The Autonomy of Information Operations
On page 3-4 of JWP 3-80 the documentation references the in-house responsibility taken forassimilating target lists. Under '
Information Operations Contribution to the Campaign Plan'
Info Ops staff will be responsible for providing the following elements as part of the CampaignPlan...............C. Details on processes such as: co-ordination measures, Info Ops target nomination procedures,nominations for inclusion in the Restricted Target List (RTL) and Joint Restricted Frequency List(JRFL), clearance and authorization requirements for themes and messages and measurementsof effectiveness will be included
.......'Page 4-3 of JWP 3-80 includes the following text on '
Clearance and Authorisation
The scale, tempo and sensitivity of operations will determine the level of ministerialinvolvement in the procedure for targeting and Info Ops with, where possible, target packages(or entire target lists) and intended themes being submitted for clearance in advance of operations. Ideally, 'silence procedures' should be used wherever possible.
'These are examples of how the MOD takes responsibility for it's own activities and it's target listsare self set. It avoids exposure of these and related activities by being selective about what theychoose to reveal and using 'silence procedures' where ministers become inquisitive.Page 3-4 continues by saying:
E. The desired Influence Activity objectives, themes, messages and tasks will be listed in the 'InfoOps objectives matrix' along with the CCA objectives and tasks........These tasks will then besubmitted for inclusion in the Joint Integrated Prioritised Target List (JIPTL) to ensure coherencebetween Info Ops and broader military activity. Info Ops staff
will also contribute to otherannexes of the Campaign Plan such as targeting, media ops and CIMIC.
'Later on page 4-1 in Chapter 4 – Execution, it states that the JTFC '
gives targeting guidance,approves the draft Joint Integrated Prioritised Target List (JIPTL) and authorizes the TargetNomination List (TNL) and Joint Restricted Frequency List (JRFL).
'In November 2009 the head of Cyber and Influence at DSTL, David Ferbrache produced apresentation as an introduction to Cyber and Influence. On the last page summary he makesreference to Targeting, mentioning the '
self selection of targets
' and '
personalisation of messages
'directed at these targets within operations.(http://www.scribd.com/doc/128168751/)At the same time the Team Leader for the Influence section of C&I at DSTL Porton Down,psychologist George Brander produced a presentation titled 'Understanding and Influencing inCyberspace'.