Professional Documents
Culture Documents
FM 100-6
Information
Operations
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
HEADQUARTERS,
DEPARTMENT OF THE ARMY
FM 100-6
INFORMATION OPERATIONS
Contents
Page
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
Chapter 1 OPERATING ENVIRONMENT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Geostrategic and Technological Environment . . . . . . . . . . . . . . . . . . . . . 1-1
Threats to the Information Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Information Dominance: The Response to the Challenges . . . . . . . . . . . 1-9
Chapter 2 FUNDAMENTALS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Cognitive Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Components of Information Operations . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Information Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Chapter 3 OPERATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-0
Command and Control Warfare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Civil Affairs Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Public Affairs Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Chapter 4 RELEVANT INFORMATION and INTELLIGENCE . . . . . . . . . . . . . . . . . 4-0
Relevant Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-0
Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Chapter 5 INFORMATION SYSTEMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-0
Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-0
Role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Signal Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Future Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10
i
Page
ii
Preface
This manual addresses the operational context of information operations (IO),
relevant terminology, and the environment of information operations. It supports
battle command and provides guidelines for commanders that conduct IO to
support all phases of the force-projection operating environment, including
planning and executing early entry and force-projection operations in joint and
multinational settings.
Military operations occur in peace and war. The traditional focus when
discussing information and C 2 was electronic warfare (EW), electronic
countermeasure (ECM), and electronic counter countermeasure (ECCM)
operations that take place during war. The focus of this manual is on command
and control warfare (C2W), public affairs (PA), and civil affairs (CA). All are
operations that the Army currently uses to gain and maintain information
dominance as well as effective C2. Successful operations require effective C2 to
transform military capabilities into applied military power. The more effective the
force’s C2 system, the more completely its capabilities can be realized in peace or
war.
As the Army’s capstone doctrine for IO, this manual supports soldiers and
leaders that execute IO to support military operations. Not only does the doctrine
herein provide commanders and their staffs with guidance to conduct information
operations, it also serves as the foundation for development of US Army tactics,
techniques, and procedures (TTP) manuals. It is also the foundation to refine
existing training support packages (TSPs), mission training plans (MTPs), training
center and unit exercises, and service school curricula. The manual provides a
basis to examine organizations and materiel developments applicable to IO.
This doctrine applies to the total Army—active and reserve components and
Army civilians. It is specifically oriented at the operational and tactical levels of
military operations. It may be useful to other services, nonmilitary agencies, and
allies involved in such operations.
iii
Introduction
The Army is embracing a new era characterized by the accelerating growth of
information, information sources, and information dissemination capabilities
supported by information technology. This new era, the so-called Information Age,
offers unique opportunities as well as some formidable challenges. New
technology will enhance the Army’s ability to achieve situational dominance on
land, where the decisive element of victory for our nation has always been critical.
At the same time, it will enable adversaries to employ many of these same
capabilities. This new technology also allows the Army to transform itself.
The Army is changing the way it does business in the foxhole; in its schools
and training centers; and in its doctrine, training, leader development,
organizations, materiel development, and soldier development. Responding to
the challenges and opportunities of the Information Age, the Army is preparing
the warfighter for operations today as well as in the twenty-first century.
Information and the knowledge that flows from it empower soldiers and their
leaders. When transformed into capabilities, information is the currency of victory.
Information operations integrate all aspects of information to accomplish the
full potential for enhancing the conduct of military operations. Information
operations are not new. In their simplest form they are the activities that gain
information and knowledge and improve friendly execution of operations while
denying an adversary similar capabilities by whatever possible means. Effects of
IO produce significant military advantage for forces conducting such operations.
Information is an essential foundation of knowledge-based warfare. It enables
commanders to coordinate, integrate, and synchronize combat functions on the
battlefield. To gain the relative advantage of position (maneuver) and massing of
effects (firepower), commanders must act while information is relevant and before
the adversary can react. Targeting an adversary’s information flow to influence his
perception of the situation or prevent him from having or using relevant
information contributes directly to decisive operations. As the commander targets
the adversary’s information systems (INFOSYS), he protects his own. Realizing
that absolute and sustained dominance of the information environment is not
possible, commanders seek to achieve information dominance at the right place,
the right time, and in the right circumstances. They seek information dominance
that defines how the adversary sees the battlespace, creating the opportunity to
seize the initiative and set the tempo of operations.
• The accuracy, lethality, and range of modern weapons have forced
commanders to disperse their formations, decentralizing control and
execution. Massing the effects of these dispersed systems depends on
accurate information. Disruption of the flow of information or corruption of
the information itself can negate the effects of weapons and systems.
Instead of being limited to the physical destruction of people or war
machines as the only path to battlefield success, armies now can target
information or an adversary’s INFOSYS to alter the battlefield chemistry
and yield battlefield success.
• The speed and pervasiveness of data transmission in the Information Age
are causing a revolutionary change in the nature of military operations and
warfare. Targeting information extends beyond the battlefield and involves
more than attacking an adversary’s information flow while protecting the
iv
FM 100-6
friendly information flow. It also requires awareness of, and sensitivity to,
information published by nonmilitary sources. These information sources
are able to provide tactical-level information in near real time to audiences
throughout the world, with the potential of profoundly influencing the
context of those operations.
• IO define the operational situation by generating understanding, providing
context, and influencing perceptions. They enable and protect friendly
INFOSYS; synchronize force application; connect hierarchical and
nonhierarchical systems; link sensors, shooters, and commanders; and
degrade, disrupt, or exploit adversary operations by attacking the
adversary’s command and control (C2). Units conduct IO across the full
range of military operations, from operations in garrison, through
deployment, to combat operations, to redeployment. IO greatly expand a
commander’s battlespace, including interaction with the media, industry,
joint forces, multinational forces, and computer networks worldwide.
• Within the context of joint and/or multinational operations, the Army must
be able to dominate the information environment in order to perform its
missions in any contingency or conflict. The Army’s force-projection
capability is based upon accurate and timely information. IO can
significantly enhance the Army’s ability to deter aggression, to effectively
execute the full range of operations, and to win decisively in combat.
Notwithstanding the synergy possible with the power of information and
information technology, fog and friction will remain; the challenge of sorting out
the signals from the noise amidst a mass of expanding data will also remain. Many
solutions to the dilemma of uncertainty for the commander are technical. But there
can be no information revolution without the human influence and understanding
of soldiers and commanders who link and integrate information, technology, and
action. IO do not offer any panaceas. Perfect knowledge is not the objective. The
military objective remains—to enter an operational theater capable of achieving
superior relative combat power against an enemy, or to establish situational
dominance in operations other than war (OOTW).
The Army’s keystone doctrine in FM 100-5 describes how the Army thinks
about the conduct of operations. This manual, while designed to enhance and
enable the operations in FM 100-5, reaches out to accommodate and leverage
newly emerging information technologies, especially digitization.
As the Army’s capstone publication for information operations, this manual
supports the National Military Strategy and explains the fundamentals of IO for the
Army. IO doctrine reflects, and goes beyond, the joint military strategy of
command and control warfare (C2W), which implements Department of Defense
(DOD) information warfare policy. This manual—
• Identifies information as a major influence on operations at the tactical,
operational, and strategic levels.
• Enables commanders to successfully integrate information, INFOSYS, and
their effects across the full range of military operations. Such integration
enables and enhances the elements of combat power.
v
FM 100-6
vi
Chapter 1
Operating Environment
Army forces today are likely to encounter conditions of greater ambiguity and
uncertainty. Doctrine must be able to accommodate this wider variety of
threats. In so doing, the Army is prepared to respond to these worldwide
strategic challenges across the full range of possible operations as part of a joint
and combined team.
FM 100-5
1-1
FM 100-6
Global Information
Environment
National Global Defense
Information Information Information
Infrastructure Infrastructure Infrastructure
Political Industry
Leaders Military Information (Foreign, US)
Environment
Media Joint Systems
(CNN, Internet)
Other
Governments International Organizations
(Red Cross, World Health Organization)
1-2
FM 100-6
NEWS MEDIA
Adversaries and other non-DOD The role of the news media will continue to
organizations, including many actors, agencies, expand. The number of news organizations and
and influences outside the traditional view of their means to gather, process, and disseminate
m i l i t a r y c o n fl i c t , i n t r u d e i n t o t h e M I E . information is increasing exponentially. From the
Adversaries, perhaps supported by nonaligned 147 reporters who accompanied the D-Day
nations, will seek to gain an advantage in the GIE invasion in World War II, to the 800-plus reporters
by employing battlespace systems and in Panama during Just Cause, to the 1,300
organizations. In addition, the media, think tanks, reporters in the Kuwaiti theater in Desert Storm,
academic institutions, nongovernment the ability and desire of the news media to cover
organizations (NGOs), international agencies, US military operations is a given. Likewise, the
and individuals with access to the information demand by the US and international public to
highway are all potentially significant players in know what is happening, consistent with security
the GIE. These entities can affect the strategic and and propriety, is also a given.
operational direction of military operations
FM 100-5 observes that the impact of media
before they even begin. Independent of military
coverage can dramatically affect strategic
control, their impact is always situationally
direction and the range of military operations.
dependent. Their activities may cause an
Clearly, the effect of written, and, more
unanticipated or unintentional effect on military
importantly, visual information displayed by US
operations. Such actors include—
and international news organizations directly
• Government agencies such as the and rapidly influenced the nature of US and
Department of State (DOS) or Federal international policy objectives and our use of
Emergency Management Agency (FEMA). military force in Rwanda, Somalia, and in the
former Yugoslavian republic.
• NGOs.
INFORMATION
• Private voluntary organizations (PVOs).
INFRASTRUCTURES
• International agencies that provide a Wi t h i n t h e G I E , a n i n t r i c a t e s e t o f
commercial service, such as the European information infrastructures have evolved to link
Space Agency. i n d i v i d u a l s , g ro u p s , a n d n a t i o n s i n t o a
comprehensive network that allows for the
• Agencies that coordinate international increasingly rapid flow of information to all
efforts, such as the International Committee elements having access to the network. In
o f t h e R e d C r o s s o r Wo r l d H e a l t h practice, subelement labels are misleading as the
Organization. information environment has no discrete
• Social and cultural elements, including boundaries. Each subelement is inextricably
religious movements and their leaders. intertwined, a trend that will only intensify with
the continuous application of rapidly advancing
• Intelligence and military communications technology. This worldwide telecommunications
systems of other services, allies, and web transcends industry, the media, and the
adversaries. military. It includes both government and
nongovernment entities, the GII, the national
• Individuals with the appropriate hardware information infrastructure (NII), and the defense
and software to communicate with a information infrastructure (DII).
worldwide audience.
1-3
FM 100-6
encompasses all these components and captures • The satellite, terrestrial, and wireless
the vision of a worldwide, seamless, dynamic technologies that deliver content to home,
web of transmission mechanisms, information businesses, and other public and private
appliances, content, and people. Global institutions.
accessibility and use of information in the GII is
e s p e c i a l l y c r i t i c a l , g i v e n t h e i n c re a s i n g • The information and content that flows
globalization of markets, resources, and over the infrastructure, whether in the form
economies. The GII— of data bases, the written word, television,
or computer software.
• Includes more than just the physical
facilities used to store, process, and display • The computers, televisions, and other
voice, data, and imagery. It encompasses a products that people employ to access the
wide array of ever-expanding capabilities, infrastructure.
including cameras, scanners, keyboards,
fax machines, and more. • The people who provide, manage, and
generate new information and those that
• Electronically links organizations and
help others to do the same.
individuals around the globe and is
characterized by a merging of civilian and
military information networks and Defense Information
technologies. Infrastructure
DII encompasses transferring information
National Information
and processing resources, including information
Infrastructure
and data storage, manipulation, retrieval, and
All nations’ NIIs are an integral part of the display. The DII connects DOD mission support,
GII. The composition of the NII mirrors the GII, command and control (C 2 ), and intelligence
but on a reduced scale. The NII is— computers and users through voice, data
• A series of components, including the imagery, video, and multimedia services. It
collection of public and private high-speed, provides information processing and value-
i n t e r a c t i v e , n a r ro w a n d b ro a d b a n d added services to subscribers over the Defense
networks. Information Systems Network (DISN).
1-4
FM 100-6
managing force and forces, compresses the operations. Know the situation now requires
traditional levels of war in time and space, and additional focus on nonmilitary factors.
gives operations a simultaneous and continuous Commanders can best leverage the effects of
character. A commander ’s battlespace now new technology on their organizations by
includes global information connectivity. As a employing new and emerging automated
result, tactical military actions can have political planning and decision aids and new or different
and social implications that commanders must m e t h o d s a n d t e c h n i q u e s o f c o n t ro l a n d
consider as they plan, prepare for, and conduct management.
Level of
Hostility
WAR
Unstructured
CONFLICT ADVERSARIES
Structured
Unauthorized User
Insider
Terrorist
Nonstate Activist
PEACETIME Intelligence Service
Military
Unauthorized Malicious Data Base Electronic Electronic Conventional
Access Software Corruption Intelligence Attack Weapons
1-5
FM 100-6
Sources of Threats
Threats come from a range of sources—from to networks and mainframe computers is
individuals (unauthorized users or insiders) to growing.
complex national organizations (foreign
intelligence services and adversary militaries). INSIDERS
Boundaries between these groups are indistinct, Individuals with legitimate access to a
and it is often difficult to discern the origins of system pose one of the most difficult threats from
any particular incident. For example, actions that which to defend. Whether recruited or self-
appear to be the work of hackers may actually be motivated, the insider has access to systems
the work of a foreign intelligence service. Sources normally protected against attack. While an
include unauthorized users, insiders, terrorists, insider can attack a system at almost any time
nonstate groups, foreign intelligence services, during its lifetime, periods of increased
and opposing militaries or political opponents. vulnerability for a system include design,
production, transport, and maintenance.
UNAUTHORIZED USERS TERRORISTS
Unauthorized users such as hackers are the Terrorists are increasing their use of
source of most of the attacks against INFOSYS in commercial INFOSYS. Their actions range from
peacetime. While to date, they have mainly unauthorized access, to an information network,
targeted personal computers, the threat they pose up to direct attacks against the infrastructure
1-6
FM 100-6
FOREIGN INTELLIGENCE
SERVICES
(bombing, and so forth). Terrorist groups have Active during periods of both peace and
also been identified using computer bulletin conflict, foreign intelligence services take
boards to pass intelligence and technical data advantage of the anonymity offered by computer
across international borders. bulletin boards to hide organized collection or
NONSTATE GROUPS disruption activities behind the facade of
unorganized hackers. Their primary targets are
New players, ranging from drug cartels to
social activists, are taking advantage of the often commercial and scientific networks rather
possibilities offered by the Information Age. They than direct attacks on the military.
can acquire, at low cost, the capabilities to strike
a t t h e i r f o e s ’ c o m m e rc i a l , s e c u r i t y, a n d OPPOSING MILITARIES OR
communications infrastructures. Moreover, they POLITICAL OPPONENTS
can strike with relative impunity from a distance.
Besides attacking opponents directly, these actors While the adversary’s activities are more
use the international news media to attempt to traditionally associated with open conflict or war,
influence global public opinion and shape his manipulation of the news media during
perceptions of a conflict. They even attempt to peacetime may help frame the situation to his
inflame dormant issues into conflicts that advantage prior to the onset of hostilities.
otherwise would not arise.
Level of Hostility
The level of hostility generally reflects the On the battlefield, reliance on an extensive
scope and scale of an adversary’s actions against and potentially fragile communications
friendly INFOSYS. In peacetime, unauthorized infrastructure presents a vulnerability that entices
access to and use of computers, computer exploitation. The initial candidates for attack
systems, and networks is the greatest current could be vital information nodes or links such as
threat. Deliberate use of malicious software by an CPs and communications centers. In addition to
adversary could be used against s t r i k i n g b a t t l e fi e l d i n f o r m a t i o n n o d e s ,
communications, transportation, banking, power,
adversaries can also strike the supporting
and computation systems upon which both
infrastructure, both on and off the battlefield.
industry and the military might depend. We can
Central system support assets such as power
expect an adversary to use malicious software to
assess the vulnerability of our information sources can be very difficult to repair or replace.
networks. Artillery, tactical ballistic missiles, and air power
provide the major attack systems for most
As the crisis moves toward overt conflict or
adversaries today. The ability of an adversary to
war, more direct and far-reaching attacks can
strike will only grow as more capable systems,
arise against information and INFOSYS. Targets
such as cruise missiles and precision-guided
can include both units and their supporting
infrastructures. Deployed tactical units may face munitions, proliferate. This ability to strike with
the results of earlier intrusions and insertions, precision will be enhanced by the spread of such
allowing embedded malicious software to cripple technologies as GPS, unmanned aerial vehicles
systems or degrade communications. By the time (UAVs), and near-real time imagery satellites. If
a unit is engaged in combat, it could have been INFOSYS or facilities cannot be destroyed, they
subjected to a variety of overt and covert attacks can be made untenable through contamination by
against its INFOSYS. chemical or biological weapons.
CHALLENGES
Commanders and national leaders face global visibility of operations and rapid
significant and interrelated challenges in changes in information technology and their
dealing with and anticipating the effects of the impacts in the GIE.
1-7
FM 100-6
Information security
Two commonly recognized facts address public switch network (PSN) and are largely
why information security (INFOSEC) is an outside the direct control or influence of the
important challenge. First, the Defense military. In addition, a significant amount of
Information Systems Agency (DISA) reports that open-source intelligence is carried by commercial
over 95 percent of DOD communications during means.
peacetime travel over the relatively unprotected
Continuous Operations
Because of the pervasive and intrusive nature must have already developed plans and
of the MIE, preparation for dealing with IO must procedures for dealing with the myriad aspects
not wait until a unit receives a warning order to and influences in the MIE or risk being rapidly
deploy. By that time, the commander and his staff overcome by events.
Morale
The global visibility of operations impacts a inaccurate information, and misinformation (or
command’s combat power by either enhancing or disinformation) impact families and
degrading soldier morale. Soldier spirit and communities as well as soldiers, affecting their
perseverance, the will to win, dedication to the morale and commitment to the objective at hand
cause, and devotion to fellow soldiers and the
and potentially undermining the critically
unit can be rapidly undermined by what is being
important human psychological dimensions
said in the GIE. The instant communications
capabilities of these INFOSYS often disseminate discussed in FM 100-5. Nevertheless, Americans
information to soldiers—whether accurate or on and off the battlefield will continue to have
inaccurate—faster than the military chain of free access to radio, television, and the press and
c o m m a n d . B a d n e w s , m i s i n t e r p re t a t i o n , be aware of events and circumstances.
Legal Considerations
Relatively few rules and laws govern the use engagement (ROE) or status of forces
of or access to many new INFOSYS or agreements/status of mission agreements.
technologies. For that reason, IO confront legal Tension exists both in peace and during times of
challenges and other constraints such as rules of conflict. Collection of intelligence, or, simply,
1-8
FM 100-6
information in peacetime, is often limited by contracts or legal restrictions may prevent the
policy and/or law. Many policies and laws for military from controlling or influencing the use of
using nonmilitary computer systems and other civilian assets by an adversary. As an example,
information networks during peacetime are yet during hostilities an allied coalition force may
to be determined. For example, the control or
depend upon an international agency to change
regulation of access on the internet to protect
sensitive information or critical network nodes is the access codes for an imagery satellite to protect
largely unaddressed. What are the ROE for the critical information in the area of responsibility
INFOSYS in peace? In war? Close coordination (AOR). Without the change, the imagery is
with the supporting judge advocate is critical in available in the open market. An adversary
confronting IO challenges based on legal could, under commercial contract, download
considerations. critical satellite imagery of the geographic region
Because many of the actors and influences in in near-real time as the satellite passed over the
the MIE are outside friendly military control, ground station.
INFORMATION DOMINANCE:
THE RESPONSE TO THE CHALLENGES
1-9
FM 100-6
HISTORICAL PERSPECTIVE
For near ly two hours a divisional headquarters or with various headquarters and from
succession of young officers, of the forward troops. In turn, they the commanders. I thought the
a b o u t t h e r a n k o f m a j o r, made their reports and were system admirable, and indeed
presented themselves. Each searchingly questioned by their the only way in which a modern
had come back from a different chief to unfold the whole story Commander-in-Chief could
sector of the front. They were of the day's battle. This gave see as well as read what was
the direct personal Field Marshal Montgomery a going on in every part of the
representatives of the complete account of what had front.
C o m m a n d e r - i n - C h i e f, a n d happened by highly competent
could go anywhere and see men whom he knew well and Sir Winston Churchill
anything and ask any w h o s e eye s h e t r u s t e d . I t Triumph and Tragedy, 1953
questions they liked of any afforded an invaluable cross-
commander, whether at the check to the reports from all the
Directed Telescope
High-performing units are in large part • Using special operations units,
distinguished from other units by their ability to reconnaissance teams or officers, and
effectively acquire and use information. special communications networks.
Historically, high-performing units often gained
the information advantage by using These techniques are still valid and in use today.
nontraditional means and methods. One such Modern technological innovations potentially make
method is often referred to as the directed telescope. the advantages gained via the directed telescope
In concept, the directed telescope acquires technique almost routine. Innovations in sensors,
information by supplementing the routine processors, communications, and computers can
information flow, normally by— give commanders immediate access to enemy and
• Going outside the traditional command friendly situation information and thus a subsequent
and its hierarchical information channels. operational knowledge advantage.
Battlefield Visualization
Creation of an operational knowledge level of battlefield visualization is significantly
advantage supports the commander’s battlefield greater than his opponent’s.
visualization. Battlefield visualization is the process In the past, leveraging a knowledge
whereby the commander— advantage to decisively achieve a desired end
• Develops a clear understanding of his state has been largely an intuitive process. Truly
current state in relation to the enemy and exceptional commanders have almost always
environment. possessed this trait; less successful commanders
• E n v i s i o n s a d e s i re d e n d s t a t e t h a t often have not. Information technologies now
represents mission accomplishment. hold a potential for making this grasp of the
battlespace, and the inherent opportunities it
• Visualizes the sequence of activity that will affords, more accessible to every leader, from
move his force from its current state to its field army to rifle platoon. The effect of these
end state. c h a n g e s w i l l b e t o e n h a n c e b a t t l e fi e l d
A key step toward achieving information visualization by better supporting leaders with a
dominance is reached when one commander’s deliberate and systematic information process
1-10
FM 100-6
based upon building blocks of raw data parsed different echelons, this same technology will
and collated by both man and machines, enhance situational awareness and promote
synthesized into a coherent whole, and focused s y n c h ro n i z e d o p e r a t i o n a l p l a n n i n g a n d
upon drawing understanding from the chaos of execution. Ideally, the command will see and
battle. Additionally, by linking commanders at think as one.
Situational Awareness
A critical aspect of achieving a knowledge IO potentially assure situational awareness
advantage over your adversary is the appropriate to every level of an organization,
achievement of a condition of situational down to the individual soldier. Systems being
awareness throughout the force. Situational tested and fielded today offer commanders at all
awareness includes— levels the potential of a collective, shared
• A common understanding of the understanding of the battlespace. The
commander’s assessment of the situation. commander ’s assessment of the situation, his
• The commander’s intent. intent, and the concept of operation provide the
• The commander ’s concept of operation, f r a m e w o r k t h a t a p p l i e s t h ro u g h o u t t h e
combined with a clear picture of friendly organization. This framework fosters increased
and enemy force dispositions and cohesion and unity of effort in the execution of
capabilities. operations. Figure 1-3 illustrates this relationship.
Unity and
Cohesion of Effort
Orders
Understanding (Execution)
Processing
Data
• The intelligence function processes data and information into usable form, increasing the
commander's knowledge of the situation.
• Knowledge promotes understanding, leading to commander decisions
(either a concept of operations during the planning process or immediate orders to subordinate
units during execution).
• The commander, his staff, and subordinate commanders use the command and control function
to implement the concept and orders, promoting unity of effort.
