TRAINING SUPPORT PACKAGE (TSP)
TSP Number/
Title / 158-IO-0001
Implement Defensive Information Operations
Effective
Date / 1 OCT 2001
Supersedes
TSP(s) / 301-371-1050  Implement Operational Security Measures
113-367-9001 Supervise the Implementation of Platoon Electronic Measures
TSP User / Enlisted Members , Warrant Officers , Commissioned Officers
Proponent / CAC, Fort Leavenworth KS 66043
Improvement Comments / Please send your comments to:
Commander
US Army Combined Arms Center
ATTN: Futures Development & Integration Center
415 Sherman Avenue, Suite 14
Fort Leavenworth, KS 66027-2326
Security
Clearance/
Access / Unclassified
Foreign Disclosure Restrictions / This product has been reviewed by the product developers in coordination with the US Army Fort Leavenworth foreign disclosure authority. This product is releasable to students from all requesting foreign countries without restrictions.


PREFACE

Purpose / This training support package provides the instructor with a standardized lesson plan for presenting instruction for¾
TASK NUMBER TASK TITLE
158-350-0001 Implement Defensive Information Operations
This TSP
Contains / TABLE OF CONTENTS / Page
Preface
Lesson
Plan / Section I, Administrative Data / 3
Section II, Introduction / 5
- Terminal Learning Objective / 5
Section III, Presentation / 6
A – Enabling Learning Objective: A - Identify how
Information Operations (IO) are executed / 6
B – Enabling Learning Objective B - Identify how the effects of
Defensive Information Operations are used to Achieve
Information Superiority / 9
C – Enabling Learning Objective C- Identify threats to Army
Operations that result from the Information Age Environment
And the Army’s application of Information Technology / 11
D – Apply Protective Measures to protect Information and
Achieve Information Superiority / 16
E – Implement Measures to Protect Information on your
Unit’s Automated Information System (AIS) / 24
Section IV, Summary / 28
Section V, Student Evaluation / 29
Appendices / A. Instructional Media, e.g., Viewgraph Masters / A-1
B. Test and Test Solutions (Provided upon request) / B-1
C. Student Handouts / C-1


158-350-0001

TITLE: Implement Defensive Information Operations

Effective Date: 1 OCT 2002

SECTION I. ADMINISTRATIVE DATA

All Courses COURSE NUMBER(S) COURSE TITLE(S)

Including This

Lesson WOES Warrant Officer Education System

OES Officer Education System

NCOES Noncommissioned Officer Education System

Task(s) TASK NUMBER TASK TITLE

Taught or

Supported

a. 158-350-0001 Coordinate the components of information operations to protect information and information systems and achieve information superiority at brigade and below.

b. 113-305-1001 Communicate by a tactical radio.

c. 158-200-3000 Apply the brigade fight concept to operational planning.

d. 190-200-0002 Employ physical security measures.

e. 301-371-1100 Integrate the intelligence preparation of the battlefield (IPB) process into mission planning.

f. 301-371-1052 Protect classified information and material.

Task(s)

Reinforced None

Academic The academic hours required to teach this lesson are as follows:

Hours / PEACETIME / MOB
AC / TASS Training Bns / AC/RC
Resident / AT/ADT / IDT / Non-res DL
Hrs:Mins/MOI / Hrs:Mins/MOI / Hrs:Mins/MOI / Hrs:Mins/MOI / Hrs:Mins/MOI
1:30hrs
TEST / 30 min
TOTAL / 2:00

Prerequisite

Lesson(s) None

Security

Clearance/

Access Unclassified

Foreign

Disclosure

Restriction

Statement This product has been reviewed by the product developers in coordination with the US Army Fort Leavenworth foreign disclosure authority. This product is releasable to students from all requesting foreign countries without restrictions

References / Number / Title / Date / Additional
Information

AR 530-1

/
Operations Security
/ 3 Mar 1995

AR 380-19

/ Information Systems Security / 27 Feb 1998

FM 3-13

/ Information Operations: Doctrine, Tactics, Techniques, and Procedures
(Final Draft) / 20 Sep 2000

JP 3-13

/ Joint Doctrine for InformationOperations / 9 Oct 1998
/ Information Assurance Security Officer(IASO) Certification Course / 20 Nov 2000

Student Study Provide the student handout(s) to students at least 2 days in advance.

Assignments

Instructor

Requirements One instructor familiar with information operations.

Additional

Support

Personnel

Requirements None

Equipment

Required Overhead projector and screen.

