56 Sample
56 Sample
com
INFO1
[Link]
SMARTBOOK
First Edition (INFO1)
Information Operations
(IO Defined & Described)
Information
in Joint Operations
Information Roles
& Responsibilities
e Info-Related Capabilities
pl
(PA, CA, MILDEC, MISO,
OPSEC, CO, EW, Space, STO)
Information Planning
(IE Analysis, IPB, MDMP, JPP)
m
Information Preparation
Information Execution
Sa
IO
Fires & Targeting
Information Assessment
information
OPERATIONS&CAPABILITIES
Guide to Information Operations & the IRCs
INFO1
[Link]
SMARTBOOK
e
pl
m
Sa
IO information
OPERATIONS&CAPABILITIES
Guide to Information Operations & the IRCs
retrieval systems, without permission in writing by the publisher. Inquiries should be ad-
dressed to The Lightning Press.
SMARTbook is a trademark of The Lightning Press.
Notice of Liability
The information in this SMARTbook and quick reference guide is distributed on an “As Is”
basis, without warranty. While every precaution has been taken to ensure the reliability and
accuracy of all data and contents, neither the author nor The Lightning Press shall have
any liability to any person or entity with respect to liability, loss, or damage caused directly
or indirectly by the contents of this book. If there is a discrepancy, refer to the source docu-
ment. This SMARTbook does not contain classified or sensitive information restricted from
public release. “The views presented in this publication are those of the author and do not
necessarily represent the views of the Department of Defense or its components.”
Credits: Cover image - Soldiers from A Co., 1st Bn, 111th Inf, 56th Stryker BCT conduct a
night live-fire during Exercise Decisive Strike 2019 (U.S. Army photo by Staff Sgt. Frances
Ariele Tejada). All other images courtesy Dept. of the Army and/or Dept. of Defense.
[Link]
(INFO1)
(Sample Only) Find this and other SMARTbooks at: [Link]
Notes to Reader
INFO1: The Information Operations & Capabilities SMARTbook
Over the past two decades, information operations (IO) has gone through a number
of doctrinal evolutions, explained, in part, by the rapidly changing nature of informa-
tion, its flow, processing, dissemination, impact and, in particular, its military employ-
ment. INFO1: The Information Operations & Capabilities SMARTbook examines the
most current doctrinal references available, and charts a path to emerging doctrine
on information operations.
Information is a resource. As a resource, it must be obtained, developed, refined,
distributed, and protected. The information element of combat power is integral to
optimizing combat power, particularly given the increasing relevance of operations in
and through the information environment to achieve decisive outcomes.
Information Operations (IO) is the integrated employment, during military opera-
tions, of information-related capabilities in concert with other lines of operation to
influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential
adversaries while protecting our own. The purpose of IO is to create effects in and
through the information environment that provide commanders decisive advan-
tage over enemies and adversaries.
e
The joint force commander (JFC) leverages informational aspects of military
activities to gain an advantage; failing to leverage those aspects may cede this
pl
advantage to others. Leveraging the informational aspects of military activities
ultimately affects strategic outcomes. The joint force attacks and exploits infor-
mation, information networks, and systems to affect the ability of relevant
actors to leverage information in support of their own objectives. This includes
m
Notes to Reader-1
(Sample Only) Find this and other SMARTbooks at: [Link]
T
ND
AR
AR
• DE P
MY
•
I CA
U NI
ER
TE
M
ST A
D
AT E S O F
Joint Operations
17 January 2017
Incorporating Change 1
22 October 2018
ND
AR
AR
• DE P
MY
•
I CA
U NI
ER
TE
ST A
D
AT E S O F
Joint Operations
e 17 January 2017
Incorporating Change 1
22 October 2018
pl
Plus more than a dozen primary references on the IRCs and more!
INFO1 chapters and topics include information operations (IO defined and described), infor-
m
mation in joint operations (joint IO), information-related capabilities (PA, CA, MILDEC, MISO,
OPSEC, CO, EW, Space, STO), information planning (information environment analysis, IPB,
MDMP, JPP), information preparation, information execution (IO working group, IO weighted
Sa
efforts and enabling activities, intel support), fires & targeting, and information assessment.
2-Introduction
(Sample Only) Find this and other SMARTbooks at: [Link]
as necessary. The primary mechanism for monitoring and assessing IRC activities is the IO
working group. There are two variations of the IO working group. The first monitors and as-
sesses ongoing planned operations and convenes on a routine, recurring basis. The second
monitors and assesses unplanned or crisis situations and convenes on an as-needed basis.
Chap 7: Fires & Targeting
The fires warfighting function is the related tasks and systems that create and
converge effects in all domains against the threat to enable actions across the range
of military operations. These tasks and systems create lethal and nonlethal effects
delivered from both Army and Joint forces, as well as other unified action partners.
Targeting is the process of selecting and prioritizing targets and matching the appropri-
ate response to them, considering operational requirements and capabilities (JP 3-0).
IO is integrated into the targeting cycle to produce effects in and through the information
environment that support objectives.
Chap 8: Information Assessment
Assessment precedes and guides the other activities of the operations process. It is
also part of targeting. In short, assessment occurs at all levels and within all operations
and has a role in any process or activity. The purpose of assessment is to improve the
commander’s decision making and make operations more effective. Assessment is a key
component of the commander’s decision cycle, helping to determine the results of unit
actions in the context of overall mission objectives.
Introduction-3
(Sample Only) Find this and other SMARTbooks at: [Link]
(INFO1)
References
The following references were used in part to compile INFO1: The Information Operations
& Capabilities SMARTbook. All military references used to compile SMARTbooks are in the
public domain and are available to the general public through official public websites and
designated as approved for public release with unlimited distribution. The SMARTbooks do not
contain ITAR-controlled technical data, classified, or other sensitive material restricted from
public release. SMARTbooks are reference books that address general military principles,
fundamentals and concepts rather than technical data or equipment operating procedures.
Joint Publications
JP 3-0 Oct 2018 Joint Operations (w/Change 1)
JP 3-12 Jun 2019 Cyberspace Operations
JP 3-13 Nov 2014 Information Operations (w/Change 1)
JP 3-13.1 Feb 2012 Electronic Warfare
JP 3-13.2 Dec 2011 Military Information Support Operations (w/Change 2)
JP 3-13.3
JP 3-14
Jan 2012
Oct 2020
e Operations Security
Space Operations
pl
JP 3-57 Sep 2013 Civil-Military Operations
JP 3-61 Aug 2016 Public Affairs (w/Change 1)
m
Army Doctrine Publications (ADPs)
ADP 3-19 Jul 2019 Fires
Other Publications
PAM 525-3-1 Dec 2018 The U.S. Army in Multi-Domain Operations 2028
JDN 2-13 Dec 2013 Commander’s Communication Synchronization
4-References
(Sample Only) Find this and other SMARTbooks at: [Link]
(INFO1)
Table of Contents
Information
Chap 1
Operations (IO)
I. Information Operations (Defined & Described)..........................1-1
I. Information Operations (IO)..............................................................................1-1
II. The Purpose of Information Operations...........................................................1-2
- Positions of Relative Advantage (Gaining the “Information Advantage”).....1-3
- Information Operations (Overview)..............................................................1-4
- Integrated Employment of Information-Related Capabilities (IRCs)............1-5
III. Operational & Information Environment.........................................................1-6
A. Operational Environment (OE)..................................................................1-6
B. Information Environment............................................................................1-7
e
C. The Multi-Domain Extended Battlefield.....................................................1-8
- Information Environment Operations (IEO)............................................1-9
IV. Three Interrelated Efforts..............................................................................1-10
pl
V. Army-Joint Relationships...............................................................................1-10
II. Information (as an Element of Combat Power)........................1-11
I. The Information Element of Combat Power.................................................... 1-11
m
II. Information Operations & the Command & Control Warfighting Function.....1-12
- Warfighting Function Tasks (FM 3-0*)........................................................1-12
- The Six Warfighting Functions...................................................................1-13
III. IO and the Operations Process....................................................................1-14
Sa
- IO Planning................................................................................................1-15
- IO Preparation............................................................................................1-15
- IO Execution..............................................................................................1-15
- Targeting....................................................................................................1-15
- IO Assessment...........................................................................................1-15
III. IO & the Army Strategic Roles.................................................1-17
- Positions of Relative Advantage......................................................................1-19
I. Shape.............................................................................................................1-18
SHAPING Activities (IO Considerations)......................................................1-20
- Military Engagement.............................................................................1-20
- Security Cooperation............................................................................1-21
- Other Shaping Activities.......................................................................1-21
II. Prevent..........................................................................................................1-18
PREVENT Activities (IO Considerations).....................................................1-22
- Flexible Deterrent Option (FDO)...........................................................1-22
- Flexible Response Option (FRO).........................................................1-22
III. Conduct Large-Scale Ground Combat.........................................................1-24
IO in Support of DECISIVE ACTION............................................................1-25
- Decisive Action.....................................................................................1-25
- IO Weighted Efforts (& Enabling Activities)...........................................1-25
IV. Consolidate Gains........................................................................................1-26
Win.....................................................................................................................1-26
Table of Contents-1
(Sample Only) Find this and other SMARTbooks at: [Link]
Information
e
Chap 2
pl
in Joint Operations
m
2-Table of Contents
(Sample Only) Find this and other SMARTbooks at: [Link]
Table of Contents-3
(Sample Only) Find this and other SMARTbooks at: [Link]
Chap 3
Information-Related
Capabilities (IRCs)
Information-Related Capabilities (IRCs) ........................................3-1
I. Intrinsic and Extrinsic IRCs (by Echelon).........................................................3-2
- Determination of Assets...............................................................................3-3
- Requesting Capabilities Not On Hand.........................................................3-3
II. Overview of IRCs.............................................................................................3-4
I. Public Affairs (PA).........................................................................3-5
Public Affairs Guidance (PAG).............................................................................3-5
I. Public Affairs and the Operational Environment (OE).......................................3-6
- Public Perception.........................................................................................3-7
II. Public Affairs Information Synchronization......................................................3-9
III. Public Affairs Fundamentals.........................................................................3-10
- Principles of Information............................................................................3-10
- Tenets of Public Affairs...............................................................................3-10
- PA and Commander’s Communication Synchronization (CCS) ................ 3-11
IV. Audiences, Stakeholders, and Publics.........................................................3-12
V. Narrative, Themes, and Messages................................................................3-13
e
VI. Visual Information Function (COMCAM)......................................................3-14
VII. PA Actions in the Joint Planning Process....................................................3-16
pl
II. Civil Affairs and Civil-Military Operations (CMO)....................3-17
I. Civil Affairs and Civil-Military Operations........................................................3-17
II. CMO and the Range of Military Operations...................................................3-18
- Strategic Aspects of Civil-Military Operations............................................3-19
m
Table of Contents-5
(Sample Only) Find this and other SMARTbooks at: [Link]
Chap 4
(Information Operations)
PLANNING
PLANNING (Overview).....................................................................4-1
A. IO & Army Design Methodology (ADM)...........................................................4-2
B. IO & the Military Decisionmaking Process (MDMP)........................................4-2
I. Synchronization of Information-Related Capabilities................4-3
I. Commanders’ Responsibilities.........................................................................4-3
Commander’s Responsibilities (Overview)....................................................4-4
- Commander’s Narrative..........................................................................4-4
- Commander’s Intent...............................................................................4-5
- Guidance................................................................................................4-5
- Concept of Operations............................................................................4-5
- Risk Assessment....................................................................................4-5
II. Staff Responsibilities.......................................................................................4-3
Key IO Planning Tools and Outputs...............................................................4-3
A. IO Running Estimate..................................................................................4-6
B. Logic of the Effort.......................................................................................4-8
C. CCIRs and EEFIs......................................................................................4-9
e
- Commander’s Critical Information Requirements (CCIRs).....................4-9
- Priority Intelligence Requirements (PIRs)...............................................4-9
pl
- Friendly Force Information Requirements (FFIRs).................................4-9
- Essential Elements of Friendly Information (EEFIs)...............................4-9
IV. IO Input to Operation Orders and Plans.......................................................4-10
A. Mission Statement................................................................................... 4-11
m
(Information Operations) e
Chap 6
EXECUTION
pl
m
EXECUTION (Overview)...................................................................6-1
I. Information Operations Working Group............................................................6-1
II. IO Responsibilities Within the Various Command Posts.................................6-4
Sa
Chap 7
Fires &
Targeting
I. Fires (IO Considerations)..............................................................7-1
I. The Fires Warfighting Function.........................................................................7-1
II. Fires Overview.................................................................................................7-2
III. Execute Fires Across the Domains.................................................................7-4
IV. Joint Fires (IO Considerations).......................................................................7-6
V. Foundations of Fire Support (FS)....................................................................7-8
- Attack & Delivery Capabilities......................................................................7-8
VI. Scheme of Information Operations..............................................................7-10
II. Targeting (IO Integration)...........................................................7-11
Targeting Methodology...................................................................................... 7-11
I. Targeting Process Considerations..................................................................7-12
- Targeting Overview....................................................................................7-12
- Various Targeting Cycles............................................................................7-12
- Targeting Categories..................................................................................7-13
- Find, fix, track, target, engage, and assess (F2T2EA)...............................7-13
e
- Find, fix, finish, exploit, analyze, and disseminate (F3EAD)......................7-13
II. Decide, Detect, Deliver, Assess (D3A)..........................................................7-14
III. Targeting Tasks during the MDMP................................................................7-16
pl
IV. Dynamic Targeting (F2T2EA) ......................................................................7-22
(Information Operations)
m
Chap 8
ASSESSMENT
Sa
ASSESSMENT (Overview)...............................................................8-1
I. Assessment Framework...................................................................................8-1
II. IO Assessment Considerations.......................................................................8-2
- Measures of Effectiveness (MOE)...............................................................8-2
- Measures of Performance (MOP)................................................................8-3
- Indicators.....................................................................................................8-3
III. Assessment Rationale....................................................................................8-4
IV. Principles That Enhance the Effectiveness of IO Assessment.......................8-4
V. Assessment Focus..........................................................................................8-5
VI. Assessment Methods.....................................................................................8-6
VII. Assessment Process.....................................................................................8-6
A. Monitoring Information Operations............................................................8-6
B. Evaluating Information Operations............................................................8-7
Criteria Development.....................................................................................8-8
- Measure of Effectiveness (MOEs) Development....................................8-8
- Measure of Performance (MOPs) Development....................................8-9
- Indicator Development............................................................................8-9
- Logic of Effort or Theory of Change........................................................8-9
VIII. Assessment Products.................................................................................8-10
8-Table of Contents
(Sample Only) Find this and other SMARTbooks at: [Link]
Information
Operations
Chap 1
I. Information Operations
(Defined & Described)
Ref: FM 3-13, Information Operations (Dec ‘16), pp. 1-2 to 1-6.
in and through the information environment that advance the ability to deliver opera-
tional advantage to the commander. While IRCs create individual effects, IO stresses
aggregate and synchronized effects as essential to achieving operational objectives.
See p. 1-5 (and chap. 3) for an overview and further discussion of the IRCs.
are integrated into the concept of operation to support each line of operation and
effort. Based on the situation, commanders may designate IO as a line of effort to
synchronize actions and focus the force on creating desired effects in the information
environment. Depending on the type of operation or the phase, commanders may
designate an IO-focused line of effort as decisive.
saries. Commanders achieve this advantage in several ways: preserve and facilitate
decision making and the impact of decision making, while influencing, disrupting
or degrading enemy or adversary decision making; get required information faster
and with greater accuracy and clarity than the enemy or adversary; or influence the
attitudes and behaviors of relevant audiences in the area of operations having an
impact on operations and decision making.