1-11
FM 100-6
Situational awareness is inherently local, intent and concept were understood two
providing immediate context and relevance for echelons up and down in a hierarchical structure.
the interpretation and use of new information as Information technology now makes it possible
it is received by a soldier in a particular situation. for a senior commander’s intent and concept to
The local situation relevant to each level and be relatively easily shared throughout the
individual is developed within the common command whenever doing so will enhance the
framework and shared vertically and laterally as operation. The art of command requires clearly
appropriate. This situation not only retains the stating a common framework with sufficient
advantage of hierarchical structure (common freedom for local adaptation and application.
framework and intent) but also adds the Proliferation of that understanding, potentially to
advantage of nonhierarchical INFOSYS that all leaders on the battlefield, gives the force a
enable decentralized adaptation and action to singular perspective and a clarity of focus that
local situations throughout the command. optimizes its combat power against an opponent
D e v e l o p i n g t h e fl e x i b i l i t y o f a or enables it to control a situation in other
nonhierarchical structure places a greater operations. Denying an adversary a similar
obligation on the commander to clearly articulate capability, such as degrading his situational
his intent and concept of operations. awareness, is an equally important objective and
Traditionally, commanders ensured that both is addressed in Chapter 3 under C2W.
Expanded Vision
Our traditional operational vision must informational maneuver. Maintaining this
expand to take full advantage of the potential advantage requires constant assessment and
contribution of IO to dominate the enemy while adjustment. To this end, PSYOP-supported
protecting friendly forces. Before any mental Special Forces (SF) teams in the countryside, civil
constraints are placed on intent or operational affairs (CA) teams in urban areas, reports from
concept, commanders at every level assess those PVOs, and media coverage provide a form of
actors and elements that can affect upcoming reconnaissance and surveillance, just as standard
operations, to include informational aspects. The military reconnaissance and surveillance
commanders’ assessments include actors and operations provide information that drives
elements both within and outside of their control. subsequent fire and maneuver.
The result of this process of thinking about the The purpose of firepower in combat is the
GIE is a manageable number of informational generation of destructive force against an
elements with which commanders decide to deal, enemy’s capabilities and will to fight. The MIE
which, by definition, constitutes the MIE for a equivalent of firepower, already included in
particular operation. This expanded vision of the doctrine, is the employment of lethal and
battlespace can include various combinations of nonlethal, direct and indirect capabilities through
space, time, purpose, and people. C 2 W. C 2 W uses deception, PSYOP, electronic
The elements of an IO vision align with the warfare (EW), operations security (OPSEC), and
combat functions associated with traditional destruction to attack an adversary’s capabilities.
operations. The MIE equivalent of the tactical At the same time, C 2 W protects friendly
advantage of high ground, or the flanking operations. US armed forces have always
position, might be transformed into an employed these capabilities, but they were
information advantage of local and international recently integrated into operations under C2W.
recognition that the military operation is This integration improves the friendly targeting
legitimate and has international support. Just as process by directing the power of traditional
successful maneuver gives a commander more attack, deception, PSYOP, EW, and OPSEC at the
options than the enemy, a perception of adversary’s decision cycle, thus gaining control
credibility and support, or an ability to command of that cycle and helping generate information
a n d c o n t ro l , p ro v i d e s a n a d v a n t a g e f o r dominance.
1-12
FM 100-6
While the 1993 version of FM 100-5 identify the critical audiences, messages, and
recognizes the impact of global news coverage on communications means is not new to leaders.
the scope, nature, and duration of major However, it is gaining major significance for
operations, recent events demonstrate that the successful operations.
GIE also affects operations at brigade, battalion,
and company levels. Commanders at every level
may now find that CA, military police (MP),
public affairs (PA), PSYOP, and SF activities that HISTORICAL PERSPECTIVE
support, enable, or influence operations have During the course of the Gulf War, the
become integral to their decision process and combined operations of the allied coalition
operations and require careful coordination and effectively isolated, both physically and
synchronization to achieve maximum effect. psychologically, a large element of Iraqi forces
Commanders must continue to carefully manage on Faylaka Island. Rather then reduce the
the separation of PA and PSYOP functions to island by direct assault, a tactical PSYOP
preserve the integrity and credibility of PA team from the 9th PSYOP Battalion, aboard a
UH-1N helicopter, flew aerial loudspeaker
operations. The methods of using C2W, PA, and
missions around the island with cobra
CA together to enhance operations is discussed in gunships providing escort. The message told
detail in Chapter 3. the adversary below to surrender the next day
in formation at the radio tower. The next day
Activities that affect how operations are seen 1,405 Iraqis, including a general officer, waited
and perceived by different audiences are an in formation at the radio tower to surrender to
increasingly prevalent and required calculation of the Marine forces without a single shot having
battle command and a prerequisite for effectively been fired.
visualizing battlespace. The requirement to
1-13
FM 100-6
Information Management
Information management takes on increasing forces increasingly separated, leaving large gaps
importance in meeting the challenges of global between formations and requiring each cluster
v i s i b i l i t y, r a p i d l y c h a n g i n g i n f o r m a t i o n of forces to act with greater autonomy within an
technology, and their impact on the GIE. e x p a n d e d A O . D i s p e r s i o n c re a t e s m o re
Mountains of data must be acquired and quickly subordinate force clusters, decentralizes
translated into knowledge and understanding. d e c i s i o n a u t h o r i t y, a n d c re a t e s a m a j o r
Accomplishing this challenge requires a requirement for coordinated effort. The nominal
continuous, cyclical process. Decision-making span of control is increased and overall
has become increasingly dynamic and situational awareness is more complicated.
multidimensional. Decisions about current
operations must occur simultaneously with Harnessing the potential of information to
decisions and planning about future operations. transform how the Army operates is critical to
Decision-making must match the pace with its success in the future. However, technology
which situational awareness changes. alone cannot provide leaders with automatic
Information technology now permits the battlefield visualization, flawless situational
horizontal movement and integration of awareness, easily expanded vision, or highly
information and provides a framework for local effective information management. In the final
decision-making, potentially allowing the analysis, the products of our initiative to
commander ’s span of control to increase harness the potential of information can only
without losing effectiveness. The dynamics support the application of a leader’s judgment,
affecting a commander ’s span of control are wisdom, experience, and intuition to enhance
critical because the modern battlefield sees his battle command.
1-14
Chapter 2
Fundamentals
COGNITIVE HIERARCHY
Information is defined as— U n d e r s t a n d i n g i s a c h i e v e d b y using
Data collected from the environment and judgment to give knowledge relevance within a
processed into a usable form. s p e c i fi c s i t u a t i o n a l c o n t e x t . I d e a l l y,
understanding a situation supports a commander
A given piece of data is largely meaningless in battlefield visualization and creates the
by itself. Only when data is processed, that is, conditions from which plans can be formed and
placed into a situational context, does it gain effective actions taken. See Figure 2-1.
meaning and become, by definition, information.
Knowledge is derived from information.
Knowledge is information that has been tested
and accepted as factual—
• Through cognition—the mental process that
receives or develops unverified Understanding
information (beliefs).
• Through assessment or testing to Judgment
prove the information. Knowledge
2-1
FM 100-6
STRATEGY
The National Military Strategy recognizes that operations. In times of crisis, information can
information warfare (IW) is one of many deter adversaries from initiating actions
capabilities within the US military elements of detrimental to interests of the US Government
national power. IW can support the overall US or its allies or detrimental to the conduct of
Government strategic engagement policy during friendly military operations. If carefully
peacetime, crisis, conflict, and postconflict. The conceived, coordinated, and executed, IW—
ability of the US Government to influence the
• Contributes to defusing crises.
perceptions and decision making of others
greatly impacts the effectiveness of deterrence, • Reduces the period of confrontation and
power projection, and other strategic concepts. enhances the impact of informational,
diplomatic, economic, and military efforts.
This paragraph introduces and defines
information warfare and explains its relationship • Forestalls or eliminates the need to employ
with the Army’s interpretation— information combat forces.
Information Warfare
Information warfare is the term adopted by the adversary. The strategic goal of IW is to seize and
Department of Defense (DOD) and the joint staff maintain a decisive advantage by attacking an
to recognize a range of actions taken during adversary’s NII through exploitation, denial, and
conflict to achieve information superiority over influence, while protecting friendly INFOSYS.
an adversary. It is specifically defined in IW offers either side the chance to strike at a
CJCSI 3210.01 as— distance with relative safety.
Actions taken to achieve information The Army, recognizing that IW as currently
super ior ity by affecting adversar y
defined by DOD is more narrowly focused on the
i n fo r m a t i o n , i n fo r m a t i o n - b a s e d
impact of information during actual conflict, has
processes, information systems, and
computer-based networks while chosen to take a somewhat broader approach to
d e fe n d i n g o n e ’s ow n i n fo r m a t i o n , the impact of information on ground operations
i n fo r m a t i o n - b a s e d processes, and adopted the term information operations.
information systems and computer- The Army has adopted this broader approach to
based networks. recognize that information issues permeate the
full range of military operations (beyond just the
The objective of IW is to attain a significant traditional context of warfare) from peace
information advantage that enables the total through global war. IO implement the IW policy
force to quickly dominate and control the for the land component commander.
2-2
FM 100-6
Information Operations
Information operations integrate all aspects of operations; IO include interacting with the
information to support and enhance the elements GIE and exploiting or denying an
of combat power, with the goal of dominating the adversary's information and decision
battlespace at the right time, at the right place, capabilities.
and with the right weapons or resources. IO are
defined as—
Continuous military operations within the Units conduct IO across the full range of
MIE that enable, enhance, and protect the military operations, from operations in garrison,
friendly force’s ability to collect, process, through deployment, to combat operations, and
and act on information to achieve an continuing through redeployment upon mission
advantage across the full range of military completion.
COMPONENTS OF
INFORMATION OPERATIONS
Activities to support IO include acquiring, operate within a battlespace established by the
using, protecting, managing, exploiting, and denying MIE. (See Figure 2-2.) Army organizations
information and INFOSYS. These activities take conduct these IO activities as part of a dynamic,
place within three interrelated components of IO: iterative process to support each component in an
operations, RII, and INFOSYS. These components integrated full-dimensional operation.
Global Information
Environment
Military Information
Environment Industry
Political (Foreign, US)
Decisions
Global
Information Information
Systems Infrastructure
Joint Systems
Media
(CNN, Internet) Relevant Defense
Information Operations Information
and Infrastructure
Intelligence
Other
Governments
National International Organizations
Information (Red Cross, World Health Organization)
Infrastructure
2-3
FM 100-6
Operations
C2W, CA, and PA are the three operations the military technology and military
Army currently uses to gain and maintain operations.
information dominance and effective C2.
• Vulnerabilities created by widespread
C2W
incorporation of advanced technology for
OPERATIONS
INFOSYS and intelligence.
C2W is the warfighting application of IW in
military operations. The aim of C 2 W is to • The radical improvement in INFOSYS and
influence, deny information to, degrade, or intelligence capabilities resulting from
d e s t ro y a d v e r s a r y C 2 c a p a b i l i t i e s w h i l e explosive advances in technology.
protecting C2 capabilities against such actions.
C2W is composed of two major branches: The complexity and range of today’s MIE
i n c r e a s e s t h e d i f fi c u l t y o f a c h i e v i n g a
• Command and control-attack (C2-attack). comprehensive disruption of an adversary’s C2
• Command and control-protect (C2-protect). capabilities through any single attack or
C2W planning is conducted throughout the
application of combat power. This places a
premium upon the effective integration and
military operational continuum, from peacetime
synchronization of friendly physical destruction,
through termination of hostilities. In the past, the
EW, deception, and PSYOP to achieve maximum
primary warfighting objective was to concentrate
results when launching attacks. Likewise, careful
physical and destructive combat power against
integration and synchronization is also required
the adversary’s personnel and equipment, that is,
tanks, airplanes, artillery, air defense. C2 W is
to fully protect our critical INFOSYS/intelligence
architecture from adversary attacks. Without the
discussed in detail in Chapter 3.
c o m p l e t e a n d t h o ro u g h i n t e g r a t i o n a n d
By 1986, AirLand Battle further evolved this synchronization of the five C2W elements across
thinking by linking ground and air operations to both C 2 -attack and C 2 -protect, operational
achieve depth and synchronization. A effectiveness will be reduced and potential
paramount consequence of AirLand Battle was vulnerabilities exposed.
the intention to strike at reserve, reinforcing, and
second-echelon forces. This led in 1993 to an
extended operational strategy of deep C2-Attack
operations, with long-range weapons and Special The goal of offensive C 2 W, specifically
Forces. Looking at high-value targets, deep C2-attack, is to gain control over our adversary’s
operations strategy sought to destroy, degrade, C2 function, both in terms of flow of information
deny, and disrupt critical C2 nodes as one of its and level of situational awareness. With effective
primary objectives. C2-attack, we can either prevent an adversary
Today, C 2 W operations integrate and from exercising effective C2 or leverage it to our
synchronize the capabilities of PSYOP, deception, advantage.
OPSEC, and EW to facilitate the application of C 2 -attack can strike at the adversary’s
appropriate systems and forces to execute IO. capabilities at all echelons, targeting personnel,
While C2W has had a primarily offensive focus in equipment, communications, and facilities in an
the past, it now includes both C2 -attack and effort to disrupt or shape adversary C2. RII plays
C 2 -protect. Although these two disciplines of a key role in C2-attack planning and operations,
C2W have been practiced by successful armies with the creation and maintenance of regional
since the beginning of recorded history, modern data bases on personal, historical, and cultural
warfare with its emphasis on information and influences, intelligence-preparation-of-the
INFOSYS requires a new perspective. Three battlefield (IPB), and battle damage assessments
factors make C2W considerations critical when (BDA)—both soft and hard kill. The principal
operating in today’s environment: C 2 - a t t a c k a p p r o a c h f o r i n fl u e n c i n g t h e
• Continuous, high-volume information flow adversary’s C2 is the synchronized application of
dictated by the relationship of modern the six information activities.
2-4
FM 100-6
C2-Protect
C2-protect seeks to maintain effective C2 of Commanders include CA operations in their
friendly forces by negating or turning to a planning guidance. CA planners must consider
friendly advantage the adversary’s efforts to all available support and information to ensure
influence, degrade, or destroy friendly C 2 successful completion of the CA mission. CA
systems. C 2-protect is divided into active and forces are well-suited to plan, coordinate,
p a s s i v e m e a s u re s a n d s e e k s t o l i m i t t h e support, and, if directed, supervise various
vulnerability of forces (personnel, equipment, operations to support US objectives.
and information) to hostile action, even as
deployed forces face ever-expanding threats and PUBLIC AFFAIRS
adversary capabilities. C 2 -protect includes OPERATIONS
countering an adversary’s propaganda to prevent Most military operations are conducted
it from affecting friendly operations, options, under the full glare of public scrutiny. National
public opinion, and the morale of friendly troops. and international news media coverage plays a
major role in quickly forming public debate and
CIVIL AFFAIRS shaping public opinion. The news media serves
OPERATIONS as a public forum for the analysis and critique of
CA support to IO provides an integral role of goals, objectives, and actions. It can impact
interfacing with critical actors and influences in political, strategic, and operational planning,
the GIE. Whether in peace, conflict, or war, decisions, and mission success or failure. The
conducting military operations, consolidating reality of near real-time information, processed
c o m b a t p o w e r, a n d s e e k i n g i n f o r m a t i o n and transmitted at greater speeds and to wider
dominance are improved when leveraging CA audiences than in the past, has bridged the gap
support. Although conditions differ across the between what occurs on the ground and the goals
spectrum of conflict, CA activities establish, and objectives of the National Military Strategy.
maintain, influence, or exploit relations among Therefore, the public affairs officer (PAO)
military forces, civil authorities, and the civilian monitors public perceptions and develops and
populace in an AO to facilitate military disseminates clear and objective messages about
operations. For example, during Operation military operations. Moreover, commanders
Restore Democracy, CA activities informed the must involve themselves also in this dimension of
local populace through the news media, public IO. PA personnel—
discussion, and PSYOP informational products • Assist the commander by working to
and programs about the reestablishment of the establish the conditions that lead to
legitimate Haitian government. This created an confidence in and support of the Army.
information exchange that promoted • Support open, independent reporting and
understanding of, confidence in, and positive access to units and soldiers.
perception of measures supporting military
operations. • S e e k a b a l a n c e d , f a i r, a n d c re d i b l e
presentation of information that
The civil-military operations center (CMOC) communicates the Army story through an
can be established to interact with key actors and expedited flow of complete, accurate, and
influences in the GIE, such as NGOs, PVOs, and timely information.
local authorities. CA elements support military
operations by applying their skills and experience The commander uses his internal information
in public administration, economics, public program (formerly command information) to
facilities, linguistics, cultural affairs, and civil inform soldiers about where they fit in, what is
information and by collecting information expected of them, and how they help accomplish
relevant to the commander’s critical information the mission. This information also helps soldiers
requirements (CCIR). CA personnel have an combat the effects of enemy propaganda or
intricate and important role in providing misinformation. Commanders, through their
information during both the intelligence cycle PAO, initiate, direct, and emphasize internal
and the operational planning cycle. information topics and programs. Every soldier
2-5
FM 100-6
must receive information specific to the operation internal and external audiences. Leaders
through command channels and world, national, integrate PA into their decision-making process
and local news. The media is an important by considering it in their assessment of the
information channel to the American public; situation and development of courses of actions,
however commanders, staff officers, and soldiers plans, and orders. Commanders ensure that PA
must balance OPSEC and other operational operations are synchronized with other combat
requirements when working with the media. functions and promote early coordination of PA,
PA personnel support commanders by CA, and PSYOP functions during the planning
assessing the information environment and process. A continual exchange of information
advising them on the PA implications of current must exist during execution as well. Although
and future operations. Leaders understand the e a c h f u n c t i o n h a s a s p e c i fi c a u d i e n c e ,
importance of achieving a balanced, fair, and information will overlap, making it crucial that
credible presentation of information to both messages are deconflicted and coordinated.
Relevant Information
and Intelligence
Leaders have struggled with how to best decision-execution cycle to function and gives
capitalize on available information throughout direction to actions by the force to accomplish
the history of organized warfare. The drive to their operational missions.
know as much as possible about their own The collection, processing, and
forces—location, combat effectiveness, current dissemination of relevant information is the key
activity—and the enemy’s—location, disposition, to achieving situational awareness throughout
combat effectiveness, intended actions—has been the force, which creates the opportunity for unity
a durable characteristic of successful of effort toward mission accomplishment. The
commanders, regardless of the time period or commander operates within the GIE, adjusting
nationality. Today, commanders operate in an his MIE to enhance his situational awareness as
environment increasingly marked by the rapid appropriate for the operation at hand.
flow of information and decisions among
strategic, operational, and tactical levels. These The commander focuses on RII requirements.
f a c t o r s a re c o m p l i c a t e d b y a n e x p l o s i v e The commander ’s operational requirements
expansion in the opportunities for access and the dictate the critical information requirements,
m a n i p u l a t i o n o f o p e r a t i o n a l l y re l e v a n t which in turn dictate the RII collection effort. To
information by the wide array of individuals, be effective, the unit’s intelligence cycle must be
organizations, and systems found in the GIE. managed to provide information based on the
priorities in the concept of operations. A key to
Ultimately, effective C2 depends on ensuring successful IO is an accurate IPB focused on the
that the right person has the right information at MIE. During combat operations intelligence
the right time. Intelligence, the commander ’s analysts must continually perform an
source of relevant information about the information-oriented BDA to ensure IO remain
adversary, takes on increased, even crucial, effective. RII support to IO begins in peacetime
importance in the Information Age. Because IO and must be continuous throughout all phases of
give battlespace global connectivity, intelligence an operation or campaign.
on current or potential adversaries must be
Advances in information technology are
prepared on a global scale. Interaction with the
mandating changes in how RII support is
MIE requires timely intelligence about many
provided. First, communications connectivity
aspects of current or potential adversaries, to
allows broadcast dissemination of information.
include cultural, political, and commercial aspects.
This incorporates direct downlink of raw data
Commanders must have information to from multiple sensors to multiple echelons
command. Information allows the commander’s simultaneously and the broadcast of finished
2-6
FM 100-6
Information Systems
INFOSYS collect, process, and disseminate technologies to enhance Army operations is the
information relating to current and future Army Enterprise Strategy (AES). The AES and
operations. Automation has made great advances other initiatives like C 4 I for the Warrior are
in information processing, but human beings reinforcing the important contributions INFOSYS
remain the most effective system for determining make to information-based warfare. Of particular
relevance and fusing information. INFOSYS are importance is the evolution of the Army’s
those means that enable commanders and their comprehensive information architecture with its
staffs to— t h re e s u p p o r t i n g i n i t i a t i v e s f o c u s e d o n
• Monitor the current situation. operational, system, and technical architectures.
When completed, this initiative will create a
• Synchronize operations.
common operating environment (COE) of
• Integrate and synchronize operations standardized, interactive systems and templates
across battlefield operating systems (BOSs). for the collection, storage, and manipulation of all
• Coordinate joint air and naval support. Army data bases.
• Update weapon systems targeting Operational Architecture
parameters. The operational architecture will establish
• Control close, deep and rear operations as the required connectivity among processes,
one operation. functions, information, and organizations. It will
show what we do, what information we need to
do it, and how often we need to exchange
ARCHITECTURE information within the force.
INFOSYS are essential to the effective
application of military power. The Army’s System Architecture
integrated architecture of advanced INFOSYS The system architecture seeks to identify
maximizes the C2 capabilities of land forces in all relationships among C4I components of systems
operating environments. The road map for and create physical connectivity within the
exploiting current and future information information system. It uses an organizational
2-7
FM 100-6
context to show system allocation and network communications automation architectures, both
structures and helps document engineering space- and terrain-based. However configured,
decisions, such as specific information protocols INFOSYS can provide such support with a
and bandwidth. minimum of physical repositioning to support
C2, whether in a strategic deployment phase or
Technical Architecture
moving for a tactical attack. Both military and
The technical architecture will establish a set commercial INFOSYS play important roles in this
of rules governing the arrangement, interaction, architecture.
and interdependence of all the parts and
elements that together constitute our INFOSYS. It Today, the Army applies information
specifies the permissible standards for designing technologies to digitize the battlefield by
C4I capabilities and is critical to the creation and providing integrated C2 that flows across each
maintenance of interactive systems. level of operation or war. The migration of the
current Army Command and Control System
(ACCS) to the Army Battle Command System
INTEGRATION
(ABCS) incorporates a common C 2 operating
The integration of INFOSYS—both vertically environment at all echelons. This integration of
and horizontally—facilitates tactical and
modern INFOSYS with our tactical units
o p e r a t i o n a l a g i l i t y, i n i t i a t i v e , d e p t h ,
continues to enhance their connectivity, decision-
synchronization, and versatility essential to
Army success in joint and combined operations. making, and, ultimately, lethality, survivability,
and the ability to control the tempo of operations.
Advanced weapons system and sensor
GLOBAL CONNECTIVITY t e c h n o l o g i e s b a s e d o n i n t e ro p e r a b i l i t y ,
Global connectivity is essential for linking digitization, and spectrum supremacy will
strategic, operational, and tactical aspects of IO contribute directly to improved effectiveness of
and the ability to project forces worldwide. the force. Chapter 5 discusses the Army INFOSYS
INFOSYS support operations globally with architecture in detail.
INFORMATION ACTIVITIES
IO involves acquiring, using, protecting, organizational capabilities, link the MIE to the
exploiting, denying, and managing information GIE, and enhance situational awareness for
and INFOSYS. When effectively executed, these soldiers and leaders. These activities apply to
critical activities supplement the human skills of both information and INFOSYS (hardware,
battle command, speed decision making, people, organizations, and processes). Although
minimize or eliminate uncertainty, focus combat listed sequentially, these activities are concurrent
p o w e r, h e l p p r o t e c t t h e f o r c e , h a r n e s s and seamless in their application (see Figure 2-3).
2-8
FM 100-6
Global Information
Environment
ACQUIRE Information
Systems
Relevant
Information Operations
and
Intelligence
EXPLOIT
USE
MANAGE PROTECT
Figure 2-3. Information Operations Activities
Acquire
Commanders must consider the nature of the strategic, or national levels. Collection of
information required before allocating resources information about adversaries and the
to acquire it. Initial questions include— environment is managed through the RII
• What information is needed? collection cycle.
• What is the nature of that information? Commanders determine the critical
• How can that information be acquired? information for each operation and publish those
requirements through their CCIR. The
Necessary information includes mission, commander alone decides what information is
enemy, troops, terrain and weather, and time critical based on the mission, his experience, and
available (METT-T) and the basic who, what, the higher echelon commander’s intent. The staff
when, where, why questions. The nature of that
may recommend CCIR to the commander as—
information includes its accuracy, timeliness, and
i t s o v e r a l l re l e v a n c e t o t h e s i t u a t i o n i n • P r i o r i t y i n t e l l i g e n c e re q u i re m e n t s t o
consonance with the CCIR. Considering the determine what the commander wants or
available information sources and the nature of needs to know about the enemy, his
that information, commanders develop technical purpose, and/or terrain (how I see the
and tactical plans to acquire critical information. enemy).