Materials INSTRUCTOR MATERIALS: This TSP, VGT transparencies, student handout, test and answer sheet.

STUDENT MATERIALS: Student handout(s).

Classroom, One 25–person standard classroom.

Training

Area, and Range

Requirements

Ammunition

Requirements

Instructional Before presenting this lesson, instructors must thoroughly prepare by studying this lesson and identified reference material.

Branch Name Rank Position Date

Safety Mgr. Larry Fitts GS-12 CAC, Safety Office 3 Apr 2001

Approval

Proponent Name Rank Position Date

Lesson Ron Jackson GS-12 IO Proponency Office 28 September 2001

Approvals

SECTION II. INTRODUCTION

Method of instruction: CO

Instructor to student ratio is 1:25

Time of instruction: 5 Minutes

Media: VGT

Motivator The information age is upon us. Virtually everything we touch has become faster, more efficient, or otherwise improved through the use of information and information systems. More than ever before, information is essential so commanders can coordinate, integrate, and synchronize combat functions on the battlefield. Information and information systems enable our soldiers and leaders to make faster, better, and more accurate decisions. Potentially, this increased decision-making capability can provide our forces with a decisive advantage over our adversaries thus giving them information superiority. In this regard, information operations have become an essential component of warfare and a critical element of combat power.

Terminal Note: Inform the students of the following terminal learning objective requirements.

Learning

Objective

At the completion of this lesson, you (the student) will

ACTION: / Identify how defensive information operations protect information and
Information systems and achieve information superiority at brigade and below.
CONDITION: / In a classroom, given the appropriate references and student handout.
STANDARD: / Accurately: (1) Define information operations; (2) Identify how the effects of defensive IO contribute to achieving information superiority; (3) Identify three sources of threats to friendly information and information systems (INFOSYS); (4) Identify three ways hostile intelligence threats collect information on friendly operations; (5) Identify the steps of the operations security (OPSEC) process; (6) Identify the three types of OPSEC indicators; (7) Identify the purpose of the OPSEC survey; (8) Identify three OPSEC measures to protect critical information; (9) Identify three electronic protection procedures to protect radio communication; (10) Identify three measures to protect information on the unit’s Automated Information System (AIS).

Safety

Requirements None

Risk Low

Assessment

Level

Environmental It is the responsibility of all soldiers and Department of the Army (DA) civilians to protect the environment from damage.

Considerations

Evaluation Measure students’ performance at the end of the class by requiring them to achieve a minimum score of 70 percent on the 25-question test in appendix B. Students should be allowed 30 minutes to complete this examination.

Instructional

Lead-in

In this instruction, we will discuss defensive information operations and see how they are used to protect information and achieve information superiority. We will look at the threats to friendly information and information systems and discuss measures to protect them from attack and compromise. Additionally, we will look at operations security, electronic protection measures for radio communications, and finally, how we can protect information from our unit’s Automated Information Systems (AIS) from attack and compromise. Since information is an essential component of warfare and an element of combat power, protecting friendly information and INFOSYS from adversaries is essential to successful military operations.

SECTION III PRESENTATION

ELO A.

ACTION: / Identify how information operations (IO) are executed.
CONDITION: / In a classroom environment, given appropriate references.
STANDARD: / Define IO; Identify the elements and related activities of
IO; Define information superiority.

1. Learning Step/Activity 1 Define Information Operations

Method of instruction: CO

Instructor to student ratio is 1:25.

Time of instruction (minutes): 5 min.

Media: VGT

References: FM 3-13, Information Operations: Tactics, Techniques, and Procedures

(Final Draft), 30 September 2000

Security Classification: Unclassified

Instructor’s Note: Briefly discuss information operations by asking the class to define information operations. Then show VGT 1, “Information Operations.”

a. Few questions have been so hotly debated recently as the correct definition of information operations. Some believe that the term “information operations” applies only to actions occurring on a computer network, like generating information on or through your computer network. Others take the broader view that information operations cover everything having to do with the manipulation of information, including the hardware, software, the environment, and the individuals who generate and use information. This latter view is probably closer to the truth. However, regardless of which view of information operations you prefer, the fact is that the information age has had a profound impact on how the US Army will conduct operations and operations other than war now and in the future.

b. Information Operations are actions taken to affect adversary information and influence others’ decision-making process, information, and information systems while protecting one’s own information and information system. We use IO to create, shape, and preserve opportunities for decisive operations. Information operations accomplish this by causing the following effects:

Instructor Note: Show VGT 2, “Information Operations Effects.”