To support achievement of these various ways, IO employs and synchronizes
IRCs to affect the will, awareness, understanding, and capability of these audiences,
while protecting our own. Will, awareness, understanding, and capability all contrib-
ute to and sustain decision making and, if compromised, can impair that decision
making. In terms of will, awareness, understanding, and capability, advantage is
achieved when commanders preserve their will to fight, as well as their situational
understanding and their full capacity and ability to prosecute operations. Further,
commanders achieve advantage when they preserve their freedom of action in the
information environment while degrading enemy or adversary freedom of action.
See following pages (pp. 1-4 to 1-5) for an overview and further discussion.
Information
Operations
Positions of Relative Advantage
(Gaining the “Information Advantage”)
Ref: FM 3-0 (w/Chg 1), Operations (Dec ‘17), pp. 1-18 to 1-19.
Gaining the “information advantage” to achieve “decision dominance” is an emerging
doctrinal concept with regard to operations in the information environment. While not
currently defined in joint or service doctrine, components of the concept are similar to
those found in FM 3-0’s discussion of “position of relative advantage”:
See p. 7-7 (& 2-3) for related discussion of “leveraging information” from joint doctrine.
A position of relative advantage is a location or the establishment of a favorable
condition within the area of operations that provides the commander with temporary
freedom of action to enhance combat power over an enemy or influence the enemy to
accept risk and move to a position of disadvantage (ADRP 3-0). Positions of relative
advantage occur in all domains, providing opportunities for units to exploit. Com-
manders maintain momentum through exploitation of opportunities to consolidate
gains, and they continually assess and reassess friendly and enemy effects for future
opportunities. A key aspect in achieving a position of advantage is maneuver, the em-
ployment of forces in the operational area through movement in combination with fires
to achieve a position of advantage in respect to the enemy (JP 3-0).
Positions of relative advantage are usually temporary and require initiative to exploit.
e
While friendly forces are seeking positions of advantage, enemy forces are doing the
same. There are multiple forms of positional advantage that provide opportunities to
exploit. Some are considerations that should be understood when formulating tactical
pl
and operational concepts, while others are goals that can be worked towards as a
means of destroying or defeating the enemy and achieving the overall purpose of the
operation. Examples of positional advantage include—
m
• Physical and geographical (including strategic positioning, sanctuary, and control
of key terrain)
• Combat power and warfighting function overmatch (including range, lethality,
precision, and mass)
Sa
Information
Operations
Chap 1
II. Information (as an
Element of Combat Power)
Ref: FM 3-13, Information Operations (Dec ‘16), pp. 1-7 to 1-8 and ADP 3-0,
Operations (Jul ‘19), chap. 5.
Information is a resource. As a resource, it must be obtained, developed, refined,
distributed, and protected. IO, along with knowledge management and information
management, are the ways that units harness this resource and ensure its availabil-
ity, as well as operationalize and optimize it.
Ref: ADP 3-0, Operations (Jul ‘19), fig. 5-1. The elements of combat power.
Commanders apply combat power through the warfighting functions using
leadership and information.
Commanders apply leadership through mission command. Leadership is the
multiplying and unifying element of combat power. An Army commander, by virtue
of assumed role or assigned responsibility, inspires and influences people to ac-
complish organizational goals.
Information enables commanders at all levels to make informed decisions on
how best to apply combat power.
Information
Operations
Chap 1
III. IO & the
Army Strategic Roles
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), chap. 7.
Army IO supports joint IO across the range of military operations and across all opera-
tional phases. In accordance with latest joint doctrine (JP 3-0 w/Chg 1, dated Oct ‘18),
the joint operation model describes six general groups of activity as shown in figure
V-4 as a convenient basis for thinking about a joint operation in notional phases.
Enable
Activities
Dominate
Level of Military Effort
Stabilize
Activities Activities
Develop Revise,
and Maintain,
Maintain or Cancel
Operation Operation
Plan
XXXX e Plan
XXXX
pl
Seize Initiative Activities
Deter Activities
Operation Shaping Activities
m
Theater Shaping Activities
Ref: JP 3-0 (w/Chg 1), fig. V-4. A Notional Joint Combat Operation Model.
The Army recognizes that today’s operational environment encompasses the physi-
cal areas of the air, land, maritime, space, and cyberspace domains, as well as the
information environment (which includes cyberspace) and the electromagnetic spec-
trum. Thus, the Army now uses a multi-domain approach to operations, integrating
joint and Army capabilities and synchronizing actions across all domains to fulfill its
strategic roles of shape, prevent, win, and consolidate gains.
Ref: FM 3-0 (Oct ‘17), fig. 1-4. Army strategic roles and their relationships to joint
phases.
I. Shape
Army operations to shape bring together all the activities intended to promote
regional stability and to set conditions for a favorable outcome in the event of a
military confrontation. Army operations to shape dissuade adversary activities to
achieve regional goals short of military conflict. Shaping activities include enhancing
security cooperation and forward presence to promote U.S. interests; developing
allied and friendly military capabilities for self-defense and multinational operations;
and providing U.S. forces with peacetime and contingency access to a host nation.
Regionally aligned and engaged Army forces are essential to achieving objectives
that strengthen the global network of multinational partners and prevent conflict.
These military operations and activities specifically shape perceptions and influence
behaviors of all relevant audiences as necessary to meet U.S. strategic objectives.
As such, IO has a significant role in shaping operational environments and may be
the decisive line of effort in Phase 0.
Although shaping operations are ongoing, they are specific to each theater and
operational area in which they occur (although effects in one theater may well create
effects or achieve objectives in another). The balance of defend, attack, and stabilize
IO efforts varies based on the specific operational area, the mission, and the actors
or audiences involved. IO considerations or actions during shaping operations may
include, but are not limited to, the following:
• Understanding IO implications in the theater campaign plan.
• Embedding IO training and cooperation as part of day-to-day security cooperation.
e
• Military support to public diplomacy.
• Leveraging available and requested IRCs to achieve cooperative and persua-
sive influence in the information environment that promotes stability, coop-
pl
eration, and partnership among allies and potential allies, as well as fosters
legitimacy of U.S. and coalition efforts.
• Integrating and synchronizing IRCs to achieve persuasive influence in the in-
m
formation environment that dissuades adversaries or potential adversaries from
gaining a malign or disruptive advantage or informs and inoculates the local
populace against enemy or adversary propaganda.
• Reviewing contingency plans to ensure requisite IRCs are available in theater
Sa
II. Prevent
Army operations to prevent include all activities to deter an adversary’s undesir-
able actions. These operations are an extension of operations to shape designed to
deny the adversary any opportunities to further exploit positions of relative advan-
tage. Army operations to prevent accomplish this by raising the potential costs to
adversaries of continuing activities that threaten U.S. interests. Prevent activities are
generally weighted toward actions to protect friendly forces, assets, and partners,
and to indicate U.S. intent to execute subsequent phases of a planned operation.
• Negotiations to secure basing and transit rights, establish relationships, and formal-
ize support agreements.
• The use of grants and contracts to improve relationships with and strengthen part-
Sa
ner nations.
• Designing interoperability into acquisition programs.
• Electromagnetic spectrum (EMS) mapping of adversary capabilities.
Military engagement, security cooperation, and deterrence activities usually involve a com-
bination of military forces and capabilities separate from, but integrated with, the efforts of
interagency participants, and they are coordinated by ambassadors and country teams.
Military Engagement
Military engagement is the routine contact and interaction between individuals or ele-
ments of the Armed Forces of the United States and those of another nation’s armed
forces, or foreign and domestic civilian authorities or agencies to build trust and
confidence, share information, coordinate mutual activities, and maintain influence (JP
3-0). Military engagement occurs as part of security cooperation, but it also extends to
interaction with domestic civilian authorities. GCCs seek out partners and communicate
with adversaries to discover areas of common interest and tension. This increases
the knowledge base for subsequent decisions and resource allocation. Such military
engagements can reduce tensions and may prevent conflict, or, if conflict is unavoidable,
they may allow the U.S. to enter into it with greater access and stronger alliances or
coalitions. Army forces support military engagement through key leader engagement and
Soldier and leader engagement.
Information
Operations
Security Cooperation
Security cooperation is all Department of Defense interactions with foreign security
establishments to build security relationships that promote specific United States security
interests, develop allied and partner nation military and security capabilities for self-de-
fense and multinational operations, and provide United States forces with peacetime and
contingency access to allied and partner nations (JP 3-20). These efforts may include
Army forces participating in joint and multinational exercises and employing regionally
aligned forces. Conducting security cooperation is one of the Army’s primary stability
tasks. Security cooperation is governed by various sections of Title 10, USC; Title 22,
USC; and specific public laws addressing Department of Defense (DOD) interactions
with other nations.
Commanders and staffs conduct security cooperation to develop allied and friendly
military capabilities for self-defense and multinational operations, to improve information
exchange and intelligence sharing, to provide U.S. forces with peacetime and contin-
gency access, and to mitigate conditions that could lead to a crisis. Security cooperation
activities include—
• Security assistance.
• Security force assistance (SFA).
• Foreign internal defense.
• Security sector reform.
Information
Operations
Chap 1
IV. IO Across the Range
of Military Operations
Ref: FM 3-13, Information Operations (Dec ‘16), pp. 1-5 to 1-7 and JP 3-0 (w/Chg 1),
Joint Operations (Oct ‘18), chap. V.
Army forces conduct IO within joint force parameters. From peace to war, and across
the range of military operations, commanders integrate and synchronize IO to focus
combat power and gain advantage in the information environment. In all situations,
Army forces do not act in isolation. Army forces conduct operations in support of
a larger joint or multinational plan. Figure V-2 from JP 3-0 depicts the three main
categories of military operations within the range of military operations construct:
See pp. 1-17 to 1-26 for related discussion of IO and the Army strategic roles.
e
Large-Scale Combat Operations
Range of
pl
Crisis Response and Limited Contingency Operations Military
Operations
Ref: JP 3-0 (w/Chg 1), fig. V-2. Notional Operations Across the Conflict Continuum.
Sa
Information
Operations
Chap 1
V. IO Roles, Responsibilities,
& Organizations
Ref: FM 3-13, Information Operations, chap. 3.
Every member of a unit—from the commander, to the staff, to the IO officer or repre-
sentative, to individual Soldiers and Army civilians—contributes to IO. Also essential
to mission success are the IRCs supporting the unit’s IO efforts, as well as any
augmenting IO units. Each has a specific role and important responsibilities to fulfill
or undertake, as well as vital relationships to forge and sustain, in order to achieve
advantage in and through the information environment.
I. The Commander
Commanders, at all levels, are responsible for knowing what threats their units face
and how to exploit or defeat them. They are their unit’s chief influencers and engage
relevant audiences and actors, as necessary, to shape the information environment
to their advantage. Commanders rely on their staff and IO officer, in particular, to as-
sist in planning, preparing, executing, and assessing IO. They also personally direct
and review analysis of the information environment, issue guidance on the employ-
ment and synchronization of IRCs, and direct adjustments based on assessment
results. e
Cognizant of the pervasive impact of the information environment on operations and
pl
the need to affect this environment to their advantage, commanders are mindful of
the following:
• Every operation has, to some degree, an effect on the information environ-
ment.
m
e
• Assessing the effectiveness of employed IRCs.
The IO officer contributes to the overall intelligence preparation of the battlefield
(IPB) by assisting the G-2 (S-2) in identifying and evaluating threat information
pl
capabilities, as well as the means to influence the population. Additionally, the IO
officer submits to the G-2 (S-2) any IRs regarding intelligence shortfalls about the
information environment and coordinates with the G-2 (S-2) in developing templates,
m
databases, and other relevant products, including but not limited to:
• Religion, language, and culture of key groups and decision makers.
• Agendas of nongovernmental organizations.
Sa
Chap 2
I. Information
in Joint Operations
Information
in Joint Ops
Ref: JP 3-0 (w/Chg 1), Joint Operations (Oct ‘18), chap. III.
nomic) provide leaders in the US with the means and ways of dealing with crises
around the world. Employing these means in the information environment requires
the ability to securely transmit, receive, store, and process information in near real
Sa
time. The nation’s state and non-state adversaries are equally aware of the signifi-
cance of this new technology, and will use information-related capabilities (IRCs) to
gain advantages in the information environment, just as they would use more tradi-
tional military technologies to gain advantages in other operational environments.
Regardless of its mission, the joint force considers the likely impact of all operations
on relevant actor perceptions, attitudes, and other drivers of behavior. The JFC then
plans and conducts every operation in ways that create desired effects that include
maintaining or inducing relevant actor behaviors. These ways may include the timing,
duration, scope, scale, and even visibility of an operation; the deliberately planned
presence, posture, or profile of assigned or attached forces in an area; the use of sig-
nature management in deception operations; the conduct of activities and operations
to similarly impact behavioral drivers; and the employment of specialized capabilities
-- e.g., information-related capabilities (IRCs) -- to reinforce the JFC’s efforts.
Inform activities involve the release of accurate information to domestic and inter-
national audiences to put joint operations in context; facilitate informed perceptions
about military operations; and counter adversarial misinformation, disinformation,
and propaganda. Inform activities help to assure the trust and confidence of the US
population, allies, and partners and to deter and dissuade adversaries and enemies.
The joint force attacks and exploits information, information networks, and sys-
tems to affect the ability of relevant actors to leverage information in support of their
own objectives. This includes the manipulation, modification, or destruction of infor-
mation or disruption of the flow of information for the purpose of gaining a position of
military advantage. This also includes targeting the credibility of information.
(Joint IO) I. Information (as a Joint Function) 2-1
(Sample Only) Find this and other SMARTbooks at: [Link]
The information function includes activities that facilitate the JFC’s understanding of the
role of information in the OE, facilitate the JFC’s ability to leverage information to affect
Information
in Joint Ops
See pp. 1-6 to 1-7 for related discussion of the operational environment (OE).
Language skills, regional knowledge, and cultural awareness enable effective joint
operations. Deployed joint forces should understand and effectively communicate with
HN populations; local and national government officials; multinational partners; national,
regional, and international media; and other key stakeholders, including NGOs. This ca-
pability includes knowledge about the human aspects of the OE and the skills associated
with communicating with foreign audiences. Knowledge about the human aspects of the
OE is derived from the analysis of national, regional, and local culture, economy, politics,
religion, and customs. Consequently, commanders should integrate training and capabili-
ties for foreign language and regional expertise in contingency, campaign, and supporting
plans and provide for them in support of daily operations and activities. Commanders
should place particular emphasis on foreign language proficiency in technical areas iden-
tified as key to mission accomplishment.
For specific planning guidance and procedures regarding language and regional
expertise, refer to CJCSI 3126.01, Language, Regional Expertise, and Culture (LREC)
Capability Identification, Planning, and Sourcing.
Information
in Joint Ops
Regardless of its mission, the joint force considers the likely impact of all operations on
relevant actor perceptions, attitudes, and other drivers of behavior. The JFC then plans
and conducts every operation in ways that create desired effects that include maintain-
ing or inducing relevant actor behaviors. These ways may include the timing, duration,
scope, scale, and even visibility of an operation; the deliberately planned presence, pos-
ture, or profile of assigned or attached forces in an area; the use of signature manage-
ment in deception operations; the conduct of activities and operations to similarly impact
behavioral drivers; and the employment of specialized capabilities (e.g., KLE, CO, mili-
tary information support operations [MISO], EW, CA) to reinforce the JFC’s efforts. Since
some relevant actors will be located outside of the JFC’s OA, coordination, planning, and
synchronization of activities with other commands or mission partners is vital.
tion of the flow of information for the purpose of gaining a position of military advantage.
This also includes targeting the credibility of information.