Information can be acquired through
personnel, technical means, intelligence • Friendly forces information requirements
collection systems, tactical reporting, and (FFIR) to allow the commander to
intelligence or information disseminated from determine the combat capabilities of his or
other DOD or non-DOD agencies at operational, adjacent friendly units (how I see myself).
2-9
FM 100-6
The CCIR is normally noted in paragraph 3d Information is perishable and has a temporal
of the operations order/operations plan quality that is often controlled by a set of
(OPORD/OPLAN). Information about friendly dynamic conditions or decisions. Events can
activities and status is coordinated through unit make an item of information irrelevant or so
SOPs and OPLANs. Information is also acquired u n re p re s e n t a t i v e a s t o p o r t r a y a h i g h l y
using a more general information collection cycle inaccurate picture of reality. Information beyond
focusing on gathering relevant information from a certain age will detract from the commander’s
other sources and influences in the MIE. The situational awareness. Standard operating
information needs of the commander are not procedures (SOPs), CCIRs, OPLANs, and
answered by a single source, but by— collection plans must all be sensitive to
• A combination of his own electronic perishability of information. Moreover, from a
systems. technical perspective, INFOSYS managers must
respond by managing the systems and
• Operational activities such as information to enable assured, timely
reconnaissance and security. communication and decision making.
Use
The commander is able to see his battlespace war (OOTW), may come from sources outside the
through the use of space, air, and ground systems unit or military channels. A unit must make use
to acquire relevant information and provide a of both organic and nonorganic INFOSYS.
current situation. The commander expands his Nonorganic systems are either DOD
thinking to include all INFOSYS and
governmental or non-DOD (GIE). Use of other
organizations accessible in the GIE. Once the data
i s a c q u i re d , a n a l y z e d , a n d c o l l a t e d , t h e US Government systems, (DOD and non-DOD) is
information is used to update and validate a coordinated with higher commands. Using
common situational awareness. This common systems outside the government is more
situational awareness provides the basis to refine, complex. Units can use some services openly and
continue, or adjust decisions, plans, and passively, such as listening to, or subscribing to,
operations. broadcast media. Units can also make overt use of
• Information is focused and used by issuing services such as communications relays or
guidance, prioritizing assets, and weather forecasting. However, commanders
establishing requirements. must be aware of the legal and policy limits on
• Staffs then refine the guidance into their use of any non-DOD INFOSYS.
OPLANS or OPORDS. They seek to
How the information nets within an
integrate information at all echelons and
organization are linked together can provide
plan the use of all available information,
regardless of the source. multiple conduits for information. Horizontal
internetting of INFOSYS at the lowest possible
The most timely, accurate, or relevant levels provides a deeper, multidimensional
information, particularly in operations other than picture than traditional, stovepipe reporting.
2-10
FM 100-6
Protect
While the proliferation of information and C 4 I information infrastructure vulnerable to
information technology can be a great advantage, attack or exploitation at any time. As part of
it is also a potentially significant risk that must be planning for both battlespace and garrison
accounted for in every operation. Protection of operations, the signal officer analyzes the unit’s
soldiers and equipment, although not new, has information structure to prioritize critical paths,
increased in importance in today’s information- systems, and data for protection. Everything
rich environment. Friendly information and cannot be protected. Therefore, the operations
INFOSYS must be protected throughout the officer must perform a risk management analysis
b a t t l e s p a c e . O p e r a t i o n a l l y, p r o t e c t i n g to identify essential information and INFOSYS
information requires viewing friendly that must be kept f ree from disruption or
vulnerabilities from the enemy’s C 2 -attack corruption.
perspective. Commanders must examine the Elements of the infrastructure to be protected
vulnerability of their soldiers and systems to are data, computers, communications systems,
exploitation or attack by an enemy capable of a n d s u p p o r t f a c i l i t i e s . Planners must
attacking friendly C 2 on a wide front by integrate elements of the GIE into plans to
employing EW, destruction, deception, and ensure that commanders consider their
propaganda. impact, or potential impact in any operation.
In order to stop or delay a weapon or system Assessment and vulnerability analysis systems
from functioning, an adversary might attack the must provide the timely and accurate data
information or INFOSYS that enable that needed to identify and target threats and
system. For example, an adversary might potential threats to friendly INFOSYS.
introduce a malicious software code through a Protecting computer and communications
communications network directly into the systems from enemy intrusion, disruption, and
Advanced Field Artillery Tactical Data System destruction is an initial basic step in an overall
(AFATDS) to disrupt the sharing and distribution protection approach. However, commanders
of combat information with other Army and joint must also be sensitive to enemy attempts at
C 2 systems. Actions taken to protect the
capability to operate unconstrained in the MIE
deception and propaganda. A resourceful enemy
may employ propaganda to predispose a
battlespace are considered part of C 2 W (C 2 - commander and his staff toward a specific course
protect). of action and then exploit that mindset with a
Information and INFOSYS must be deception operation. IO may often take place
protected at the electronic, physical, and human under degraded conditions. Besides adversary or
levels, as described in relationship to the accidental actions, natural phenomena may
potential threat—all without impeding the degrade or disrupt equipment or services.
overall operation. Security programs that Because of the complexity and fragility of
identify threats to C 4 I systems also take on INFOSYS, a unit’s plans should include
increased importance while in garrison because procedures for operating without all the
the porous and open nature of the GIE makes the information infrastructure.
Exploit
Joint Pub 1-02 describes exploitation as without his knowledge. A flexible approach to
“taking full advantage of any information that exploitation is preferred. The level of
has come to hand for. . . military operational exploitation, whether simply monitoring or
purposes.” All information environments and corrupting data bases, depends on the situation
systems surrounding an operation, friendly and and the desired objective. It may not always
adversarial, military and nonmilitary, offer mean directly attacking or degrading an
chances for exploitation. Generally, exploiting an adversary’s ability to C2. Exploitation involves—
adversary’s INFOSYS is making use of that • Reading the adversary’s signals.
adversary’s INFOSYS data or communications • Intercepting communications.
2-11
FM 100-6
Deny
The offensive aspect of IO, C2-attack, makes Adversary space-based systems and UAVs
possible the goal of attacking an adversary pose significant problems. Because of difficulties
simultaneously at all levels with overwhelming in locating or engaging these platforms,
force. C 2 -attack is intended to prevent an commanders may be forced to use indirect
adversary from exercising effective C 2 of his means, such as camouflage or deception, to
forces by denying the adversary information or counter them. At echelons below corps level, the
influencing, degrading, or destroying the commander may lack the assets to perform all
adversary’s information and INFOSYS. C2-attack missions, particularly those involving
battlefield deception and PSYOP. However, the
IO gives the commander the means to attack value in denying an adversary effective
an adversary throughout the depth of the command remains important and commanders
battlespace, far beyond the range of direct or at all levels need to be prepared to contribute to
indirect fire systems. The goal is to degrade the achieving that objective. Depending on METT-T,
adversary’s confidence in either his data or his the commander might target an element of the
ability to command and control operations. By adversary’s information flow to blind him or
attacking or confusing his sense of the battlefield, prevent effective response. For example, by
friendly forces gain information dominance and a targeting RISTA, fire direction, or command nets,
subsequent relative advantage in applying a commander can limit the effectiveness of an
combat power or controlling a situation in adversary’s indirect fire systems.
OOTW.
Commanders must continually assess exploit
Information denial operations generally and deny capabilities to strike an optimum
require time and occur over relatively large areas. balance that will achieve the greatest payoff in
To blind or deafen an adversary requires that dominating enemy IO. Multiple attack options
most of his major surveillance and in IO will result from analysis and assessment
reconnaissance systems be influenced or of potential targets. Generally, the earlier an
engaged. Therefore, attacks of adversary adversary’s decision-making cycle is disrupted,
INFOSYS are normally planned as a series of t h e g re a t e r t h e e ff e c t i t c a n h a v e o n h i s
engagements, contributing to a larger operation capabilities. It is often more effective to disrupt
or higher objective. These engagements are the adversary’s early sensing or decision-making
normally conducted quickly and against a processes rather than trying to disrupt execution
specific target, such as jamming a receiver or of a decision already made. Operational
u s i n g t h e A r m y Ta c t i c a l M i s s i l e S y s t e m commanders must weigh the relative advantages
(ATACMS) to destroy an adversary’s C2 node. to be gained by attacking adversary C2 nodes
2-12
FM 100-6
against the potential loss of intelligence from the need to protect intelligence methods and
adversary signatures, radiation, or emissions and sources.
Manage
In order to conduct full-dimensional execution. Information should also flow
operations, information and INFOSYS require vertically between echelons to enable concurrent
careful coordination and synchronization. With planning. This serves to eliminate duplicate
guidance issued, the staff coordinates and efforts and unnecessary redundancy, which
integrates information requirements and allows systems to deal with time-sensitive,
INFOSYS to synchronize the critical information relevant information. It also reduces the
flow with the operational concept. Management signature and noise levels of units in the
information and INFOSYS must focus on battlespace. The keys to this effective
operational requirements that will derive communications and information flow are
information from reconnaissance, connectivity, throughput, and resilience. Units
counterreconnaissance, communications, and can manage connectivity among their organic
security operations. Managing information assets. The difficulty comes in maintaining
includes managing the electromagnetic spectrum horizontal and vertical connectivity outside the
(EMS); deciding what sources and systems to use; unit, particularly when dealing with forces using
ensuring a reliable flow of information between older or different communications and INFOSYS.
nodes and levels (horizontal and vertical Connectivity is accomplished through the
integration); and resolving differences among maintenance of electronic and human links
information from multiple sources. vertically and laterally outside the unit. When
O p e r a t i o n a l re q u i re m e n t s g u i d e t h e dealing with forces or units less technically
management of the EMS. The principal functions capable, teams must be prepared to deploy with
using the EMS that require planning and control specialists or liaison personnel equipped with
are— updated equipment.
• Communications. Resilience is the ability of INFOSYS, from a
• Intelligence collection. technical and management perspective, to
p ro v i d e t h e n e c e s s a r y c o n n e c t i v i t y a n d
• Jamming. continuity when INFOSYS are degraded.
• Resolving electromagnetic interference. Additionally, Army leaders and planners must
understand how military information and
This planning must be an integral part of systems interconnect and interact with the GIE.
operations planning—in many cases preceding a Overreliance on commercial systems,
decision on a scheme of maneuver or fire support particularly satellites and host nation
and definitely preceding mission execution. telecommunications networks, may impose
Effective management of information and restrictions or limitations. Close management
assets allows information to flow horizontally and consistent coordination will help assure the
and vertically across BOSs to enable effective availability, reliability, and timeliness of C 4 I
planning, preparation, decision making, and assets.
2-13
Chapter 3
Operations
Commanders seek to apply overwhelming combat power to achieve victory at
minimal cost. They integrate and coordinate a variety of functions with the
elements of combat power to sustain it at the operational and tactical levels.
FM 100-5
1 2
. Joint Pub 3-13.1 states that beyond the five fundamental elements of C W “other capabilities in practice may be
2 2
employed as part of C W to attack and protect.” The Army recognizes that C W is the joint reference point for IO when
working with the joint staff and other services in the realm of IW. However, the Army interprets this new paradigm more
broadly and recognizes the more comprehensive integration of other information activities as fundamental to all IO;
2
hence the term operations, which includes specifically C W, CA, and PA.
3-0
FM 100-6
HISTORICAL PERSPECTIVE
Major emphasis was placed on • Assist in the restoration of required to achieve coalition
C2W, CA, and PA activities the legitimate government objectives.
during Operations Desert Shield of Kuwait. Fully aware that the enemy,
and Desert Storm. Commanders During Desert Storm’s air as well as the public at home,
integrated OPSEC, military operations, the enemy was was focused on PA coverage
deception, PSYOP, and EW selectively blinded by EW and of the confrontation, the
efforts during Desert Shield to physical destruction to mask coalition used that coverage
pave the way for successful friendly force movements and to confuse the enemy by
combat operations. During operations. Deception
planning for Desert Storm, the encouraging speculation on
operations continued to the place, time, and size of
senior leadership recognized that enforce erroneous enemy
Iraq's C2 was a critical the impending attack. At the
perceptions of the CINC's same time, the coalition
vulnerability whose destruction intentions. EW and precision
could enable victory with learned that immediacy of
air strikes against C2 targets
minimal friendly loss. This is media attention could have
were used to disorganize and
evident from the Secretary of unforeseen consequences for
isolate Iraqi forces. When the
Defense's guidance outlining the its own strategic, operational,
ground attack commenced,
military objectives for Desert and tactical planning. After
Iraqi forces were close to
Storm: disintegration, with numerous the cessation of hostilities,
• Neutralize the Iraqi national formations unable to CA elements enhanced the
command authority's ability coordinate their efforts. The restoration of Kuwaiti
to direct military operations. need for synchronization was governmental and social
an early lesson learned and order and responded promptly
• Eject Iraqi armed forces from
demonstrated immediate and effectively to one of the
Kuwait.
payoffs. Successfully denying central unanticipated
• Destroy the Iraqi Republican Saddam Hussein the ability to consequences of the war as
Guard. command and control his Iraqi forces created an
• Destroy Iraqi ballistic missile forces substantially reduced enormous refugee crisis in the
and nuclear, biological, and casualties on all sides and northern Kurdish provinces of
chemical warfare capabilities. significantly reduced the time Iraq and in southern Turkey.
3-1
FM 100-6
2
Role of C W
2
C W applies to all phases of operations, The integrated use of operations security
including those before, during, and after actual (OPSEC), military deception,
2
hostilities. Even in OOTW, C W offers the psychological operations (PSYOP),
military commander lethal and nonlethal means electronic warfare (EW), and physical
to achieve the assigned mission while deterring destruction, mutually supported by
war and/or promoting peace. The offensive intelligence, to deny information to,
2
aspect of C W can slow the adversary’s influence, degrade, or destroy adversary
operational tempo, disrupt his plans and ability C2 capabilities, while protecting friendly C2
to focus combat power, and influence his capabilities against such actions.
estimate of the situation. The defensive aspects Command and control warfare applies
2 2
of C W minimize friendly C system across the operational continuum and all
2
vulnerabilities and mutual interference. C W is levels of conflict.
defined as— CJCSI 3210.03, 31 March 1996
2
C W Elements
2
The foundation for C W is robust and operations and other activities; identifying
redundant command, control, communications, those actions that can be observed by
4
and computer (C ) INFOSYS, coupled with adversary intelligence systems;
seamless, national-to-tactical, relevant determining indicators adversary
information and intelligence support. The intelligence systems might obtain that
2
building blocks, or elements, of C W include— could be interpreted or pieced together to
• OPSEC. derive critical information in time to be
useful to adversaries; and selecting and
• Military deception. executing measures that eliminate or
• PSYOP. reduce to an acceptable level the
• EW. vulnerabilities of friendly actions to
adversary exploitation.
• Physical destruction.
Joint Pub 3-54
These building blocks contribute to
protection of the force and mission OPSEC is the key to denial. It gives the
accomplishment in various ways, depending on commander the capability to identify those
the situation. This situation dependence leads to actions that can be observed by adversary
the building blocks that are shown in a intelligence systems. It can provide an
constantly changing pattern in Figure 3-1. The awareness of the potentially friendly indicators
integrated employment of these five elements that adversary intelligence systems might obtain.
leads to synergy on the battlefield and results in Such an awareness could be interpreted or
2
the most effective execution of C -attack and/or pieced together to derive critical information
2
C -protect tasks. The commander drives this regarding friendly force dispositions, intent,
2
C W process to achieve agility by focusing and/or courses of action that must be protected.
attacks on the adversary’s ability to command The goal of OPSEC is to identify, select, and
and control his forces while simultaneously execute measures that eliminate, or reduce to an
2
protecting friendly C . acceptable level, indications and other sources
of information that may be exploited by an
OPERATIONS SECURITY adversary.
Operations security is defined as— OPSEC planning is severely challenged by the
A process of identifying critical new family of global commercial capabilities, to
information and subsequently analyzing include imaging, positioning, and cellular systems
friendly actions attendant to military that offer potential adversaries access to
3-2
FM 100-6
Command
and Control
Equipment Personnel
C2- MILITARY
ATTACK OPERATIONS
C2W
C2-
OPSEC Deception EW Destruction PSYOP PROTECT
Deception EW Destruction PSYOP OPSEC
EW Destruction PSYOP OPSEC Deception
Destruction PSYOP OPSEC Deception EW
PSYOP OPSEC Deception EW Destruction
3-3
FM 100-6
PSYCHOLOGICAL
OPERATIONS
Psychological operations are defined as—
Historical Perspective
O p e r a t i o n s t o c o n ve y s e l e c t e d
Tactical deception had significant positive information and indicators to foreign
i m p a c t s o n t h e s u c c e s s o f O p e ra t i o n audiences to influence their emotions,
Overlord, and, thus the retaking of the
motives, objective reasoning, and,
European continent in World War II. Deception
worked hand in hand with OPSEC to keep the
ultimately, the behavior of foreign
organization and location of the real Overlord governments, organizations, groups, and
cantonments, training sites, dumps, individuals. The purpose of PSYOP is to
movements, and embarkations carefully induce or reinforce foreign attitudes and
hidden. Unbelievable effor t was put into behavior favorable to the originator’s
creating mock airfields and ports, phony objectives.
ships, boats, planes, tanks, vehicles, and
Joint Pub 3-53
troop movements, both real and staged. A
new era of deception was introduced—the
electronic one. German coastal defense
radars were destroyed in a calculated pattern. PSYOP are based on projection of truth and
Deception planners purposely left some intact credible message. PSYOP are an essential tool in
in the Calais region. both C2-protect and C2-attack operations. The
Army has shown considerable strength in
The night the invasion was launched, the
Allies began massively jamming German applying both PSYOP and deception to military
radars with chaff. But they purposely did not operations. PSYOP can proliferate discrete
completely cover their targets. German radar messages to adversary C4I collectors, enhance
operators could “see” between Allied jamming joint combat power demonstrations with
curtains. And, what they saw was a ghost fleet surrender appeals, and magnify the image of US
of small ships towing barges and blimps technological superiority. PSYOP elements
headed for Calais at eight knots—or the speed must work closely with other C2W elements and
of an amphibious fleet. Powerful electronic PA strategists to maximize the advantage of IO.
emitters received the pulse of the German As an example, the Army has shown considerable
radar and sent it strongly back to the German
strength in applying both PSYOP and deception
receivers. For each repetition of this deception
to military operations.
it looked to the German operators like a
PSYOP’s main objective in C2-protect is to
10,000-ton ship was out there. The small ships
also had the recorded sounds of the
amphibious assault at Salerno to play over minimize the effects of an adversary’s hostile
speakers from 10 miles out. German troops propaganda and disinformation campaign
ashore could hear the Allies “getting into their against US forces. Discrediting adversary
landing craft” for the run into the beach. This propaganda or misinformation against the
information threw German intelligence into operations of US/coalition forces is critical to
chaos for several precious hours and played a maintaining favorable public opinion.
major role in delaying German counteractions
to the actual invasion taking place at
Normandy.
3-4
FM 100-6
Historical Perspective
On April 14, 1943, US In less than 48 hours, Admiral Henderson Field spotted the
intelligence experts intercepted Chester W. Nimitz’s forces two Japanese Betty bombers of
and decoded a message planned and coordinated an Ya m a m o t o ’s p a r t y a n d
revealing that Admiral Isoroku operation to shoot down attacked.
Yamamoto, Commander-in-Chief Yamamoto’s plane and obtained Both aircraft were quickly sent
of Japan’s Navy, would be flying approval from Secretary of the plummeting to the ground,
to Bougainville in four days. Navy Frank Knox and President completing a classic information
When analysis determined that Roosevelt. operation that took less than
Bougainville lay just within the Yamamoto was known to be four days from start to finish and
extended range of US P-38 invar iably punctual, and rendered irreparable damage to
fighters at Henderson Field on American planners were Japanese command and
Guadalcanal, Allied planners confident that his plane would control. The Japanese would
recognized the opportunity to appear over Bougainville on feel the impact of this single
strike at the heart of Japanese schedule—9:39 am, April 18. mission throughout the
command and control and At that moment, 16 carefully remainder of the war.
strategic planning in the Pacific. positioned P-38s from
3-5
FM 100-6
C2W Disciplines
The two disciplines that comprise C2W are • Second, the adversary commander is
C -attack and C2-protect.
2
influenced by manipulating perception and
causing disorientation of his decision cycle.
C2-ATTACK • Third, adversary IO are degraded by
selectively disrupting C4I systems.
C2-attack is defined as—
• Fourth, adversary information capabilities
The synchronized execution of actions
can be neutralized or destroyed by physical
taken to accomplish established
objectives that prevent effective C 2 of
destruction of nodes and links. Destruction
operations are most effective when timed to
adversarial forces by denying information
occur just before the adversary needs a
certain C2 function or when focused on a
to, by influencing, by degrading, or by
destroying the adversary C2 system.
target that is resource-intensive and hard to
reconstitute.
C2-Attack Principles
The three principles of C2-attack are to—
• Plan based on the unit’s mission,
commander ’s intent, and concept of
operations. Historical Perspective
3-6
FM 100-6
OPSEC MILITARY PSYOP PHYSICAL EW
DECEPTION DESTRUCTION
systems from
adversary to deception
can support by–
upsetting
protected units observables audience from susceptible assets
and activities conflicting
• Isolating decision using EMS with EA
• Covering short- maker from information
term “gaps” in information at critical
OPSEC times to enhance
EW
effect of deception
executions
• OPSEC • OPSEC
requirements may requirements may
Conflicts
OPSEC
necessary to infrastructure
convey PSYOP necessary to
messages communications
intrusion
communications
frequencies
3-8
FM 100-6
C2-PROTECT
C2-protect is defined as—
The maintenance of effective C2 of ones
Historical Perspective
ow n fo r c e s by t u r n i n g t o f r i e n d l y The history of the Information Age is being
advantage or negating adversary efforts made now. In 1988 we saw the first well-
to deny information to, to influence, to publicized case of a computer virus. This
degrade, or to destroy the friendly C 2 insidious, self-replicating virus known as the
Internet Worm penetrated the computer
system.
system at the University of California at
C 2 -protect can be offensive or defensive.
Berkeley, corrupting thousands of computers
Offensive C2-protect uses the five elements of
on the internet. A computer emergency
3-9
FM 100-6
(formerly the Command Information Program), personnel, can also develop information
publicized by the PAO, can be extremely products that commanders can use to help
beneficial in countering adversary propaganda in protect soldiers against the effects of adversary
the US and among the deployed forces. PA disinformation or misinformation.
specialists, working with PSYOP and intelligence
Functional Specialties
Many CA activities require specific civilian PUBLIC FACILITIES
skills. CA activities most relevant to the GIE and SECTION
supporting IO are categorized into four major Public communications allocates civilian
sections: communications resources for civilian and
military use and directs civil communications
GOVERNMENT agencies as required, normally only in a civil
SECTION administration mission.
Public administration provides liaison to the
civilian government. SPECIAL FUNCTIONS
SECTION
ECONOMIC Civil information advises, assists, supervises,
SECTION controls, or operates civil information agencies
E c o n o m i c s a n d c o m m e rc e m o n i t o r s and provides TV, radio, or newspaper services.
government economic and commercial agencies,
normally only in a civil administration mission.
Collection Activities
The nature of CA activities and the need for potential area of operations. In their daily
CA personnel to develop and maintain a close operations, CA personnel deal with people,
relationship with the civilian populace puts them equipment, and documents that are prime
in a favorable position to collect information. CA sources of information. Information collected is
information collection activities encompass the often important to other units’ staff sections or
complete spectrum of cultural, social, political, agencies and supports the CCIR.
and economic issues within the present or
3-10
FM 100-6
Information Sources
CA units are included in the information other assistance (normally referred to
collection plan of the supported unit. CA units appropriate intelligence personnel).
report information that meets the criteria of the • Government documents, libraries, or
supported unit’s collection plan. Prime sources of archives.
information available to CA units include, but are
not limited to— • Files of newspapers or periodicals.
• Civilians who were housed with, catered to, • Industrial and commercial records.
or associated with enemy personnel. • Technical equipment, blueprints, plans, or
• Dislocated civilians and other personnel information of interest related to
participating in movement control, relief, or transportation, signal, engineer, and
medical fields.
