Operationalizing Information Operations, John R Glock (9781025117294) — Readings Books

Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Operationalizing Information Operations
Paperback

Operationalizing Information Operations

$37.99
Sign in or become a Readings Member to add this title to your wishlist.

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

All military operations utilize information operations (IO). The Joint Staff and Services have written doctrine on IO. The cornerstone documents of the Joint Staff and Services, all refer to IO. Information Superiority is a core competency of the United States Air Force. Yet, there is virtually nothing written on how one actually operationally employs IO in support of a Joint Force Commander. The purpose of this paper is to address the question: How, at the operational level, does one employ offensive counter information operations (OCIO)? This researcher decomposed the problem of employing OCIO into constituent parts. This methodology revealed that successful employment of OCIO requires a force application process similar to that used when employing traditional forms of military force (e.g. air power). One still needs to establish objectives, identify targets, recommend capabilities, apply these capabilities against specific targets and after applying them assess their level of success. Having established the requirements of a process for employing OCIO, this paper then analyzes what aspects of the current joint targeting process need modification, and how to modify them in order to apply that process to OCIO.OCIO can use the existing joint targeting process with only minor modifications. To enhance the OCIO targeting process there are seven recommendations. These are: creating IO Target Materials, developing IO critical elements, establishing IO target folders requirements, formulating joint IO weaponeering methodologies, integrating IO and non-IO planning efforts, ensuring adequate access to IO capabilities and refining terminology.

This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.

This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.

As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO

Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.

Format
Paperback
Publisher
Hutson Street Press
Date
22 May 2025
Pages
48
ISBN
9781025117294

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

All military operations utilize information operations (IO). The Joint Staff and Services have written doctrine on IO. The cornerstone documents of the Joint Staff and Services, all refer to IO. Information Superiority is a core competency of the United States Air Force. Yet, there is virtually nothing written on how one actually operationally employs IO in support of a Joint Force Commander. The purpose of this paper is to address the question: How, at the operational level, does one employ offensive counter information operations (OCIO)? This researcher decomposed the problem of employing OCIO into constituent parts. This methodology revealed that successful employment of OCIO requires a force application process similar to that used when employing traditional forms of military force (e.g. air power). One still needs to establish objectives, identify targets, recommend capabilities, apply these capabilities against specific targets and after applying them assess their level of success. Having established the requirements of a process for employing OCIO, this paper then analyzes what aspects of the current joint targeting process need modification, and how to modify them in order to apply that process to OCIO.OCIO can use the existing joint targeting process with only minor modifications. To enhance the OCIO targeting process there are seven recommendations. These are: creating IO Target Materials, developing IO critical elements, establishing IO target folders requirements, formulating joint IO weaponeering methodologies, integrating IO and non-IO planning efforts, ensuring adequate access to IO capabilities and refining terminology.

This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.

This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.

As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

Read More
Format
Paperback
Publisher
Hutson Street Press
Date
22 May 2025
Pages
48
ISBN
9781025117294