The management aspect of the information joint function includes activities that facilitate
shared understanding across the joint force and that protect friendly information, informa-
tion networks, and systems to ensure the availability of timely, accurate, and relevant
information necessary for JFC decision making.
Facilitating Shared Understanding
Facilitating shared understanding is related to building shared understanding in the C2
joint function. Where building shared understanding is an element of C2 and focuses on
purpose (i.e., the commander’s objective), facilitating shared understanding is concerned
with process (i.e., the methods). Key components of facilitating understanding are col-
laboration, KS, and IM.
Chap 2
II. Joint Information
Operations (JP 3-13)
Information
in Joint Ops
Ref: JP 3-13 w/change 1, Information Operations (Nov ‘14), chap. I & exec. summary.
Chap 2
III. Integrating / Coord-
inating Functions of IO
Information
in Joint Ops
Ref: JP 3-13 w/change 1, Information Operations (Nov ‘14), chap. II.
This section addresses how the integrating and coordinating functions of IO help
achieve a JFC’s objectives. Through the integrated application of IRCs, the relation-
ships that exist between IO and the various IRCs should be understood in order to
achieve an objective.
MILDEC Civil-Military
J-2T Rep J-2 Rep
Operations
OPSEC Rep J-2X Rep
MISO
J-9 Rep
Sa
Ref: JP 3-13 (with change 1), Information Operations, fig. II-3, p. II-6.
Information
cell must account for logical transitions from phase to phase, as joint IO moves from
in Joint Ops
the main effort to a supporting effort.
Shape
Joint IO planning should focus on supporting the TCP to deter adversaries and po-
tential adversaries from posing significant threats to US objectives. Joint IO planners
should access the JIACG through the IO cell or staff. Joint IO planning during this
phase will need to prioritize and integrate efforts and resources to support activities
throughout the interagency. Due to competing resources and the potential lack of
available IRCs, executing joint IO during phase 0 can be challenging. For this reason,
the IO staff and IO cell will need to consider how their IO activities fit in as part of a
whole-of-government approach to effectively shape the information environment to
achieve the CCDR’s information objectives.
Deter
During this phase, joint IO is often the main effort for the CCMD. Planning will likely
emphasize the JFC’s flexible deterrent options (FDOs), complementing US public
diplomacy efforts, in order to influence a potential foreign adversary decision maker
e
to make decisions favorable to US goals and objectives. Joint IO planning for this
phase is especially complicated because the FDO typically must have a chance to
work, while still allowing for a smooth transition to phase II and more intense levels of
pl
conflict, if it does not. Because the transition from phase I to phase II may not allow
enough time for application of IRCs to create the desired effects on an adversary or
potential adversary, the phase change may be abrupt.
m
Seize Initiative
In phase II, joint IO is supporting multiple lines of operation. Joint IO planning during
phase II should focus on maximizing synchronized IRC effects to support the JFC’s
objectives and the component missions while preparing the transition to the next phase.
Sa
Dominate
Joint IO can be a supporting and/or a supported line of operation during phase III.
Joint IO planning during phase III will involve developing an information advantage
across multiple lines of operation to execute the mission.
Stabilize
CMO, or even IO, is likely the supported line of operation during phase IV. Joint IO
planning during this phase will need to be flexible enough to simultaneously support
CMO and combat operations. As the US military and interagency information activity
capacity matures and eventually slows, the JFC should assist the host-nation security
forces and government information capacity to resume and expand, as necessary. As
host nation information capacity improves, the JFC should be able to refocus joint IO
efforts to other mission areas. Expanding host-nation capacity through military and
interagency efforts will help foster success in the next phase.
Enable Civil Authority
During this phase, joint IO planning focuses on supporting the redeployment of US
forces, as well as providing continued support to stability operations. IO planning during
phase V should account for interagency and country team efforts to resume the lead
mission for information within the host nation territory. The IO staff and cell can anticipate
the possibility of long term US commercial and government support to the former adver-
sary’s economic and political interests to continue through the completion of this phase.
Monitor Situation
HHQ WARNORD, PLANORD, FRAGORD, OR JSCP Step 2: Mission Analysis IO Mission Statement Initial IO-Related Recommended
COG/CV Analysis IO Tasks CCIRs
JIPOE and CIO IO Assumptions IO Staff Estimate Commenced
SecDef IPR-A
Commander’s Intelligence Estimate IO Constraints/Restraints Submit Recommended CDR’s IO
1 (Approved Mission) Initial IO Shortfalls Identified Planning Guidance
Initial IO Risks Identified
COG/CV Products IO Concept of Support Refined CCIRs
Step 3: COA Development
Mission Analysis Products IO effects
Additional IO-Related Shortfalls
IO-Related CDR’s Planning Guidance IO tasks
(As Required)
Intel Support MOEs IO Staff Estimate Continues
narrative/sketch
Identify required supplemental ROE
Appendix-3 to Annex-C
CDR’s Approved COA w/Corresponding IO Concept
JPG Guidance Step 7: Plan or Order Development Staff Coordination
Ref: JP 3-13 w/change 1, Information Operations (Nov ‘14), fig. IV-1, p. IV-3.
(Approved Plan)
Legend (Part 1 of 2)
(Sample Only) Find this and other SMARTbooks at: [Link]
Throughout JOPP, IRCs are integrated with the JFC’s overall CONOPS (see Figure IV-
Typical time when warning orders are issued to subordinates (may vary as directed by CDR)
(Sample Only) Find this and other SMARTbooks at: [Link]
Information
in Joint Ops
from applicable operation plans (OPLANs) and concept plans (CONPLANs).
c. Alert subordinate and supporting commanders of potential tasking with regard to IO
planning support.
d. Gauge initial scope of IO required for the operation.
e. Identify location, standard operating procedures, and battle rhythm of other staff
organizations that require integration and divide coordination responsibilities among
the IO staff.
f. Identify and request appropriate authorities.
g. Begin identifying information required for mission analysis and course of action
(COA) development.
h. Identify IO planning support requirements (including staff augmentation, support
products, and services) and issue requests for support according to procedures
established locally and by various supporting organizations.
i. Validate, initiate, and revise PIRs and RFIs, keeping in mind the long lead times
e
associated with satisfying IO requirements.
j. Provide IO input and recommendations to COAs, and provide resolutions to con-
pl
flicts that exist with other plans or lines of operation.
k. In coordination with the targeting cell, submit potential candidate targets to JFC or
component joint targeting coordination board (JTCB). For vetting, validation, and
deconfliction follow local targeting cell procedures because these three separate
m
for the IO staff and IO cell during mission analysis to remain focused on the information
environment. Key IO staff actions during mission analysis are:
a. Assist the J-3 and J-2 in the identification of friendly and adversary center(s) of
gravity and critical factors (e.g., critical capabilities, critical requirements, and critical
vulnerabilities).
b. Identify relevant aspects of the physical, informational, and cognitive dimensions
(whether friendly, neutral, adversary, or potential adversary) of the information
environment.
c. Identify specified, implied, and essential tasks.
d. Identify facts, assumptions, constraints, and restraints affecting IO planning.
Chap 3
Information-Related
Capabilities (IRCs)
Ref: FM 3-13, Information Operations (Dec ‘16), pp. 1-2 to 1-6 and ATP 3-13.1, The
Conduct of Information Operations (Oct ‘18), chap. 3.
IO brings together information-related capabilities (IRCs) at a specific time and in
a coherent fashion to create effects in and through the information environment
that advance the ability to deliver operational advantage to the commander. While
IRCs create individual effects, IO stresses aggregate and synchronized effects as
essential to achieving operational objectives.
Info-Related
Capabilities
An information-related capability (IRC) is a tool, technique, or activity employed
within a dimension of the information environment that can be used to create effects
and operationally desirable conditions (JP 1-02). The formal definition of IRCs en-
courages commanders and staffs to employ all available resources when seeking to
affect the information environment to operational advantage. For example, if artillery
fires are employed to destroy communications infrastructure that enables enemy de-
cision making, then artillery is an IRC in this instance. In daily practice, however, the
term IRC tends to refer to those tools, techniques, or activities that are inherently
e
information-based or primarily focused on affecting the information environment.
IRC’s include—
pl
• Public affairs
• Civil affairs operations
• Military deception
m
• Electronic warfare
• Cyberspace operations
• Space operations
• Soldier and leader engagement (SLE), to include police engagement
• Combat camera
• Special technical operations
All unit operations, activities, and actions affect the information environment. Even
if they primarily affect the physical dimension, they nonetheless also affect the infor-
mational and cognitive dimensions. For this reason, whether or not they are routinely
considered an IRC, a wide variety of unit functions and activities can be adapted for
the purposes of conducting information operations or serve as enablers to its plan-
ning, execution, and assessment. Some of these include, but are not limited to:
• Commander’s communications strategy or communication synchronization.
• Presence, profile, and posture
• Foreign disclosure
• Physical security
• Physical maneuver
• Special access programs
• Civil military operations
• Intelligence
• Destruction and lethal actions
(IRCs) Information-Related Capabilities 3-1
(Sample Only) Find this and other SMARTbooks at: [Link]
cators of friendly force actions attendant to military operations, and incorporates coun-
termeasures to reduce the risk of an adversary exploiting vulnerabilities (JP 3-13.3).
Chap 3
I. Public
Affairs (PA)
Ref: JP 3-61 (w/Chg 1), Public Affairs (Aug ‘16) and FM 3-61, Public Affairs Operations
(Apr ‘14).
Public affairs (PA) doctrine and principles apply across the range of military opera-
tions. PA is a command responsibility and should not be delegated or subordinated
to any other staff function below the command group. The public should perceive
information communicated by PA as accurate.
Info-Related
Capabilities
Public Affairs Guidance (PAG)
Public affairs guidance (PAG) supports the public discussion of defense
issues and operations and serves as a source document when responding to
media representatives and the public. PAG also outlines planning guidance
for related public affairs responsibilities, functions, activities, and resources.
The development and timely dissemination of PAG ensures that all information
is in consonance with policy when responding to the information demands of
joint operations. PAG also conforms to operations security and the privacy
e
requirements of the members of the joint forces.
pl
The US military has an obligation to communicate with its members and the US
public, and it is in the national interest to communicate with international publics. The
proactive release of accurate information to domestic and international audiences
puts joint operations in context, facilitates informed perceptions about military opera-
m
vironment. Notably, traditional media is no longer the only voice influencing key pub-
lics. The abundance of information sources, coupled with technology such as smart
phones, digital cameras, video chat, and social media enterprises, allows information
to move instantaneously around the globe. As such, it is imperative for PA personnel
to rapidly develop themes and messages to ensure that facts, data, events, and utter-
ances are put in context. Coordination and synchronization of themes and messages
take place to ensure unity of effort throughout the information environment.
These tools provide the US military the ability to reach various audiences without
mass media, as well as create the opportunity to join the conversation (as opposed
to simply delivering a message) with an audience. Two-way conversation permits
greater transparency and clarity. Joint operations will be supported by tailored
communication that addresses friendly, neutral, and adversarial audiences. Often,
these audiences want to both listen to and be heard by US forces. PA personnel will
focus their communication efforts to a given public or publics. The speed of modern
communications and the disparity of multiple audiences increase the importance of
quickly and agilely synchronizing communication.
The First Amendment guarantees freedom of the press, but within the Department of
Defense (DOD) this right must be balanced against the military mission that requires
operations security (OPSEC) at all levels of command to protect the lives of US or
multinational forces and the security of ongoing or future operations. These compet-
ing goals sometimes lead to friction between the media and the military. The Privacy
Act of 1974 prevents the release of certain personal information to the media, but
does not forbid individuals from releasing information about themselves in social
media. In addition, stringent restrictions exist for protecting personally identifiable
information, and there are strict reporting requirements if personally identifiable
information is released, even inadvertently.
The tempo of military operations, OPSEC concerns, and the number and variety of
other information sources competing for the attention of the populace complicate the
joint force commanders’ (JFCs’) ability to provide information to diverse publics at
the same pace as the media and other sources. The ability of anyone with Internet
access to share information and provide graphic visuals without validating facts as
an event unfolds further complicates the military’s effort to accurately inform the me-
dia and populace. JFCs and public affairs officers (PAOs) should evaluate missions
to identify public information and visual information (VI) requirements, as well as the
means to acquire and move those products in a timely manner. PA planning should
include considerations to reduce the time lag between an event and when informa-
Info-Related
Capabilities
Environment (OE)
Information in the public domain affects the OE and influences operations. Com-
manders should carefully evaluate how various friendly, enemy, adversary, and
neutral actions, images, and words impact planned and ongoing operations. PA un-
derstands that various audiences have differing information needs and works closely
with other information providers to ensure consistency of messaging and accuracy
of content. By conveying the facts about joint force activities in a proactive manner,
PA helps the JFC to impact the information environment, particularly as it relates to
public support. The joint force must coordinate all of its messages; further, it must
integrate those messages with its partner nations’ message as part of the ongoing
alignment to maintain unity of effort and stand out in a saturated information environ-
ment. The information environment is the aggregate of individuals, organizations,
and systems that collect, process, disseminate, or act on information.
For additional discussion of the OE, see pp. 1-6 to 1-7. See facing page for a
discussion of public perception.
Effective PA contributes to:
Narrative
A narrative is a short story used to underpin operations and to provide greater under-
standing and context to an operation or situation.
• Narrative in National Security Strategy. The national security narrative is formed
primarily by broad national policies, as articulated in strategic documents like the
National Security Strategy and National Military Strategy. More specific national
strategy is developed in National Security Council (NSC) meetings and executed by
the relevant departments. For every military operation, the President or NSC staff
may create the national/strategic narrative to explain events in terms consistent with
national policy.
Info-Related
Capabilities
• Conflicting Narratives. Across areas of responsibility (AORs) and during opera-
tions within a specified operational area, there can be a struggle to define the
prevailing narrative at all levels (internationally, nationally, and within the operational
area) on favorable terms. To gain superiority over the adversary’s narrative, dimin-
ish its appeal and followership, and supplant it or make it irrelevant, the USG needs
to establish the reasons for and desired outcomes of the conflict, in terms under-
standable and acceptable to all relevant publics.
Operational-level themes are often created for each phase of an operation. Operational
themes are nested with strategic themes and enduring national narratives to mitigate the
risk that phase-by-phase themes appear to give conflicting messages.
Sa
Messages support themes by delivering tailored information to a specific public and can
also be tailored for delivery at a specific time, place, and communication method. While
messages are more dynamic, they must always support the more enduring themes up
and down the chain of command. The more dynamic nature and leeway inherent in mes-
sages provide joint force communicators and planners more agility in reaching publics.
Theater and operational themes should nest within the CCDR’s and USG’s strategic
themes. Theater and operational-level messages must also support themes at their level.
This enables consistent communications to local and international audiences, which sup-
ports strategic objectives.
Sources of information for the national narrative include Presidential speeches and White
House communications ([Link]), Secretary of State speeches and DOS
communications ([Link] and rapid response unit products), Secretary of Defense
speeches and DOD communications ([Link]), Chairman of the Joint Chiefs
of Staff (CJCS) speeches and communications ([Link]), and CCDR speeches and
combatant command (CCMD) communications. Sources of information for the joint force
themes should include the mission, commander’s intent, and any other guidance con-
tained within the warning order, planning order, operation order (OPORD), and execute
order (EXORD). This is not an exhaustive list; other official sources providing national
strategic narratives can contribute to a joint force’s narrative. The Defense Press Office
(DPO) can help joint force communications with strategic guidance. The DPO routinely
coordinates DOD communications with the NSC staff and participating USG departments
and agencies.
Chap 3
II. Civil Affairs and Civil-
Military Operations (CMO)
Ref: JP 3-57, Civil-Military Operations (Sept ‘13), chap. 1.