Relationships
The information collected can supplement planners prepare their estimates from basic
the intelligence effort. US forces need timely and intelligence documents that are not primarily
accurate information and intelligence to plan written for CA use, such as an area study.
missions, secure the element of surprise, identify Intelligence is the product resulting from the
and develop targets, and protect US interests collection, evaluation, and processing of
across the operational continuum. CA activities information.
are closely tied to the intelligence functions and
Overall, CA elements collect information that
operations associated with the overall tactical
the G2/J2 turns into intelligence. CA forces, if
mission.
used correctly, can complement the intelligence
CA personnel are not, and must not have the collection process, especially HUMINT. In some
appearance of being, intelligence agents. The cases, CA elements can also enhance the
mission of the unit drives the intelligence cycle. capabilities of technical intelligence (TECHINT)
As operational planning begins, so does or intelligence concerning foreign technological
i n t e l l i g e n c e p l a n n i n g . R e q u i re m e n t s f o r development that may have eventual application
operational planning are normally for finished for military use.
intelligence studies, estimates, or briefings. CA
3-11
FM 100-6
STAFF
CA operations must be integrated into the
battle plan, to include providing for timely and
Figure 3-4. Additional GIE Players
3-12
FM 100-6
Historical Perspective
In the early spring of 1991, in 353d Civil Affairs Command reservists in an intensive three-
the aftermath of its humiliating (USAR), Bronx, New York. week effort, first in Stuttgart
defeat at the hands of US-led In Turkey, the CA soldiers joined and later at Incirlik Air Base,
coalition forces, the Iraqi Army with 10th Special Forces Group Tu r k e y, t o d e s i g n a n d
l a u n c h e d a v i o l e n t a t t a ck t o a i d ove r w h e l m e d r e l i e f implement a unique relief
against the Kurdish minority in workers already on the scene. supply data base. Their
northern Iraq. More than half a The latter included personnel p r o gra m , l a t e r n a m e d t h e
million refugees fled across the from the United Nations High Disaster Assistance Logistics
border into southeastern Turkey. Commissioner for Refugees, Information System (DALIS),
Huddling on ex p o s e d the US Department of State combined key data from
mountainsides, they promptly Office of Foreign Disaster agencies on the type of aid
began to become ill and die R e l i e f, t h e Tu r k i s h R e d arriving, storage locations, and
from starvation, exposure to the Crescent, and more than 40 intended destinations. DALIS
bitter cold, and var ious different civilian humanitarian allowed planners to coordinate
diseases. The wor ld press relief organizations, all of which effor ts and deliver the right
reported that over a thousand were attempting to care for the supplies to the right locations at
Kurds, especially children and Kurds in 40 or more scattered the right time. These innovative
the elderly, were dying each l o c a t i o n s . S h a l i k a s h v i l i ’s soldiers used the power of the
day. g r e a t e s t p r o bl e m b e c a m e microprocessor to unscramble
On April 5, President Bush coordinating all the what threatened to be a
directed US military forces to organizations’ efforts with the l o g i s t i c a l , d i p l o m a t i c, a n d
“stop the dying.” Lieutenant US Air Force—the pr imar y humanitarian nightmare. By
General John M. Shalikashvili, m e a n s fo r t r a n s p o r t i n g combining data from multiple
then deputy commander of US emergency supplies into the sources, they provided vital
Army Europe, was placed in region. i n fo r m a t i o n t h a t r e d u c e d
command of the coalition task redundancy and avoided
At US European Command maldistribution of resources at
fo r c e P r o v i d e C o m fo r t . Headquar ters in Stuttgar t,
Elements of several CA units, a c r i t i c a l m o m e n t , s av i n g
Germany, an Army Reserve CA thousands of lives. Using IO,
a c t i ve a n d r e s e r ve , w e r e captain with the 353d saw a
redeployed from the Persian CA soldiers became masters of
possible solution. The captain, the situation and made a
Gulf or deployed from For t a software engineer in civilian
Bragg to Tur key under the decisive contribution to the
life, joined with three other CA success of Provide Comfort.
PA fulfills the commander ’s obligation to Army operations are of interest to the public and
keep the American people and the soldiers subject to being covered by the media. PA is
informed. PA operations help establish the therefore a function that supports both combat
conditions that lead to confidence in America’s and noncombat operations and contributes to
Army and its readiness to conduct operations. success in war and other military operations.
3-13
FM 100-6
Missions
The inherent challenge is for commanders to supportive to ensure that credibility is not
understand the dynamics of media coverage. The undermined and mission success is achieved
media can potentially have a quick and pervasive The PAO’s support to the commander is
impact on their plans and operations. Its m u l t i d i m e n s i o n a l . T h e PA O a d v i s e s t h e
coverage of the development of plans and the commander on media relations and the PA
conduct of operations may impact and influence implications of current and future operations and
strategic decisions in a more profound and events. He serves as the official command
immediate way than in the past. PA operations spokesperson and implements the Commander’s
enable commanders to effectively operate with Internal Information Program. PA focuses on
the media. Commanders must also have a better achieving an accurate, balanced, and credible
appreciation for the immediacy of media p re s e n t a t i o n o f t i m e l y i n f o r m a t i o n t h a t
coverage such as personal interviews, live versus communicates the commanders perspective to
taped reports, film versus written dispatches, enhance confi dence in the force and the
methods of transmission, and so on. operation. It provides the critical battlefield
The commander’s information needs are not function of media facilitation by serving as the
answered by a single source, but by a interface between the media and the force.
combination of many systems and functions, With the broad scope and initiative given to
including the news media. The advances in soldiers and units today at every level, one of
information technology provide potential the primary tools the commander uses is the
adversaries with the capability to exploit (deny, internal information program. Well-informed
distort, degrade, or destroy) information. The soldiers are likely to have higher morale and
PAO must have the capability to monitor the p e r f o r m b e t t e r. S o l d i e r s n e e d a n d w a n t
national and international media and identify information from both external and internal
and assess information relevant to the operation. sources and are interested in the public
The missions of PA, PSYOP, and CA involve perception of an operation. Therefore, PA
communicating information to critical audiences operations use various communication methods
to influence their understanding and perception and channels to make this information available
of the operation. Information communication to soldiers, other Army audiences, and external
m u s t b e f u l l y c o o rd i n a t e d t o e l i m i n a t e audiences. The broad range of missions the
unnecessary duplication of effort and ensure Army executes today are done in an
unity of purpose. Planning for these operations environment of global visibility. Media coverage
must be synchronized, and the messages they can be pivotal to the success of the operation and
communicate must be truthful and mutually achieving national strategic goals.
Impact of Change
Every aspect of every operation may be an positions and opinions, often in pursuit of
issue of interest to the media and consequently to agendas well beyond the scope and purpose of
the public. Existing and emerging technology the operation being reported. They become active
puts military operations onto the global stage, participants in the international public debate of
often in real time. Soldier actions can induce events and issues.
public reactions, which in turn causes NCA
Adversaries can also attack the public opinion
reactions that impact operations without ever
center of gravity and affect operations without
engaging US forces. For example, real-time or
ever engaging US forces. All Army operations
near real-time reports of the actions of a soldier
c a n b e i n fl u e n c e d t h r o u g h p l a n n e d o r
manning a roadblock, the results of a minor
inadvertent messages communicated via the
skirmish, or the effects of a major combat action
GIE. PA and the associated GIE addresses
become the subject of discussion. Media
simultaneous effects that are integral to all levels
personalities, politicians, pundits, critics,
of war (Figure 3-5). In the Information Age, the
academics, and the general public rapidly form
3-14
FM 100-6
old separation of public information and internal operations. Such activities contribute to team
information activities are compressed. building, morale, and unit cohesion. They
Providing accurate, timely news, enhance soldier confidence and understanding.
information, and entertainmen t reduces They contribute to ethical behavior, respect for
distractions, rumors, fear, and confusion that the law of war, private property, the rights of
could cause stress and undermine efficient civilians and noncombatants, and human dignity.
3-15
FM 100-6
Historical Perspective
At 1800 hours local (Riyadh) on movement, passing 1st Cavalry execute the double envelopment
27 February 1991, the Gulf War Division around to the north of with a new departure time of
CINCCENT and ARCENT 1st Armored Division, to crush 0600, being mindful of the 0800
commanders agreed that in all what remained of the Iraqi cease-fire. Difficulties inherent in
likelihood no more than 24 Republican Guard. The corps reordering battle and executing
hours of battle remained. At intended to execute the double the mission for maximum gain
2100 hours during a briefing for envelopment beginning at 0500 over the next four hours led to
the press corps telecast live on the 28th. In accordance with confused communications,
around the world, the an ARCENT war ning order misunderstood commander’s
C I N C C E N T r e fl e c t e d t h a t concer ning the cease-fire, intent, and postwar questions
opinion and indicated that h o w eve r, V I I C o r p s u n i t s over operational and tactical
c o a l i t i o n fo r c e s w o u l d b e assumed a local security execution.
pleased to stop fighting when so posture, focusing on force In the space of 11 hours, a
ordered. The time of the briefing protection. An ARCENT frag press conference that included
in CONUS (1300 hours EST) order, published at 0200 and unguarded opinions about the
e n s u r e d a w i d e a u d i e n c e, titled “Potential Temporar y past and future course of a war
including the President of the Cease-Fire,” reiterated the 0500 p r o fo u n d l y a f fe c t e d t h e
United States, for at least a implementation time. strategic, operational, and
portion. Reacting to the briefing, At 0300, CENTCOM notified tactical levels of that war.
the President and the Chairman ARCENT that the President had Commanders on the front lines
of the Joint Chiefs of Staff set 1200 am eastern standard were neither infor med nor
(CJCS) conferred, and the time on 28 February (0800 hours consulted on the intent of the
CJCS called Riyadh from the local) as the beginning of the public briefing, either before or
Oval Office, indicating the cease-fire time and urged the after it had taken place. The
President’s wish to stop the Army component to inflict the ubiquitousness and immediacy
o f fe n s i v e a s s o o n a s greatest possible damage on the of press reportage effectively
practicable. The CINC called his e n e my b e fo r e t h a t h o u r. erased boundaries between
component commanders, Accordingly, ARCENT published national and theater command
s t a t i n g t h a t t h e N C A wa s a new FRAG order at 0330, authorities and dramatically
considering a cease-fire at 0500 calling for the resumption of compressed the time between
(local) on 28 February. offensive operations. At 0406, the strategic decision and
M e a n w h i l e, V I I C o r p s h a d VII Corps commander ordered operational consequences.
prepared a double envelopment his division commanders to
3-16
FM 100-6
Figure 3-6. Mutually Supported Roles of C2W, Civil Affairs, and Public Affairs
3-17
Chapter 4
This chapter sets the doctrinal foundation for the role of relevant
information and intelligence in IO. The chapter discusses the need for
relevant information, the criteria to carefully assess such information,
and the commander’s decision and execution cycle. It also includes
information on the role of intelligence in framing relevant
information about the adversary.
RELEVANT INFORMATION
Relevant information is defined as— • Logisticians focused on friendly force
Information drawn from the military sustainment conditions and requirements.
information environment that significantly • PA and CA focused on the interface
impacts, contributes to, or is related to the between military and nonmilitary sectors.
execution of the operational mission at
hand.
4-0
FM 100-6
Only a limited amount of such information maintained to meet the needs of particular
was shared and that at relatively high levels elements on the battlefield.
within the military organizational hierarchy. Because of changes in the information and
Information flowed up and down stovepipes with operational environments, we can now achieve
routines that tended to slow the sharing of new levels of efficiency and effectiveness in use of
information across organizational boundaries. information by integrating and synchronizing the
collection, processing, and dissemination efforts.
Relatively little effort was focused upon the
Efforts must focus on leveraging the potential
systematic integration or synchronization of operational contribution of information by
information. Normally, numerous specialized, efficiently collecting and sharing information
noninteractive data bases were developed and across all BOS elements.
Assessment Criteria
Because sources of information are imperfect • Completeness. All necessary information
and susceptible to distortion and deception, required by the decision maker.
commanders and planners must carefully assess • Precision. Information that has the required
the quality of the information prior to its use. level of detail.
They can do so using the following six criteria:
As a first priority, information should be
• Accuracy. Information that conveys the true accurate and relevant. As a second priority, it
situation. should be both timely and in usable form. Finally,
• Relevance. Information that applies to the information should be as complete and precise as
mission, task, or situation at hand. possible. The following rule of thumb supports
these relationships: incomplete or imprecise
• Timeliness. Information that is available in
information is better than none at all; untimely or
time to make decisions.
unusable information is the same as none at all;
• Usability. Information that is in common, inaccurate or irrelevant information is worse than
easily understood formats and displays. none at all.
4-1
FM 100-6
desired future end state, and develops an Commanders collect information, develop
initial concept of how to execute the situational awareness, and plan for future
mission. operations at the same time they conduct
current operations. Meanwhile, senior and
• Step 3. Based on his understanding of the s u b o rd i n a t e c o m m a n d e r s g a t h e r
situation and his intent, the commander information and work through decision and
issues guidance and directs a planning execution cycles at their respective levels.
process to develop and refine a viable Maintaining rapid decision and execution
course of action for mission cycles—and thus a rapid tempo of
accomplishment. Upon deciding on a operations—requires that seniors and
course of action, he disseminates his orders subordinates alike have an accurate,
to put the operation into motion. During common picture of the battlespace. From
this execution phase, the commander this common picture, a unit gains greater
monitors the operation and gauges its situational awareness with which to exercise
results. This brings him full circle to acquire initiative during combat or other situations.
new or additional information from which
he begins the cycle again. Throughout the
entire cycle, the fog and friction of war The commander operates within the GIE,
continually affect the commander’s ability adjusting his MIE to enhance his situational
to acquire information, visualize, plan, a w a r e n e s s a s n e c e s s a r y. M o r e o v e r, t h e
decide, and execute. commander uses his various means in the MIE to
ensure that all elements of his force have a
• Step 4. Since the decision and execution cycle common, complete, and relevant situational
is a continuous process, all parts of the cycle awareness. This requires a sophisticated
are active at each echelon of command. INFOSYS that enhances the commander’s ability
Battlefield
Visualization Planning
Execution Decision
Relevant Information
4-2
FM 100-6
to share, manage, and move information among efficient and effective operations. These
organizations. The commander also uses his operations often involve a variety of GIE players.
information capabilities to support OOTW. The For example, the G3/J3 works closely with PA
emphasis during such missions shifts away from and CA officers, among others, to determine
the combat focus of C2W operations and starts to critical information requirements pertaining to
take in broader considerations contributing to his AO.
INTELLIGENCE
Intelligence is— produce a common, current, and relevant picture
The product resulting from the collection, of the battlespace that reduces uncertainty and
processing, integration, analysis, shortens the commander ’s decision-making
evaluation, and interpretation of available process. Against an adversary, intelligence is vital
information concerning foreign countries for developing and executing effective C 2 W
o r a r e a s . A l s o, i n fo r m a t i o n a n d operations that degrade and distort the enemy’s
knowledge about an adversary obtained
decision-making process while protecting
through obser vation, investigation,
analysis, or understanding. friendly C2. Intelligence support to IW executed
at the strategic and national levels must be
Joint Pub 1-02 leveraged to support C2W and IO conducted at
Intelligence is also the critical subelement of the operational and tactical levels. This effort
relevant information that focuses primarily upon requires a seamless intelligence-collection
foreign environments and the adversary. In process and supporting architecture, providing
support of friendly operations, intelligence helps real-time intelligence products focused on CCIR.
Role of Intelligence
Intelligence provides the commander with an In noncombat operations, HUMINT, open
accurate understanding of the threat situation as sources, and other government agencies provide
it relates to current and future operations. timely information to augment the unit’s more
Intelligence personnel acquire, use, manage, and traditional battle-focused intelligence-collection
exploit information to produce such an effort. The intelligence effort provides current,
understanding. For common situational accurate threat and targeting data to weapon
awareness to be accurate and current, the systems and intelligence sensors. Their
intelligence effort is continuous. Intelligence effectiveness is dependent upon the rapid
collection includes all possible sources, from movement of data between collector, processor,
national-level covert operations through local decision maker, and shooter. Intelligence
open sources such as news media, commercial supports C 2 W, focusing on C 2 -attack and
world contacts, academia, and local nationals. C2-protect.
Intelligence-Enabling Functions
The primary purpose of intelligence is to reduce uncertainty for the commander by
enable well-informed operational decisions screening out information that is not relevant to
based on an accurate understanding of the his decision-making process. Intelligence-
situation. The essence of intelligence is to collect, enabling functions focus on assessing friendly
analyze, screen, and present information vulnerabilities, understanding the adversary,
requested by the commander. Intelligence helps employing IPB, and assessing battle damages.
4-3
FM 100-6
4-4
FM 100-6
Information Dominance
Understanding the Information Battlefield
Leadership Decision
Profiles Processes
Art
Information
Technology Information Infrastructure
Information
Infrastructure
C2W Analytical
Data bases Tools
Technical skills
Analytical skills
C2W COA
Development and Process
Much of this information should be routinely infrastructure of the adversary, and analyzing the
collected and maintained in national-level data adversary’s vulnerabilities.
bases and be readily available at the start of a
mission. Constructing a
Decision-Making Template
The IPB actions the intelligence officer The first step in the IPB process is to construct
accomplishes to support IO include constructing a template of the adversary’s decision-making
a template of the adversary decision-making process. This aspect of information IPB focuses
p ro c e s s , u n d e r s t a n d i n g t h e i n f o r m a t i o n on developing an understanding of the
4-5
FM 100-6
Basis for–
• Planning operations
• C2W courses of action
• Targeting
• Maneuver-based Targets includes–
• Equipment and force-oriented • Decision Makers
• Decision Process
• C2 nodes
Knowledge-Based
Decision-Oriented
Outthink and
out-communicate GOAL
the adversary
Better and more
timely decisions
4-6
FM 100-6
ASSESSING
BATTLE DAMAGES
• First, system vulnerabilities are identified BDA serves to confirm or deny previous
which can be exploited to cause the desired intelligence estimates and update the IPB. The
effects on the decision process. intelligence system continuously assesses the
• Second, the appropriate attack mechanism effectiveness of IO. This BDA allows commanders
and specific entry point (building, floor, air to adjust IO efforts to maximize effects. An
shaft) is determined. important aspect of this information BDA is timely
Vulnerability analysis is then extended to
analysis to determine when exploitable
vulnerability is created in the adversary C 2
include the collateral damage a C2W action may structure. Compared to the way we look at
cause on the operating environment. As an conventional BDA reporting procedures, BDA in
example, an option in attacking an adversary’s C2 IO is not so apparent.
might be to destroy his electrical power
infrastructure. However, the strategic cost Information BDA is not always reported in
(political or logistical) of destroying this terms of physical destruction of a target. The
capability might outweigh the tactical gains. One challenge of information BDA is to be able to assess
implication of the GIE is that actions and their the effects of our efforts without the benefit of
consequences are examined across the MIE, as physical confirmation. The effects may well be
opposed to the battlefield alone. trends, activities, and patterns in future adversary
actions. They could be as simple as an absence of
Developing Options activity on a C2 net, combined with an increase of
The decision-making template and the traffic elsewhere, that is, reduced very high
infrastructure template are combined to form a frequency/ultrahigh frequency (VHF/UHF)
C 2 -attack course-of-action template. Various transmissions coupled with observations of
courses of action can then be developed and increased courier traffic or heavy land line activity.
analyzed to determine the best way to use IO to BDA also examines the collateral damage C2W
influence, support, or accomplish the overall actions may cause to nonmilitary systems and
mission. capabilities within a commander’s MIE.
4-7
Chapter 5
Information Systems
FUNCTIONS
INFOSYS include personnel, machines, view of his battlespace, coordinate the activities
manual or automated procedures, and systems of his tactical forces, and help shape his MIE.
that allow collection, processing, dissemination,
and display of information. These functions INFOSYS directly support battle command;
cover all aspects of the organization, providing however, all aspects of land warfare—operations,
commanders with an accurate, relevant, common logistics, planning, and intelligence—depend on
picture and a common situational awareness. a responsive information system infrastructure.
Accordingly, a commander should consider his INFOSYS are able to simultaneously support
staff as part of the INFOSYS because its chief current operational deployments and future
function is to plan and integrate IO. INFOSYS contingencies. Interoperability and flexibility are
collect, transport, process, disseminate, and critical characteristics of any INFOSYS, especially
protect information in support of the CCIR. In given the requirement for Army forces to conduct
addition, INFOSYS enable the commander to use force projection and split-based operations using
information effectively to maintain an accurate strategic systems.
5-0
FM 100-6
ROLE
The role of INFOSYS is to provide the The accelerated development of information
infrastructure that allows the Army to interface technologies has created new techniques for
with the GII. INFOSYS enable the integration of managing, transporting, processing, and
all IO activities. INFOSYS form the architecture presenting data. These include imagery, video,
that— color graphics and digital overlays, mapping, and
• Supports the staff process. data base technology.
5-1
FM 100-6
2
architecture allow for modular C support for commanders and units across the range
force tailoring during any phase of an operation. of operations. Discussion includes the INFOSYS,
Operations take place in a global environment the principles that form the foundation for their
and demand information from a host of information support, and the direction of future INFOSYS
sources. Military and nonmilitary INFOSYS technology.
provide that global capability to support
relationships of strategic, operational, and information system is the joint Global Command
tactical architectures that tie the many distributed and Control System (GCCS), which interfaces
5-2
FM 100-6
with the Army Global Command and Control hardware and software to provide connectivity
System (AGCCS). and dissemination of battle command
information.The two evolving architectures
account for predetermined user information
ARMY GLOBAL COMMAND
exchange requirements throughout the tactical
AND CONTROL SYSTEM
force.
AGCCS is a seamless C2 system operating at
the upper echelons of the ABCS and supports C2 Each node of the tactical internet can
for echelon-above-corps units. provide information services while on the move.
Network management is an important feature of
the tactical internet and is highly critical to the
ARMY BATTLE successful delivery of information across the
COMMAND SYSTEM battlefield. It enables the tactical information
ABCS is the primary Army warfighting C 2 manager to track tactical users on the battlefield.
INFOSYS and employs a mix of fixed/semifixed It provides a tool to assist in the dynamic
installations and mobile networks, depending on configuration of battle command information
the subsystem. ABCS is interoperable with networks needed to conduct tactical IO.
theater, joint, and combined C 2 systems across
the full range of BOS functions. It is vertically and
Force XXI Battle Command Brigade
horizontally integrated at the tactical and
and Below System.
operational levels. ABCS provides connectivity
to combat information data bases and processes In the near term, the FBCB2 system employs
information pertaining to each BOS. In addition the GPS (POS/NAV) and communicates over the
to the theater-level AGCCS, the other single-channel ground and airborne radio
components of the ABCS include the Army system/enhanced position location reporting
Tactical Command and Control System (ATCCS) system (SINCGARS/EPLRS) and the mobile
and the Force XXI Battle Command Brigade and subscriber equipment/tactical packet network
Below System (FBCB2). (MSE/TPN). These systems form an integrated
network to move information (data) between
Army Tactical Command higher and lower echelons (vertically) and
and Control System between adjacent organizations (horizontally)
without routing through the brigade
ATCCS is linked directly to AGCCS, headquarters. Moreover, FBCB2 provides digital
providing the framework of seamless connectivity from brigade to weapons systems or
connectivity from brigade to corps. Moreover, it platform level. It transitions from a network of
integrates the traditional disparate stovepipe three separate systems to a homogeneous
functions into a coherent, seamless infrastructure network and system of systems comprised of—
that binds the BOS together. Figure 5-3 depicts
this INFOSYS architecture. Tactical internet • Appliqué—a family of laptop-sized
capabilities to establish the use and allocation of computers connected to navigation devices
new IO capabilities offered by digitization of and radios to provide processing and
tactical forces are in development. The tactical display capabilities to platforms without an
internet has both operational and systems embedded processor.
information architectures. The operational
architecture is for required connectivity of force • Tactical Internet—a battlefield
elements and the type and volume of digital communication systems networked
information-sharing by elements within the together using commercially based internet
force. The system architecture is for specific protocols.
