5. Department of the Army Information Security Program. 29 September
2000.
AR 380-19. Information Systems Security. 27 February 1998.
AR 381-11. Production Requirements and Threat Intelligence Support to the U.S.
Army. 28 June 2000.
AR 530-1. Operations Security (OPSEC). 3 March 1995.
FM 1 (FM 100-1). The Army. 14 June 2001.
FM 3-05.30 (FM 33-1). Psychological Operations. 19 June 2000.
FM 3-19.30 (FM 19-30). Physical Security. 8 January 2001.
FM 3-21.31. Stryker Brigade Combat Team. 13 March 2003.
FM 3-50. Smoke Operations. 11 September 1996.
FM 3-50 will be republished as FM 3-11.50.
FM 3-61.1. Public Affairs Tactics, Techniques, and Procedures. 1 October 2000.
FM 3-90. Tactics. 4 July 2001.
FM 3-93 (100-7). The Army in Theater Operations. TBP.
FM 3-100.12. Risk Management: Multiservice Tactics, Techniques, and
Procedures for Risk Management. 15 February 2001.
FM 3-100.12 will be republished as FM 5-19.1.
FM 4-0 (100-10). Combat Service Support. 29 August 2003.
FM 6-02.2. Command, Control, Communications, and Computers (C4)
Operations: Interim Brigade Combat Team. TBP.
FM 6-02.71. Network Management. TBP.
FM 6-20. Fire Support in the AirLand Battle. 17 May 1988.
FM 6-20 will be republished as FM 3-09.
Bibliography-2
______________________________________________________________________________ Bibliography
FM 6-20-40. Tactics, Techniques , and Procedures for Fire Support For Brigade
Operations (Heavy). 5 January 1990.
FM 6-20-40 will be republished as FM 3-09.4.
FM 7-15. The Army Universal Task List. 31 August 2003.
FM 12-6. Personnel Doctrine. 09 September 1994
FM 12-6 will be republished as FM 1-0.
FM 20-3. Camouflage, Concealment, and Decoys. 30 August 1999.
FM 20-3 will be republished as FM 3-58.1.
FM 22-100. Military Leadership, 31 August 1999.
FM 22-100 will be republished as FM 6-22.
FM 27-100. Legal Support to Operations. 1 March. 2000.
FM 27-100 will be republished as FM 1-04.0.
FM 33-1-1. Psychological Operations, Techniques, and Procedures. 5 May 1994.
FM 33-1-1 will be republished as FM 3-53.10.
FM 34-1. Intelligence and Electronic Warfare Operations. 24 September.1994.
FM 34-1 will be republished as FM 2-0.
FM 34-2. Collection Management and Synchronization Planning. 8 March 1994.
FM 34-2 will be republished as FM 2-33.3.
FM 34-60. Counterintelligence. 3 October 1995.
FM 34-60 will be republished as FM 2-01.2.
FM 34-130. Intelligence Preparation of the Battlefield. 8 July 1994.
FM 34-130 will be republished as FM 2-01.3.
FM 41-10. Civil Affairs Operations. 14 February 2000.
FM 41-10 will be republished as FM 3-05.40.
FM 46-1. Public Affairs Operations. 30 May 1997.
FM 46-1 will be republished as FM 3-61.
FM 71-100. Division Operations. 28 August 1996.
FM 71-100 will be republished as FM 3-91.
FM 100-7. Decisive Force: The Army in Theater Operations. 31 May 1995.
FM 100-7 will be republished as FM 3-93.
FM 100-14. Risk Management. 23 April 1998.
FM 100-14 will be published as FM 5-19.
FM 100-15. Corps Operations. 29 October 1996.
FM 100-15 will be republished as FM 3-92.
FM 100-18. Space Support to Army Operations. 20 July 1995.
FM 100-18 will be republished as FM 3-14.
Bibliography-3
FM 3-13 __________________________________________________________________________________
FM 100-25. Doctrine for Army Special Operations Forces. 1 August 1999.
FM 100-25 will be republished as FM 3-05.
FM 101-5-1. Operational Terms and Graphics. 30 September 1997.
FM 101-5-1 will be republished as FM 1-02.
DEPARTMENT OF DEFENSE PUBLICATIONS
DOD Directives are available online: http://www.dtic.mil/whs/directives.
DOD Directive S-3600.1. Information Operations. 9 December 1996.
DOD Directive 5100.77. DOD Law of War Program. 9 December 1998.
(FOUO) DOD Directive O-8530.1. Computer Network Defense (CND). 8 January
2001.
PUBLIC LAWS AND OTHER PUBLICATIONS
Armed Forces Staff College Pub 1. The Joint Staff Officer’s Guide. 1997.
