Page:United States Army Field Manual 3-13 Information Operations.djvu/30

 Dnign ut Army lnfnmulion Opamtium • Develop mnevote, attainable IO training objectives. • Support exercise objectives with realistic play by all IO elementslre lated activities. • Create a realistic 10 exercise environment. • Assess and evaluate employment and synchrorzixatiein of IO elements! related activities. • Use appropriate security measures to protect I0 activities. • Evaluate the use of computer support products (such as synchroniza- tion tools) to execute 10. • Use simulations to augment 10 where and when applicable. · Give credit to the playing units for IO execution; penalize those who should and do not, • Apply eifects of Eriendly offensive and defensive IO to opposing fumes, and etfects of adversary offensive and deiensive IO to friendly forces. • Require units tn maintain mission effectiveness when they lose Lho support of digitallmivzmcod technology. 1-B9. Effectrive IO training requires products that contain specific informa- tion on adversary social, military, religious, and economic institutions. Exer- cise planners may have to provide these. The data needed to create, update, and use these products should be built into the exercise scenario and master scenario events list (MSEL). The opposing time should have an IO capability consistent with the exercise scenario. Realistic IO are essential to evaluating friendly I0 pmrticieney. Within the exercise tenets, both sides should be ale lowed free IO play. Structured, mechanical I0 degrades participants ability to develop the mental agility and creativity that actual IO demand. Senior exercise participants should allow, even welcome, opportunities to work thmugh the C2 chaos that effective I0 can cause. Units should include IO tasks in their mission essential task lists (ME'l`Ls). SUMMARY 1~90. Information superiority is an operational advantage commanders gain through eH'ective IM, ISR. and 10. Commanders from brigade through eche~ lons above oorps conduct I0 to attack adversary C2 systems, defend friendly C2 systems, and shape the information environment. They conduct IO throughout the spectrum of oonHiet and across the range of military opera- tions. [0 brings together many elements and related activities. The G-7 has coordinating staff responsibility for IO. I0 applies the information element of combat power. Pmperly synchronized, it enhances employment of the other elements of combat power. Suwcssful 10 helps commanders gain, maintain, and exploit thc initiative. Available technology allows commanders to syn» ehmnizo offensive and defensive IO to produce complementary and reinfnrc— ing etiects. However, despite advances in technology, the human dimension remains the primary focus of IO. L2!