5-3
FM 100-6
5-4
FM 100-6
5-5
FM 100-6
The availability of nonmilitary INFOSYS system, and by the need to develop effective
often offer the command an alternative means to training strategies. The optimal use of INFOSYS
satisfy its informational C2 needs, but only after a ultimately depends on the availability of quality
careful assessment of security risks. As an soldiers and leaders who are trained to employ
additional benefit, use of available nonmilitary advanced INFOSYS technology. Organizations
INFOSYS may reduce the requirement for will be challenged to develop flexible task-
deployed military information system packages. organization strategies that use the INFOSYS to
Operational use of a nonmilitary system allows adapt to the wide range of different conditions
planners to compensate for system shortages and existing in the GIE. In addition, organizations will
to meet the surge of information requirements in improve their battlefield functional capability in a
the early stages of deployment. digital environment by using advanced computer
The J6/G6 is responsible for standardization applications and tools. System challenges will
of nonmilitary equipment and software used emerge as a result of—
throughout the AO. However, planners have to • Constantly advancing technology.
ensure the deployed modular INFOSYS packages
implement open, nonproprietary, commonly • Uneven distribution of early generation
accepted standards and protocols to interface equipment mixed with new, improved
with nonmilitary systems. Proper use of INFOSYS digital INFOSYS.
creates new challenges at individual user,
organization, and system levels. Planners should • Limited EMS availability.
consider these challenges in IO planning because
• The search for commercial-off-the-shelf
they will affect the end user and the information
products available for use within the
management structure.
INFOSYS architecture.
The user will be challenged by the
digitization of the battlefield, by interface Meeting these challenges will enable and enhance
requirements between the operator and the the conduct of future operations.
FM 100-5
SIGNAL SUPPORT
Throughout all force-projection stages, a forward-most warfighters. Signal support
paramount need exists for a signal support means requirements to fulfill this task are enormous and
to transport information from the sustaining base vary greatly, depending on the type of military
power-projection platform at CONUS operation.
installations, through strategic gateways, to the
Mission-Essential Tasks
Information battlespace requires an end-to- anywhere at any time. This capability must be a
end, protected, seamless, multigigabyte multimedia system of systems that transports
information-transfer and processing capability video, imagery, data, and voice information to
for the warfighter to conduct IO virtually create an infosphere that the battle commander
5-6
FM 100-6
can plug-in and pull what he needs to visualize the CONUS, installation sustaining bases
battle from the current state to a successful end (ISBs), and joint operational areas (JOAs).
state. The signal support mission-essential tasks • Reach back through strategic entry points to
to project and construct the infosphere are to— power-projection platforms and
• Link the force to the infosphere to achieve information fusion centers.
seamless global connectivity. • Extend the communication range of battle
• Transport information with broadband, command operations centers and fighting
high-capacity systems optimizing satellites platforms by providing C 4 for mobile
and terrestrial signal support to connect operations (C4FMO).
Support Enablers
The enabling objective of signal support to IO • Digitize, compress, and broadcast multimedia
is to provide the warfighter the capabilities he battle command information in five
needs to obtain and share in near real-time. categories, using increased bandwidth,
high-efficiency transport systems. The
multimedia categories control, monitor,
Signal support requires the total integration of all
information management functions into a system
alert, inquire, and explore critical
of systems or ABCS. ABCS provides knowledge- information.
based information that is adaptable and
• Encrypt and provide multilevel information
responsive to the commander’s IO requirements. security.
The ABCS has a suite of C 4 hardware and
• Manage information networks with smart
software capable of collecting, processing, fusing, software that dynamically allocates
managing, transporting, disseminating, displaying, throughput capacity on demand and then
and protecting force-level information (status) routes and disseminates information.
and force-level control information (intent, plans, • Display via ABCS, a three-dimensional
orders). The signal support mission-essential interactive knowledge-based relevant
tasks to enable IO are to— common picture (RCP).
While the core of the twentieth century land warfare has been the tank, the core
of the twenty-first century will be the computer.
General Gordon Sullivan, CSA (1993)
FUTURE TECHNOLOGY
As technology advances, the conduct of Nevertheless, technology is only an enabling
operations will continue to change. Each advance tool. Quality soldiers and well-trained leaders
in information technology will— remain the true centerpiece to successfully
planning and operating this increasingly
• Help leaders form a more complete picture
digitized and automated information system of
of the battlespace.
systems. The following examples illustrate where
• Generate the potential for faster, higher information technology could enable military
quality decisions. operations by the turn of this century.
• Today, tactical radio communications
• Support more rapid maneuver in terms of
networks exist separately with no
both time and space.
automatic routing or interconnection
• Increase a unit’s flexibility and agility. between nets. On the future digitized
5-7
FM 100-6
5-8
FM 100-6
SECURITY
Due to the present and ever-increasing facets of an overall C2-protect effort ensure ISS.
dependence upon automated INFOSYS within The three primary security measures are—
the Army, INFOSEC and information systems
• Procedures for quality assurance.
security (ISS) has become critical. In both war and
peace, computer systems and networks on which • Denial of unauthorized intrusion.
units rely for logistics, personnel, administration,
• Hardening of programs.
maintenance, and financial data processing and
transfer are vulnerable to attack. Often, the
internet is a favorite communication platform for
intruders. Gaining access to a unit’s computer
and communications network can be
accomplished by a wide range of methods and
techniques. Some of the more common methods Historical Perspective
include—
In 1994 a computer hacker operating from the
• Inserting malicious software through United Kingdom attacked the Rome Air
contractors. Development Center at Griffiss Air Force
Base, NY, where he compromised the security
• Tracking software maintenance changes of 30 systems and penetrated more than 100
and system operations activities. other systems before being caught in a 26-day
international electronic manhunt. The victims
• Alternating access paths or sniffer devices included the South Korean Atomic Research
that trap information about traffic and Institute, NASA, the Goddard Space Flight
passwords. Center in Greenbelt, and the Jet Propulsion
Laboratory in California.
These intrusions may be initiated during The Defense Information Systems Agency
peacetime or at any point in an operation. It is estimates that DOD experienced 231,000
even possible that a military system could come incidents, or security intrusions, in 1994.
These incidents included destruction of data,
from the factory with an embedded logic bomb or
modification of data or software, stolen data or
virus. In the past, new commercial floppy disks
used by government agencies have been found
software, and shut-down of hosts or networks.
5-9
FM 100-6
Hardening of Programs
In addition to tracking down intruders, perfect, and protection/restoration resources are
system programs should be hardened against finite. OPLANs and OPORDs specify the
intruders’ attempts to gain vital information or priorities of protection efforts.
damage information flow. No protection plan is
MANAGEMENT
INFOSYS management consists of decision making in any type of operation. The
prioritizing information in a limited focus of battle staffs is to leverage available
communications environment. The primary technology by employing INFOSYS that give the
purpose of automated and manual INFOSYS is to commander the desired information at the right
achieve an information advantage by using and time and the right place. See Appendix C.
managing information for timely and accurate
Management Process
All information that the staff provides is the staff and INFOSYS support on the rapid
predicated upon the commander’s intent, acquisition, fusion, and analysis of information
concept of operations, and supporting that yields knowledge-based operations. The
commander’s CCIRs. The CCIRs govern the C4I INFOSYS augment routine or periodic reports
architecture and its use. The CCIRs define the (established by unit SOPs) with specific requests
commander’s information needs, thus focusing for information from BOSs or other data bases.
5-10
FM 100-6
5-11
FM 100-6
lower, adjacent, joint, and multinational forces. Tactically, the information flow must
Voice traffic and data distribution are the support the needs of commanders. Commanders
primary methods of passing this information. and staffs must have the information they need to
Voice traffic includes user-to-user, conference, plan, direct, control, and coordinate an operation.
and broadcast type of transmission. Data The information must be secure and readily
distribution includes formal record traffic (joint available. Tactical systems management ensures
message text), informal record traffic (facsimile that information is exchanged inside and outside
and electronic mail), system-to-system data, and the unit and made available according to the
POS/NAV data. needs of commanders and staffs to support the
tactical plan.
Technical systems management connects all
INFOSYS devices into a multilevel secure Within each BOS, the information flow,
network that supports the commander’s concept processing, and storage are managed according
of operation and maintains the correct security to the needs of the BOS. Flow, processing, and
levels at each network node throughout the storage of information among BOSs are
battle. Technical systems management collectively managed according to the needs of
requirements include— the overall force-level commander. Tactical
systems management includes—
• Planning the INFOSYS network.
• Planning information exchanges.
• Planning communications connectivity.
• Planning data base locations and
• Planning network security. replications.
• Allocating frequencies. • Planning continuity of operations
(including security).
• Controlling and monitoring the connection
• Controlling and monitoring information
of systems devices to one another and to
exchanges and data base transactions.
supporting communications systems.
• Implementing continuity of operations
• Reconfiguring the network as required by plans as required.
the tactical situation or equipment failures.
• Planning for degradation of the network.
• Maintaining the network.
Appendix C contains detailed information on
• Maximizing network performance. INFOSYS planning.
5-12
FM 100-6
followed in all frequency and radio regularity interference. Forced entry operations create the
matters. Parts of the spectrum are reserved by greatest demands for flexible and adaptive
nations and other international agencies and spectrum management. An adversary will use
therefore are not available for use by the US the spectrum as he sees fit, creating potential
military.
interference with friendly usage. For example, a
Where agreements do not exist, coordination television station may interfere with combat net
of frequency use is made through DOS. The radios, yet the OPLAN may call for capturing the
United Nations (UN) recognizes the International
station intact for future friendly use, thereby
Telecommunications Union (ITU) as the
specialized agency in the telecommunications hindering efforts to eliminate the interference.
field. The ITU allocates the international radio During initial spectrum planning, planners
frequency spectrum, registers frequency must consider adversary spectrum usage and
assignments, and coordinates resolving management and adapt to events as they unfold.
Communications dominate war; they are the most important single element in
strategy.
5-13
Chapter 6
PLANNING
IO planners must consider the conditions information dominance, and, in doing so, follow
that affect the Army as it deploys. They must a planning process that applies the components
focus on the principal objective of achieving of IO correctly in support of military operations.
Employment Considerations
The IO discussed herein depend on a series of how IO apply across the spectrum of operations
considerations and conditions that affect the and how the use of the IO components, especially
force-projection army as it deploys and operates C2W operations, increases in times of conflict and
to support joint, multinational, and interagency war
power-projection operations. Figure 6-1 depicts
6-0
FM 100-6
Quantity
of
Effort
Relevant C2 -Attack
Information C2 -Protect
and Tactical Deception
Intelligence
PSYOP
C2 -Destruct
Information EW
Systems
Operational Deception
OPSEC
Operations
2
(C W, PA, CA)
strategic options for consideration. The potential viewpoint, the spectrum of candidate
for nuclear exchange and major power conflicts information targets and the range of operational
in the post-Cold War world is diminishing. alternatives are virtually unlimited.
Therefore, military options to effectively attack a
US Army force component commanders, in
s t r a t e g i c t a rg e t — w h i l e m i n i m i z i n g t h e
support of national and theater strategic
potentially devastating social, economic, and
objectives, are responsible for employing the full
political effects of conventional military use—
range of their information capabilities during
increase in importance. Army IO offer both a
war or OOTW. As part of a national IO strategy,
potential deterrent capability and coercive
the Army can be called upon to employ its
capability at all levels of war.
capabilities to support both direct and indirect
As with nuclear warfare, nations can engage actions. Occasions have arisen and will continue
to arise that dictate the use of Army capabilities
in IO at strategic, operational, and tactical levels.
outside a purely battlefield context. The Army
Similar to nuclear warfare, the effects can be
component commander has capabilities ranging
widespread or targeted against a narrow range of
from PSYOP support to deep battle strikes to
hostile capabilities. As with nuclear warfare,
contribute to joint warfighting operations.
nations may eventually develop IO capabilities
that are perceived to be principally offensive or Information and INFOSYS capabilities
defensive. National strategies can be supported inextricably link the traditional levels of war.
by building an IO capability based upon varying These phenomena require commanders and
combinations of C2-protect and C2-attack and staffs at each level to understand the information
other capabilities. From purely a technical gathered, where the information is required, and
6-1
FM 100-6
Operational Level
the means or connectivity necessary to deliver At the operational level, IO occur across the
and/or receive that information. National-level full range of operations and are critical to the
systems (DOD and commercial) are increasingly success of each stage of force projection. In
capable of supporting and enhancing tactical peacetime, IO support—
operations (weather, communications, imagery, • Deterrence and reassurance.
navigation). The challenge for leaders is to—
• General situational awareness.
• First know the information is available.
• Operational assessments and estimates.
• Include the requirements for the • Contingency planning.
information in plans and exercises.
• Training in support of the CINC’s planning
• Understand how to get the information into and preparation activities.
a system, unit, or headquarters that
During conflict or hostilities, IO implement
C2W activities at each level of war. Continuous
provides an enhanced operational
capability.
engagement in IO helps the commander seize and
sustain the initiative and synchronize operational
In many cases the connectivity is found
capabilities. This allows the commander to
through other services or through civilian
control the tempo of operations so that friendly
agencies. For example, the long-haul connectivity
forces can effectively transition from peacetime to
during Operation Desert Shield/Storm was
w a r t i m e o p e r a t i o n a l e n v i ro n m e n t s a n d
augmented by commercial satellite terminals.
situations. During Operation Desert Storm, for
Systems such as the Army High Frequency
example, the coalition experienced information
Electronic Warfare System (AHFEWS), employed
dominance in near real time because the enemy’s
at the strategic or operational level with other
joint C2W assets, could diminish an opponent’s
INFOSYS were almost totally disabled.
confidence and will to fight before operations The linchpin permitting the operational
begin. Army UAVs could contribute to the maneuver of coalition forces in Iraq was the
domination of OOTW situations as an initial enemy’s inability to visualize the battlespace.
show of strength before the possibility of This enabled an entire US corps to move in
hostilities occur. If necessary, they could provide relatively open desert terrain for distances
the selected intelligence needed to dismantle an beyond 200 kilometers and still achieve total
adversary’s C 2 structure. Combined with operational surprise. The enemy’s information
deception and PSYOP, these contributors to C2W flow had been so disrupted and his surveillance
could erode a potential opponent’s confidence in capabilities so suppressed that he could not see
his own forces and conceal the OB and intentions the battlefield. The success of that operational
of the friendly forces. campaign depended critically on information
dominance. Space sensors, aircraft-borne sensors,
Army component commanders strive to ground sensors, helicopter-transported Special
support the joint force attack strategy at all levels
in order to commit and employ Army
capabilities—including C2W, CA, and PA—to the
Historical Perspective
best possible advantage. As with other military
activities, IO need to be coordinated and If the Iraqi forces moved in daylight, they were
integrated with the OPLAN and JTF campaign subject to immediate attack by coalition air and
plan and synchronized to achieve decisive surface-to-surface missiles. At night, their
movements were detected by superior night-
results. IO offer the prospect of maintaining
friendly C2 and situational awareness at a highly
capable sensors. They were then attacked by
the coalition’s all-weather attack aircraft.
dependable level, while simultaneously Further, their use of broadcast media, coupled
degrading an adversary’s ability to effectively with a lack of understanding of the coalition’s
command and control his forces. Such a intent, caused them to base their decision
combination should create a state of information cycle on externally filtered information.
dominance.
6-2
FM 100-6
Forces teams, and Marine drones combined to • Tempo. The tempo is the time devoted to the
give the operational commander an accurate and tactical decision-making process. Execution
timely picture of the battlespace. must be dramatically compressed. But,
because the information dominance
Tactical Level advantage is achievable through deliberate
At the tactical level, commanders usually action within a specific battlespace, battle
accomplish their missions through combined command can be better synchronized,
arms operations. At this level, IO are often limited resulting in the creation of opportunities
in scope. While a tactical-level commander uses that lead to success.
all aspects of IO, the focus is often on disruption
or destruction of enemy INFOSYS or nodes, Tactical units, both maneuver and CSS,
primarily through EW and physical destruction. participate in IO directed by higher headquarters.
The commander maintains access to his INFOSYS In some operations, tactical units perform
through OPSEC, ISS, and EP. Other applications targeting—striking C 2 nodes, deception,
include— reconnaissance and surveillance, and PSYOP
• Planning and executing C2W. activities focused on supporting an overall
• Projecting and constructing the infosphere. theater-level IO. They are also linked to the
layered information environment via a CMOC or
• Protecting friendly information. the PAO. For example, CMOC connectivity to
• Establishing and maintaining user access to local governmental, cultural, social, and
battle command information via ABCS. economic institutions can provide a wealth of
information supporting military operations. The
• Enabling IO and battlefield visualization. PAO facilitates media relations and contact to
• Collecting and producing RII. support friendly forces.
• Attacking the enemy’s C2 system.
6-3
FM 100-6
With an expanded vision, tactical field established and as the international community
commanders anticipate potential threats of adjusts to the impact of the information explosion.
disinformation, enemy PSYOP, and rumors
within their command, as well as the potential Simple interference, willful manipulation,
backwash of public information into their and corruption or destruction of data bases or
battlespace. Establishing an effective internal INFOSYS, to include space-based systems, have
information program enhances the morale of become increasingly active and sensitive
soldiers, reinforces the stated unit mission, and activities. The information web and its continuity
supports accurate media reports for both soldiers or disruption has implications far beyond the
and their families. military environment, into economic, political,
and social dimensions. Competition for the EMS,
space-based data systems, communications
RESTRAINTS AND
networks, and webbed computer networks all set
CONSTRAINTS
the stage for potential interference, both
An increased awareness of how operations intentional and unintentional. Collateral damage
shape and are shaped by the MIE is necessary as gains new meaning in this environment. The
commanders and staffs plan, prepare, and potential for the civilian population to be directly
execute IO. Because information can and will be or indirectly affected is present and growing.
interpreted differently by any number of
individuals or groups, military operations can The laws governing the information
affect the economic, political, and social fabric of environment and the law of land warfare are the
individual lives, organizations, and nations far guidepost, and every soldier is responsible for
beyond the scope and intent of the military preventing violations. Close coordination with
operation. This reality creates a dynamic set of the supporting judge advocate is critical to
restraints and constraints that impact military assuring compliance with applicable restraints
operations. and constraints. As the Army moves into the
Information Age, the features of the battlespace
Asymmetrical or hybrid operations are the continue to change, and the means and methods
norm as tailored forces are assembled to meet a of conducting all types of operations also change.
wide variety of needs. Accordingly, different Success in any operational environment depends
levels of modernization are found within the on leadership, discipline, morale, and
army, among joint or interagency task force professional training.
members, and between US and coalition forces.
Disparities in information and communications Today’s operations increasingly depend on
technology threaten continuity and intelligence and INFOSYS from tactical through
interoperability. Information capabilities can strategic levels to provide critical information on
offset these variances, providing the force and the all aspects of the friendly and enemy situation.
connectivity needed to operate effectively. The seamless and horizontal flow and integration
of information provides valuable operational
Statutory constraints, international law, data to support planning and battle command.
federal regulations, and rules of engagement While the fog of war has thinned, it will never
(ROE) may limit a commander ’s options completely disappear. The commander will
regarding IO. Laws and regulations, such as always face some uncertainty on exact enemy
those governing the use of the frequency force dispositions, OB, and operations in general,
spectrum, public information, PSYOP, and not to mention some degree of uncertainty about
espionage, provide examples of free access to the enemy’s intentions. That uncertainty will be
information and INFOSYS and are intended to compounded by artful opponents (military or
prevent misuse or abuse of these activities. IO otherwise) and exacerbated by the consequences
may be further constrained or further enabled as of unintentional actions or influences from other
new laws, rules, agreements, and protocols are sources within the commander’s MIE.
6-4
FM 100-6
Information Dominance
The principal objective of IO is to gain staffs will continue to make judgments based on
information dominance—a relative advantage less than perfect information. Likewise, they will
between the friendly commander ’s decision have to inspire soldiers to perform their duties in
process and that of the adversary—and to use the face of fear and fatigue. Commanders will
that advantage to enhance and enable the continue to mold units to levels of high
elements of combat power. IO are an essential performance through training, chain-of-
foundation of knowledge-based, combined arms command development, personnel management,
warfare. Likewise, full-dimensional operations morale, and a positive command climate.
require integrated IO.
Elements
BATTLE COMMAND The three basic elements of battle
Army operations are profoundly affected by command— leadership, decision making, and
information and IO in the critical function of controlling—are characterized by both continuity
battle command. Although battle command and change.
remains principally an art, it relies increasingly
on the ability to process information and move it Leadership. T h e c o m m a n d e r ’ s l e a d e r s h i p
rapidly to critical points in the operational area. continues to provide purpose, direction, and
To achieve the required level of information motivation to soldiers and units. Leaders will be
dominance, the Information Age commander better equipped to make informed decisions but
treats IO as he would any other critical element of will operate within a philosophy that will not
combat power, by providing guidance and change.
direction to his staff and his subordinate
commanders. Decision Making. Decision making is facilitated
through much-improved information
The commander’s personal involvement in
technologies, maintenance of a relevant, common
the development of the CCIR makes it the
picture upon which to base decisions, and
principal vehicle for ensuring that his battle
improved decision-making skills of leaders.
command information needs are met. Advances
Control. C o n t r o l i s f a c i l i t a t e d b y b e t t e r
in information technology have made decision
making and control of units more technical and communications, to include video broadcasting
quantifiable; yet much of those functions remain and private links, new position locating and
well within the realm of art, not science. The reporting technologies, greater situational
commander understands that he will never have awareness, remotely shared electronic maps,
all the critical information he wants, when he automated decision support aids, and other
wants it, and that leading soldiers and units to information technologies and procedures.
success will remain largely in the realm of art.
Accordingly, he employs IO to retain an Challenges
information advantage over his opponent. The challenges for leaders are to provide
Digital technology enhances C2. It allows the purpose, direction, and motivation to forces
Army to have previously unimaginable amounts operating over greater spaces, under greater time
of accurate and reliable information. It allows pressures, and amid more complex situations.
higher commanders to have detailed knowledge Specific implications of IO as they apply to the
about events several echelons below. At the same commander’s art include the following:
time, it gives subordinates more information • Identifying, conceiving, and communicating
about the bigger picture and about what is the unit’s purpose remains a complex art.
happening in other areas of the picture. Based on This is largely the commander’s domain.
t h e R C P, c o m m a n d e r s a re b e t t e r a b l e t o Understanding the mission, the intent of the
continuously, and in near-real time, integrate next two higher commanders, and the
combat power. c o n c e p t o f o p e r a t i o n o f t h e p a re n t
Technology and time do not change some organization may be easier with improved
aspects of battle command. Commanders and communications, but the restatement of the
6-5
FM 100-6
mission, the formulation of the intent judgments about what their condition may
statement, and the issuance of planning be tomorrow. Unquantifiable information
guidance are still functions the commander and information gaps will remain. No
must perform himself. matter how much information the
• The current doctrinal approach of mission commander gathers before making a
orders, or decentralized decision-making, is decision, uncertainty will remain.
not anticipated to change. The ability to • The ability to process information through
communicate with remote commanders risk management enables commanders to
and staffs by video conference and by other avoid unnecessary risks. Identifying,
electronic means does not eliminate the analyzing, and selecting control measures
commander ’s need to provide implicit to manage risks gives commanders
direction to subordinates. Information maximum force protection.
technology enhances the effort by
providing a RCP across the BOSs and STAFF RESPONSIBILITIES
functions in near real time. During critical To facilitate IO, the commander establishes
actions the commander focuses most of his staff responsibilities for planning and execution.
attention and decision making on the main OOTW present unique challenges due to the
effort. Therefore, relying on his heavy involvement of the media and other
subordinates to act within his intent and players in the GIE. The staff must consider the
concept is vitally important. actions and reactions of US and foreign
• Commanders need to motivate their governmental and nongovernmental agencies,
soldiers, as well as their staffs and others, to PVOs, and the media when planning operations.
accomplish difficult tasks under dangerous, Depending on the situation, IO planning can be a
trying circumstances. Commanders will complex undertaking or a relatively routine staff
continue to inspire and mentor subordinates function. The commander ’s IO cell, however
through face-to-face communications and organized, draws upon selected expertise
physical presence. Although it may be throughout the primary and special staff, with
difficult, commanders still need to position liaison and possibly augmentation from
themselves where they can see the battlefield subordinate commands. A number of techniques
a n d w h e re s o l d i e r s c a n s e e t h e m . and a variety of arrangements are available to
Commanders establish interpersonal accomplish these responsibilities.
re l a t i o n s h i p s w i t h t h e i r s t a ff s a n d
subordinate commanders. Commanders Staff Members
also contribute to unity of effort by Current staff members can integrate IO
establishing personal relationships among actions into the operation. This approach uses
and between commands to foster mutual current staff procedures, processes, and
trust, cooperation, open communications, techniques to plan, coordinate, and synchronize
and teamwork in both national and IO with the operation. The likely choice for the
multinational operations. Commanders nonmodernized or partially modernized force is
remain the leaders that all members of the to designate a staff representative to supervise
organization look to for timely decisions and these actions.
informal feedback.