Info-Related
Capabilities
tal entities with military operations to achieve unity of effort. JFCs seek this synergy
by several means, one of the more prominent being through the conduct of CMO
that bring together the activities of joint forces and multinational forces (MNFs) and
nonmilitary organizations to achieve common objectives.
Civil-Military
Unified Operations
Action, Civil-Military Operations, and Civil Affairs
Unified Action
e
The synchronization, coordination, and integration of the activities of
governmental and nongovernmental entities with military operations to
pl
achieve unity of effort
Takes place within unified commands, subordinate unified commands,
and joint task forces under the direction of these commanders
m
Civil-Military Operations
The responsibility of a commander
Normally planned by civil affairs personnel, but implemented by all
Sa
elements of the joint force
Civil Affairs
Conducted by civil affairs forces
Provides specialized support of civil-military operations
Applies functional skills normally provided by civil government
The levels of war are doctrinal perspectives that clarify the links between strategic objec-
tives and tactical actions. The national strategic objectives facilitate theater strategic
planning. Military strategy, derived from policy, is the basis for all operations (refer to JP
3-0, Joint Operations). CMO are applicable at the strategic, operational, and tactical lev-
els of war. Specific actions at one level of war may affect all three levels simultaneously
but with different effects at each level. CMO guidance should therefore include higher
headquarters objectives and end states presented by USG policy and guidance. Individu-
Info-Related
als and units conducting CMO must understand the interrelationships of the levels of war.
Capabilities
A. Strategic
At the strategic level, CMO focus on larger and long-term issues that may be part of
a Department of Defense (DOD) global campaign, or USG reconstruction, economic
development initiatives, and stability operations in failing or recovering nations. CMO
Sa
B. Operational
At the operational level, CMO integrate and synchronize interagency, IGO and NGO
activities with joint force operations. Interagency, IGO, and NGO activities generally
support security cooperation and feature programs to build relationships and mitigate the
need for military force. Consequently, CMO focus on immediate or near-term issues such
as health service infrastructure; movement, feeding, and sheltering of dislocated civilians
(DCs); police and security programs; promoting government legitimacy; and coordination
for CMO support to tactical commanders.
Joint force planners and interagency partners should identify civil-military objectives early
in the planning process. CMO are integrated into plans and operations through inter-
agency coordination, multinational partnerships, and coordination with IGOs and NGOs.
Coordination of CMO for current and future operations is conducted at the operational
level. Information is valuable to interorganizational coordination, to efficiently and effec-
tively marshall and distribute resources (to include funding), and to assess success in an
OE where success may not be measured by traditional operational indicators. Informa-
tion management (IM) enables CMO for operational commanders and facilitates the
required interorganizational coordination necessary.
C. Tactical
Often, a civil-military team or civil-military operations center (CMOC) may facilitate
tactical-level CMO among the military, the local populace, NGOs, and IGOs. Com-
manders derive tactical-level CMO from the core tasks of support to civil administration
(SCA), populace and resources control (PRC), foreign humanitarian assistance (FHA),
nation assistance (NA), and CIM. Tactical-level CMO normally are more sharply focused
and have more immediate effects. Often, a civilian-military team or CMOC will facilitate
these actions between the military, the local populace, and NGOs/IGOs. During certain
contingency operations, the Secretary of State and SecDef will integrate stabilization and
reconstruction contingency plans with military contingency plans and will develop a gen-
eral framework for fully coordinating stabilization and reconstruction activities and military
operations at all levels where appropriate. The DOS Bureau of Conflict and Stabilization
Info-Related
is tasked to implement policy requirements from NSPD-44, Management of Interagency
Capabilities
Efforts Concerning Reconstruction and Stabilization. This could provide a framework at
the national strategic level for stabilization and reconstruction planning and coordination.
SecDef, through the Chairman of the Joint Chiefs of Staff (CJCS), provides direction to
combatant commanders (CCDRs) and subordinate JFCs to implement joint operation
planning for the NSPD-44, Management of Interagency Efforts Concerning Reconstruc-
tion and Stabilization, process.
Annex G (Civil Affairs) promulgates CMO requirements in a formal plan or operation
order. CMO require coordination among CA, maneuver, health support, MP, engineer,
transportation, and SOF. CMO involve cross-cutting activities across staff sections and
e
subordinate units. Annex G identifies, consolidates, and deconflicts the activities of the
various sections and units. Planning and coordination at lower echelons require signifi-
pl
cantly more details than discussed in annex G.
Changes in the military or political situation, as well as natural or man-made disasters,
can divert the joint force’s main effort from CMO to combat operations. The JFC should
identify early indicators and warnings of changes in the OE and allocate resources to
m
monitor these changes in order to anticipate changes in force requirements. Branch and
sequel planning and preventive action may mitigate disruption of CMO. Possible Escala-
tion Indicators include:
Sa
Chap 3
III. Military
Deception (MILDEC)
Ref: FM 6-0 (C2), Commander and Staff Organization and Operations (Apr ‘16), chap. 11.
This section provides information on military deception. Initially this section ad-
dresses the principles of military deception. It then discusses how commanders use
military deception to shape the area of operations in support of decisive action. The
section concludes with a discussion of how to plan, prepare, execute, and assess
military deception.
Info-Related
Capabilities
I. Military Deception Process and Capability
Modern military deception is both a process and a capability. As a process, military
deception is a methodical, information-based strategy that systematically, deliberate-
ly, and cognitively targets individual decisionmakers. The objective is the purposeful
manipulation of decisionmaking. As a capability, military deception is useful to a
commander when integrated early in the planning process as a component of the
operation focused on causing an enemy to act or react in a desired manner.
e
Refer to JP 3-13 for a discussion in information operations and JP 3-13.4 for a more
detailed discussion on military deception.
clarify the relationship between strategic and tactical actions. The levels have no
finite limits or boundaries. They correlate to specific levels of responsibility and mili-
tary deception planning. They help organize thought and approaches to a problem.
Sa
Decisions at one level always affect other levels. Common to all levels of military
deception is a set of guiding principles:
• Focus on the target
• Motivating the target to act
• Centralized planning and control
• Security
• Conforming to the time available
• Integration
Military deception often relies on the basic understanding that the complexities and un-
certainties of combat make decisionmakers susceptible to deception. The basic mecha-
nism for any deception is either to increase or decrease the level of uncertainty, or ambi-
guity, in the mind of the deception target (or targeted decisionmaker). Military deception
and deception in support of operations security present false or misleading information to
the targeted decisionmaker with the deliberate intent to manipulate uncertainty. The aim
of deception is to either increase or decrease the targeted decisionmaker’s ambiguity in
order to manipulate the target to perceive friendly motives, intentions, capabilities, and
vulnerabilities erroneously and thereby alter the target’s perception of reality.
Info-Related
Capabilities
Ambiguity-Decreasing Deception
Ambiguity-decreasing deception reduces uncertainty and normally confirms the enemy
decisionmaker’s preconceived beliefs, so the decisionmaker becomes very certain about
the selected course of action (COA). This type of deception presents false information
that shapes the enemy decisionmaker’s thinking, so the enemy makes and executes a
specific decision that can be exploited by friendly forces. By making the wrong decision,
which is the deception objective, the enemy could misemploy forces and provide friendly
forces an operational advantage. For example, ambiguity-decreasing deceptions can
present supporting elements of information concerning a specific enemy’s COA. These
e
deceptions are complex to plan and execute, but the potential rewards are often worth
the increased effort and resources.
pl
Ambiguity-Increasing Deception
Ambiguity-increasing deception presents false information aimed to confuse the enemy
decisionmaker, thereby increasing the decisionmaker’s uncertainty. This confusion can
m
produce different results. Ambiguity-increasing deceptions can challenge the enemy’s
preconceived beliefs. These deceptions draw enemy attention from one set of activi-
ties to another, create the illusion of strength where weakness exists, create the illusion
of weakness where strength exists, and accustom the enemy to particular patterns of
Sa
activity that are exploitable at a later time. For example, ambiguity-increasing deceptions
can cause the target to delay a decision until it is too late to prevent friendly mission suc-
cess. They can place the target in a dilemma for which there is no acceptable solution.
They may even prevent the target from taking any action at all. Deceptions in support of
operations security (OPSEC) are typically executed as this type of deception.
Tactical Deception
Most often, Army commanders will be faced with deciding when and where to employ
military deception in support of tactical operations. The intent of tactical deception is to
induce the enemy decisionmakers to act in a manner prejudicial to their interests. This
is accomplished by either increasing or decreasing the ambiguity of the enemy decision-
maker through the manipulation, distortion, or falsification of evidence. Military deception
undertaken at the tactical level supports engagements, battles, and stability tasks. This
focus is what differentiates tactical deception from other forms of military deception.
Refer to JP 3-13.4 for more information on military deception.
Chap 3
IV. Military Information
Support Operations (MISO)
Ref: JP 3-13.2 (w/Chg 1), Military Information Support Operations (Dec ‘11).
Info-Related
Capabilities
environment. Within the military and informational instruments of national power,
the Department of Defense (DOD) is a key component of a broader United States
Government (USG) communications strategy. To be effective, all DOD communica-
tions efforts must inherently support the credibility, veracity, and legitimacy of USG
activities.
Military information support operations (MISO) play an important role in DOD
communications efforts through the planned use of directed programs specifically
designed to support USG and DOD activities and policies. MISO are planned opera-
tions to convey selected information and indicators to foreign audiences to influence
e
their emotions, motives, objective reasoning, and ultimately the behavior of foreign
governments, organizations, groups, and individuals in a manner favorable to the
pl
originator’s objectives. Military information support (MIS) professionals follow a delib-
erate process that aligns commander’s objectives with an analysis of the environ-
ment; select relevant TAs; develop focused, culturally, and environmentally attuned
messages and actions; employ sophisticated media delivery means; and produce
m
observable, measurable behavioral responses.
The employment of MIS units is governed by explicit legal authorities that direct and
determine how their capability is utilized. This legal foundation establishes MISO as
a communications means and allows their integration with those strategies that ap-
Sa
ply the instruments of national power. Leaders and planners interpret relevant laws
and policies to conduct MISO in any situation or environment, internationally and
domestically.
Joint MISO support policy and commanders’ objectives from strategic to tactical
levels. Although military leadership and local key communicators are examples of
TA engaged at the operational and tactical levels that are capable of affecting the
accomplishment of a strategic objective.
MISO are used to establish and reinforce foreign perceptions of US military, political,
and economic power and resolve. In conflict, MISO as a force multiplier can degrade
the enemy’s relative combat power, reduce civilian interference, minimize collateral
damage, and maximize the local populace’s support for operations.
MISO contribute to the success of both peacetime engagements and major opera-
tions. The combatant commander (CCDR) receives functional and theater stra-
tegic planning guidance from the Joint Strategic Capabilities Plan (JSCP), Unified
Command Plan (UCP), and Guidance for Employment of the Force (GEF). These
documents are derived from the Secretary of Defense (SecDef) National Defense
Strategy, which interprets the President’s national security policy and strategy, and
the Joint Chiefs of Staff National Military Strategy.
Info-Related
Capabilities
US Government Coordinate Understand Better enable the Create, strengthen,
(USG) Strategic information, and engage USG to engage or preserve
Communication themes, plans, key foreign audiences conditions
(Department of programs, and audiences holistically and with favorable to
State Lead) actions that are unity of effort advance national
synchronized with interests and
other elements of objectives
national power
PA and MISO are separate and unique activities that are governed by policy and
practice in terms of audiences, focus, and scope. SC integrates various instruments
of national power with other activities across the USG to synchronize crucial themes,
messages, images, and actions. SC is policy driven and generally conducted under
DOS lead. DOD SC activities are designed to support the continuity of DOD strategic-
and operational-level messages and activities with overall USG policy and SC themes.
Chap 3
V. Operations Security
(OPSEC)
Ref: JP 3-13.3, Operations Security (Jan ‘12) and ATP 3-13.3, Army Operations Security
for Division and Below (Jul ‘19).
Joint forces often display personnel, organizations, assets, and actions to public
view and to a variety of adversary intelligence collection activities, including sensors
and systems. Joint forces can be under observation at their peacetime bases and
locations, in training or exercises, while moving, or when deployed to the field con-
Info-Related
Capabilities
ducting actual operations. Frequently, when a force performs a particular activity or
operation a number of times, it establishes a pattern of behavior. Within this pattern,
certain unique, particular, or special types of information might be associated with
an activity or operation. Even though this information may be unclassified, it can ex-
pose significant US military operations to observation and/or interdiction. In addition,
the adversary could compile and correlate enough information to facilitate predicting
and countering US operations.
The indicator’s signature is a characteristic that serves to set the indicator apart. A
signature makes the indicator identifiable or causes it to stand out. Uniqueness and
stability are properties of a signature. Uncommon or unique features reduce the ambi-
guity of an indicator.
Association. Association is the process of forming mental connections to an
indicator. It is the key to interpretation. An enemy compares current data with previously
gathered information to identify possible relationships. Continuity of actions, objects, or
other indicators, which register as patterns, provides another association. For example,
the presence of special operations aviation aircraft, such as the MH-6, MH-60, and
Info-Related
Capabilities
reduce the time needed to make accurate situational assessments. They are primary
warning tools because they provide a background for contrasts.
Contrast. Contrast is the change in an indicator’s established profile. The key
to obtaining the contrast of an indicator lies in how it differs from what has been
shown previously. Contrasts are the simplest and most reliable means of detection
because they only need to be recognized, not understood. One question prompts
several additional ones concerning contrasts in profile. The nature of the indicator’s
exposure is an important aspect when seeking profile contrasts. For example, if the
adversary identifies items specific to special operations aviation at an airfield, this will
contrast with what is “normal” at the airfield and will indicate the deployment of special
operations aircraft to the airfield without having actually observed them.
Exposure. Exposure is the condition of being presented to view or made known—the
condition of being unprotected. For an OPSEC indicator, exposure increases according
to the duration, repetition, and timing of its appearance. The exposure of an indicator
often reveals its relative importance and meaning. Limited duration and repetition reduces
detailed observation and associations. An indicator that appears for a short time will
likely fade into the background of insignificant anomalies. An indicator that appears over
a long period of time, however, becomes part of a profile. Indicators exposed repeatedly
present the biggest danger. Operations conducted the same way several times with
little or no variation provide an adversary the information needed to determine where,
when, how, and with what to attack. Repetitive operations cost many lives in wartime.
Chap 3
VI(a). Cyberspace
Operations (CO)
Ref: FM 3-12, Cyberspace & Electronic Warfare Operations (Apr ‘17), chap. 1.
Superiority in cyberspace and the electromagnetic spectrum (EMS) provides a de-
cisive advantage to commanders at all levels in modern combat. The Army’s ability
to exploit cyberspace and EW capabilities will prove critical to the success of unified
land operations. As cyberspace and EW operations develop similar and complemen-
tary capabilities, the Army must plan, integrate, and synchronize these operations
with unified land operations.
Info-Related
Capabilities
Employing cyberspace and EW capabilities under a single planning, integration, and
synchronization methodology increases the operational commander’s ability to un-
derstand the environment, project power, and synchronize multiple operations using
the same domain and environment. Synchronizing offensive and defensive activities
allows a faster response to enemy and adversary actions. The EMS is the common
denominator for both cyberspace and EW operations, and also impacts every opera-
tion in the Army.
The distinctions between cyberspace and EW capabilities allow for each to oper-
e
ate separately and support operations distinctly. However, this also necessitates
synchronizing efforts to avoid unintended interference. Any operational requirement
specific to electronic transfer of information through the wired portion of cyberspace
pl
must use a cyberspace capability for affect. If the portion of cyberspace uses only
the EMS as a transport method, then it is an EW capability that can affect it. Any
operational requirement to affect an EMS capability not connected to cyberspace
must use an EW capability.
m
cyberspace missions are DODIN operations, DCO, and OCO. A cyberspace capabil-
Capabilities
e
pl
m
Sa
Ref: FM 3-12 (Apr ‘17), fig. 1-1. Visualization of cyberspace and the electromagnetic
spectrum in an operational environment.