Carter, Rosemary M. “The Information Operations Cell-Necessary for Division
Offensive Actions.” School of Advanced Military Studies monograph,
Command and General Staff College, first term, AY 98-99.
Center for Army Lessons Learned (CALL) Newsletter 99-2. Task Force Eagle IO: IO
in a Peace Enforcement Environment. January 1999.
Source for “CMO in a Peacekeeping Environment,” page 2-25.
Center for Army Lessons Learned (CALL) Newsletter 99-15. Tactics, Techniques
and Procedures for Information Operations. March 1999.
Source for “Maintaining the Initiative at Home Station,” page 2-23.
CJCSI 3211.01C. “Joint Military Deception.” 19 February 2002.
CJCSI 6510.01C. “Information Assurance and Computer Network Defense.”
1 May 2001.
Concept for Future Joint Operations. Expanding Joint Vision 2010. May 1997.
General Order Number 5, Subject: Establishment of US Army Network
Enterprise Technology Command/9th Army Signal Command; Transfer
and Redesignation of The Headquarters and Headquarters Company, 9th
Army Signal Command; Discontinuance of the Communications
Electronic Services Office and the Information Management Support
Agency. 13 August 2002.
Grohoski, Romanych, and Seybert, “Measures of Effectiveness in the Information
Environment.” Military Intelligence Professional Bulletin (July-
September 2003): 12-16.
Paragraphs 6-16-6-38 and figures 6-1 and 6-2 use data from this article.
Information Assurance: Legal, Regulatory, Policy, and Organizational
Considerations, 4th Edition. Washington, D.C.: The Joint Staff,
Directorate of Command, Control, Communications, and Computer
Systems. 25 August 1999.
Also called the “IA Purple Book”.
Bibliography-4
______________________________________________________________________________ Bibliography
Joint Pamphlet. Information Assurance through Defense in Depth. February
2000.
Joint Pamphlet. Information Assurance. Legal, Regulatory, Policy and
Organizational Considerations, 4th Edition. August 1999.
Joint Pamphlet. A Strategy for Peace the Decisive Edge in War, Information
Operations. March 1999.
Kahan, James P., D. Robert Worley, and Cathleen Stasz. “Understanding
Commanders’ Information Needs.” RAND: Arroyo Center. June 1989.
LIWA. Information Operations Planning, Tactics, Techniques, and Procedures for
Field Support Teams, The Information Operations Process, 6th Edition.
May 1999.
Memorandum of Understanding Among Deputy Chief of Staff for Operations and
Plans; Deputy Chief of Staff for Intelligence; Director of Information
Systems for Command, Control, Communications, and Computers; and
Commander, US Army Intelligence and Security Command, Subject: The
US Army Intelligence and Security Command’s Land Information
Warfare Activity. February-March 1995.
Memorandum, DAMO-ODI, Subject: Naming of the Armies Initial TOE,
Information Operations Unit. 14 August 2002.
Message: R51700Z OCT 00. From DA WASHINGTON DC//DAMO-ZA//,
SUBJECT: Assignment of Army Component for Space/Computer
Network Attack/Computer Network Defense.
Message: R011530Z NOV 00. FROM DA WASHINGTON DC//SAIS-
IAS//,SUBJECT: New Information Assurance (IA) Personnel Status-
Interim Policy Change.
Message: O12050Z NOV 00. FROM SECDEF, WASHINGTON DC//OASD-
PA/DPL//. SUBJECT: Public Affairs Guidance-Computer Network Attack.
Message DTG 012050Z Nov 00, From SECDEF Washington DC//OASD-
PA/DPL//, SUBJECT: Public Affairs Guidance- Computer Network
Attack.
National Military Strategy. December 1999.
National Security Strategy for a New Century. December 1999.
Presidential Decision Directive 68. “United States International Information
Policy (IPI).” 30 April 1999.
Smith-Mundt Act of 1948 (Title 22 USC section 1461).
The United States Code is available online: http://uscode.house.gov/usc.
htm.
“Strategic Assessment, 1999.” Institute for National Strategic Studies, National
Defense University. June 1999.
Tulak, Arthur N. “The Application of Information Operations Doctrine in
Support of Peace Operations.” Master of Military Art and Science thesis,
Command and General Staff College, 4 June 1999.
USAJFKSWCS Pub 525-5-15. Psychological Operations: Capabilities and
Employment. January 1999.
Bibliography-5
FM 3-13 __________________________________________________________________________________
US Army War College. “Strategic Research Project, Information Operations: A
Layman’s Perspective.” 1 April 1997.
Bibliography-6
Index
Entries are by paragraph number unless stated otherwise.