• Uncertainty will always exist. The Process-Oriented Group
commander may know what the enemy is A process-oriented or ad hoc task group, led
doing at the moment, but will rarely know by the J3/G3, can integrate and synchronize IO
w h y. S o u n d c o m m a n d j u d g m e n t i s actions. This approach is similar to that used for
required to determine what the enemy may targeting and deep attack. This too is a viable
be doing tomorrow. In addition, no matter approach for the partially modernized force or
how well the commander knows the status nonmodernized force entering a complex combat
of his forces today, he needs to make or noncombat environment where a number of
6-6
FM 100-6
IO capabilities and or threats exist. Appendix D products. While essential coordination between
provides a notional IO structure at Figure D-1. these staff functions may be accomplished
through the IO cell, the IO cell PA representative
Information Operations should not also serve as the primary command
Battle Staff spokesperson.
What separates good units from not so good units is the way the unit processes
information.
General Donn Starry, US Army (1978)
6-7
FM 100-6
Planning Process
The IO planning process consists of five basic and processes that must be addressed by
steps that apply across the three components of C2-protect.
IO (operations, RII, and INFOSYS).
PRIORITIZATION
MISSION ANALYSIS The second step is to prioritize both friendly
and enemy critical nodes and vulnerabilities.
The first step of the process begins as the
This part of the process develops potential targets
for C 2 -attack and C 2 -protect and ensures
commander analyzes the mission, formulates his
overall concept of operations, and considers how
deconfliction of their integrated effects.
IO can contribute to achieving his mission. Under
the direction of the J3/G3, the staff analyzes the For C 2 -attack purposes, nodes critical to
command’s mission and concept of operations to more than one adversary system may have a
derive a concept of IO. Simply put, “How can IO higher priority. Vulnerability may override
support the mission?” The staff must consider criticality, with more critical nodes that are less
both C 2 -attack and C 2 -protect. Flexibility is vulnerable receiving a lower priority. Priorities
essential, as IO support may shift over the course should be balanced and shifted between C 2 -
of the overall operation. attack and C2-protect as required to support the
unit mission. The C 2 -attack product is a
During analysis, the staff examines enemy and prioritization of the list of critical, vulnerable
friendly INFOSYS within the context of the adversary targets from earlier work. Similarly,
commander ’s MIE. The staff determines the C2-protect targets should be identified in terms of
capabilities both sides require to operate criticality and vulnerability, then prioritized.
effectively. It also sets out the requirements and
conditions needed to establish information CONCEPT OF OPERATIONS
dominance. The staff considers nonmilitary
T h e t h i rd s t e p o f t h e p ro c e s s i s t h e
INFOSYS influences or capabilities beyond
formulation of an IO concept of operations to
influence the adversary’s C2 while protecting
traditional military control—such as local or
friendly C 2 . The G3/J3 reviews his sets of
regional communications networks, radio,
potential C2-attack and C2-protect targets. He
television, computer networks (internet or
worldwide web), and the news media—that may
assesses available IO capabilities to develop an
influence the operation. The examination produces
IO concept of operation that best supports the
a list of critical nodes and vulnerability analyses.
overall operational mission and is synchronized
• The C2-attack analysis identifies adversary with the overall concept of operation.
C2 systems of C2W interest and determines Synchronization of IO, both internally (among
the critical C2 and C2-attack nodes in those the five C 2 W elements and CA and PA) and
systems. The C 2 -attack focus increases externally (across the BOSs), is absolutely critical
payoff by identifying key target for achieving decisive C2-attack and C2-protect
vulnerabilities for offensive action. results. The impact of proper synchronization is
to focus the effect of the entire range of friendly
• The C 2 -protect analysis focuses on the capabilities to achieve maximum effect at the
adversary’s capability to detect, locate, and decisive point in time and space.
attack critical friendly C2 nodes to disrupt
the friendly decision-making process. As Although the situation dictates the critical
with C2-attack, intelligence plays a major areas for the operation, the commander and staff
role by providing information on adversary consider these specific areas in planning:
sensor capabilities, target selection, and • Operations—both C2-attack and C2-protect
attack means. The staff considers the objectives from a friendly and enemy
physical destruction, jamming, and perspective. The basic OPLAN/OPORD
intrusion, as well as deception and PSYOP and the C2W annex synchronize physical
means available to the adversary. The destruction, EW, OPSEC, deception, and
product is a list of critical, vulnerable nodes PSYOP to maximize C2-attack and
6-8
FM 100-6
C2-protect. Many C2W activities can have dominance in order to give the force dominant
the effect of maximizing protection while battlespace awareness and control of the MIE. A
degrading adversary C2 capabilities. Other critical tool in developing an effective concept of
influences in the commander’s information operation is the synchronization matrix. The
battlespace can directly impact mission synchronization matrix is designed to array time-
success, for example, the media, phased objectives along a horizontal axis against
governmental and nongovernmental
organizations, local or regional social/
performing units usually organized by BOS
along a vertical axis. Within the framework of the
cultural influences, perceptions, attitudes,
matrix, critical tasks that must be performed to
and opinions.
achieve the IO objectives are identified, aiding the
• RII requirements. planner in recognizing the interrelationship
• INFOSYS support requirements. between specific tasks and actions and the need
The battle staff considers all these factors to to orchestrate them in a manner that maximizes
arrive at an IO concept of operations. The concept the impact of their execution. See Figure 6-2 for
is oriented on establishing information an example of an IO synchronization matrix.
IO CENTRAL OBJECTIVE
Influence, disrupt, or delay the adversary's military
decision cycle while protecting US/coalition
decision cycles
TIME
DEPLOYMENT ENTRY DECISIVE TERMINATION AND REDEPLOYMENT AND
OPERATIONS OPERATIONS OPERATIONS POSTCONFLICT RECONSTITUTION
OPERATIONS OPERATIONS
• Protect US/coalition intelligence operations
• Prevent friendly C2 fratricide
UNITS • Deny the adversary the ability to attack US/coalition communications and information systems
• Influence the • Attack the • Attack the adversary's ability to • Influence
adversary to adversary's coordinate defensive operations neighboring
reject or delay ability to nations' actions
attack course of coordinate an • Attack the adversary's ability to
action attack on reinforce
early entry
Maneuver forces
Unit A
Unit B Destroy the
Unit C adversary's RISTA
assets
Intelligence Degrade the Destroy, degrade, Disrupt the
Unit A adversary's ability to and influence the adversary's tactical
access intelligence adversary's communications
intelligence fusion
centers
6-9
FM 100-6
EXECUTION
Execution begins with tasking those elements national command level would lose
that conduct IO missions. The G3/J3 controls and information about the adversary’s national-
directs both the IO planning and execution phases l e v e l i n t e n t a n d re s o l v e . S i m i l a r l y,
of the process, with support from the G2 and IO destroying an air defense network may give
element specialists on the staff. The keys here the tactical commander local air superiority,
are— but it may also eliminate the only means the
• Selecting the best C2-attack capability for operational-level commander has to track
the best effect (deny, influence, degrade, or identify enemy formations.
destroy).
• Legal and policy restrictions and ROE—in
• Synchronizing the application of effects to order to understand their impact on the
reinforce the five elements of C2W, CA, and linkage between the levels of war. Target
PA capabilities (not allow them to conflict). planners are required to know the ROE as
Similarly, protection of C2 nodes needs to be well as the laws and policy governing the
tasked to available means and/or attack of certain persons, places, or things.
additional protective tactics, techniques, How does the commander deal with the
and procedures (TTP) adopted by the force. commercial computer network, the local/
IO taskings normally become part of the regional phone network, or the cellular data
basic order paragraph 3 concept of operations and net that not only supports the military effort
coordinating instructions. Additional IO details but also the civilian population, commerce,
are covered in a separate annex that consolidates and industry? Other considerations include
applicable IO/C2W into one coherent operational when and what information to release to the
discussion. When a separate IO/C2W annex is media, NGOs, and PVOs.
written, it should include an IO/C2W Planners must be aware that the counter-IO
synchronization matrix that establishes time the adversary launches will likely target US
lines, responsibilities, sequence of actions, and civilian infrastructures. The mere threat of such
desired effects. actions may also generate significant effects, both
As planning and execution take place, real and psychological. For example, an
planners should consider a number of factors adversary’s announcement claiming the insertion
beyond strict combat capabilities. These of a virus into a particular banking institution’s
include— computer operation could trigger a panic with
• The opportunity cost of an action—that is, major economic repercussions, regardless of the
what is the trade-off between attacking or adversary’s actual execution of such an attack.
destroying an adversary’s capability now or
exploiting that capability for future gain? FEEDBACK
As an example , destroying key C 2 The fifth step is to set up a monitoring and
facilities may give the operational feedback mechanism. A continuous damage or
commander freedom of action by denying effects assessment process is critical in order for
the enemy effective C 2 of his forces. the commander to revise his continuing estimate
However, the opportunity cost of this action of the situation and adjust operations. See
would be to deny national signal Appendix A to develop C 2 W and IO-related
intelligence (SIGINT) systems a valuable planning products. The five-step planning
link to the opponent’s NCA. Therefore, the process is illustrated in Figure 6-3.
EXECUTION
The force-projection cycle is an excellent activities is essential to attaining and maintaining
framework to discuss how to execute IO. The information dominance in conducting operations
packaging, timing, and employment of key IO across the full spectrum, to include OOTW.
6-10
FM 100-6
OUTPUTS/PRODUCTS
Operation Order Other Annexes Separate Annex
• Concept • Signal • C2W
• Task Organization • Intelligence • PA Operations
• Command and Signal • Forward Support • Movement
• PSYOP • CA Operations
Figure 6-3. IO Planning Process
Force-Projection Operations
Our post-Cold War National Military Strategy In many situations, GIE organizations will be
calls for a primarily CONUS-based Army—one present in the AOR before Army forces arrive.
that is capable of rapid power projection on short They will often be well-entrenched, with an
notice to any region of the globe to decisively established logistical framework and long-
defeat a regional adversary. These force- standing coordination and liaison arrangements.
For example, initially the media may know the
projection operations follow a general sequence
AOR better than the military. As it covers the
of stages that often overlap in space and time. IO
b u i l d u p , t h e m e d i a g a i n s a t h o ro u g h
considerations and actions apply to all force- understanding of and forms its own perspective
projection stages. They focus on ensuring about the situation, particularly in OOTW. The
information support to battle command during projection of Army forces into the situation is of
all joint, multinational, and interagency national interest, with national and international
operations and effective intervention against the media watching from the moment forces arrive.
adversary’s C2. CA and PA personnel need to deploy early to
6-11
FM 100-6
MOBILIZATION OPERATIONS
support the commander and the force in their Mobilization is an information-intensive
interactions with these organizations. CA and PA operation. Once mobilization is declared, the
operations not only reduce the potential unit’s activities include assembling personnel,
distractions to a commander but also educate checking readiness factors, and time-phasing
these organizations and facilitate their efforts to operations to meet force deployment schedules.
provide accurate, balanced, credible, and timely IO assist in synchronizing arrival, processing,
information to local officials and agencies, as well certifying, and moving to final points of
as external audiences. Some unique considerations departure. The Army depends on information
apply for force-projection operations and OOTW. management resources in its sustaining base to
accomplish the mobilization process. These
The friendly communications infrastructure resources include—
provides the means to integrate C4I capabilities • The Standard Army Management
starting from the installation power-projection Information System (STAMIS).
platform with reach-back capabilities while en
route, during initial entry, during buildup, • FORSCOM’s Mobilization Level
throughout the operation, and during Application Software (MOBLAS).
redeployment. The variety of conditions under
• TRADOC’s Reception Battalion Automated
which the Army is employed in the Information
Support System (RECBASS).
Age requires close IO coordination, integration,
and synchronization from the strategic to the • DOD INFOSYS such as the Defense Joint
tactical level. Figure 6-4 outlines this concept. Military Pay System (DJMS) and the
Force projection, supported by IO, is continuous Defense Enrollment Eligibility Reporting
and seamless and compresses time and space. System (DEERS).
Mobilization
Operations
Predeployment
Redeployment and Operations
Reconstitution
Operations
Deployment
Operations
Termination and
Postconflict
Operations
Entry Operations
Decisive
Operations
6-12
FM 100-6
Most of these systems depend upon the NII PA operations during predeployment
for their operation. Many run on standard contribute to establishing conditions that lead to
c o m m e rc i a l p l a t f o r m s s u c h a s p e r s o n a l confidence in the Army and its readiness to
computers (PCs), reduced instruction set conduct operations while remaining attentive to
computing (RISCs), or mainframes. The systems OPSEC and INFOSEC. As units are identified for
could be expanded or enhanced during a crisis. possible or actual mobilization, public and media
T h e i r d e p e n d e n c e a l s o u n d e r s c o re s t h e attention increases dramatically. PA operations
importance of engaging the interagency process contribute to a reduction in rumors,
to help secure the NII from possible attack or misinformation, and uncertainty on the part of
compromise. soldiers, family members, and the public.
Intelligence activities during the During the predeployment phase, tactical
mobilization phase focus on collecting INFOSYS continue to be used less than fixed
intelligence on probable operational military and civilian systems for routine actions
environments and potential adversaries. The staff during predeployment. Military systems that link
performs the initial information-based IPB operational and strategic echelons, such as the
during peacetime. DISN and the Defense Switch Network (DSN),
C 2 W activities during mobilization are are the primary dedicated military systems used.
predominantly concerned with protecting Intelligence, logistics, and operational planning
information. Upon mobilization, protection of require extensive coordination with outside
information is included in the commander ’s agencies, other services, and so forth, to provide
recall and assembly plans. C2-protect measures the data required.
p r o t e c t t h e a v a i l a b i l i t y, i n t e g r i t y, a n d Intelligence activities continue to revolve
confidentiality of unclassified and classified around establishing an adversarial data base and
information necessary to support mobilization an information-based IPB. Component
operations. During this stage of force projection, commands require national intelligence and
bits of information conveyed in nonsecure public weather data to support detailed planning.
and military radio transmissions, news releases, Before deployment, the commander ’s staff
friendly conversations, telephone calls, trash, and should develop CCIR, PIR, CMO, and RISTA
so forth, permit news media personnel or hostile plans.
intelligence analysts to piece together US
intentions and capabilities. OPSEC and INFOSEC C2W actions continue to focus on protecting
aid the commander in preventing adversaries i n f o r m a t i o n t h ro u g h e x e rc i s i n g O P S E C
from collecting information of intelligence value. procedures. With the support of the higher joint
headquarters, as augmented by LIWA, C2 W
planners consider offensive actions to establish
PREDEPLOYMENT OPERATIONS
information dominance once the force begins to
Commanders establish objectives and unit deploy. Close coordination with PA personnel is
requirements to set the stage for predeployment required during deception and PSYOP planning
a c t i v i t i e s a n d s e e k t o p re s e r v e f r i e n d l y to maintain OPSEC and ensure such efforts are
assessments and decision-making capabilities. IO not targeted against friendly audiences and, most
integrate the elements of C2W to mask importantly, US, allied, or coalition media.
deployment and enhance deception operations.
Plans include— PA develops assessments for current and
• Engagement of the adversary’s INFOSYS. future operations. Planning continues for
appropriate media inclusion (journalists
• Identification of tasks, C 2 W target sets, accompanying units). PA implications of all
specific procedures, and coordinating aspects of the operation are considered to include
instructions—all displayed within a media attention and public response.
detailed IO synchronization matrix. Synchronized PA programs contribute to
These steps ensure the implementation of IO and increased soldier understanding, confidence,
set the stage for ongoing military actions. dedication, discipline, will to win, and public
6-13
FM 100-6
ENTRY OPERATIONS
confidence in the Army. PA efforts focus on IO are necessary to establish the conditions
protecting and enhancing the public support of for successful early entry. IO capabilities are
g r a v i t y. deployed into a contingency area with a focus on
their ability to gather the information required by
the commander while denying the enemy use of
DEPLOYMENT OPERATIONS his information and IO capabilities. Early entry
operations vary by region and mission. In both
IO are necessary to establish the conditions
unopposed and opposed entry, counter-RISTA
for deploying forces into an AO. Deploying forces
operations are essential. Air and missile defense
require near-real-time joint and/or interagency
is key to successful counter-RISTA operations
communications tailored for rapid deployment,
during the early entry period when forces are
en route operations, and links from strategic
most vulnerable. Air and missile defense systems
negate enemy airborne RISTA, EW, and C 2
through tactical levels.
During the deployment stage, staff planning platforms while simultaneously protecting key
f u n c t i o n s i n t e n s i f y. C o n t i n g e n c y p l a n s geopolitical assets and the force’s critical nodes
(CONPLANs) and PIR are updated, completed, from air and missile attack.
or adjusted. Commanders and staff planners tap
into joint and interagency planning systems and Unopposed Entry
data bases, such as the Joint Operations Planning Unopposed entry allows for greater use of IO
and Execution System (JOPES) and the Army capabilities. Early deploying assets focus IO on
Mobilization and Operations Planning and the adversary to support forward presence or
Execution System (AMOPES), to determine lift host nation (HN) forces. Early entry forces rely on
asset availability and sequencing. Intelligence split-based communications with CONUS-based
requirements and assessments are continually elements for most of their intelligence and
monitored and adjusted. As forces begin communications support. Although HN or
deploying, commanders plan for the impact of commercial systems may be available, planner
force separation and reduced information awareness of statutory requirements regarding
support through low-capacity systems. They their use is essential.
adjust their CCIR to those most critical to
maintain situational awareness, training Opposed Entry
readiness, and mission accomplishment. When entry is opposed, commanders may
have to rely on a limited number of INFOSYS to
INFOSYS requirements for deploying forces get the information they need to accomplish the
demand home station, en route, and intertheater/ mission. Because information requirements may
intratheater communications that are secure, well overwhelm the capability of available assets,
flexible, and deployable. These INFOSYS must be commanders must clearly prioritize their
capable of interoperating with joint forces, information needs to best focus the use of these
civilian agencies, and multinational or coalition limited capabilities.
forces. INFOSYS support mission planning with
multiple continuous intelligence and logistics Working within the joint IW/C2W plan, army
links to the deploying/deployed force, home commands employ their C 2 W capabilities to
station, major commands, logistics agencies, and satisfy assigned tasks. Successful opposed entry
national and joint intelligence sources. operations can be significantly enhanced by
denying the adversary use of his INFOSYS
Deploying forces are highly dependent on through employment of C 2 -attack assets.
CONUS-based intelligence, such as imagery and C2-attack could include deceiving or overloading
weather, derived from national or theater-based the adversary’s INFOSYS and disrupting his use
s e n s o r s . T h e f o rc e s re q u i re a s s u re d a n d of the EMS.
survivable communications to numerous
agencies. During deployment, echelons above DECISIVE OPERATIONS
division execute most of the C2W actions such as Commanders visualize the battlespace and
deception, PSYOP, and continued OPSEC. develop operational concepts that use common
6-14
FM 100-6
Our present theory is to destroy personnel, our new theory should be to destroy
commands. Not after the enemy’s personnel has been disorganized, but before it has
been attacked, so that it may be found in a state of disorganization when attacked.
Extracted from J.F.C. Fuller’s memorandum
“Strategic Paralysis as the Object of the Decisive Attack,” May 1918
6-15
FM 100-6
6-16
FM 100-6
Army forces face complex and sensitive In OOTW, as in other operations, military IO
situations in a variety of OOTW. These range c a p a b i l i t i e s a re n o t t h e o n l y a s s e t s t h e
from supporting near hostilities in peace commander may have available. Non-DOD,
enforcement and peacekeeping operations; state, and local agencies; international
through drug interdiction, nation assistance, and organizations; military or paramilitary forces;
humanitarian assistance; to support for US state and private organizations may also be available
and local authorities responding to natural to contribute to IO. These players may offer a
disasters or civil unrest. variety of services and resources, both military
and nonmilitary, from within the GIE. This
The primary tool for mission expanded field of individual and organizational
accomplishment in conventional military senders and receivers of information, with
operations is the use of force directed against an varying methods of operation and focus, add a
adversary. In OOTW, however, such a threat may
not be present or may not be clearly defined. The
threat in these environments may be rogue Historical Perspective
elements, thugs, or even the adverse effects of the
Projection of information is essential to
environment or a natural disaster. Hence, successful militar y operations. Dur ing
commanders employ a wider range of methods Operation Restore Hope in Somalia in 1992-
in less conventional ways that involve many 1993, a peace operation, the 10th Mountain
more players to accomplish the mission. As such, Division (LI) adjusted its mission analysis and
IO capabilities to support the assigned missions t r a ck i n g by e s t a bl i s h i n g i n fo r m a t i o n
may become essential for success. IO may be one dissemination as a BOS. This BOS included
of the most critical and acceptable means of PA, PSYOP, and information for soldiers. The
division considered full integration of these
achieving the assigned objectives because ROE
activities into all aspects of the operation as
may severely restrict the use of conventional critical to success.
military weapons.
6-17
FM 100-6
variety of INFOSYS needs. Interoperability, involved in the operation. IO help synthesize this
cooperation, coordination, and liaison may data for a common understanding of threatened
significantly increase resource requirements. interests, to determine relevant and attainable
objectives, and to achieve unified efforts. The
COORDINATION methodology for exchanging intelligence
AND LIAISON information should be conceived and exercised
well before operations begin. US intelligence
IO can be extremely complex and
personnel know and understand foreign
demanding. The Army is often faced with
disclosure policy and procedures. They generally
formidable infrastructure and interoperability
obtain necessary foreign disclosure authorization
challenges, both at home for domestic support
from the Defense Intelligence Agency.
operations and abroad for multinational
operations, often in austere environments. NGOs and PVOs
To provide coherence to information efforts, The number of NGOs and PVOs that may be
IO planning must be in sufficient detail and found in a commander’s AO could be extensive.
coordinated with all participating agencies. This NGOs and PVOs can be valuable sources of
requires extensive coordination and liaison. As information that commanders involved in IO
an example, CA, PSYOP, and PA elements are should consider. Commanders may also need to
able to use the same communications media with create centralized control and liaison structures,
essentially the same messages but to different such as CMOCs or emergency operations centers
audiences. CA and PSYOP personnel address (EOCs), to facilitate coordinated efforts with
local populations and enemy forces, respectively, NGOs. See FM 100-23-1.
while PA personnel address US forces and
national and international news media. Local Assets
Employment of C2W, intelligence, and INFOSYS
Local assets may provide the capability to
capabilities requires coordination to ensure the
support and secure the temporary setup of IO—
synchronization of operations among
telephone towers, satellites, ground cables, or
participating organizations. Since military and
other utilities that would allow commanders to
civilian systems are often incompatible, military
achieve assigned objectives or tasks. Also, some
and supported agency communication planners
localities may have the equivalent of non-DOD
must coordinate as early as possible in the
agencies. The US embassy or consulate can be
operation. The Army may be required to
contacted for assistance in establishing liaison
coordinate IO with the following organizations:
with these agencies. These agencies may provide
United States Agencies invaluable assistance in these environments.
The Army may coordinate with non-DOD SPECIAL
agencies in the broad spectrum of OOTW, CONSIDERATIONS
especially when the Army is placed in a
supporting role to US agencies during domestic All operations require gathering and
support operations. FMs 100-19 and 100-23 and dissemination information, as well as some form
Joint Pub 3-08 list and describe various agencies of intelligence. Since intelligence is a restrictive
requiring consideration. Among these is the term, the preferred terminology in UN operations
United States Information Agency (USIA), which is information-gathering and dissemination.
is especially pertinent for the conduct of public Accurate information is essential for planning
diplomacy information efforts conducted in PSYOP, OPSEC, EW, destruction, and deception
foreign countries. operations.
