Page:United States Army Field Manual 3-13 Information Operations.djvu/31

 Chapter 2 Information Operations Elements and Related Activities This chapter discusses the contributions and links of eoch information operations (IO) core and supporting element and related activity to offen- sive and defensive I0. It also shows the links among them in diagram form. The core and supporting I0 elements are similar to the battlefield oper- eting systems. They ere independent activities thut, when taken together and synchronized, constitute IO. Figure 2—1, pages 2—27-—2·30. shows how each IO element supports the others. Figure 2-2. pages 2-31—2-32. shows possible conflicts among 10 elements. Figure 2-3, page 2-33, shows the support between IO and the related activities of public zulairs and civil- military operations. CORE ELEMENTS 2-1. Core IO elements me operations security (OPSEC), psyz:hol<rgicsl<wpcr:1ti¢ina (PSYOP). military deception (MD), cloet-mnic werihrc (EW) and oonipoter not- work operations (CNO). Computer network operations comprise com- puter network attack (CNA), computer network defense (CND}, and related computer network exploitation (CNE) enabling operations (This doiinition is consistent with joint initiatives and is being storied as n possible joint dolinitiou). Tlteso oore IO elements can he employed either in- dividuolly or io conjunction with various supporting elements. i·e1.ated activities, and iotellipzcnto capabilities to provide a fully integrated wmiighting capability. 2-2. PSYOP, MD mid OPSEC are employed to intluenco izdyersmy dccisionmaket-s or groups while protecting friendly dtcisionnniking. EW and CNO are employed to aiieut or defend the eloctroningnetic sptx·i1um,iiih1rm:xv tion systems (INFOSYSL end imiirmetlon that support douisiontnokers, weapon systems, command and eontrol (C2), and oulonmtud responses, ki .rrrr. k_..` ,;-,;7~7{.rz,i 5 W._.. 7; pj_.:`(i _j  _j rg_;.j,;7~5.rz,5  5 y._..  it r,;__,·(i `I ,1; —r,,   ._.r  i qtiégismptixs  ,si»oisoiti¤i¤ ;i.Q;211—; Q  g., ..Oivei*a§$¤tis’§i>éudiyis5;l&,i,;Sa».;,.;;.z;,;·»;lair? ¢E`;}?hySl¤§l Qeitriqétibti-ii;.ai.-·1»·.;iI§,·»4<§i»»L··,?q11·{gf T; ~`'·  liuiléil0MMive!}€¥4¥e·¢iQéJ¥¢i-¢>t»·.2?§   ar: E5,,Military°Déobndpziantsntig;,;..o;..L...;L;;.¢;t;.2e6 ; ":Pyqilcal@ntg.·;1;;i,;;;;>,;.>;.: ..,r, t;:;·.s.;z$.2~;·tSjj:xI Q   w$tfgt§J.,.L;Qg.no£;..:{g-.iQ§1;Q{;L{i·¥2§I   —_i { i ;;~’c¤ry1n¤t¤r!{émwk-operators ,J,:¢.;;:;.,L2·¤ ~;;*Gewtwscentlpn=.;s..2»»;i::,2,--tant-;»»Z¤11`:: ¤: j :_»xiuiripisteiVipiooyerrtAgee;;;.g;.;.,i;r;rg..,g.4;;+9 y Lgotyitorpropapendai.;.4;:;;;;o:.zs,;t,..;;a;—1¤   ‘‘.`  ,’_, Q ¢?¤¤¤?¤*T N¤*·?i§*l¤`€¥P!¤¥€*§£F9f%€i¤Qtr-¥¥'1·»i»§<#;sé·é¥{i=?¤7%?? .r.rr V `i.‘ VW~i}.·¤i::1;?‘is,C’,:i,L?;,?ifQli ‘',r   ;Wj1? ,   ¤*;9!’{il*!*'lF*¥.9P?*?i*¥?P¤*<·e¤-'§i¢~-.-¤=ié?·>·&¢¥2r¥4.i—“ 2-1
 * `;}@Pff*!¤¥ir-Na*¤*¤FF  Rihifier¤s§*lvl*$¤$.t·é#»»e··¢»»¥#¢é=i##e>i·Q#a»¢#-==;2%Z1 ‘