(Updated October 7, 2014)
Purpose: The Working Group (WG) promotes the exchange of ideas concerning current Information and Cyber Operations thinking and capabilities and their impact on the warfighter. Specifically, the WG explores the changing opportunities, capabilities, and vulnerabilities of Information Operations (IO) and Cyber Operations (CO) across the spectrum of peace and conflict. This WG places emphasis on new techniques, capabilities, and studies that help to demonstrate the actual impact and value of IO and CO to the warfighters, defenders and responders across all operational phases.
Discussion: IO and CO have been a topic of increasing importance during the last several years. Joint Publication 3-13, Information Operations (IO), dated 27 November 2012, defines IO as the “Integrated employment, during military operations, of information-related capabilities (IRC) in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” IO currently employs five core capabilities to achieve desired Combatant Commander’s effects or prevent the enemy from achieving his desired effects: electromagnetic warfare (EW), computer network operations (CNO), military information support operations (MISO), military deception (MILDEC), and operational security (OPSEC). The newest revision of Joint Publication 3-13, introduces new models of information-influence relationships and environments; as well as, clarifies staff roles and desired effects upon target audiences (TA).
As a basis of reference and for consistency in our efforts, the WG will use the DoD 3600.01 definition of DoD-related Information Operations to explore capabilities with particular interest on the global integration of how Information Operations, as a Core Military Competency, could provide the capability required to be decisive in future conflicts. This WG will also incorporate the evolving definitions, perspectives and activities of non-DoD defenders and responders with respect to Information and Cyber Operations and activities. Past symposia, games, and more recently several major exercises and real world events have highlighted the importance of this area, including the vulnerabilities of Information-Technology-dependent organizations and the global reach of influence messages. Of crucial importance to Information and Cyber Operations is the ability to demonstrate the impact of Information and Cyber Operations (CO) capabilities during peace, crisis, war, or operations other than war.
The Information Operations and Cyber Operations Working Group features analyses and associated papers, which provide insight into these important areas regardless of the Information and Cyber Operations technique or capability used. Papers that describe development of Information and Cyber Operations analysis tools, techniques, experimentation, measures of effectiveness, historical case studies of both successful and unsuccessful Information and Cyber Operations, damage indicators and damage assessment methods—or the refinement of existing ones—are welcome. Presentations may include completed studies or work-in-progress.
Other Working Groups: Candidates for joint discussions with WG 5 include:
· Strategic Operations National Security Analysis (WG 1)
· Infrastructure Analyses, Protection and Recovery (WG 3)
· ISR and Intelligence (WG 7)
· Air and Missile Defense (WG 9)
· Joint Campaign Analysis (WG 10)
· Maritime Operations (WG 12)
· Experimentation (WG 22)
· Measures of Merit (WG 23)
· Decision Analysis (WG 27)
· Modeling and Simulation (WG 28)
· Wargaming (WG 30)
· Special Operations and Irregular Warfare (WG 32)
· Social Science Methods and Applications (WG 33)