1st IOC (L), F-49, F-57-F-59
validating, MD, 4-116
PA, coordinate with,
2-1102-117
A
B
PSYOP, coordinate with,
AAR, MD operations and, 4-113
BDA, IO, 6-18, 6-20, 6-30, 6-33
2-110, 2-117
ACE, EWO, coordinates with,
biases, conditioning and, MD,
PSYOP, support of, 2-94
2-29
4-108
CNA, F-64
ACERT, F-68, F-72
deception targets, using,
4-13, 4-34
CNO, element of, 2-1
CND and, 2-41
exploiting, during MD
IO, component of, 1-57
G-6, assists, 2-41
operations, 4-45
objectives, 2-35
G-6, passes INFOCON to,
influence of, MD, 4-44
operations, 2-31
2-68
introducing, during MD
support, 2-32
OPSEC and, F-14
operations, 4-79
responsibilities, F-52
CND, F-4
reinforcing, during MD
administrative means, MD, of,
ACERT and, 2-41
operations, 4-108
4-27
CNO, element of, 2-1
C
adversary(ies), 1-16, 1-51, 7-30,
conduct, 2-39
7-31
CA forces, limitations of, 2-116
consists of, 2-38
ANOSC, 2-41, F-68, F-70-F-72
cause and effect, IO, 6-18, 6-22,
G-6, responsible for, 2-40
6-23
ARAT-TA, responsibilities, F-60
IO, component of, 1-57
CCIR, plans and, F-6
Army National Guard enhanced
RCERT and, 2-41
separate brigade, IO
CHEMO, F-12, F-23
CNE, CNO, element of, 1-57, 2-1,
responsibilities, F-38
CI, agents, 2-77
2-44
ASCC, G-7s and, 1-86, F-2, F-41-
contribute to, 2-76
CNO, 1st IOC (L) and, F-64-F-65
F-46, F-42
discipline and MOS,
composed of, 2-1, 2-30
assessment, deception targets, of,
distinguish between, 2-77
4-13
IO, component of, 1-57
mission, 2-76
first-order effects, IO, 6-20
COA, analysis, war-gaming, 5-118
operations support, 2-75
G-7, establishing links for IO
comparison, 5-125
protect against, 2-74
assessment, 7-4
decision briefing and, 5-127
CMO, activities, 2-111
G-7, IO, 6-14
decision briefing, G-7
civil authorities, support to,
intelligence collection assets,
presents, 5-129
2-115
IO, 6-35
development, 5-78
civil dimension, aspects of,
IO, 6-19
IO concept of support, 5-131
2-112
IO, criteria of success, 6-13
WARNO, IO input for, 5-128
forms of, 2-113
IO, during execution, 7-11
MD termination branches,
IO objectives, support of,
MD operations, of, 4-85
4-100
2-103
second-order effects, IO, 6-21
MD, G-2 and, 4-67
military operations, support
third-order effects, IO, 6-21
to, 2-114
MD, G-3 and, 4-66, 4-75,
4-90, 4-102
types of, during MD, 4-114
Index-1
FM 3-13 __________________________________________________________________________________
COA (continued)
criteria of success, assessment of,
deception target, adversary
IO, 6-4, 6-13, 6-19
decisionmakers and, 4-12
MD, G-7 and, 4-66, 4-90,
4-102, 4-113
development of, IO, 6-26
assessment of, 4-13
viable, establishing, 4-98
evaluation of, 6-25
beliefs and, 4-42
war games and, 4-101
IO assessment matrix and,
biases and, 4-13, 4-34, 4-44,
5-109
4-45, 4-79, 4-108
COLISEUM, contingency
planning, support of IO, 1-79
IO input work sheets and,
desired perceptions and,
5-109
4-13, 4-18
collection plan, G-3, coordinated
with, 5-64
IRs and, 5-109
foreign power and, 4-24,
4-25, 4-27
combat power, examples of IO,
second-order effects for, 6-31
friendly, 5-80, 5-81
indicators and, 4-13
third-order effects for, 6-32
commander’s guidance, receipt of
perceptions and, 4-30
critical asset list, Army defines,
mission, and, 5-12, 5-72
5-45, 7-18
physical means, 4-24
commander’s intent, statement of,
current operations, G-7
situational understanding,
5-70
responsibilities, F-3-F-4
4-18
commanders, CCIR and, 5-62
current operations center,
technical means, 4-25
IO planning guidance, 5-71
responsibilities, F-61-F-62
decision support template, G-7,
risk assessment, allocates
CWC, F-68
used by, 7-18
resources, 5-60
D
decisionmakers, adversary, 4-2,
available assets, reviews,
4-12
databases, 6-1
5-47
defensive IO, adversary actions,
DCSIO, IO responsibilities, F-41-
initial guidance, essential