Cyberspace missions and actions are interrelated; synchronizing and supporting efforts
among the cyberspace missions is imperative to maintaining freedom of maneuver in
cyberspace. Supporting the cyberspace missions are the cyberspace actions: cyber-
space defense; cyberspace intelligence, surveillance, and reconnaissance (ISR); cyber-
space OPE; cyberspace attack; and cyberspace security. Cyberspace actions support
DODIN operations, DCO, OCO, or any combination thereof. Executing cyberspace ac-
tions at any echelon is dependent on authority, capability, and coordination. The actions
are interrelated and a cyberspace mission may require more than one action to achieve
mission success.
Info-Related
Capabilities
Army forces can execute cyberspace missions and actions under the proper authority.
Since DODIN operations and some DCO tasks may overlap, Army forces may conduct
multiple cyberspace missions or actions as part of their daily duties and responsibilities.
Situational requirements may dictate the transition from cyberspace security to DCO
internal defensive measures (DCO-IDM). Figure 1-3 below shows the relationship of the
cyberspace missions and cyberspace actions both external and internal to the DODIN
and the owned, leased, shared partner portions of cyberspace. EW can affect the
cyberspace capabilities that use the EMS.
e
pl
m
Sa
Ref: FM 3-12 (Apr ‘17), 1-3. Cyberspace & EW operations, missions and actions.
Chap 3
VI(b). Electronic
Warfare (EW)
Ref: FM 3-12, Cyberspace and Electronic Warfare Operations (Apr ‘17), pp. 1-25 to 1-35.
Info-Related
Capabilities
Electronic Warfare (EW) Operations
A Electronic Attack (EA)
With proper integration and deconfliction, EW can create reinforcing and complementa-
ry effects by affecting devices that operate in and through wired and wireless networks.
e
pl
C Electronic Warfare Support (ES)
Actions tasked by, or under the direct control
of, an operational commander to search for,
m
Ref: FM 3-12, Cyberspace and Electronic Warfare Operations (Apr ‘17), fig. 1-9.
Electronic warfare missions.
Chap 3
VII. Space
Operations
Ref: JP 3-14 (w/Chg 1), Space Operations (Oct ‘20).
Access to space is vital to the collective security of the United States and its allies
and partners. The Department of Defense (DOD) space policy is focused on deter-
ring adversaries, defending against threats, and pursuing resilient space architec-
tures that contribute to achieving space mission assurance and objectives. Further,
the United States must sustain the ability to attribute malicious or irresponsible
Info-Related
actions that jeopardize the viability of space for all. Sustained space access is vital
Capabilities
to the collective security of the United States and its allies and partners.
Space Domain
The space domain is the area above the altitude where atmospheric effects
on airborne objects become negligible. United States Space Command
(USSPACECOM) area of responsibility (AOR) is the area surrounding the Earth
at altitudes equal to, or greater than, 100 kilometers (54 nautical miles) above
mean sea level. Like the air, land, and maritime domains, space is a physical
e
domain within which military, civil, and commercial activities are conducted. The
relationship between space and cyberspace is unique in that many space opera-
tions depend on cyberspace, and a critical portion of cyberspace can only be
pl
provided via space operations.
I. Space Operations
Space operations are those operations impacting or directly utilizing space-and
ground-based capabilities to enhance the potential of the United States and multina-
tional partners. Joint space forces are the space and terrestrial systems, equipment,
facilities, organizations, and personnel, or combination thereof, necessary to conduct
space operations. Space systems consist of three related segments: space, link, and
ground.
• The ground segment consists of ground-based facilities and equipment sup-
porting command and control (C2) of space segment resources, as well as
ground-based processing equipment, Earth terminals or user equipment, space
situational awareness (SSA) sensors, and the interconnectivity between the
facilities in which this equipment is housed.
• The link segment consists of signals connecting ground and space segments
through the electromagnetic spectrum (EMS). This link normally includes
telemetry, tracking, and commanding (TT&C) signals necessary for controlling
the spacecraft and payload. Separate from the TT&C signals, the satellite pay-
load may contribute to the link segment through the use of SATCOM signals
between two terminals on the ground or a PNT signal enhancing air, ground,
and naval maneuver.
• The space segment involves the operational spacecraft within the space
domain.
Due to the complexities of the operational environment (OE) and the required integration
and coordination between elements of the joint force, a shared understanding of selected
aspects of specific space capabilities is essential to foster and enhance unified action.
Space Control
Space control includes offensive space control and defensive space control operations
to ensure freedom of action in space and, when directed, defeat efforts to interfere with or
attack US or allied space systems. Space control uses a broad range of response options
e
to provide continued, sustainable use of space. Space control contributes to space deter-
rence by employing a variety of measures to assure the use of space; attributing enemy
attacks; and being consistent with the right to self-defense, target-threat space capabilities.
pl
See following page (p. 3-64) for further discussion of space control and superiority.
Environmental Monitoring
Terrestrial environmental monitoring provides information on meteorological and oceano-
graphic factors that affect military operations. Space environmental monitoring provides
data that supports forecasts, alerts, and warnings for the space environment that may
Info-Related
serves as the source to generate unit tasking and coordination within the CSTO and
Capabilities
SPINS. The CSTO tasks execution and the SPINS provide amplifying guidance.
Space Coordinating Authority
OPORD:
OLYMPIC DEFENDER
CFSCC CFSCC
Current USSPACECOM
OPORD CSPOC Leadership
Combatant Commands
e Strategy Plans Division
Guidance,
SOD
pl
Objectives, and
Effects
Combat
Operations
CSTO Division Tasking MSP
CSTO
Operational
Level Command
and JMP
Control of Space
Legend
CFSCC Combined Forces Space Component OPORD operation order
Command RFI request for information
CSPOC Combined Space Operations Center SOD space operations directive
CSTO combined space tasking order SSR space support request
JMP joint mission plan USSPACECOM United States Space Command
MSP master space plan
Ref: JP 3-14 (w/Chg 1), fig. IV-1. Combined Space Tasking Order Process.
The planning process may significantly compress during a crisis or to support ma-
jor combat operations. In periods of conflict, the CSTO cycle may compress from a
30¬day production cycle to synchronize with the supported CCDR’s air tasking order
cycle. The CSTO transmits the CFSCC’s guidance and priorities for a short-duration
timeframe, assigns tasks to meet operational objectives, and, when required, synchro-
nizes and integrates CFSCC activities with other CCMD operations.
Chap 3
In addition to the specific IRCs covered on the previous pages, FM 3-13 discusses
additional capabilities as outlined below.
Additional IRCs
Info-Related
Capabilities
Integrated Joint Special Technical
A Operations (IJSTO)
E
m
Physical Security
F
Sa
H Police Engagement
I Social Media
All unit operations, activities, and actions affect the information environment. Even
if they primarily affect the physical dimension, they nonetheless also affect the infor-
mational and cognitive dimensions. For this reason, whether or not they are routinely
considered an IRC, a wide variety of unit functions and activities can be adapted for
the purposes of conducting information operations or serve as enablers to its plan-
ning, execution, and assessment.
See p. 3-1 for additional discussion.
(IRCs) VIII. Additional IRCs 3-71
(Sample Only) Find this and other SMARTbooks at: [Link]
Chap 4
(Information Operations)
PLANNING
Ref: FM 3-13, Information Operations (Dec ‘16), pp. 4-1 to 4-2.
Planning is the art and science of understanding a situation, envisioning a de-
sired future, and laying out effective ways of bringing that future about (ADP 5-0).
Planning helps commanders create and communicate a common vision between
commanders, their staffs, subordinate commanders, and unified action partners.
Planning results in a plan and orders that synchronize the action of forces in time,
space, and purpose to achieve objectives and accomplish missions.
Commanders, supported by their staffs, ensure IO is fully integrated into the plan,
starting with Army design methodology (ADM) and progressing through the military
decisionmaking process (MDMP). The focal point for IO planning is the IO officer (or
designated representative for IO). However, the entire staff contributes to planning
products that describe and depict how IO supports the commander’s intent and con-
cept of operations. The staff also contributes to IO planning during IO working group
meetings to include assessing the effectiveness of IO and refining the plan.
Information
Planning
Commanders, supported by their staffs, ensure IO is fully integrated into the
e
plan, starting with Army design methodology and progressing through the military
decisionmaking process.
pl
Army Design Methodology (ADM)
ADM helps commanders and staffs with the conceptual aspects of planning. These
aspects include understanding, visualizing, and describing operations to include
m
framing the problem and identifying an operational approach to solve the problem.
an operations plan or operations order that synchronizes the actions of the force
in time, space, and purpose to accomplish missions. Both the problem the com-
mander needs to solve and the specific operation to advance towards its solution
have significant information-related aspects.
See pp. 4-3 to 4-16 for discussion of commander, staff, and IO working group
responsibilities for synchronizing information-related capabilities.
Planning activities occupy a continuum ranging from conceptual to detailed. Con-
ceptual planning involves understanding operational environments and problems,
determining the operation’s end state, and visualizing an operational approach to
attain that end state. Detailed planning translates the commander’s operational
approach into a complete and practical plan. Generally, detailed planning is associ-
ated with the science of control including synchronizing forces in time, space, and
purpose to accomplish missions.
Refer to BSS6: The Battle Staff SMARTbook, 6th Ed. for further discus-
sion. BSS6 covers the operations process (ADP 5-0); commander’s activ-
ities; Army planning methodologies; the military decisionmaking process
and troop leading procedures (FM 7-0 w/Chg 2); integrating processes
(IPB, information collection, targeting, risk management, and knowledge
management); plans and orders; mission command, C2 warfighting func-
tion tasks, command posts, liaison (ADP 6-0); rehearsals & after action
reviews; and operational terms and military symbols (ADP 1-02).
(Planning) Overview 4-1
(Sample Only) Find this and other SMARTbooks at: [Link]
Chap 6
I. Synchronization of
Info-Related Capabilities
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), chap. 4.
Creating effects in the information environment is not random. Units synchronize
and sequence IRCs so that they actively contribute to fulfilling the unit’s mission in
accordance with the commander’s intent and concept of operations. Mission com-
mand places responsibility for IRC synchronization on the staff; however, without the
commander’s direct involvement, stated intent, guidance, concept of operations, and
narrative, the staff will fail to achieve desired and required operational outcomes.
I. Commanders’ Responsibilities
Commanders drive the conduct of IO and are their unit’s key informers and influenc-
ers. Their influence is a function of their position, authority, decisions, personal ac-
tions, and the combat power their unit generates. Every action they take, operation
they lead, capability they employ, and word or image they convey sends a message.
Ultimately, they have the responsibility to align and combine each message into a
Information
comprehensive and compelling narrative while ensuring their unit fulfills this narra-
Planning
tive. Their narrative explains the why of military operations.
e
Commanders (and subordinate leaders) are responsible for driving the conduct of
IO through their narrative, stated intent, guidance, concept of operations, and risk
pl
assessment to achieve desired and required operational outcomes.
See following pages (pp. 4-4 to 4-5) for an overview and further discussion.
The staff has responsibility for conducting IO through synchronizing IRCs. As the
staff lead for IO, the IO officer or designated representative develops a range of
products and chairs the IO working group. The IO working group is the primary
mechanism for synchronization and produces several outputs that drive the unit’s
Sa
See p. 6-3 for related discussion of the IO working group inputs and outputs (fig. 4-1)
and chap. 7 for fires and targeting products.
(Planning) I. Synchronization of Information-Related Capabilities 4-3
(Sample Only) Find this and other SMARTbooks at: [Link]
e
(1) Terrain. State how terrain affects a functional area’s capabilities.
(2) Weather. State how weather affects a functional area’s capabilities.
pl
(3) Enemy Forces. Describe enemy disposition, composition, strength, and systems in
a functional area. Describe enemy capabilities and possible courses of action (COAs)
and their effects on a functional area.
(4) Friendly Forces. List current functional area resources in terms of equipment,
personnel, and systems. Identify additional resources available for the functional area
m
located at higher, adjacent, or other units. List those capabilities from other military
and civilian partners that may be available to provide support in the functional area.
Compare requirements to current capabilities and suggest solutions for satisfying
discrepancies.
Sa
(5) Civilian Considerations. Describe civil considerations that may affect the functional
area, including possible support needed by civil authorities from the functional area as
well as possible interference from civil aspects.
c. Facts/Assumptions. List all facts and assumptions that affect the functional area.
2. MISSION. Show the restated mission resulting from mission analysis.
3. COURSES OF ACTION.
a. List friendly COAs that were war-gamed.
b. List enemy actions or COAs that were templated that impact the functional area.
c. List the evaluation criteria identified during COA analysis. All staffs use the same
criteria.
4. ANALYSIS. Analyze each COA using the evaluation criteria from COA analysis.
Review enemy actions that impact the functional area as they relate to COAs. Identify
issues, risks, and deficiencies these enemy actions may create with respect to the
functional area.
5. COMPARISON. Compare COAs. Rank order COAs for each key consideration. Use
a decision matrix to aid the comparison process.
6. RECOMMENDATIONS AND CONCLUSIONS.
a. Recommend the most supportable COAs from the perspective of the functional
area.
b. Prioritize and list issues, deficiencies, and risks and make recommendations on
how to mitigate them.
Variations on this format, such as the example provided in Figure 4-3 below enable
the IO officer to spotlight facts and assumptions, critical planning factors, and available
forces. The latter of these requires input from assigned or available IRCs. The graphic
format also offers a clear, concise mechanism for the IO officer to articulate recommend-
ed high-payoff targets, commander’s critical information requirements, and requests for
forces. Maintaining both formats simultaneously provides certain benefits: the narrative
format enables the IO officer to cut-and-paste sections directly into applicable sections of
orders; the graphic format enables the IO officer to brief the commander and staff with a
single slide.
Information
Information environment coalition forces’ troop Implied tasks operations
Planning
• Radio is the best movements and • Deny adversary • Identify tribal leaders
medium to reach the
civilian population within
AO SWORD, followed by Assumptions
e
propaganda in the AO use of social
media
messaging CCIR nominations
pl
social media • Civilian population will during decisive • Block axis of
• Religious leaders within support HNSF and operations advance by civilian
contested areas are key coalition forces once • Develop Soldier population during
communicators to the security is restored and leader attack
population engagement,
m
• Civilian population will • Damage to HN
• Displaced civilians in remain in place during and MISO essential services
camps along main routes attack unless there is a products to infrastructure and
may impede coalition loss of essential support non- religious structures
forces’ advance services interference
EEFI nominations
Sa
N/A
Critical planning Objectives Request for forces
factors 1. Influence civilian population to minimize interference Request OCO to deny
Air tasking order cycle with coalition forces information operations team to use of social media
request 72 hours prior prevent civilian casualties site during decisive
2. Disrupt enemy forces use of media outlets in order operations
to support freedom of movement of coalition forces.
AO area of operations EEFI essential element of friendly information
BN Battalion HN host nation
CCDR combatant commander HNSF host-nation security forces
CCIR commander’s critical information requirement HPT high-payoff target
CFACC combined force air component commander MISO military information support operations
CO Company N/A not applicable
COMCAM combat camera OCO offensive cyberspace operations
Ref: ATP 3-13.3, fig. 4-3. Example graphical information operations running estimate.
