Synopsis: |
Information operations (IO) encompass attacking adversary command and control (C2) systems (offensive IO) while protecting friendly C2 systems from adversary disruption (defensive IO). Effective IO combines the effects of offensive and defensive IO to produce information superiority at decisive points. Topics include design of army information operations, operations security, military deception, planning information operations, preparing operations, and executing operations. |