limits, 1-64
F-43
elements of, 5-16
Army and joint environments,
deceive, IO effect, 1-62
initial guidance, including IO,
2-4
deception events, concealing,
5-15
Army defines, 1-63
4-22, 4-54, 4-82
restated mission, approves,
uses of, 1-69
deception means, deception story,
5-69
4-23
degrade, IO effect, 1-62
risk, accepts or rejects, 5-107
deception objectives, MD
deny, IO effect, 1-62
concept of operations, COA,
operations and, 4-15
destroy, IO effect, 1-62
within commander’s intent, 5-87
subordinate, 4-16
detection, IO effect, 1-66
conditioning, MD preparation
subordinate, forms of, 4-17
disinformation, propaganda, 2-89
technique, 4-108
support to the defense, 4-53
disrupt, IO effect, 1-62
COS, IO responsibilities, F-19
deception operations. See MD
DOD Intelligence Dissemination
counteractions, hostile
propaganda, neutralize, 2-97
deception story, believability of,
Program, contingency planning,
4-47
support of IO, 1-79
adversary attempts, 2-81
credibility, 4-21
DODDIP, contingency planning,
consists of, 2-79
support of IO, 1-79
false information and, 4-30,
contributions to, 2-80
4-31
DWG, deception story
offensive actions, 2-83
development, 4-76-4-80, 4-82
illusions and, 4-84
reducing, 2-82
developing COAs and, 4-75
indicators and, 4-20, 4-21
counterpropaganda, adversary
in support of MD operations,
perceptions and, 4-20
propaganda, attacks, 2-96
4-57, 4-60
preconceptions and, 4-43
consists of, 2-85
MD and, F-13
scenario, 4-20
counteractions, 2-97
E
suspicion and, 4-43
preventive actions, 2-97
EEFI, initial guidance, essential
truthful information and, 4-31
PSYOP forces, 2-86, 2-91
element of, 5-16
rumor control, 2-97
Index-2
____________________________________________________________________________________ Index
electromagnetic deception, 1-23,
adversary COAs, determines,
G-5, coordinates with, 2-117
4-25, 4-26
5-36
G-7, coordinates with, 5-6,
electronic attack, EW component,
areas of interest, 5-38
5-56, 5-98, 6-51, 7-1, 7-9,
2-27
7-11, 7-16, 7-18, 7-19,
CI operations, monitors, 2-78
7-23-7-26, 7-28, 7-29,
electronic attack incident,
collection plan, incorporates,
7-31
adversary, CNA by, 1-25
5-64
IO responsibilities, 6-43, F-22
electronic protection, EW
commander’s visualization
component, 2-25
ISR and, 1-40, 5-64, 5-65
and, 5-14
ENCOORD, MD and, F-12
MD operations, role in, 4-19,
doctrinal template, G-7 and,
4-57, 4-62
EP, EW and, F-10
5-34
OPSEC, disseminates, 5-59
ES, EW and, F-10
EW responsibilities, F-10
PIR, answers, 1-46
estimates, BDA and other
EWO, coordinates with, 2-29
intelligence analyses, IO, 6-33
prioritizing branches and
G-3, coordinates with, 1-46
sequels, IO, 6-12
coincidental relationships, IO
G-3, submits IO tasks to, 5-20
elements, 6-24
restated mission, 5-67
G-5, coordinates with, 2-117
IO, 6-6
risk assessment matrix, IO
G-7 and, 5-54
input to, 5-108
MD, 4-73
G-7, combines risk
TAC CP and, 7-16
EW, action, 2-23
assessment with, 5-59
time plan, receipt of mission,
EW, components of, 2-24
G-7, coordinates with, 2-84
5-66
EW support, EW component, 2-26
G-7, helps develop RI, 5-35
G-4, G-7, coordinates with, 2-117,
EWO, 2-28, 2-29, 6-43, F-10-F-11
G-7, HVTs and, 5-39
6-43, 6-54, F-25
execution, MD operations, of,
G-7, reverse-plan IO tasks,
G-5, G-2, coordinates with, 2-117
4-109, 4-111, 4-112
5-98
G-3, coordinates with, 2-117
exploit, IO effect, 1-62
G-7, synchronize IO, 5-1
G-6, coordinates with, 2-117
external coordination, G-7,
G-7, works closely with, 7-15
IO responsibilities, 6-43, F-26
establishing liaison, 6-44, 6-46
information sources, access
PAO, coordinates with, 2-117
F
to, 1-44
PSYOP and, F-16
FA 30, F-2
IO IRs, incorporates, 5-65
G-6, ACERT, assists, 2-41
FECC, SBCT and, F-37
IO responsibilities, 6-43, F-21
CND actions/tasks, G-7 and,
feedback indicators, 4-87, 4-88