Running estimate development is continuous. The IO officer maintains and updates the
running estimate as pertinent information is received. While at home station, the IO of-
ficer maintains a running estimate on friendly capabilities. The unit prepares its running
estimate based on researching and analyzing the information environment within its
region and anticipated mission sets.
successes. Maneuver, CAO, and MISO will conduct SLEs to enable 1 SBCT elements freedom of
Planning
maneuver throughout AO RAIDER. Finally, 1 SBCT will capture opera�onal successes through
area of opera�ons
e
COMCAM and other visual informa�on capabili�es while OPSEC will protect EEFIs.
AO IDP internally displaced person
pl
CAO civil affairs opera�ons IRC informa�on-related capability
CIVCAS civilian casualty MISO military informa�on support operations
CMOC civil-military opera�ons center OPSEC opera�ons security
CO cyberspace opera�ons PA public affairs
COMCAM combat camera PL phase line
EA engagement area SBCT Stryker brigade combat team
m
EEFI essen�al elements of friendly informa�on SLE Soldier and leader engagement
EW electronic warfare
Ref: ATP 3-13.1, fig. 4-5. Sample scheme of information operations statement.
Sa
Ref: ATP 3-13.1, fig. 4-6. Example scheme of information operations sketch.
D. IO Synchronization Matrix
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), pp. 4-14 to 4-16.
The synchronization matrix is used to monitor progress and results of IO objectives
and IRC tasks as well as to keep IO execution focused on contributing to the overall
operation. It is one of the IO working group’s primary tools for monitoring and evaluating
progress and assessing whether planned effects have been achieved.
Tasked unit or system IO task Time on target or Location Remarks
time of effect
EA-6B EW-01 H-1 through H- TAI 002 and 003 Successful if enemy
hour is unable to send
early warning
Tactical PSYOP team MISO-01 H-24 and continue Objective Successful if no
SPRUCE civilian interference
Civil affairs team CAO-01 H-24 through H- Objective PINE N/A
hour
Special Instructions: None
Ref:
CAO
ATP 3-13.1, table 4-2. Example 2 – Information
civil affairs operations N/A
operations synchronization matrix.
not applicable
EA-6B electronic warfare aircraft (Prowler) PSYOP psychological operations
IRC
IO Phase Ioperations
information Phase II TAI Phase
target area III
of interest Phase IV
MISO military information support operations
EW Monitor signals of Electronic attack to N/A N/A
interest. Electronic disrupt enemy
protection for communications.
personnel and Electronic
Information
personnel and
MISO Broadcast
harassment
e
equipment.
N/A Broadcast via
mobile radio to
Broadcast on
mission success.
pl
messages against keep population Coordinate with
enemy. Broadcast informed on COMCAM for post-
noninterference mission. mission messaging
messages for local and countering the
populace. effect of adversary
m
information
activities.
OPSEC Determine essential Implement N/A N/A
elements of friendly measures to protect
information for essential elements
Sa
mission. of friendly
information to
protect movement
routes, mission
command, and
objective.
MILDEC N/A N/A N/A N/A
CAO Prepare N/A N/A Assist personnel
Commander’s returning to
Emergency villages. Assess
Response Program small-scale
paperwork for funds immediate projects.
disbursement.
Coordinate with
Provincial
reconstruction
team.
PA Prepare press N/A N/A Distribute press
releases. releases. Conduct
Embed media. press conference
and set up
interviews with
subject matter
experts.
COMCAM Document Document Document Document
operation. operation. operation. operation.
CAO civil affairs operations MISO military information support operations
Ref: ATP 3-13.1,
COMCAM combattable
camera4-1. Example 1 – Information
N/A notoperations
applicable synchronization matrix.
EW electronic warfare OPSEC operations security
IRC information-related capability PA public affairs
4-16MILDEC
(Planning)
militaryI. Synchronization of Information-Related Capabilities
deception
(Sample Only) Find this and other SMARTbooks at: [Link]
Chap 4
II. Information
Environment Analysis
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), chap. 2.
IO and Intelligence Preparation of the Battlefield (IPB)
The mechanics of analyzing the information environment and enemy or adver-
sary operations in the information environment are generally the same as those
established to support intelligence preparation of the battlefield (IPB) for other
military planning. IPB is a critical component of the military decisionmaking process
(MDMP). It provides a systematic approach to evaluating the effects of significant
characteristics of an operational environment for missions.
IPB to support IO refines traditional IPB to focus on the information environ-
ment. Its purpose is to gain an understanding of the information environment in a
geographic area and determine how the enemy or adversary will operate in this en-
vironment. The focus is on analyzing the enemy’s or adversary’s use of information
to gain positions of relative advantage. The end state is the identification of threat
Information
information capabilities in the information environment against which friendly forces
Planning
must contend and threat vulnerabilities that friendly forces can exploit with IO.
e
Analyze and Depict the Information Environment
pl
To achieve advantage in the information environment, commanders, with spe-
cialized advice and support from the IO officer, ensure that IO planning is fully
integrated into the operations process. This begins with analysis to understand,
visualize, and describe the information environment.
m
biases, perceptions, decisions, key leaders and decision makers, among many
others. What occurs in the physical dimension of the information environment
and, more broadly, the operational environment, always has second- and third-
order effects in the informational and cognitive dimensions of the information
environment. Thus, there must be holistic and nuanced understanding of how
these various components and dimensions interrelate and the whole operates.
This understanding is depicted through a series of information overlays and
comprehensive combined information overlays, which vary depending on com-
manders’ priorities, the nature of the operation, and the type of analysis being
conducted. Modeling or mapping social or human networks also enhances this
understanding. While complex, the information environment still needs to be
captured in a way that the commander can visualize and understand it, draw
necessary insights and conclusions, and make informed decisions. The IO officer
should not be locked into any specific method for analyzing and depicting the
information environment but develop a process and overlays that best serve the
commander and, as appropriate, follow unit standard operating procedures. As
new technologies and interactive capabilities emerge, they should be incorpo-
rated as tools to facilitate the visualization and understanding processes.
characteristics of the information environment within this defined area in all three
Planning
dimensions (physical, informational, and cognitive) that can affect friendly and threat
e
operations, as well as influence friendly courses of action and command decisions.
These significant characteristics can include, but are not limited to, the following:
pl
• Terrain (and weather).
• Populace.
• Societal structures.
m
• Military or government information and communications infrastructure.
• Civilian information and communications infrastructure.
• Media.
• Third party organizations.
Sa
Due to the complexity and volume of data involving civil considerations, no simple or
single model exists for presenting this analysis. It typically comprises a series of products,
such as data files, overlays, and assessments.
Political Military Economic Social Information Infrastructure
• Enclave, • Areas of • Commercial • Refugee • Broadcast • Road system
province, influence and • Fishery camp coverage • City limit
district interest • Ethnic, area
• Industrial • Power grid
• National • Area of social, tribal • Social
boundaries operations • Markets enclave media reach • Irrigation
Areas
• Mining or network
• Shadow • Safe haven • School
government • Smuggling district penetration • Suburb,
• Local nation exurb, urban
influence area base or routes • Online group • Word of
mouth core
training area • E-commerce
• Graffiti
• Court house • Base and • Banking • Club • Cell tower • Emergency
• Government base • Fuel • Jail • Broadcast shelter
center buildings facility • Public building
• Factory • Library
• Training
Structures
• Currency
platform
• Social
• Print shop
• News
• Electric
station
• Law
pl
practices and • Organization • Food network operation enforcement
rights security • Nonprofit • Newspaper • Fire fighting
• Training
• Executive, • Market or support to • Social • Maintenance
Capabilities
• Guild • Cooperative
organization network • Patriotic or • Social
• Labor union
• Host • Terrorist service media
government • Landowner organization information
• Military
• Court system lobbying • Cooperative • Familial group
• Insurgent group • News
group organization
affiliation
• United • Key leader • Banker • Community • Decision • Builders
Nations • Thought • Employer or leader maker • Local
representative leader employee • Teacher • Elder development
• Political • Employment • Entertainer • Religious council
leader
People
Example Overlay
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), pp. 2-7 to 2-11.
IO officers and planners often use one common technique to present analysis. They
prepare an overlay (graphical depiction) for each significant characteristic that visually
displays its salient features and identifies gaps in intelligence or information that are
subsequently refined into requirements for collection (requests for information, requests
for collection).
The following figures provide example overlays. The first focuses on population centers
and the second focuses on communications infrastructure. Both examples are based
on the Decision Action Training Environment or DATE scenario as employed at the Joint
Readiness Training Center.
Note. These overlays depict “a” way, not “the” way. IO officers or representatives must
adapt their products to the situation at hand, their units’ standard operating procedures,
and commander’s preference.
Information
Planning
e
pl
m
Figure 2-1. Example overlay that depicts Figure 2-2. Example overlay that depicts
relevant information about the populace in relevant information about communications
Sa
Figure 2-1. Example overlay that depicts relevant information about the populace in the
area of operations (continued).
responsible for the product. Although the CIO may include classified information, par-
Planning
this topic).
Figure 2-5 below illustrates a sample CIO. What appears in or on the CIO depends on
the situation, mission, commander preferences, and the resulting analysis. Templates in-
clude a combination of narrative (descriptive) elements, pictorial elements, and graphical
elements. Whether the “so what” statement appears on the template itself or in accompa-
nying notes, it needs to be conveyed concisely to the commander. The proportion of one
element to the others depends on the conclusions the IO officer reaches and a judgement
call on the best way to convey these conclusions.
Information
Planning
e
pl
m
Sa
Chap 4
Information
Planning
e
pl
m
Sa
Figure 4-1. Relationship among the scheme of IO, IO objectives, and IRC tasks.
Commanders use their mission statement for the overall operation, the IO mission
statement, scheme of IO, IO objectives, and IRC tasks to describe and direct IO, as
seen in fig. 4-1. See pp. 4-3 to 4-16 for in-depth discussion IO mission statement,
scheme of IO, IO objectives, and IRC tasks (synchronization of IRCs).
Refer to BSS6: The Battle Staff SMARTbook, 6th Ed. for further discus-
sion. BSS6 covers the operations process (ADP 5-0); commander’s activ-
ities; Army planning methodologies; the military decisionmaking process
and troop leading procedures (FM 7-0 w/Chg 2); integrating processes
(IPB, information collection, targeting, risk management, and knowledge
management); plans and orders; mission command, C2 warfighting func-
tion tasks, command posts, liaison (ADP 6-0); rehearsals & after action
reviews; and operational terms and military symbols (ADP 1-02).
and tactical-level IO objectives must nest with strategic theater objectives. Joint
Planning
and component staffs develop IO objectives to help integrate and synchronize their
e
campaigns and major operations.
The IO officer develops objectives as part of developing the scheme of IO during
pl
COA development. These objectives help the staff determine tasks to subordinate
units during COA development and analysis.
discussed in general terms but not assigned to a subordinate unit. During orders
production, these tasks are assigned to IRC units.
Information
Planning
e
pl
m
Sa
importance of routing combat information and intelligence to the people who need it.
Planning
A WARNORD is issued after the commander and staff have completed their initial
assessment and before mission analysis begins. It includes, at a minimum, the
type and general location of the operation, initial timeline, and any movements or
Sa
reconnaissance that need to be initiated. When they receive the initial WARNORD,
subordinate units begin parallel planning.
Parallel planning and collaborative planning are routine MDMP techniques. The time
needed to achieve and assess effects in the information environment makes it espe-
cially important to successful IO. Effective parallel or collaborative planning requires
all echelons to share information fully as soon as it is available. Information sharing
includes providing higher headquarters plans, orders, and guidance to subordinate
IO officers or representatives.
Because some IRCs require a long time to plan or must begin execution early in an
operation, follow-on WARNORDs may include detailed IO information. Although the
MDMP includes three points at which commanders issue WARNORDs, the number
of WARNORDs is not fixed. WARNORDs serve a purpose in planning similar to that
of a fragmentary order (FRAGORD) during execution. Commanders issue both, as
the situation requires. Possible IO officer input to the initial WARNORD includes:
• Tasks to subordinate units and IRCs for early initiation of approved IO actions,
particularly for military deception operations and MISO.
• Essential elements of friendly information (EEFIs) to facilitate defend weighted
efforts and begin the OPSEC process.
• Known hazards and risk guidance.
• Military deception guidance and priorities.
Mission Analysis
(Summary of IO Inputs, Actions & Outputs)
Ref: FM 3-13, Information Operations (Dec ‘16), table 4-1, pp. 4-14 to 4-18.
Table 4-1 provides a summary of the inputs, actions and outputs required of the IO
officer. Only those sub-steps within mission analysis with significant IO activity are listed.
MDMP Sub
-
Inputs IO Officer Actions IO Officer Outputs
Step
• Higher HQ IPB • Develop IPB products • Input to IPB products
• Higher HQ • Analyze and describe the • IRs to G-2 (S-2), as
running information environment in well as the foreign
estimates the unit’s area of operations disclosure officer
• Higher HQ and its effect on friendly, • Refined EEFIs
OPLAN or neutral, adversary, and (OPSEC)
OPORD enemy information efforts
• Higher HQ • Identify threat information
combined capabilities and
information vulnerabilities
overlay • Identify gaps in current
Conduct IPB
intelligence on threat
information efforts
• Identify IO-related high-value
targets
Information
information-related COAs
• e Assess the potential effects
of IO on friendly, neutral,
adversary, and enemy
pl
operations
• Determine threat’s ability to
collect on friendly critical
information
• Determine additional EEFIs
m
(OPSEC)
• Specified tasks • Identify specified tasks in the • Specified, implied and
from higher HQ higher HQ OPLAN or essential tasks
Determine Specified, Implied, and
• •
combined essential tasks targeting guidance
information
overlay products • Develop input to the • Refined EEFIs
command targeting guidance (OPSEC)
• Assemble critical and
defended asset lists,
especially low density
delivery systems
• Determine additional EEFIs
(OPSEC)
• Current task • Identify friendly IRCs (include • List of available IRCs
organization for capabilities that are joint, [IO running estimate
information interorganizational, and paragraph 1b(4)]
Review Available Assets
MDMP Sub
-
Inputs IO Officer Actions IO Officer Outputs
Step
• Higher HQ • Identify facts and • List of facts and
Assumptions
OPORD • Submit IRs that will confirm running estimate
• Commander’s or disprove assumptions paragraph 1c.)
initial guidance • Identify facts and • IRs that will confirm or
• Observations assumptions regarding disprove facts and
and reports OPSEC indicators that assumptions
identify vulnerabilities
• Higher HQ • Identify and assess hazards • List of assessed
OPLAN or associated with IO hazards
OPORD
Management
concerning IO efforts
• Identify IRs to recommend as
commander’s critical
information requirements
Information
• Initial IPB • Identify gaps in information
Planning
PIRs or IO IRs needed to support planning,
Determine Initial
•
e
Collection Plan
Available Time
•
timeline vis-à-vis higher HQ effect(s) of long-lead
timeline and threat timeline time events
as determined during IPB
Refine initial time allocation
Sa
•
plan
• Public affairs • Assess impact of initial • PA themes/ messages
Develop Initial Themes and
COA course of action IPB intelligence preparation of the OPSEC operations security
EEFI essential element of friendly battlefield PA public affairs
information IR information requirements PIR priority intelligence requirement
G-2 assistant chief of staff, intelligence IRC information related capability S-2 battalion or brigade intelligence
G-3 assistant chief of staff, operations MISO military information support officer
G-5 assistant chief of staff, plans operations S-3 battalion or brigade operations staff
HQ headquarters OPLAN operations plan officer
IO information operations OPORD operations order S-5 battalion or brigade plans staff
officer
IO officer perceives the need for additions or changes to the commander’s intent or
Planning
synchronization matrix
Sa
COA course of action IO information operations MDMP military decisionmaking process WARNORD warning order
Include heading if attachment is distributed separately from the base order or higher-level
attachment.