(1) Deny: To prevent the adversary command and control (C2) system from collecting or disseminating friendly information or causing him not to collect at all.

(2) Influence: To cause the adversary to behave in a manner favorable to the friendly force by applying perception activities to affect their emotions, motives, and objective reasoning.

(3) Deceive: To cause the adversary decision-maker to believe what is not true, to mislead him by manipulating his understanding of friendly operations.

(4) Exploit: To use the adversary C2 to friendly advantage or exploit adversary vulnerabilities.

(5) Degrade: To physically render adversary INFOSYS ineffective unless reconstituted.

(6) Disrupt: To interrupt, confuse, or impede the adversary observation/sensors through the use of obscurants and visual and multispectral abilities.

(7) Destroy: To physically render adversary information systems ineffective unless reconstituted.

2. Learning Step/Activity 2 Identify the elements and related activities of IO

Method of instruction: CO

Instructor to student ratio is 1:25.

Time of instruction (minutes): 5 min.

Media: VGT

References: FM 3-13, Information Operations: Tactics, Techniques, and Procedures

(Final Draft), 30 September 2000

Security Classification: Unclassified

Instructor’s Note: Show VGT 3, “IO Elements and Related Activities,” and discuss each element and related activity. Refer to the student handout for detailed information on each element and related activity.

a. Information Operations effects are generated through a combination of 13 elements and 2 related activities. Each element or activity may be executed offensively or defensively to accomplish the desired mission.

IO Elements and Related Activities

IO Elements:

Operations security (OPSEC)

Psychological operations (PSYOP)

Counterpropaganda

Military deception

Counterdeception

Electronic warfare (EW)

Computer network attack (CNA)

Physical destruction

Information assurance

Computer network defense (CND)

Physical security

Counterintelligence

Special information operations

IO Related Activities:

Public affairs

Civil affairs

b. Many of these elements are not new and have been executed by the Army for years. What is new is the coordinated effort to bring these elements under one umbrella and better use them to accomplish strategic, operational, and tactical goals. This new approach to conducting military operations focuses on controlling and exploiting information to support operations and achieve success on the battlefield.

c. An important aspect of this coordinated effort is the synergy created when the elements and related activities work together. This synergy maximizes the effectiveness of information operations. By working together, the elements and related activities achieve greater results than would have been possible if each were executed separately.

3.  Learning Step/Activity 3 Define Information Superiority

Method of instruction: CO

Instructor to student ratio is 1:25.

Time of instruction (minutes): 5 min.

Media: VGT

References: FM 3-13, Information Operations: Tactics, Techniques, and Procedures (Final Draft), 30 September 2000

Security Classification: Unclassified

Instructor’s Note: Briefly discuss information superiority by asking the class to define information superiority and why information superiority is critical to mission accomplishment. Then show VGT 4, “Information Superiority.”

a. Information superiority is the operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same.

b. Information superiority is a goal achieved when the friendly commander’s situational awareness and understanding of the battlefield, based on an uninterrupted flow of information, gives him an operational advantage over the adversary.

c. For warfighters, information superiority is a combat multiplier because it gives our soldiers the ability to strike a decisive blow against the enemy while denying the enemy the same capability.

Instructor Note: Show VGT 5, “Information Superiority – “Operation Desert Storm.”

d. An example of the effect of information superiority was demonstrated during Operation Desert Storm. During Operation Desert Storm, the coalition forces enjoyed information superiority throughout the entire operation. This was achieved by knocking out Iraq’s command and control systems, communications systems, and radar systems early in the conflict. This prevented Saddam from communicating with his forces, targeting his weapons, and knowing where the coalition forces were on the battlefield. This action combined with the coalition force’s ability to collect, store, process, and disseminate an uninterrupted flow of information ensured success in every aspect of the operation.

e. The bottom line is that information superiority is the ultimate goal of information operations because it can give our forces a decisive operation advantage over an adversary.

Note Conduct a check on learning and summarize the enable learning objective. During this block of instruction, we defined and discussed information operations, information superiority, and the information environment. We have discussed the elements and related activities of information operations. We have pointed out that: (1) Information operations are an element of combat power. (2) That information operations effects are generated through the execution of 13 elements and 2 related activities. (5) That information superiority is the operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. (6) That achieving information superiority is the ultimate goal of information operations.