IPB, responsible for, 1-41
6-45
fire support, IO, G-7 and, 5-1
MD COAs and, 4-67
CND, responsible for, 2-40
first-order effects, 6-17, 6-20, 6-23
physical security, assesses,
commander’s visualization
force protection, IO actions,
2-73
and, 5-14
related to, 6-37, 6-38, 6-39,
PIRs, added to collection
current operations and, F-4
6-48
plan, 5-99
EW responsibilities, F-10
foreign IO, threat sources,
G-3, COA approval, WARNO
manipulation of, 1-17
issued, 5-127, 5-128
EWO, coordinates with, 2-29,
2-57
foreign power, deception target,
COA statement, prepares,
4-24, 4-25, 4-27
5-115
G-2, coordinates with, 2-57
FSCOORD, 5-14, F-10
COAs, 4-66, 4-75, 4-90,
G-5, coordinates with, 2-57,
2-117
FSTs, capabilities, F-50-F-51
4-102
IA, responsible for, 2-57
commander’s guidance,
G
WARNO and, 5-74
IM, staff oversight for, 1-37
G-1, IO responsibilities, 6-43, F-20
commander’s visualization
INFOCON, disseminates,
G-2, adversaries, develops facts
and, 5-14
2-58
and assumptions, 5-54
FRAGOs, IO and, 7-10, 7-25,
IO responsibilities, F-27-F-29
7-26
Index-3
FM 3-13 __________________________________________________________________________________
G-6 (continued)
IO efforts, responsible for,
IO mission statement,
1-57
develops, 5-2
RCERT, assists, 2-41
G-2, coordinates with, 1-43,
IO objectives, 4-65, 5-6, 5-89
G-7, ACE, coordinates with, 7-19,
1-46, 2-17, 2-31, 2-84, 5-1,
7-23, 7-24, 7-28, 7-31
IO planning products,
5-20, 5-33, 5-35, 5-37,
developing, 5-9
areas of interest, G-2, 5-38
5-39, 5-40, 5-99, 5-110,
IO preparation, 6-2
assessment matrix, IO, 7-13,
5-111, 5-121, 7-6, 7-11,
7-20
7-15, 7-16, 7-23, 7-24,
IO responsibilities, 6-43
CCIR and, 5-40, 5-63
7-28
IO risks, assesses, 5-56,
challenges, assessing IO, 7-1
G-3, coordinates with, 2-17,
5-101
5-6, 5-29, 5-61, 5-74, 6-51,
IO shortfalls, identifying, 5-50
CNA support, corps level,
7-1, 7-9, 7-11, 7-16, 7-18,
2-31, 2-36
IO staff tasks, prepare and
7-19, 7-23-7-26, 7-28,
monitor, 6-5
CND actions/tasks, 6-45
7-29, 7-31
IO status, reports, 7-9
COAs and, 4-66, 4-90, 4-102,
G-4, coordinates with, 6-54
4-113, 5-39, 5-76, 5-78,
IO synchronization matrix,
G-5, coordinates with, 2-17
5-79, 5-87, 5-102, 5-115,
develops, 5-98
5-116, 5-129, 7-25, 7-28,
hazards, 5-58, 5-103
IO tasks and mission
7-29
HPTL and, 7-18
statement, 5-94
combat power and, 5-81,
HPTs, 5-99
IO tasks, develops, 5-8
5-82
IA, deconflicts, 2-57
IO tasks, recommends units
commander, advises, 5-14
implied tasks, IO-related,
to, 5-113
commander’s guidance, IO
5-44
IO, allocates time, 5-26
input to, 5-73
information environment, 5-37
IO, planning, 5-1
counterpropaganda,
information flow, 7-23
IO, responsibility for, 1-85
responsibility for, 2-93
IO annex, coordinates, 5-136
IO-capable units, integrates,
criteria of success,
IO assessment, 5-17, 6-14,
6-55
establishes, 5-110
6-34, 7-4, 7-11, 7-12
IO-related facts and
critical asset list and, 5-45,
IO assets and resources,
assumptions, record of,
5-100, 7-18
reviews, 5-47
5-75
current operations
IO cell, 5-17, 5-24
IO-related hazards, 5-106-
responsibilities, F-4
5-108
IO concept of support, 5-3,
decision support template, IO,
5-89, 5-122
IO-related tasks, 5-42, 5-66
7-18
IO coordination, 6-10, 6-41
IPB, 4-67, 6-9
defensive IO objectives,
determines, 5-92
IO effectiveness, assessment
ISR plan, 6-9
of, 5-109
MD and, 4-32, 4-57, 4-62,
doctrinal template, G-2 and,
5-34
IO effects, obtaining, 7-19
F-12
EEFI, reviews, 5-16
IO estimate and, 5-25, 5-125,
MDMP and, 5-1, 5-41, 5-76
5-126
MDO and, 2-21, 4-19
enemy PSYOP, evaluates,
2-17
IO execution, 6-36, 7-14,
offensive and defensive IO,
7-16, 7-18
integrating, 1-70
establishing liaison, 6-46
IO factors, input, 5-13
OPLAN/OPORD, IO annex,
EW operations, synchronizes
with, 2-29
IO hazards, develops controls