(U) References: Refer to higher headquarters· OPLAN or OPORD and identify map
Planning
sheets for operation (optional). Add any other specific references to IO if needed.
e
1. (U) Situation. Include information affecting information operations (IO) that paragraph
1 of the OPLAN or OPORD does not cover or that needs expansion.
pl
a. (U) Area of Interest. Describe the information environment as it relates to IO. Refer
to Tab 1 (Combined Information Overlay) to Appendix 15 (Information Operations) to An-
nex C (Operations) as required.
m
b. (U) Area of Operations. Refer to Appendix 2 (Operation Overlay) to Annex C
(Operations).
(I) (U) Information Environment. Describe the physical. informational. and cogni-
tive dimensions of the information environment that affect IO. Refer to Tab 1 (Combined
Sa
[CLASSIFICATION]
APPENDIX 15 (INFORMATION OPERATIONS) TO ANNEX C (OPERATIONS) TO OPERATION
PLAN/ORDER [number] [(code name)]- [issuing headquarters] [(classification of title)]
Information
concept of operations. Establish the priorities of support to unitsfor each phase of the
Planning
operation. Establish IO objectives to employ IRCs to achieve the desired endstate. De-
e
scribe how IO weighted efforts will support offense, defense, and stability tasks. Identify
target sets and effects, by priority. Describe the general conceptfor the integration of
pl
IO. List the staff sections, elements, and working groups responsible for aspects of IO.
Include IO collection methodsfor information developed in staff sections, elements, and
working groups outside the IO element and working group. Ensure subordinate units
and higher headquarters receive the IO synchronization plan. Describe the plan for the
m
integration of unified action and nongovernmental partners and organizations. Refer to
Annex C (Operations) as required This section is designed to provide insight and under-
standing a/how IO is integrated across the operational plan.
b. (U) Assessment. Describe the priorities for assessment and Identify the measures
Sa
Chap 4
(Information Operations)
V. Battle Drills
Ref: FM 3-13, Information Operations (Dec ‘16), pp. 4-1 to 4-2.
FM 3-13 describes battle drills as planning aids designed to speed response to
crisis situations occurring during the conduct of a mission. For IO, quick responses
to enemy or adversary activities, actions, and events in the operational area are nec-
essary to prevent the enemy or adversary from gaining advantage in the information
environment or, conversely, to sustain friendly advantage.
IO Battle Drills
Information
B Define Information End State
Planning
C
e
Develop Battle Drill
pl
Scheme of Information Operations
m
Staffs develop battle drills during the planning process; however, drills are not
complete and final COAs. Rather, battle drills are predeveloped concepts that antici-
pate crises. Once a crisis occurs, units can adjust the battle drill quickly to address
Sa
I. IO Preparation Activities
Peacetime preparation by units or capabilities involves building contingency plan
databases about the anticipated area of operations. These databases can be used
for IO input to IPB and to plan IO to defend friendly intentions, such as network
protection and operations security (OPSEC). IO portions of contingency plans are
e
continuously updated. Normal IO working group participants maintain their own data
to provide the IO officer with the latest information.
pl
During peacetime, IO officers prepare for future operations by analyzing anticipated
area(s) of operations’ information environment and likely threat information capabili-
ties. Examples of factors to consider include, but are not limited to—
• Religious, ethnic, and cultural mores, norms, and values.
Information
Preparation
m
Refer to BSS6: The Battle Staff SMARTbook, 6th Ed. (Plan, Prepare,
Execute, & Assess Military Operations), pp. 1-48 to 1-51 for further
discussion of preparation activities from ADP 5-0 (2019). Specific discus-
sion includes preparation activities commanders, units, and Soldiers
conduct to ensure the force is protected and prepared for execution.
See also p. 5-7 for discussion of preparation fundamentals from ADP
5-0.
Preparation 5-1
(Sample Only) Find this and other SMARTbooks at: [Link]
During preparation, the IO officer adjusts the relevant portions of the operation plan
(OPLAN) or operation order (OPORD) to reflect the commander’s decisions. The
IO officer also updates the IO running estimate so that it contains the most current
information about adversary information activities, changes in the weather or terrain,
Sa
5-2 Preparation
(Sample Only) Find this and other SMARTbooks at: [Link]
Execution is the act of putting a plan into action by applying combat power to
accomplish the mission and adjusting operations based on changes in the situa-
tion (ADP 5-0). In execution, commanders, staffs, and subordinate commanders
focus their efforts on translating decisions into actions. They direct action to apply
combat power at decisive points and times to achieve objectives and accomplish
missions. Inherent in execution is deciding whether to execute planned actions
(such as phases, branches, and sequels) or to modify the plan based on unfore-
seen opportunities or threats.
Execution of IO includes IRCs executing the synchronization plan and the com-
mander and staff monitoring and assessing their activities relative to the plan and
adjusting these efforts, as necessary. The primary mechanism for monitoring and
assessing IRC activities is the IO working group. There are two variations of the
IO working group. The first monitors and assesses ongoing planned operations
e
and convenes on a routine, recurring basis. The second monitors and assesses
unplanned or crisis situations and convenes on an as-needed basis.
pl
I. Information Operations Working Group
The IO working group is the primary means by which the commander, staff and
other relevant participants ensure the execution of IO. The IO working group is a
m
collaborative staff meeting led by the IO officer, and periodically chaired by the G-3
(S-3), executive officer, chief of staff or the commander. It is a critical planning event
integrated into the unit's battle rhythm.
Purpose
Sa
The IO working group is the primary mechanism for ensuring effects in and through the
information environment are planned and synchronized to support the commander's
intent and concept of operations. This means that the staff must assess the current sta-
Information
Execution
tus of operations relative to the end state and determine where efforts are working well
and where they are not. More specifically, they must ensure targets are identified and
nominated at the right place and time to achieve decisive results. The IO working group
occurs regularly in the unit's battle rhythm and always before the next targeting working
group. The only exception is a crisis IO working group (also referred to as consequence
management or crisis action working group), which occurs as soon as feasible before
or after an event or incident that will significantly alter the information environment and
give the threat operational advantage unless handled quickly and adeptly.
Inputs/Outputs
The example in figure 6-1 (following page) is not exhaustive. In terms of inputs, it
identifies those documents, products, and tools that historically and practically have
provided the IO working group the information necessary to achieve consensus and
make informed recommendations to the G-3 (S-3) and commander. The outputs
listed are those considered essential to ensuring the staff can effectively conduct IO.
One tool that the IO working group uses to affirm and adjust the synchronized
employment of IRCs is the IO synchronization matrix. An updated synchronization
matrix is the working group's key output and essential input to the next targeting
meeting. See p. 4-16.
(Execution) Overview 6-1
(Sample Only) Find this and other SMARTbooks at: [Link]
IO Working Group
Roles & Responsibilities
Ref: FM 3-13, Information Operations (Dec ‘16), table 6-1, pp. 6-3 to 6-4.
Representative Responsibility
• Distribute read-ahead packets
• Lead working group
Information • Establish and enforce agenda
Operations • Lead information environment update
• Recommend commander’s critical information requirements
• Keep records, track tasks, and disseminate meeting notes
• Provide cyber electromagnetic activities-related information and
Cyber capabilities to support information operations analysis and objectives
Electromagnetic • Coordinate, synchronize and deconflict information operations efforts with
Activities cyberspace electromagnetic activities efforts or cyberspace
electromagnetic activities efforts with information operations efforts
• Advise on both psychological effects (planned) and psychological impacts
(unplanned)
• Advise on use of lethal and nonlethal means to influence selected
audiences to accomplish objectives
Military Information • Develop key leader engagement plans
Support Operations • Monitor and coordinate assigned, attached, or supporting military
information support unit actions
•
•
e
Identify status of influence efforts in the unit, laterally, and at higher and
lower echelons
Provide target audience analysis
pl
• Provide an intelligence update
• Brief information requirements and priority information requirements
G-2 (S-2)
• Develop the initial information collection plan
• Provide foreign disclosure-related guidance and updates
m
Subordinate unit • Identify opportunities for information operations support to lines of effort
information • Provide input to assessments
operations • Provide input to information environment update
Information
Agenda
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), pp. 4-3 to 4-4.
The IO working group has a purpose, agenda and proposed timing, inputs and out-
puts, and structure and participants. Figure 4-1 below illustrates these components.
To enhance the IO working group’s effectiveness, the IO officer and element (if one
exists) consider a number of best practices before, during, and after the meeting.
Because it relies on information from the commander’s daily update briefing and feeds
the targeting process, the IO working group occurs between the two events in the
unit’s battle rhythm.
• Intelligence collections assets • Refined themes and subordinate unit representatives, G-3
messages (S-3), fires, G-9 (S-9), operations
• CIO and IPB security, public affairs, CEMA (CO and
• Media monitoring analysis • Refined operational EW)
products
Information
• Cultural calendar
• Target nominations
Execution
• Engagements schedule Other participants (mission and
• Updated CIO situation dependent): G-1 (S-1), G-4
• Audience analysis (S-4), G-5 (S-5), G-6 (S-6), space
• Plans and orders
• Scheme of IO and update operations, MILDEC, combat camera,
synchronization matrix FAO, FDO, special forces liaison, KM
• Information officer, engineer, STO chief, chaplain,
• Commander’s objectives for IO requirements staff judge advocate, unified action
• Measures of effectiveness and partner representatives
performance
CEMA cyberspace electromagnetic activities IPB intelligence preparation of the battlefield
CIO combined information overlay IRC information-related capability
CO cyberspace operations KM knowledge management
EW electronic warfare MILDEC military deception
FAO foreign area officer min minute
FDO foreign disclosure officer MISO military information support operations
G-1 assistant chief of staff, personnel S-1 personnel staff officer
G-2 assistant chief of staff, intelligence S-2 intelligence staff officer
G-3 assistant chief of staff, operations S-3 operations staff officer
G-4 assistant chief of staff, logistics S-4 logistics staff officer
G-5 assistant chief of staff, plans S-5 plans staff officer
G-6 assistant chief of staff, signal S-6 signal staff officer
G-9 assistant chief of staff, civil affairs operations S-9 civil affairs operations staff officer
IO information operations STO special technical operations
Ref: ATP 3-13.1, fig. 4-1. Components of an information operations working group.
Chap 6
I. IO Weighted Efforts
and Enabling Activities
Ref: FM 3-13, Information Operations (Dec ‘16), chap. 2.
Information
Execution
The mission determines the relative weight of effort among the elements.
Ref: ADP 3-0, Operations (Jul ‘19), fig. 3-1. Decisive action.
Decisive Action
Decisive action is the continuous, simultaneous combination of offensive, defensive,
and stability or defense support of civil authorities tasks (ADRP 3-0). IO contributes
to decisive action through the continuous and simultaneous combination and
synchronization of IRCs in support of offense, defense, and stability tasks. IO itself
is not offensive, defensive, or stabilizing, but contributes to all of these simultane-
ously by weighting its efforts in such a way that it achieves requisite effects in and
through the information environment in support of the commander’s intent.
See following pages for discussion of IO weighted efforts in decisive action.
I. Weighted Efforts
IO weighted efforts are broad orientations used to focus the integration and synchroni-
zation of IRCs to create effects that seize, retain, and exploit the initiative in the in-
formation environment. Commanders, supported by their staffs, visualize and describe
how IO will support the concept of operations by aligning and balancing the efforts of
defend, attack, and stabilize with corresponding decisive action tasks as shown below.
e
pl
m
Ref: FM 3-12, fig. 2-1. IO weighted efforts. See following pages (pp. 6-11 to 6-13) for
further discussion of IO weighted efforts: defend, attack, and stabilize.
Informational Dimension
• Encrypting communications.
• Preserving the free-flow of information and access to data and informa-
tion sources. e
• Employing knowledge management principles.
pl
• Proactively identifying instances of social engineering or malware and
keeping virus andother protections current.
• Using forensics to determine sources of attack.
m
• Countering enemy or adversary information efforts.
Cognitive Dimension
• Making decentralized decisions.
Sa
• MISO.
• Operations security (OPSEC).
• Physical security.
• Destruction and lethal actions.
• Special technical operations.
Chap 6
II. Coordination of
Intelligence Support
ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), pp. 5-1 to 5-3.
Key Terms
pl
• Information requirement. Any information elements the commander and staff
require to successfully conduct operations (ADRP 6-0).
• Intelligence requirement. A requirement for intelligence to fill a gap in the
m
Chap 7
I. Fires
(IO Considerations)
Ref: ADP 3-19, Fires (Jul ‘19), chap. 1 and ADP 3-0, Operations (Jul ‘19), p. 5-5.
Success in large-scale combat operations is dependent on the Army’s ability to em-
ploy fires. Fires enable maneuver. Over the past two decades, potential peer threats
have invested heavily in long-range fires and integrated air defense systems, making
it even more critical that the U.S. Army possess the ability to maneuver and deliver
fires in depth and across domains.
desired end state. Fires tasks are those necessary actions that must be conducted
to create and converge effects in all domains to meet the commander’s objectives.
The tasks of the fires warfighting function are:
Sa
• Surface-to-surface fires.
• Air-to-surface fires.
• Surface-to-air fires.
• Cyberspace operations and EW.
• Space operations.
• Multinational fires.
• Special operations.
• Information operations.
See pp. 7-4 to 7-5 for an overview and further discussion.
(Fires & Targeting) I. Fires 7-1
(Sample Only) Find this and other SMARTbooks at: [Link]
of IRCs in concert with other LOOs and LOEs, to influence, disrupt, corrupt, or
usurp an enemy’s decision making.
• Assess the Results of Employing Fires. This task includes assessing the effec-
Sa
tiveness and performance of fires as well as their contribution to the larger opera-
tion or objective.
Leveraging Information
Ref: JP 3-0, Joint Operations, w/Chg 1 (Oct ‘18), pp. III-17 to III-22.
All military activities produce information. Informational aspects are the features and
details of military activities observers interpret and use to assign meaning and gain
understanding. Those aspects affect the perceptions and attitudes that drive behavior
and decision making. The JFC leverages informational aspects of military activities
to gain an advantage; failing to leverage those aspects may cede this advantage to
others. Leveraging the informational aspects of military activities ultimately affects
strategic outcomes.
Regardless of its mission, the joint force considers the likely impact of all operations on
relevant actor perceptions, attitudes, and other drivers of behavior. The JFC then plans
and conducts every operation in ways that create desired effects that include maintain-
ing or inducing relevant actor behaviors. These ways may include the timing, duration,
scope, scale, and even visibility of an operation; the deliberately planned presence, pos-
ture, or profile of assigned or attached forces in an area; the use of signature manage-
ment in deception operations; the conduct of activities and operations to similarly impact
behavioral drivers; and the employment of specialized capabilities -- e.g., key-leader
engagements (KLE), cyberspace operations (CO), military information support operations
(MISO), electronic warfare (EW), and civil affairs (CA) -- to reinforce the JFC’s efforts.
Tasks aligned under this activity apply the JFC’s understanding of the impact informa-
tion has on perceptions, attitudes, and decision-making processes to affect the behav-
e
iors of relevant actors in ways favorable to joint force objectives.
ing or inducing relevant actor behaviors. These ways may include the timing, duration,
scope, scale, and even visibility of an operation; the deliberately planned presence, pos-
ture, or profile of assigned or attached forces in an area; the use of signature manage-
ment in deception operations; the conduct of activities and operations to similarly impact
Sa
behavioral drivers; and the employment of specialized capabilities (e.g., KLE, CO, mili-
tary information support operations [MISO], EW, CA) to reinforce the JFC’s efforts. Since
some relevant actors will be located outside of the JFC’s OA, coordination, planning,
and synchronization of activities with other commands or mission partners is vital.