By gathering information from soldiers,
United Nations NGOs, PVOs, and civilians personally involved
The nations involved in specific UN in the day-to-day operation, a commander can
operations rely on shared, relevant, and pertinent gauge the mission’s effectiveness and better plan
data concerning the situation and parties current and future IO. Maximum use should be
6-18
FM 100-6
made of open-source information. When and PSYOP abilities to support US and allied
practical, tactical information-gathering systems armed forces. PSYOP is a vital force employed to
should be used so that information may be optimize the influence of US national policy on
disseminated to UN/coalition forces, NGOs and foreign target audiences, whether neutral,
PVOs, and other government agencies. However, hostile, or friendly. In other operations, PSYOP
parties to a conflict in peacekeeping operations or provide the commander with the capability to
civilians in other operations may perceive project the purpose and mission of US forces and
information-gathering as intrusive or hostile. to influence target audience behavior to support
Therefore, intelligence activities must always be the commander’s mission. For PSYOP to achieve
sensitive to legal constraints and/or maintaining maximum effectiveness, planners must include
the trust of the parties involved. The perception them early in the planning process. In crisis
of impartiality is important for the protection of situations, rapid production and dissemination
the peacekeeping force. Important intelligence of accurate information to the population are
considerations include the following: critical. PSYOP personnel can provide the
• Every item of operational information commander with real-time analysis of the
becomes potentially important during perceptions and attitudes of the civilian
OOTW. p o p u l a t i o n a n d t h e e ff e c t i v e n e s s o f t h e
• Personnel have to be information-conscious information being disseminated.
at all times. Signal support to OOTW missions requires
• Participants must remain constantly alert to the same detailed planning as any other
what takes place around them and to any operation. However, the scope and scale of
change or inconsistency in the behavior, planning may actually increase when the
attitude, and activities of the military and commander is considering or is confronted
civilian populace. with—
• Nonmilitary INFOSYS such as commercial
Information-gathering assets, sources, and and local communications services. The
agencies include those used in conventional operational principles of signal support
operations as well as some that are not normally apply.
considered. Intelligence personnel will make
• Interfaces among military and commercial
traditional use of all organic or attached
communications, INFOSYS, and networks.
collection assets. However, they may also use
Most civil and military communications
other sources and agencies such as the local news
systems are incompatible because of
media, NGOs, PVOs, international organizations,
different equipment, frequency allocations,
and exchanges with local police, governments,
and usage parameters. For these reasons,
and militaries. Dissemination of intelligence is
military and civilian communications
conducted using standard intelligence report
planners must exchange knowledgeable
formats. Intelligence personnel pass information
communications support personnel and
to liaison officers (LOs) who pass intelligence
compatible equipment to ensure
products to parties requiring them in joint or
connectivity is maintained between
multinational operations.
military and civilian operations centers.
Although not peacetime operations, CA and This exchange of personnel and equipment
PSYOP are critical operations that aid can occur at any level and should be
commanders in accomplishing their peacetime implemented and modified as the situation
objectives. Commanders must understand CA dictates.
6-19
Appendix A
PLANS
Commanders use operations, administrative, specified preparatory action, it is not executed
and logistics plans and orders to convey until the commander so directs, usually when
information and instructions to subordinate certain specified conditions, as set forth in the
units. Plans and orders are similar in format and plan, are determined to exist. A plan specifies the
content. Although a plan may be effective time or conditions under which it is to be placed
immediately for planning purposes or for in effect.
ORDERS
A plan becomes an order when execution is is that a plan normally contains assumptions. See
directed. An order carries with it the obligation of Chapter 6 for general information about
immediate execution at a specified time or date. planning and execution.
The major difference between a plan and an order
A-0
FM 100-6
(SECURITY CLASSIFICATION)
Annex A
3. EXECUTION.
a. Commander’s Intent. Briefly include how IO will support the mission
within the context of the commander’s overall vision of the operation.
1
This OPLAN format conforms to the format delineated in Joint Pub 5-00.2 and
FM 101-5.
(SECURITY CLASSIFICATION)
A-1
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-2
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-3
FM 100-6
(SECURITY CLASSIFICATION)
(3) Phase III. The third operational phase is usually the consolidation
of the results of a successful end state for this phase. It does not contain
the detail of the preceding phases. Address supporting IO as
appropriate.
c. Tasks for Major Subordinate Commands. Ensure that IO are addressed
as appropriate for each major subordinate command.
d. Coordinating Instructions. Integrate instructions on C 2W whenever
two or more phases of the operation are affected. Coordinating
instructions may include the following:
(1) Times, events, or situations that may signal the transition of various
IO between phases.
(2) Constraints (Annex E). IO in situations other than war are usually
constrained significantly by factors other than strictly military ones.
Describe such limitations on IO on military actions in the same annex
detailing the provisions of treaties, agreements, and conventions
governing the political, military, and informational limits on the
military effort.
(3) Rules of engagement (Annex F). In addition to constraints imposed
by international agreement, certain self-imposed ROE govern the use
of military forces and certain weapons effects during the major
operation. These rules may affect the use of EMS, computer networks,
and interference with space-based communications and other signals.
(4) Resource management guidance that may limit IO (for example,
limited communications circuits, limited equipment availability, or
limited access to networks).
(5) Training guidance concerning IO procedures (for example, PSYOP,
CA). Refer to a separate annex (Annex Q).
(6) Operational planning guidance involving IO.
(7) Space operations planning guidance (Annex P) providing
enhancements to IO.
(8) Public affairs operations (Annex O).
(SECURITY CLASSIFICATION)
A-4
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-5
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-6
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-7
FM 100-6
(SECURITY CLASSIFICATION)
Annex B
Copy No____
Issuing Headquarters
Place of Issue
Date/Time Group of Signature
(SECURITY CLASSIFICATION)
A-8
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-9
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-10
FM 100-6
(SECURITY CLASSIFICATION)
3. (U) EXECUTION.
a. Concept of Operations. Provide a detailed discussion of the overall
C 2 W operation, with the specific details developed in appendixes
organized around the five elements of C2W.
(1) Military Deception. This appendix includes a description of the
deception objective, the deception story, available resources, excerpts
of higher headquarters deception plans, and the active and passive
deception measures to be taken by subordinate organizations. See
Appendix A to this annex.
(2) Electronic Warfare. This appendix includes the EW mission,
enemy EW capabilities, defensive and offensive EW measures, and
c o o rd i n a t i o n w i t h o t h e r p a r t s o f t h e O P L A N ( d e c e p t i o n ,
communications, PSYOP, operational fires). See Appendix B to this
annex.
(3) Operations Security. Deny the enemy information concerning the
speed and size of the US buildup, as well as the specific course of
action the US will execute in the decisive combat phase. Emphasis in
initial stages is on denying the enemy access to his own or foreign
intelligence capabilities. Deception, PSYOP, EW, and physical
destruction all support these objectives. See Appendix C to this annex.
(4) Psychological Operations. This annex refers to the intelligence
annex, designates PSYOP targets, and describes the PSYOP plan, to
include its integration into higher headquarters plans and any
deception plan operations or related tasks for subordinate units. See
Appendix D to this annex.
(SECURITY CLASSIFICATION)
A-11
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-12
FM 100-6
(SECURITY CLASSIFICATION)
(SECURITY CLASSIFICATION)
A-13
Appendix B
Responsibilities of
Supporting Agencies
This appendix discusses the functions and responsibilities of Army
and joint agencies supporting IO and C2W across the operational
spectrum. It discusses the missions and functions of the Joint
Command and Control Warfare Center (JC2WC) and LIWA. It
delineates the responsibilities to the commander-in-chief (CINC) and
Army component commander, respectively. IO/C2W planners should
use this appendix to gain a better understanding of the support
available from these agencies.
Mission
2
The mission of the JC WC, formerly the Joint • Service component commanders.
Electronic Warfare Center (JEWC), is to provide
direct C2W support to operational commanders. • Functional component commanders.
The JC 2 WC supports the integration of the The JC 2 WC also provides support to the
constituent elements of C2W—OPSEC, PSYOP, Office of the Secretary of Defense, the joint staff,
military deception, EW, and destruction. It also the services, and other US Government agencies.
supports the noncombat military applications of The JC2WC maintains specialized expertise in
IW throughout the planning and execution C2W-related—
phases of operations. The JC2WC provides this
• Systems engineering.
direct support in the following priority order:
• Joint force commanders (combatant • Operational applications.
c o m m a n d e r s , s u b o rd i n a t e d u n i fi e d • Capabilities.
commanders, and joint task force
commanders). • Vulnerabilities.
Functions
2
The JC WC, through the joint staff director IW (see DOD Directive TS3600.1) with
for operations (J3) serves as the principal field DOD C2W efforts.
agency within DOD for C2W support. • Participates in the Joint Special Technical
Operations System by analyzing
J3
capabilities (in coordination with the
As stated in CJCSI 5118.01 the JC2WC, acting intelligence community), as tasked by the
through the joint staff J3— director of the joint staff, to optimize
• Interfaces with the joint staff, services, special technical operations support to
DOD, and non-DOD agencies to integrate combatant commanders.
B-0
FM 100-6
• Serves as the joint staff central point of procedures to assist commanders with the
contact for reviewing joint C2W mission i d e n t i fi c a t i o n , validation, and
needs statements (MNS). dissemination of electronic threat changes.
Coordinates compatibility and facilitates
• Coordinates with the joint staff director for
C4 systems (J6) for C2-protection issues.
exchange of data used in joint EW
reprogramming among the intelligence
• Assists the CJCS, through the joint staff J3/ community, services, and combatant
STOD (special technical operations commands.
division that serves as the doctrine
sponsor for C2W and EW) in the
• Organizes and facilitates development of
joint C2W simulations supporting
development of joint doctrine and joint
wargaming among the joint staff, services,
tactics, techniques, and procedures.
combatant commands, and combat support
• Evaluates C2W effectiveness in combat. agencies, in conjunction with the Joint
• Serves as the DOD focal point for defining, Warfighting Center.
coordinating, and overseeing the integration • Serves as the joint staff’s point of contact
of those data bases/data systems necessary through the J3 for C 2 W joint universal
to establish a common joint information base lessons learned (JULLS) reported under the
for conducting C2W. This information base Joint After-Action Reporting System
comprises intelligence and operational data (JAARS) and referred for action as remedial
bases/data systems, that is, data on US action projects (RAPs).
equipment, systems, and forces. It also • Participates in C2W research or studies of
includes other types of data bases (the an operational nature for DOD
remainder of the world’s systems— organizations and agencies.
geophysical, topographical, psychological,
and doctrinal) necessary to conduct C2W in • Maintains knowledge and coordinates with
the combatant commander’s battlespace. It the services on C2W systems engineering
includes US and, as available, allied WARM initiatives, laboratory programs, and
(weapons assignment research model) industrial developments.
descriptions and descriptions of US- • Performs vulnerability and effectiveness
manufactured systems sold to other nations. analyses of US equipment used in C2 W.
For the most part, this information base: Coordinates C2 vulnerability analyses with
– Is releasable to allied nations annually in the joint staff J6.
coordination with the services, • Supports allied nations or international
intelligence agencies, and other organizations on a case-by-case basis.
cognizant agencies and commands. Support includes representing the US in
– Provides a report to the joint staff J3 on appropriate international forums.
the currency and shortfalls in the C2W • Produces the annual DOD EW Plan in
information base. conjunction with the Services and combat
support agencies.
– Participates in the development of
decision aids used to manipulate the • Develops and produces an annual DOD
C2W information base. C2W plan in conjunction with the services
and combat support agencies.
– Orchestrates efforts for interoperability
and connectivity of data and systems to
support C2W with the GCCS in COMBATANT
cooperation with the DOD intelligence COMMANDER
community and the joint staff J6. For direct combatant commander C 2 W
support, the JC2WC maintains deployable C2W
• Organizes, manages, and exercises the joint augmentation teams to support the combatant
aspects of EW reprogramming. Develops commander as requested. To provide timely
B-1
FM 100-6
analysis and advice for planning and As required, the JC2WC requests
coordination of C2W, these teams maintain an augmentation from specialized organizations,
awareness of the threat and the OPLANs in the through the joint staff J3, for a deploying JC2WC
respective combatant commanders’ AORs. In team to provide a more comprehensive C 2 W
addition, the teams— capability to the supported commander. The
• Train with and develop routine working JC2WC also—
relationships with other organizations • Maintains a dedicated action officer at the
having specialized expertise in the JC 2 WC for each combatant command to
constituent elements of C2W. interface with each CINC’s staff and
integrates C2W into appropriate OPLANs.
• Provide C2W technical assistance. These action officers are responsible for all
• Function as the central coordinating JC2WC actions regarding C2W support of
element for organizations that support the their respective CINCs.
CINC’s C2W effort. • Provides tactical and technical analyses of
C2W in military operations.
• Maintain the capability to assist in planning
and coordinating the employment of joint • Supports C 2 W training by assisting
and combined EW assets as part of the combatant commanders in planning,
JCEWS. conducting, and evaluating the C 2 W
aspects of joint exercises, including field
• Provide in-theater guidance and assistance training exercises, command post exercises,
for the joint coordination of EW and computer simulations for wargaming
reprogramming. in collaboration with the Joint Warfighting
• Provide timely advice and comprehensive Center.
EW analysis support, such as radar terrain • C o o r d i n a t e s a n d c o n d u c t s fi e l d
masking overlays, and predictive analyses demonstrations of emerging technologies
(for example, Proud Flame). responsive to CINC C2W needs.
B-2
FM 100-6
Mission
L I WA c o o r d i n a t e s m u l t i d i s c i p l i n e d LIWA has been specifically designed to
intelligence and other support for operations provide tailored support to the land component
planning and execution, to include C2 W data commands. LIWA’s purpose is to provide
commanders with technical expertise that is not
base support, HUMINT, CI, and TECHINT.
resident on the command’s general and special
LIWA is electronically connected with other staff and to provide responsive technical
national, DOD, joint, and service IW facilities or interfaces with other commands, service
c e n t e r s . I n t e g r a l t o L I WA i s t h e A r m y components, and national, DOD, and joint
Reprogramming Analysis Team-Threat Analysis information centers. When deployed, the LIWA
(ARAT-TA) collocated with the US Air Force at FSTs become an integral part of the command’s
IO staff. To facilitate planning and execution of
IO, LIWA provides IO/C2W operational support
the Air Warfare Center. ARAT-TA provides the
technical expertise to ensure target-sensing to land component and separate Army
weapons systems are correctly programmed to commands and active and reserve components
meet the specific conditions of a designated AO. (AC/RC).
Functions
LIWA acts as the operational focal point for facilities to IO/C2W sabotage, deception,
land IO/C 2 W by providing operational staff and attack and to assess their ability to
support to AC/RC land component commands maintain personnel and security programs
and separate Army commands. It coordinates, and protect such facilities.
a r r a n g e s f o r, a n d s y n c h ro n i z e s I O / C 2 W
intelligence and CI support to land component • C4 threat advisories with recommendations
commands. LIWA coordinates and deploys FSTs for counter-countermeasures.
to assist and support LCCs in C 2 -protect,
including— LIWA coordinates and deploys FSTs to
• C4 security support. advise LCCs on C2-attack, including—
• Analyses, investigations, and surveys to • Preparing deliberate and contingency plans
assess the vulnerability of the LCCs’ C2 and orders.
B-3
FM 100-6
• Analyzing the threat and interpreting the • Provides operational insight and
situation, critical nodes, enemy recommendations to TRADOC and HQDA
vulnerability, defeat criteria, and BDA. on Army IO/C2W requirements and input
into Army modernization strategy, policy,
• Maintaining selected, tailored IO/C 2 W scenarios, modeling, and simulations.
data bases and monitoring the accuracy of
• Assists TRADOC in the development and
evaluation of IO/C2W systems’
supporting data bases.
Responsibilities
LIWA, as the designated Army operational and guidance, provide a wide range of support,
focal point and Army executive agent for IO/ by—
C2W operational support matters, is responsible
• Assisting in the preparation of war plans,
for—
contingency plans, and orders.
• Supporting HQDA ODCSOPS with subject-
matter technical expertise regarding IO/ • Helping develop target lists, estimates, and
C2W matters and land force deployments. assessments.
• Advising major Army and component
commands on available and emerging IO/ • Supporting the analyses of threat critical
C 2 W capabilities within the Army and nodes, enemy vulnerabilities, defeat
other services and agencies. criteria, and BDA.
B-4
FM 100-6
KEY PERSONNEL
Commander: 235-1069/2263 SA: Studies and Analysis 235-2269
Operations: 235-1791/2259 DO: Director of Operations 235-1069
DR: Director 235-1791 RT: Red Team 235-2262
XO: Executive Officer 235-2266 IM: Information Support 235-1420
DD: Deputy Director 235-2263 PR: Plans and Resources 235-2987
B-5
Appendix C
Planning Considerations
Effective battle staff planning requires a framework that focuses on the
commander’s concept of operation. Planners integrate all available
information and resources that facilitate mission accomplishment at the
strategic, operational, and tactical levels. This appendix discusses the
INFOSYS support planning principles, signal support requirements, and
2
C W planning process the commander uses to plan and conduct military
operations. The principles serve as a starting point from which to create
solutions to mission requirements that focus on resolving all INFOSYS and
2
C W issues and problems before the start of operations.
Modularity
Modular INFOSYS packages consist of sets needs of each mission. These packages must
of equipment, people, and software tailorable for satisfy the commander’s informational
a wide range of missions. Planners must requirements during the execution phases of the
understand the mission, the commander’s intent mission. Modular INFOSYS packages must be
and operational plan, availability of assets, and flexible, easily scaled, and tailored with respect
the information structure required to meet the to capacity and functional capability.
Interoperability
Interoperability is the capability of the NCA to the lowest information request.
INFOSYS working together as a system of INFOSYS should comply with the Army’s
systems. Interoperability implies compatibility of technical architecture. Adherence to these
combined, joint, and service common standards and protocols helps ensure
information or data elements procedures. interoperability and a seamless exchange of
Interoperability is the foundation on which information among the battlefield functional
INFOSYS capabilities depend. An interoperable areas and joint services. Older INFOSYS that do
INFOSYS is visible at all functional levels—a not comply with the common operating
secure, seamless, cohesive, infrastructure that environment and technical architecture require
2
satisfies C and information requirements from special planning and may not be interoperable.
Liaison Officers
LOs provide a means for the commander and different phases of an operation and between
planners to increase interoperability during commanders and staffs that have not previously
C-0
FM 100-6
worked together. LOs are especially important and enable planners to manage information more
for interpreting intent and relevance to the efficiently and effectively. LOs are especially
parties they serve and in overcoming the natural important when working with government
friction that develops between disparate agencies and allies.
organizations. LOs ease technical coordination
Flexibility
Planners must be flexible when supporting the mission or tactical situation and build a plan
INFOSYS requirements in changing situations. to accommodate them.
They must anticipate the possibility of changes in
Economy
Scalable system packages ease the application deployed. Information requirements must be
of economy. Space, weight, or time constraints limit satisfied by consolidating similar functional
the quantity or capability of systems that can be facilities integrating commercial systems
Survivability
INFOSYS must be reliable, robust, resilient, ensure that performance under stress degrades
and at least as survivable as the supported force. gradually and not catastrophically. Command
Distributed systems and alternate means of procedures must be capable of adaptation to cope
communications provide a measure of resilience. with degradation or failure.
Systems must be organized and deployed to
Redundancy
From an INFOSYS network perspective, that sufficient backup systems and repair parts
planners provide diverse paths over multiple are available to maintain the system’s or
means to ensure timely, reliable information flow. network’s capabilities.
From an equipment perspective, planners ensure
Standardization
The commander’s information requirements modular package are standardized throughout
m u s t n o t b e c o m p ro m i s e d b y t h e u s e o f the joint force. Standardization also includes
nonstandard equipment. Planners must ensure INFOSYS training, symbology, switch network
that the equipment, its configuration, and the diagrams, packet network diagrams, and
installed operating systems included in a terminology.
Commercial Capabilities
The availability of commercial INFOSYS commercial system allows planners to
often offers the commander a guide, as well as an compensate for system shortages and to meet the
alternative means, to satisfy his informational C2 surge of information requirements in the early
needs. Further, it may reduce the number and s t a g e s o f d e p l o y m e n t . T h e G 6 h a s s t a ff
size of deployed modular packages; however, responsibility for the standardization of
security must be considered. Operational use of a commercial equipment and software used
C-1
FM 100-6
throughout the AO. However, planners have to accepted standards and protocols to interface
ensure the deployed modular INFOSYS packages with commercial systems.
implement open, nonproprietary, commonly
Security
The level of security depends on the nature of access to terminals, software, and disks helps to
the information to be protected and the threat of ensure security of INFOSYS. Security must be
interception or exploitation. Electronic on-line balanced by the need to disseminate critical
encryption devices usually provide information quickly.
communications security. Controlling physical
C-2
FM 100-6
C-3
FM 100-6
that may be used to facilitate joint IO activities are found within most fleet Marine forces. Both
the BCE found within corps headquarters and the already serve as information nodes to coordinate
air/naval gunfire liaison company (ANGLICO) activities across service lines.
C2-PROTECT
concept of operation by integrating the elements
of C2W into a coherent, synchronized plan.
PLANNING STEPS
C-4
FM 100-6
EXECUTION TIMELINES
Do the actions in each area directly D+X D+Y
support the C2W annex, and do they
complement each other?
Coordination
Meets periodically
to coordinate
J2
AO
Electronic Warfare
PSYOP
Deception
Physical Destruction
OPSEC
C-5
Appendix D
ORGANIZATION
The IO cell should have representatives • Developing IO concepts to support the
from the targeting cell, targeting board, joint scheme of maneuver.
operations and targeting coordination board, or
• Establishing IO priorities to accomplish
whatever integrating process the commander
uses to integrate and synchronize his resources. planned objectives.
Each element of C2W should be represented • Determining the availability of IO resources
where possible. In OOTW situations the CA to carry out plans.
representative and/or PA representative may
Consolidated tasking will assist in the integration
take on more importance. In conflict and war
the targeting representative may become the and synchronization required for effective IO,
focus of activity. Functions of the IO cell including coordination with the joint IW
include— community.
• Planning the overall IO effort for the As the spectrum of engagement moves from
commander. peace to war, it may be more appropriate to stand
D-0
FM 100-6
up an IOBS. An IOBS would be appropriate at broader in scope. This type of staff organization
division and above and most appropriate at would be best suited for deployment in the
corps. Although the functions would be relatively context of a campaign, as discussed in
the same as the IO cell, they would be much Appendix A (see Figure D-2).
TRAINING
As in all areas, effective IO requires soldiers When employing IO in exercises, the
to train the way they are going to fight or following considerations are important:
operate. The basic task is to train the force on IO, • D e v e l o p i n g c o n c re t e , a t t a i n a b l e I O
with an initial focus on those personnel objectives.
responsible for planning and coordinating the
individual elements. When our leaders and units • Providing for sufficient IO elements to
are exposed to realistic IO elements in training, support the objectives of the exercise.
such as information distribution in OOTW, their • C re a t i n g a s re a l i s t i c a n I O e x e rc i s e
readiness and confidence increases. environment as possible.
Commander
Chief of Staff
G2 G3 Signal Officer
D-1
FM 100-6
• Assessing and evaluating the employment dominance at selected places and times during an
of IO activities. operation. Tasks include—
• Determining required IO information and
• Exercising all six IO activities in the context how to get answers.
of the exercise.
– Identify the commander’s IO CCIR,
• Using appropriate security measures to PIR, and high-priority targets and
protect the IO elements. synchronize intelligence and
information plans and military plans
• Evaluating the use of computer support on a near-real-time basis.
products to execute IO (synchronization – Establish information-linked strategic,
tools). operational, and tactical collection,
fusion, and report processes
(incorporating RISTA/sensor and CI/
• Using simulations to augment IO where
HUMINT data) to develop continuous,
and when applicable.
timely IO IPB.
• Exercising all five C 2 W elements in the • Knowing your IO capabilities and
context of the exercise. vulnerabilities to the enemy, the natural
e n v i ro n m e n t , t h e p o l i t i c a l s e t t i n g ,
Effective IO first requires specific information international law, and so forth.
products on the adversary’s military (C 2 , – Provide IO modeling and simulation for
intelligence, and capabilities), social, religious, training and evaluating performance,
and economic background that may have to be mission rehearsal, and decision
provided by exercise planners. The data needed making.
– Identify and prioritize IO EEFI.
to create, update, and use these products needs to
be built into the exercise scenario and master
scenario events list. • Knowing enemy IO capabilities and
vulnerabilities.
– Maintain a continuous IO estimate of
Secondly, the opposition force should have an
potential adversaries and/or other
IO capability consistent with the OPLAN/
operational situations in support of IO
CONPLAN scenario that is the basis for the
exercise. Realistic IO are essential to evaluating situational awareness and battlefield
friendly IO. visualization.