5-133, 6-7, 6-8, 6-11
for, 5-102
OPSEC officer, responsibility
EWO, responsibility over,
2-28
IO input work sheets, 5-96,
over, 2-6
5-97
OPSEC, integrates, 4-51,
execution matrix, IO, 7-18,
7-24
IO input, developing, 1-43
4-92, 4-93
fire support representatives
IO IRs, 5-65
physical destruction,
and, 5-1
synchronizes, 2-46
Index-4
____________________________________________________________________________________ Index
G-7 (continued)
activist nonstate actors,
IM, IO, ISR, maintaining, 1-49
adversary threat source,
PIR, OPSEC and, 5-40
operational advantage, 1-36
1-13
products, input to, 5-13
INFOSYS, security program,
adversary(ies), 1-9, 1-20
measures of, 2-56
PSYOP elements,
battlespace, components of,
coordinates support with,
INSCOM, 1-79, F-49, F-66-F-68
1-2
2-100
intelligence, PIR and HPTs,
C2 systems and, 1-3
receipt of mission actions,
focuses on, 1-41
5-12, 5-29
challenges, 1-31-1-35
intelligence support element,
responsibilities, F-2-F-9
EA, incident, 1-24
responsibilities, F-63
restated mission, IO input,
electromagnetic deception,
International Broadcasting Board,
5-67
incident, 1-23
2-95
risk assessment, combines
foreign IO, adversary threat
intrusion/attack detection,
with, 5-59
source, 1-15
monitoring, 2-54
SOP, IO tools, 5-24
hackers, adversary threat
IO, annex, 5-9
source, 1-11
statement of intent, IO input,
assessment and, 5-17, 6-19
5-70
incidents and, 1-20
assets, sources of, 5-48
task organization
information fratricide,
baseline, establishing, 7-34
recommendations and,
adversary threat source,
capabilities, IPB and, 5-33
5-112, 5-114
1-18
causes and effects, 6-18
training and, 6-42
insiders, adversary threat
source, 1-12
commanders integrate, 1-70,
unintended consequences,
1-71
identifies, 5-105
IO, 6-15
concept of support, 5-3,
unit rehearsals, participates
malicious software, incident,
5-886-28
in, 6-49
1-22
considerations, other, 7-33
war-gaming, 5-120, 5-123,
military operations and, 1-5
5-124
constraints, establish limits,
nonphysical concepts and,
5-52, 5-53
GIG, 2-42, F-70-F-71
6-15
contingency plans, based on,
H
perception management,
1-81
incident, 1-27
hazards, adversary, unintended
core elements, 2-1
actions, 5-104, 5-105
physical assets and, 6-15
corps and division
hierarchy of effects, IO, 6-17
physical destruction, incident,
responsibilities, F-1
1-26
HPTL, G-7, used by, 7-18
crisis action plan, 1-81
significant actors in, 1-4
HPTs, EW and, 5-99, F-10
databases, example of, 1-77
terrorists, adversary threat
HVTs, EW and, F-10
source, 1-14
defensive, planning for, 6-1,
I
7-15
threats in, 1-6, 1-7, 1-8
IA, 2-50, 2-51, 2-52, F-4, F-28
during peace, 1-78
threats, evaluate, 1-30
IDC, IO responsibilities, F-66-
during war, 1-84
threats, sources of, 1-10
F-67
elements of, 1-56
unauthorized access,
IM, C2, integral to, 1-37, 1-38,
employment of, 1-53
incident, 1-21
1-39
information protection, security
essential tasks, 5-43, 5-44
indicators, bad luck, 4-21, 4-46
means, 2-53
estimate, 6-6
influence, IO effect, 1-62
information superiority, situational
estimate, 5-34, 5-40, 5-55
INFOCON, actions, 2-58-2-67
understanding, maintaining,
evaluating, 7-20, 7-21
information dissemination
1-52
evaluation criteria, 5-122
management, F-28
achieving, 1-50
exercises, developing for,
information environment, 1-1
goals, contributors to, 1-36
1-88
Index-5
FM 3-13 __________________________________________________________________________________
IO (continued)
tasks, G-7 develops, 1-89,
C2 of, 4-111
5-8, 5-85, 5-95
external coordination, 6-44
categories of, 4-9
theater engagement plan
flexibility, 7-35
commander’s intent and, 4-4
and, 1-76
force multiplier, 1-72
competencies, 4-48
time allocation, 5-27
force protection, actions
conditioning, 4-108
training, MSEL data for, 1-89