Systems
The joint force attacks and exploits information, information networks, and systems
to affect the ability of relevant actors to leverage information in support of their own
objectives. This includes the manipulation, modification, or destruction of information
or disruption of the flow of information for the purpose of gaining a position of military
advantage. This also includes targeting the credibility of information.
Chap 7
II. Targeting
(IO Integration)
Ref: FM 3-13, Information Operations (Dec ‘16), chap. 7 and ATP 3-13.1, The
Conduct of Information Operations (Oct ‘18), chap. 5.
Targeting is the process of selecting and prioritizing targets and matching the appro-
priate response to them, considering operational requirements and capabilities (JP
3-0). IO is integrated into the targeting cycle to produce effects in and through the
information environment that support objectives. The targeting cycle facilitates the
engagement of the right target with the right asset at the right time. The IO officer
or representative is a part of the targeting team, responsible to the commander and
staff for all aspects of IO.
Targeting Methodology
Army targeting methodology is based on four functions: decide, detect, deliver,
and assess (D3A) (see figure 7-1). The decide function occurs concurrently with
planning. The detect function occurs during preparation and execution. The deliver
function occurs primarily during execution, although some IO-related targets may
be engaged while the command is preparing for the overall operation. The assess
function occurs throughout. e
pl
m
Sa
Targeting
Fires &
Ref: FM 3-13, fig. 7-1. The operations process, targeting cycle and IO-related tasks.
The targeting process is cyclical. The command’s battle rhythm determines the
frequency of targeting working group meetings. IO-related target nominations are
developed by the IO officer and by the IO working group, which validates all IO-
related targets before they are nominated to the targeting working group. Therefore,
the IO working group is always scheduled in advance of the targeting working group.
D - Decide
The decide function is part of the planning activity of the operations process. It oc-
curs concurrently with the military decisionmaking process (MDMP). During the de-
cide function, the targeting team focuses and sets priorities for intelligence collection
and attack planning. Based on the commander’s intent and concept of operations,
the targeting team establishes targeting priorities for each phase or critical event of
an operation. The following products reflect these priorities—
• High-payoff target list.
• Information collection plan.
• Target selection standards.
• Attack guidance matrix.
• Target synchronization matrix.
e
The high-payoff target list is a prioritized list of targets whose loss to the enemy will
significantly contribute to the success of the friendly course of action. High-payoff
targets (HPTs) are those high-value targets (HVTs) identified during COA develop-
pl
ment and validated in subsequent steps that must be acquired and successfully at-
tacked for the success of the friendly commander's mission. Examples of IO-related
HPTs are threat command and control nodes and intelligence collection assets/
capabilities.
m
The information collection plan, prepared by the G-3 (S-3) and coordinated with the
entire staff, synchronizes the four primary means information collection to provide
intelligence to the commander. The G-2 (S-2) ensures all available collection assets
Sa
attacks. It combines data from the high-payoff target list, information collection plan
Fires &
D - Detect
This function involves locating HPTs accurately enough to engage them. It primarily
entails execution of the information collection plan. All staff agencies, including the
IO officer, are responsible for passing to the G-2 (S-2) information collected by their
assets that answer IRs. Conversely, the G-2 (S-2) is responsible for passing combat
information and intelligence to the agencies that identified the IRs. Sharing informa-
tion allows timely evaluation of attacks, assessment of IO, and development of new
targets. Effective information and knowledge management are, therefore, essential.
The information collection plan focuses on identifying HPTs and answering PIRs.
These are prioritized based on the importance of the target or information to the
commander’s concept of operation and intent. When designated by the commander,
PIRs can include requirements concerning IO; obtaining answers to these require-
ments will assist the IO officer in assessing IO. Thus, there is some overlap between
detect and assess functions. Detecting targets for nonlethal attacks may require
information collection support from higher headquarters. The targeting team adjusts
the high-payoff target list and attack guidance matrix to meet changes as the situa-
tion develops. The IO officer submits new IO IRs/RFIs as needed.
During the detect function, the IO officer updates the high-payoff target list and target
synchronization matrix. In addition to the information collection plan, the IO officer will
use other information sources, particularly culturally-attuned ones that have unique
access to or knowledge of the information environment and its various audiences.
Examples include atmospheric teams; cultural attaches or advisors; joint, interorgani-
e
zational or multinational partner cultural experts; interpreters, or indigenous leaders.
D - Deliver
pl
This function occurs primarily during execution, although some IO-related targets
may be engaged while the command is preparing for the overall operation. The
key to understanding the deliver function is to know which assets are available to
perform a specific function or deliver a specific effect and to ensure these assets
m
are ready and capable. Examples of delivery methods include but are not limited to:
corps/division/brigade commander, provincial reconstruction team member or other
unified action partner, host nation government leader, loudspeaker, media broad-
Sa
A - Assess
There are multiple types and levels of assessment. Assessment within D3A specifi-
Targeting
cally focuses on whether the commander’s targeting guidance was met for a specific
Fires &
A. Mission Analysis
The two targeting-related IO products of mission analysis are a list of IO-related HVTs
and recommendations for the commander’s targeting guidance. The IO officer works
with the G-2 (S-2) during IPB to develop IO-related HVTs, and with other members of
the targeting team to develop IO targeting guidance recommendations.
Targeting Guidance
Issued within the commander’s guidance is targeting guidance. This guidance describes
e
the desired effects the commander wants to achieve. IO targeting focuses on HVTs that
support critical, information-related threat capabilities that underpin their objectives and
are vulnerable to friendly IO exploitation.
pl
The IO officer develops input to targeting guidance based on the initial mission and
available and anticipated IRCs. The IO officer identifies the functions, capabilities, or
units to be attacked; the effects desired; and the purpose for the attack. The IO officer
m
uses the targeting guidance to select IO-related HPTs from among identified HVTs.
These HPTs are confirmed during COA analysis.
Targeting guidance is developed separately from IO objectives. IO objectives are generally
broad in scope. They encompass all IO weighted efforts (attack, defend, stabilize). The IO
Sa
officer develops recommendations for targeting guidance that supports achieving objectives.
When developing IO input to the targeting guidance, the IO officer considers the time
required to achieve effects and the time required to determine results. Some IRCs require
targeting guidance that allows for the acquisition, engagement, and assessment of targets
while the unit is preparing for the overall operation. For example, the commander may
want to psychologically and electronically isolate the enemy’s reserve before engaging
it with fires. Doing this requires electronic attack of threat command and control systems
and military information support operations (MISO) directed at the threat 24 to 48 hours
before lethal fires are initiated. Successfully achieving IO objectives for this phase of the
operation requires targeting guidance that gives IO-related targets the appropriate priority.
B. COA Development
Targeting
Fires &
Feasible COAs, that integrate the effects of all elements of combat power, are devel-
oped by the staff. The IO officer prepares a scheme of IO that identifies objectives and
IRC tasks for each COA. The IRC tasks are correlated with targets on the HVT list. A
single IRC or multiple IRCs can be planned against a single HVT.
For each COA, the IO officer identifies HVTs that will support attainment of an IO objec-
tive. IO-related HVTs that subsequently support friendly IO objectives, and that can
be engaged by IRCs, become HPTs. The targeting team also performs target value
analysis, coordinates and deconflicts targets, and establishes assessment criteria. The
IO officer participates in each of these tasks.
tional and cognitive) that could diminish or enhance their value to the overall operation.
For example, fires that result in the collateral deaths of civilian non-combatants can have
a negative cognitive effect, while using fires to destroy the enemy’s fiber network so that
Sa
desire different effects. Therefore, IO-focused targeting includes coordinating and de-
conflicting targets with higher and subordinate units before the targeting working group
Targeting
Fires &
meets. Some IO-related targets may also be nominated by other staff elements. The IO
officer presents the effects required to accomplish the IO objective associated with those
targets when the targeting team determines how to engage them. IO officers must also
coordinate and deconflict targets with unified action partners whose doctrinal use of IRCs
and policies governing their employment differ. Such coordination extends the planning
horizon and may limit how IRCs are integrated.
One way to achieve this coordination and deconfliction is by beginning parallel planning
as early as possible in the MDMP. This means that the IO officer and the targeting team
should share all pertinent information with subordinate units and adjacent and higher
headquarters.
Chap 8
(Information Operations)
ASSESSMENT
Ref: ATP 3-13.1, The Conduct of Information Operations (Oct ‘18), chap. 6 and FM
3-13, Information Operations (Dec ‘16), chap. 8.
I. Assessment Framework
All plans and orders have a general logic. This logic links tasks given to subordinate
units with achieving objectives and achieving objectives with attaining the opera-
tion’s end state. An assessment framework incorporates the logic of the plan and
uses measures—MOEs and MOPs—as tools to determine progress toward attaining
desired end state conditions, as shown on figure 6-1.
e
pl
m
Sa
Assessment 8-1
(Sample Only) Find this and other SMARTbooks at: [Link]
e
Ref: FM 3-13, fig. 8-2. Logic flow and components of an IO objective. Figure 8-2 portrays
pl
the relationship between objectives (the change that needs to happen) and measures of
performance, indicators, and measures of effectiveness. The logic of the effort is shown
as a relationship between available, selected, and synchronized IRCs and the effects
expected over time. While the figure suggests that this logic is generic, it is not. It is
m
Commanders and staffs, particularly the IO officer, must account for the order of effects
when assessing IO or, more broadly, any effect. For example, an effect in the physical
dimension (1st order) can resonate in unexpected ways in the informational and cogni-
8-2 Assessment
(Sample Only) Find this and other SMARTbooks at: [Link]
e
pl
m
8-10 Assessment
(Sample Only) Find this and other SMARTbooks at: [Link]
(INFO1)
Index
Index
A Civil-Military Operations Cen- Crisis and Limited Contin-
Additional IRCs, 3-71 ter (CMOC), 3-24 gency Operations, 1-28
Analyze and Depict the Civil-Military Operations, Criteria Development, 8-8
Information Environment, 3-17 Critical Events, 4-66
4-17, 6-14 CMO and the Range of Mili- Cyberspace Actions, 3-51,
Appendix 15 (IO) to Annex C tary Operations, 3-18 3-52
(Operations), 4-61 CMO in Joint Operations, Cyberspace Domain, 3-48
Application of Information- 3-22 Cyberspace Electromagnetic
Related Capabilities COA Analysis and War Gam- Activities (CEMA), 3-45,
(IRCs), 2-8, 2-11 ing (JPP), 2-24 3-46
Army Cyberspace Missions COA Approval (JPP), 2-25 Cyberspace Missions, 3-51
and Actions, 3-54 COA Comparison (JPP), Cyberspace Operations
Army Design Methodology 2-25 (CO), 2-14, 3-45, 3-47,
(ADM), 4-2 COA Development (JPP), 3-50
Army Space Capabilities,
3-66
Army-Joint Relationships,
e
2-24
Cognitive Dimension, 2-10
Combat Camera (COM-
D
Decide, Detect, Deliver, As-
pl
1-10 CAM), 3-14 sess (D3A), 7-14
Assessing During Execution, Combat Power, 1-11 Decision Making During
6-5 Combatant Commands, 2-18 Execution, 6-6
m
Assessment, 2-27, 8-1 Combined Information Over- Decisive Action, 6-9
Assessment Focus, 8-5 lay (CIO), 4-32 Defense Support of Civil
Assessment Framework, 8-1 Combined Space Tasking Authorities (DSCA)
Assessment Methods, 8-6 Order (CSTO), 3-69 6-10
Sa
Index-2
(Sample Only) Find this and other SMARTbooks at: [Link]
Index
Joint Fires (IO Consider- Military Deception Planning
ations), 7-6 Steps, 3-31 Personnel Recovery (PR),
Joint Information Operations Military Deception Process 3-72
(JP 3-13), 2-7 and Capability, 3-27 Physical Attack, 3-72
Joint Information Operations Military Deception Tactics,Physical Dimension, 2-10
Warfare Center (JIOWC), 3-29 Physical Security, 3-73
2-17 Military Decisionmaking Pro-
Plan or Order Development
Joint Interagency Coordina- cess (MDMP), 4-2, 4-35 (JPP), 2-25
tion Group (JIACG) Military Engagement, Se- Planning Initiation (JPP),
, 2-13 curity Cooperation, and 2-23
Joint MISO Activities, 3-38 Deterrence, 1-20, 1-27
Planning Joint Space Opera-
Joint Operations, 1-28, 2-1 Military Information Support tions, 3-68
Joint Planning Group (JPG), Operations (MISO), 2-15,
Planning, 4-1
2-19 3-33
Police Engagement, 3-74
Joint Planning Process Mission Analysis (JPP), 2-23
Positions of Relative Advan-
(JPP), 2-20 Mission Statement, 4-11
tage, 1-3, 1-19
Joint Planning Process, 3-16 Mixed-Method, 8-6
Preparation, 5-1
Joint Staff, 2-17 Monitoring Information
Presence, Profile, and Pos-
Operations, 8-6
ture (PPP), 1-36, 3-73
K Monitoring IO, 6-5
Prevent Activities (IO Consid-
Key IO Planning Tools and Multi-Domain Extended erations), 1-22
Outputs, 4-3 Battlefield, 1-8
Key Leader Engagement
(KLE), 2-16
e
Multinational Consider-
ations, 2-26
Prevent, 1-18
Principles of Information,
3-10
pl
Language, Regional, and
Priority Intelligence Require-
Cultural Expertise, 2-2 N ments (PIRs), 4-9
Narrative, Themes, and
L Messages, 3-13 Protecting Friendly Informa-
m
Index-3
(Sample Only) Find this and other SMARTbooks at: [Link]
Index
Index-4
(Sample Only) Find this and other SMARTbooks at: [Link]
SMARTbooks
INTELLECTUAL FUEL FOR THE MILITARY
Recognized as a “whole of government” doctrinal reference standard by
military, national security and government professionals around the world,
SMARTbooks comprise a comprehensive professional library designed
with all levels of Soldiers, Sailors, Airmen, Marines and Civilians in mind.
e
pl
m
Sa
[Link]
The Lightning Press is a service-disabled, veteran-owned small business, DOD-
approved vendor and federally registered — to include the SAM, WAWF, FBO, and FEDPAY.
(Sample Only) Find this and other SMARTbooks at: [Link]
SMARTbooks
INTELLECTUAL FUEL FOR THE MILITARY
MILITARY REFERENCE:
SERVICE-SPECIFIC
Recognized as a “whole of government” doctrinal reference standard by military profes-
sionals around the world, SMARTbooks comprise a comprehensive professional library.
MILITARY REFERENCE:
MULTI-SERVICE & SPECIALTY e
pl
SMARTbooks can be used as quick reference guides during operations, as study
guides at professional development courses, and as checklists in support of training.
m
Sa
[Link]
(Sample Only) Find this and other SMARTbooks at: [Link]
[Link] Purchase/Order
SMARTsavings on SMARTbooks! Save big when you order our titles
together in a SMARTset bundle. It’s the most popular & least expensive way
to buy, and a great way to build your professional library. If you need a quote
or have special requests, please contact us by one of the methods below!
[Link]
Order SECURE Online
Web: [Link]
Email: SMARTbooks@[Link]
e
Place your order (or leave a voicemail)
at 1-800-997-8827
pl
Phone Orders, Customer Service & Quotes
Live customer service and phone orders available
m
Mon - Fri 0900-1800 EST at (863) 409-8084
Government/Unit/Bulk Sales
The Lightning Press is a service-disabled,
veteran-owned small business, DOD-approved
vendor and federally registered—to include the
SAM, WAWF, FBO, and FEDPAY.
We accept and process both Government
Purchase Cards (GCPC/GPC) and Purchase
Orders (PO/PR&Cs).
(INFO1)
INFO1
[Link]
9 781935 886600
[Link]