Finally, consistent with the tenets of the – Assess adversary C4I/C2W operations,
exercise, free play of IO should be allowed by strengths, and vulnerabilities
both sides. Prestructured, mechanical IO will continuously.
degrade the participant’s ability to gain valuable • Knowing how the enemy sees your
experience from the demands of mental agility capabilities and vulnerabilities in terms of
and creativity that unstructured IO can provide. IO, the battlefield, and PIR.
Senior exercise participants should allow, even
welcome, the C2 chaos that effective IO can cause – Understand the enemy’s decision-
to the exercise participants and work through making process.
such problems. – Identify the enemy’s critical IO nodes.
D-2
FM 100-6
D-3
Glossary
ABCS Army Battle Command System
ACCS Army Command and Control System
adversary often used in this manual in lieu of enemy; the term enemy
is reserved to indicate adversaries engaged in lethal
operations against US forces
AEA army executive agent
AES Army Enterprise Strategy
ACE air combat element
AC active component
ACU area common user
ACUS Army common user system
ADP automatic data processing
ADSO assistant division signal officer
AFATDS advanced field artillery tactical data system
AFGWC Air Force Global Weather Central
AGCCS Army Global Command and Control System
AHFEWS Army High Frequency Electronic Warfare System
AID United States Agency for International Development
AMOPES Army Mobilization and Operations Planning and Execution
System
ANGLICO air/naval gunfire liaison company
AO area of operation
AOR area of responsibility
appliqué a family of laptop-sized computers connected to navigation
devices and radios to provide processing and display
capabilities to platforms without an embedded processor
appreciation personal conclusions, official estimates, and assumptions
about another party’s intentions, capabilities, and activities
used in planning and decision making
ARAT-TA Army Reprogramming Analysis Team-Threat Analysis
ARCENT Army component to Central Command
ARFOR Army force headquarters
ARSOF Army special operations forces
Glossary-0
FM 100-6
Glossary-1
FM 100-6
Glossary-2
FM 100-6
Glossary-3
FM 100-6
Glossary-4
FM 100-6
EA electronic attack
electronics security the protection resulting from all measures designed to deny
unauthorized persons information of value that might be
derived from their interception and study of
noncommunications electromagnetic radiation, e.g., radar
(Joint Pub 1-02)
electronic warfare any military action involving the use of electromagnetic and
directed energy to control the electromagnetic spectrum
(EMS) or to attack the enemy. The three major subdivisions
within electronic warfare are electronic attack (EA), electronic
protection (EP), and electronic warfare support (ES)
EM electromagnetic
EP electronic protection
Glossary-5
FM 100-6
EW electronic warfare
G2 division intelligence
G3 division operations
G5 division civil affairs
G6 division communications
Glossary-6
FM 100-6
Glossary-7
FM 100-6
infrastructure the basic facilities, equipment, and installations needed for the
function of a system, network, or integrated network
IO information operations
IPB intelligence-preparation-of-the-battlefield
Glossary-8
FM 100-6
Glossary-9
FM 100-6
Glossary-10
FM 100-6
OA operational architecture
OB order of battle
ODCSOPS Office of the Deputy Chief of Staff for Operations
OOTW operations other than war
OPFOR opposing force
OPCON operational control
operations security a process of identifying critical information and subsequently
analyzing friendly actions attendant to military operations and
other activities; identifying those actions that can be observed
by adversary intelligence systems; determining indicators
adversary intelligence systems might obtain that could be
interpreted or pieced together to derive critical information in
time to be useful to adversaries; and selecting and executing
measures that eliminate or reduce to an acceptable level the
vulnerabilities of friendly actions to adversary exploitation;
also called OPSEC
OPLAN operations plan
OPORD operations order
OPSEC operations security
OPTEMPO operation tempo
PA public affairs
PAO public affairs officer
PC personal computer
PEO program executive office
PIR priority intelligence requirements
physical destruction the application of combat power to destroy or neutralize
enemy forces and installations; includes direct and indirect
fires from ground, sea, and air forces; also includes direct
actions by special operations forces
physical security that part of security concerned with physical measures
designed to safeguard personnel, to prevent unauthorized
access to equipment, installations, material and documents,
and to safeguard them against espionage, sabotage,
damage, and theft (Joint Pub 1-02)
PM project manager
POS/NAV position/navigation
PRC populace and resource control
Glossary-11
FM 100-6
Glossary-12
FM 100-6
SF Special Forces
TF task force
Glossary-13
FM 100-6
Glossary-14
References
SOURCES USED
Strategic Publications
3
ASD (C I) Memorandum, Information Management Definitions. 25 February 1994.
CJCSI 3210.01. Joint Information Warfare Policy. 2 January 1996.
CJCSI 3210.03.Joint Command and Control Warfare Policy (U). 31 March 1996.
CJCSI 3211.01. Joint Military Deception. 1 June 1993.
CJCSI 6212.01. Compatibility, Interoperability and Integration of Command, Control,
Communications, Computers, and Intelligence Systems. 30 July 1993.
CJCS MOP-6. Electronic Warfare. 3 March 1993 (S).
DOD Directive S-3600.1. Information Warfare.
DOD Directive 5122.5. Public Affairs Program. 12 February 1993.
DOD Directive 5205.2. Operations Security Program. 7 July 1983.
Memorandum of Understanding Among Deputy Chief of Staff for Operations and Plans;
Deputy Chief of Staff for Intelligence; Director of Information Systems for Command,
Control, Communications, and Computers; and Commander, US Army Intelligence and
Security Command, The US Army Intelligence and Security Command’s Land
Information Warfare Activity. February-March 1995.
National Military Strategy. February 1995.
National Security Strategy. January 1995.
References-1
FM 100-6
Joint Pub 3-58. Joint Doctrine for Operational Deception. 6 June 1994.
Joint Pub 6-0. Doctrine for Command, Control, Communications, and Computer (C4)
Systems Support to Joint Operations. 3 June 1992.
Army Publications
AR 360-5. Public Information. 31 May 1989.
AR 360-81. Command Information Program. 2 October 1989.
AR 380-5. Army Information Security Program. 1 March 1988.
AR 380-19. Information System Security. 1 August 1990.
AR 381-11 (C). Threat Support to US Army Force, Combat and Material Development.
1 March 1993.
AR 525-21. Battlefield Deception Policy. 30 October 1989.
AR 525-22. Intelligence and Electronic Warfare. 1 October 1982.
AR 525-20. Information Warfare/Command and Control Warfare (IW/C2W) Policy.
(draft). No date.
AR 530-1. Operations Security. 3 March 1995.
FM 11-45. Signal Support: Echelons Above Corps (EAC). April 1993.
FM 11-75. Battlefield Information Services (BIS). 20 September 1994.
FM 24-1. Signal Support and the Information Mission Area. May 1993.
FM 24-7. Army Tactical Command and Control System (ATCCS) System Management
Techniques. August 1993.
FM 27-100. Legal Operations. 30 September 1991.
FM 33-1. Psychological Operations. 18 February 1993.
FM 34-1. Intelligence and Electronic Warfare Operations. 27 September 1994.
FM 34-37. Echelon Above Corps Intelligence and Electronic Warfare Operations.
15 January 1991.
FM 34-130. Intelligence-Preparation-of -the-Battlefield. 8 July 1994.
FM 41-10. Civil Affairs Operations. 11 January 1993.
FM 46-1. Public Affairs Operations. 23 July 1992.
FM 71-100. Division Operations. July 1994.
FM 90-24. Multiservice Procedures for Command, Control, and Communications
Countermeasures. 17 May 1991.
FM 100-1. The Army. 14 June 1994.
FM 100-5. Operations. 14 June 1993.
FM 100-7. Decisive Force: The Army in Theater Operations. 31 May 1995.
References-2
FM 100-6
Other Publications
Army Battle Command Master Plan (ABCMP). HQDA, Office of the Deputy Chief of Staff for
Operations and Plans. 19 September 1994.
Army Digitization Master Plan. HQDA, Army Digitization Office. 30 January 1995.
Army Enterprise Strategy Implementation Plan. Office of the Secretary of the Army. 8 August
1994.
Baig, Ed C. and John Cary. “Shielding the Net against Cyber-Scoundrels.” Business Week.
14 November 1994.
Bentley, Mark and Paul Evancon. “CVW - Computer Virus as a Weapon.” Military Technology.
May 1994.
“C4I for the Warrior.” The Joint Staff Pamphlet. J6. 12 June 1993.
CJCS Pamphlet. Psychological Operations Support for Operation Provide Comfort.
March 1994.
de Borchgrave, Arnado. “Airbase No Match for Boy with a Modem.” Washington Times.
3 November 1994.
FMFM 3. Command and Control. 16 June 1993.
Fuller, J.F.C. Memorandum on Strategic Paralysis as the Object of the Decisive Attack.
May 1918.
Gingrich, Newt, Rep. “Information Warfare: Definition, Doctrine and Direction.” Speech at the
Information Research Management College, National Defense University. 3 May 1995.
References-3
FM 100-6
Griffin, Gary B. MAJ (USA). The Directed Telescope: A Traditional Element of Effective
Command. Combat Studies Institute, US Army Command and General Staff College.
20 May 1985.
Leaflets of the Persian Gulf War. 4th Psychological Operations Group (Airborne) Pamphlet.
Undated.
Naval Doctrine Publication 6. Naval Command and Control. 19 May 1995.
Otis, Glenn General (USA, Ret) and W. Peter Cherry, Dr. “Concept Paper: Information
Campaigns.” VRI Study. 19 November 1991.
Price, Alfred. The History of US Electronic Warfare. Arlington, VA: Association of Old Crows.
1984.
Spiller, R.J. Combined Arms in Battle Since 1939. Fort Leavenworth, KS: US Army CGSC
Press. 1992.
Steele, Robert D. US Newswire. 24 August 1993.
Toffler, Alvin and Heidi. War and Anti-War: Survival at the Dawn of the 21st Century. Boston:
Little, Brown and Co. 1993.
US Army Modernization Plan Update (FY 95-99). HQDA, Office of the Deputy Chief of Staff
for Operations and Plans. May 1994.
Case Study: Rome Laboratory, Griffiss Air Force Base, NY, Intrusion. US Senate Permanent
Subcommittee on Investigations. 5 June 1996.
DOCUMENTS NEEDED
DA Form 2028. Recommended Changes to Publications and Blank Forms. February 1974.
FM 11-45. Signal Support: Echelons Above Corps (EAC). April 1993.
FM 11-75. Battlefield Information Services (BIS). 20 September 1994.
FM 24-1. Signal Support and the Information Mission Area. May 1993.
FM 24-7. Army Tactical Command and Control System (ATCCS) System Management
Techniques. August 1993.
FM 27-100. Legal Operations. 30 September 1991.
FM 33-1. Psychological Operations. 18 February 1993.
FM 34-1. Intelligence and Electronic Warfare Operations. 27 September 1994.
FM 34-37. Echelon Above Corps Intelligence and Electronic Warfare Operations.
15 January 1991.
FM 34-130. Intelligence Preparation of the Battlefield. 8 July 1994.
FM 41-10. Civil Affairs Operations. 11 January 1993.
FM 46-1. Public Affairs Operations. 23 July 1992.
FM 71-100. Division Operations. (Coordinating Draft). July 1994
References-4
FM 100-6
READINGS RECOMMENDED
TRADOC Pam 525-5. Force XXI Operations: A Concept for the Evolution of Full-Dimensional
Operations for the Strategic Army of the Early Twenty-First Century. 1 August 1994.
TRADOC Pam 525-69. Concept for Information Operations. 1 August 1995.
References-5
Index
C2 personnel, equipment, ARAT-TA B-4
A and systems 3-9 architecture 5-2
ABCS 2-8, 5-3, 5-7, 5-10, 6-3 C2 structure 6-2 communications automation
access paths, alteration of 5-9 C2 system 3-1 2-8, 5-1
academic institutions 1-3 decision cycle 2-12, 3-9 operational 2-7
acquire 2-9 decision-making process 4- seamless 5-2
Advanced Field Artillery 4, 4-5, 4-6
Tactical Data System. See system 2-7
indirect fire systems 2-12
AFTADS technical 2-8
advanced weapons system information infrastructure 2-
archives 3-11
technology 2-8 12, 4-6
area of operation, analysis of
adversary INFOSYS data or
2-12
attacks to disrupt communications 2-11
Army
capabilities 2-4, 2-12 key leaders and decision
countering effects of makers 4-4 component commander 6-1,
propaganda 3-9, 3-10 6-2, B-1
leadership style 4-4
cultural, political, and comprehensive information
AES 2-7
commercial aspects of 2- architecture 2-7
6 AFTADS 2-11
IW/C2W requirements B-4
and degrading confidence 2- AGCCS 5-3
12, 3-9 modernization strategy B-5
agencies that coordinate
and destruction of international efforts 1-3 technical architecture C-0
information capabilities 3- Army Battle Command
6 AHFEWS 6-2
System. See ABCS
and disinformation 3-10 air and naval support 2-7
Army Command and Control
and disruption of C2 air power 1-7
System. See ABCS
capabilities 2-4 air superiority 1-9
Army Enterprise Strategy.
dominating and controlling Air Warfare Center 17
2-2 See AES
air/naval gunfire liaison Army Global Command and
gaining an advantage in
MIE 1-3 company. Control System.
See ANGLICO C-4 See AGCCS
options to influence or
attack opposing aircraft-borne sensors 6-2 Army High Frequency
INFOSYS 1-6 AirLand Battle 2-4 Electronic Warfare System.
intelligence systems 3-2 alert phase 1-4 See AHFEWS
militaries 1-6 Army Information System
allied coalition force 1-9
signatures 2-13 Architecture, illustration of 5-
AMOPES 6-14
space-based systems 2-12 4
analysis
spectrum usage 5-13 Army Mobilization and
of potential targets 2-12
understanding 4-5 Operations Planning and
adversary’s of signatures 2-12 Execution System. See
C2-attack courses of action of the adversary’s AMOPES
3-9 vulnerabilities 4-5 Army Reprogramming
C2 infrastructure 2-12, 3-6 ANGLICO C-4 Analysis Team-Threat
C2 node 2-12 Appliqué 5-3 Analysis. See ARAT-TA
Index-0
FM 100-6
Index-1
FM 100-6
Index-2
FM 100-6
challenges for leaders 1-7, 6-5 operations 2-3, 3-12 responsibilities for planning
and 6-6 power effects, massing of and execution 6-6
chaplains 6-7 6-15 senior and subordinate 4-2
chemical weapons, power, optimization of 1-12 senior commander’s intent,
contamination by 1-7 support agencies 15 sharing 1-12
CI B-4, D-2 combat service support C-3 situational awareness 2-10
CINC. See also JTF combatant commander B-1, span of control 1-14
responsibilities of B-1, B-3, B-2.See also JFC Commander’s Internal
C-3. combatant commands B-2 Information Program 3-9, 3-14
planning and preparation combined arms team 6-3, 6-15 commanders
activities 6-2 and battle command
command and control. See C2
civil responsibilities 6-5
command and control warfare.
administration 3-10 See C2W and decision-making 2-2
affairs. See CA Command Information and PA responsibilities 2-5
authorities 3-10 Program. See Commander’s at the tactical level 6-3
information 3-10 Internal Information Program commercial
civilian assets 1-9 command information. and scientific networks 1-7
See internal information
civilian infrastructure 5-5 communications satellite
program 2-5
civilians 3-11,6-18 systems 5-5
command, control,
civil-military operations center. communications, and receivers 5-5
See CMOC computers. See C4 3-2 satellite terminals 6-2
civil-military operations. command, control, systems 2-13, C-1
See CMO communications, computers, off-the-shelf products,
CJCS B-3 and intelligence. See C4I 2-7 search for 5-6
CMO 3-10, 6-13, 6-16 command systems 2-7 communications 2-13, 3-12,
CMOC 2-5, 3-12, 6-3, 6-18. commander-in-chief. See CINC 5-1, 6-2
See also emergency commander’s connectivity 2-6, 5-12
operations centers
art 6-5 infrastructure on the
coalition nations, and C2W C-3 battlefield 1-7
assessments 1-11, 1-12
coalition operations and C2W interception of 2-11
assets C-5
C-3
concept of operation 1-11, linking 5-2
cognitive hierarchy 2-1
5-12, 6-15, C-4 media 3-12
collateral damage 4-7
critical information methods 3-14
collection requirements. See CCIR networks 5-9, 6-4, 6-8
efforts 4-1 decision and execution cycle security. See COMSEC
plans 2-10 2-6, 4-0, 4-1, 4-2
support personnel 6-19
and use of information 4-0, decision-making process 4-3
4-1 to and from subordinate 3-9
information needs 3-14,
combat 5-10, C-0, C-1 compatibility C-0
effectiveness 2-6 intent 1-11, 1-12, 5-0, 5-10, components of IO 2-1, 2-3, 6-0
information data bases, and C-0 computer
ABCS 5-3 IO requirements 5-7 bulletin boards 1-7
net radios 5-13 operational requirements 2-6 laptop 5-3
Index-3
FM 100-6
Index-4
FM 100-6
Index-5
FM 100-6
Index-6
FM 100-6
Index-7
FM 100-6
Index-8
FM 100-6
Index-9
FM 100-6
IW/C2W 6-7, B-4 JTF 6-4, 6-7. JTF. See also lethality 1-9, 2-8
plan 6-14 CINC levels of war 3-14, 6-0, 6-1
C2W cell C-3 liaison 3-0, 3-12, 6-18
systems B-4
commanders B-1 and coordination 3-12
campaign plan 6-2
J officers 6-19
judge advocate, coordination
J2 3-11, 3-12 personnel 2-13
with 1-9, 6-4
J3 4-3, 6-6, 6-7, 6-8, 6-10, B-1, libraries 3-11
JULLS B-2
B-2, B-3, C-3 linguistics 2-5
J5. See CA staff officer K linkages 5-7
J6 5-6, 5-12, B-2 LIWA 6-7, B-4 through B-6
know the situation 1-5
JAARS B-2 knowledge advantage 1-9 local
jamming 1-6, 2-12, 2-13, 3-5 over an enemy 1-9 area networks 5-11
JC2WC B-1 through B-3 to achieve a desired end assets 6-18
JEWC. See JC2WC state 1-10 authorities 2-5
knowledge-based operations logic bombs 1-6, 5-9
Joint After-Action Reporting
5-10 logistics 6-7
System. See JAARS
knowledge-based relevant
Joint Command and Control
common picture 5-7
Warfare Center. M
See JC2WC
L maintenance, coordination of
Joint Electronic Warfare 3-12
Center. See JC2WC land forces, C2 capabilities of
major operations plan model
joint force attack strategy 6-2 2-7
A-1 through A-7
Land Information Warfare
joint force commanders B-1 malicious software 1-6, 2-11,
Activity. See LIWA 6-7
joint message text. See data 5-9
land operations 6-0
distribution management
laptop computers 5-3
joint operational areas 5-7 of information and assets
lassie also ROE
Joint Operations Planning and 2-13
governing the information
Execution System. See of technical systems 5-12
environment 6-4
JOPES maneuver 6-15
international 6-4
joint restricted frequency list manipulation
5-12 law of land warfare 6-4
of war, respect for 3-15 of operationally relevant
joint signal operating information 2-6, 2-12
instructions 5-12 LCCs 6-7, 17, 18
of data bases 6-4
Joint Special Technical leadership 6-4, 6-5
Marine drones 6-3
Operations System B-1 legal and policy limits, on use of
non-DOD systems 2-10 media coverage 1-1, 1-3, 1-13,
joint task force. See JTF
3-14, 6-6, 6-13. See also
legal and policy restrictions
joint universal lessons learned. news media and PA
6-10. See also law and ROE
See JULLS B-2 operations
legal considerations 1-8, 1-9.
Joint Warfighting Center B-3 media relations 3-14
See also law and ROE
joint warfighting operations 6-1 lethal and nonlethal, direct and medical facilities 3-12
JOPES 6-14 indirect capabilities 1-12 METL D-2
Index-10
FM 100-6
METT-T 2-9, 2-12, C-2, C-4, multilevel secure network 5-12 news organizations. See news
D-0 multimedia media
MIE 1-1, 1-3, 1-4, 1-8, 1-12, battle command information newspaper services 3-10, 3-11
2-6, 2-10, 4-2, 4-4, 4-7, 5-5, 5-7 NGOs 1-3, 2-5, 2-12, 3-0, 3-10,
6-4, 6-9 3-11, 6-10, 6-16, 6-18, 6-19.
services 1-4
and battlespace 2-3, 2-11 See also PVOs
systems 5-6
characteristics of 1-4 NII 1-3, 6-13
technology 5-8
commander’s 6-8 adversary’s 2-2
multinational operations 6-19
complexity of 2-4 characteristics of 1-4
and firepower 1-12 non-DOD agencies 1-3, 6-18
N
and relevant information 4-0 nongovernment organizations.
National Command Authorities. See NGOs
influences in 1-9 See NCA
and link to GIE 2-8 nonhierarchical structure 1-12
national information
manipulation of 1-3 infrastructure. See NII nonmilitary
Index-11
FM 100-6
concept 1-12, 2-13, 6-14 other services, allies, and for battlespace and garrison
continuum 3-10 adversaries 1-3 operations 2-11
environment 2-6, 6-2 overt attacks 1-7 battle staff C-4
maneuver 6-2 considerations
planning and execution 1-11,
P C-0 through C-5
2-5, 3-11 PA operations 1-13, 3-0, 3-9, initial spectrum 5-13
vision 1-12 3-12, 6-2, 6-7, 6-10, 6-13, at joint and multinational
6-15, 6-16.See also news levels C-3
operational-level IO 6-2 media operations 2-13
operations annex 3-15 and PA 3-15
asymmetrical or hybrid 6-4 and deployment 6-11 process 6-8 through 6-10
as a component of IO 2-1 coordination and support proper use of INFOSYS 5-6
in garrison 2-3 3-15
plans 5-7, A-0. See also
global visibility of 1-8 elements 6-18
OPLAN and OPORD
officer, responsibilities of integration of 2-6
development of 2-6
2-11 levels of 3-15
instructions for completing
other than war. See OOTW media facilitation 3-15 plans and orders A-1
planning for 6-8 missions of 3-14 through A-13
security. See OPSEC and the news media 1-13 policy
synchronization of 2-7 operations 3-13, 6-13, 6-15 for nonmilitary computer
OPLAN 2-10, 3-12, 3-15, 6-2, operations, synchronization systems 1-9
B-3, B-4, D-2.See also of 2-6 objectives 1-3
OPORD personnel 2-6 related to the conduct of
OPORD 3-12, 3-15, B-4. See and predeployment 6-13 military operations 1-8
also OPLAN programs 6-13 political opponents 1-6, 1-7
opportunity cost of an action representative D-0 populace and resources control
6-10 specialists 3-10 6-16
opposed entry 6-14 PAO, responsibilities of 2-5, position locating and reporting
opposing militaries 1-6, 1-7 3-10, 3-14, 4-3, 6-3, 6-7 technologies 6-5
OPSEC 1-12, 2-4, 3-2, 3-3, 3-9, passwords 5-9 positioning and navigation data
3-12, 3-15, 6-3, 6-7, 6-13, peacekeeping force, protection 5-12
6-14, 6-16, 6-18, B-1, B-4, of 6-19 postal and telegraph systems
C-4. See also security 5-5
perception, manipulation of 3-6
compliance 5-10 phone networks 6-10 post-Cold War world 6-1
definition of 3-2 physical destruction 2-12. See postconflict operations 6-16
goal of 3-2 also destruction postconflict turmoil 6-16
and the media 2-6 and C2W 3-2 potential threats 6-4
planning 3-2 definition of 3-5 power projection 2-2, 6-11
order of battle 2-7, 2-12, 6-2, physical protection 3-9 power sources 1-7
6-4 PIR 2-7, 2-9, 6-13, 6-14, D-2 power-projection operations.
orders, development of 2-6, planners, responsibilities of 6-0 See force-projection
5-7, A-0 planning 5-8, 6-0 through 6-10, operations
organizational sciences 1-2 6-19 power-projection platforms 5-7
Index-12
FM 100-6
Index-13
FM 100-6
Index-14
FM 100-6
Index-15
FM 100-6
Index-16
FM 100-6
27 AUGUST 1996
DENNIS J. REIMER
General, United States Army
Chief of Staff
Official:
JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army
DISTRIBUTION:
Active Army, USAR, and ARNG: To be distributed in accordance with DA Form 12-11E, requirements
for FM 100-6 (Qty rqr block no 5425).