related to, 6-37, 6-38
coordination of, 4-63
TTP for, 1-88
hazards, categories of, 5-57
current operations and, F-4
variance from the plan and,
input work sheet, 5-96
database, 4-68-4-72
7-27
internal coordination, 6-41
defense, in the, 4-53
vulnerabilities, IPB and, 5-33
IPB supports, 5-18
effective, 4-18
IO assets, Army defines, 5-47
IRs, identifying, 5-18
efforts, complications, 2-22
IO cell, 1-60, 1-86, 1-87
ISR and IM, depends on,
estimate, 4-73
IO concept, information
1-48
environment, shapes, 1-47
execution, 4-109
joint, 1-59, 1-75
IO database, target sets, focus on,
feedback, 4-85
mission statement, 5-2, 6-27
1-76
goal, 4-4, 4-59
mission success, 6-35
IO elements, 1-73, 1-76, 1-83,
guidance, 4-74, 5-16
network protection, preparing
2-92
institutional experience, 4-115
for, 6-1
IO estimate, assets and
integrated, 4-33
nonphysical concepts, 6-15,
resources, list of, 5-51
6-16
intelligence support, 4-8
IO execution, decisionmaking
objectives, 5-4, 5-43, 5-90,
joint operations, 4-52
during, 7-2, 7-5, 7-18, 7-22,
5-91, 5-92, 5-93, 6-29
7-24
mislead adversaries, 4-5
offensive and defensive,
IO IRs, current operations and,
mission analysis, 4-66
synchronizing, 1-74
F-4
need to know, 4-29
operation, enabling, 1-55
IO objectives, 5-5, 5-7
offense, in the, 4-54
OPSEC and, 6-1
IO resources, Army defines, 5-47
operations process and, 4-58
physical assets and, 6-22
IOVATs, commander and, 5-46,
opportunities, 4-3, 4-6
PIR, pertinent to, 5-40
F-54-F-56
OPSEC, 4-29, 4-31, 4-92
planners tasks, 2-32
IPB, 5-34, 5-36, 5-39, 5-40, 5-41,
planning, 4-61, 4-62
F-6
planning, integrating, 5-10,
principals, 4-11
5-11
ISR, 1-45, 4-82, 4-84, 5-64, F-6
protect the force and, 4-5
preparation for, 6-1
J-K-L-M
resources, 4-49, 4-50
related activities, 1-58
JTF, F-4
responsibilities, 4-7
related tasks, 5-8
law of war, principles of, 2-37
risk analysis and, 4-89
resources, concept of
liaison, between G-7s, 6-47
risk, forms of, 4-90
support, 5-48, 5-49
main CP, 7-7, 7-15
risk, mitigating, 4-91
staff officers, responsibilities
maneuver brigades, divisional,
of, 6-43
Service, 4-10
F-33, F-39-F-40
situational understanding
stability operations, in, 4-55,
MD, actions, 2-18, 4-1
and, 1-82
4-56
adequate information for,
situation template, 5-36
target of, 4-2
4-67
strategic environment, 1-80
task organization changes,
adjusting, 4-106
4-107
supporting elements, 2-45
adversary commanders,
tasks, specified, 4-65
synchronized operations,
manipulating, 2-19
6-40
termination, 4-99
approval authority for, 4-103
tasks, 6-30
time required, 4-32
assessing, 4-85, 4-114, 4-116
Index-6
____________________________________________________________________________________ Index
MD (continued)
IO tasks, converting
IO element, used as, 2-47
measures into, 4-97
training for, 4-48
IO support, capabilities for,
leverage truth, 4-31
2-48
unity of effort, 4-52
MD and, F-12
physical means, 4-24
unwitting actors and, 4-29,
4-104
measures, 4-92
physical security, commanders
conduct, 2-70
witting actors and, 4-29
offensive and defensive IO,
contributes to, 2-5
G-7, synchronizes, 2-72
false image, information
environment, 1-29
preparation of MD operation,
measures, 2-69
4-105
MDMP, orders production, 5-135
resources, 2-71
process, applying, 4-94
parallel planning technique,
PIR, IO related, 1-42, 5-40
5-22
OPSEC doctrine, established, 2-4
plans, G-7 responsibilities for,
time constraints, 5-28
OPSEC officer, G-2, coordinates
F-5-F-6
with, 2-6
MDO, 2-21, 4-19, 5-16, 6-43,
preconceptions, deception story,
F-12-F-13
G-3, coordinates with, 2-6
4-43
misinformation, propaganda, 2-88
MDMP and, 2-6
preparation, IO, 6-1, 6-2, 6-4, 6-5
mission analysis, briefing, 5-68
responsibilities, 6-43, F-14-
Presidential Decision Directive 68,
F-15
IPIP, distributed through, 2-8
