Page:United States Army Field Manual 3-13 Information Operations.djvu/58

 FM 3v1 3 f QPSK g Mrmary { PSYC? vnymeo [ EW I rjrrysedr Dcccplrmr [. Dcstrrmrrorr accurnty » Dugracrng · Usmg E/MES · Degmdrng • Fvcvrdrng target  Qj;Q“i_S_“tI,i;Q· · Usrrrg EP us adversary as ueceuuon edversarys anqummn     seregnem eiemmrmg measures abrlity Au see, mmgn ES Cz /·.g`7;;—"·_:i  currwmmmr _ neun ren . ueqmemg repnn, and . uesrmym or ;·   915; ·,‘_     mms me ·¤ ·¤ upereucns adversary can process mlm- upsemng §· ~}f;;—'r;j`?,-`Q. { prmccung Q agannseprv uurrmun rn sm, mancn suswpxrbm essen: fgQi‘;»;`i_{>`§[¢,[; facwlihes g_ reclea urms repurx, and pm- · lsulmrng wnh EA }j§;;.;5‘Z;'·¥Y?[i  g and acme; me comm; regex am- lz; ,Z_Li' _`>y.`;·;._*; ¤ · cmaung observume renueirom ’;§jQ·,',j—.}  § nameror · cnugrrg enemy mrormenon   {@,*2  wmre nurse ru mrsrnmrprrzr `jw   E ‘,_’ ° ffff =* !¤ mask wu! rnlcrmaxron jljli; {fj  maneuvers mmvec by me f.}'{if ;;»'·Q»Ti=.i] ernnxmnm means   we '~i rs? TL·:»;§ Q uy uperaions FSYOP physmar " enemy deoepuun sxery mmms cl snack of seiemed EA nsk assessr § mmpmm meh ,,m.¤¤.g me mgm wm meme ee, g- >. before may computers PSVOF kherrre aliuws tether xermane mn- ¢• “ can nmmt smacks un urmr sequence ut g cur BEF! wrwfe 2d unc 3a u umm CNA z my mlernprs lo msms ccmpuiers msn nr PSY- systems wurr EP prevent '~’ 2* rmqurrrx or message rnxmernn mw " rnforrmmxzn bsrure rcraase rrrzlwrwks _ F’¤>l¤¤•i¤¤ · Resmcnng · Ensurrng · seregummng · sarugusru-  it .·r- E   1} ` •   OFLANs/ amees by hem ol products do avmnrabrirzy 01 mg euusur `;w’Q·ii ¤;§{;.¤?i`    E ° E- OFORDS sccurixy and nctcoruam 1NFOS‘r'S\o use rnsrriused m   f:g_:_ cg“i,Q`j E g § number ur clasadred rn pnysreer EW bij,l;·,`;t*_.?¤5;"r " persennei inrunnarien desxmcéon  Q; ,7; ry . ¤ 3* a myer sxery rnemry MD ermmmismng auymery umep. auyersexy enemy necew Q .9 E lor um! Werahons by {Margo bon targus so deccptum mn beiore § §· ¤ crmrauuns deserving the nerepvm physrczrr d¤sm.rc— targets so physrcal 8 S S enemy on me openaurms non mn bc useu EW um use sammy as 3 xmpaci of hrs ¤9a•nrsi mem asm Sgsamsi compromised _; rg A mg need (or deoeplmn rargels PSYOP pnyseer EA \arge\s number of 2 ¤ Q ovssc rergers desrmcnm and empne faurrues ru rm E Eg mrgms srzmg EP secured by S 2 % ¤><»s·r·sz • Counter. . Cunnterrng • Cunducnng • None • Providing · Cuumvrnng .; § E mg mrergn rorergn ummm cnunmrgnu meerome romsgn { g, R S numm epereuuns uperams ru munxeyrnea. Humour Q E: g upernxmns » ldnnniyrng a¤uw broad- sures cperauuns u Q . Nw->»x1lSR mw: esv- Figura 2-1. Mutual Support within ID Elemants (cunlinucd) 2-2B
 * dsstruclrorr lnsks