examination of, 5-32
P-Q
preventive actions, propaganda
G-2, prepares IPB, 5-33
awareness programs, 2-97
G-7, researches, 5-32
PA, activities, enhance
confidence, 2-104
propaganda, in support of, 1-28,
MDMP and, 5-77
2-87, 2-98
CMO and, 2-101, 2-110,
tasks, 5-30, 5-31
2-117
protection, IO effect, 1-65
N
information environment,
provost marshal, IM violations,
NETCOM/9th ASC,
2-102, 2-108
2-73
responsibilities, F-69
informs and counters
physical security, 2-73
NETOPS, CNA, 2-41, F-28
propaganda, 2-105
PSYOP, approval authority, 2-14
network management, F-28
IO, supports, 2-106
ASCC responsibilities, F-46
network managers, react to, 2-55
media analysis plan, 2-109
capabilities, 2-10
nonphysical concepts, IO and,
principles, in support of IO,
civil authorities and populace,
6-15, 6-16
2-107
cooperation of, 2-16
O
PSYOP and, 2-94, 2-99,
CMO, coordinate with, 2-110,
2-110, 2-117
2-117
offensive IO, Army defines, 1-61,
1-62
PAO, 2-117, F-16, F-31
counterpropaganda, 2-14
operations, options, staff
peacetime, IO factors to consider,
forces, examples of, 2-15
generates, 5-84
6-3
foreign audiences, influence,
OPLAN/OPORD, 2-90, 5-107,
preparation, 6-2
2-9
5-130, 5-130, 5-132, 5-134
perceptions, desired, 4-36
adversaries, influence, 2-14
opposing information,
forms of uncertainty, 4-38
IPIP, synchronized with, 2-8
propaganda, 2-90
increasing uncertainty, 4-40
legal constraints, 2-14
OPSEC, adversary analysis and,
reducing uncertainty, 4-41
logistic requirements for, 2-14
4-95
supporting, 4-37
missions, 2-13
Army defines, 2-3
types, 4-35
operational force, 2-15
COA approval and, 4-96
physical assets, cause and effect,
PAO, coordinate with, 2-110,
commanders establish, 2-6
IO, 6-22
2-117
EEFI and, 4-95
physical destruction, G-7 and,
planning, considerations,
enforcing, 4-29
2-46, 2-49
2-14
false indicators and, 4-93
Index-7
FM 3-13 __________________________________________________________________________________
PSYOP (continued)
staff officers, IO, responsibilities
of, 6-43
potential target audiences,
accessibility of, 2-14
staff planners, 5-83, 5-122
purpose of, 2-7
State Department, 2-95
strategic force, 2-15
STRATCOM, 2-68, F-48
strategic message, reinforce,
strategic counterpropaganda,
2-12
Joint Chiefs of Staff,
coordinated by, 2-95
tactical force, 2-15
suspicion, deception story, 4-43
techniques, 2-11
synchronized operations, IO, 6-40
the force, create image of,
2-94
T
time constraints, 2-14
TAC CP, IO cell, assessment by,
PSYOP officer, responsibilities,
7-6
6-43, F-16-F-17
targeting, F-7-F-8
R
technical means, 4-25
RCERT, 2-41, F-14
termination, 4-99, 4-100, 4-112,
4-113
rear CP, IO IRs, answers, 7-8,
7-17
third-order effects, assessment of,
6-21
restoration, IO effect, 1-67
criteria of success for, 6-32
ROE, F-32
IO, 6-17
rumor control, counter rumors,
unfavorable, 2-97
threat sources, peace and crisis,
1-19
S
threats, evaluating, 1-30
S-2, IO responsibilities, F-40
U-V-W
S-3, IO responsibilities, F-40
unit rehearsals, G-7, participates
S-5, IO responsibilities, F-40
in, 6-49, 6-50
S-6, IO responsibilities, F-40
units, augmentation, IO support,
S-7, IO responsibilities, F-3-F-9,
6-52, 6-54, 6-55
F-37
unwitting actors, MD operations
SBCT, IO responsibilities, F-34-
and, 4-29, 4-104
F-35
vulnerability assessment, 5-46
second-order effects, assessment
war-gaming, G-7 helps, 5-119
of, 6-21
WARNO, IO information and,
criteria of success and, 6-31
5-12, 5-21, 5-23
IO, 6-17
witting actors, MD operations and,
Secretary of Defense, CNA
4-29
execution and, 2-36
X-Y-Z
situational understanding, IO
objectives, key to, 5-5
XO, IO responsibilities, F-19
SJA, IO responsibilities, F-32
SMDC, F-48, F-69, F-72
space operations officer, IO
responsibilities, F-24
stability operations, MD, 4-55,
4-56
Index-8
|