Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Information Operations Module Descriptors

Information Operations Module Descriptors

Ratings: (0)|Views: 24 |Likes:
Published by Spin Watch

More info:

Categories:Topics, Art & Design
Published by: Spin Watch on Feb 08, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/08/2011

pdf

text

original

 
InformationOperationsPlanningSyllabus/Curriculum
This introductory module sets the scene for an appreciation of the modern informationbattlespace with respect to Information Operations. It will provide a coherent foundationperspective for the modern practitioner. Students will study a historical perspective ofinfluence activity, contrasting techniques and approaches for similarities anddifferences within the modern context. They will critically examine current doctrine andplanning procedures across a variety of military trades and capabilities to examine theircontribution to Information Operations. Exercises involving actual case studies will allowstudents to examine the strengths and the obstacles to combining diverse military andcivilian capability to achieve a systematic, flexible and defensible plan for InformationOperations. This will include governance arrangements concerning how influenceactivity and its risks can be managed and authorised within a wider context of the UKGovernment’s Comprehensive Strategy. Emphasis will be placed on the value of audittrails and the need for shared understanding across diverse stakeholders to achieve aco-ordinated campaign.The module will therefore cover:Relevant military historyEffects based theory, with specific reference to Key Leader Engagement andPresence, Posture and ProfileInformation Operations, PSYOPS, Media Ops and CIMICApproaches to counter-insurgency and asymmetric warfareEmphasis will be placed on raising the students’ critical thinking around the variableswithin the complex socio-technical systems and the potential relationships thesesystems have to each other. Module elements that touch on research methods andorganising paradigms for information classification and management will introduce asystematic and empowering perspective for students to carry them through theremaining modules.Specific elements that will be covered include:Critical ThinkingValue of informationSources of InformationSituational AwarenessDecision MakingIntended Learning OutcomesOn successful completion of the module the student will be able to:KnowledgeDescribe the main elements and key management issues in the conduct ofInformation OperationsAnalyze historical examples of surprise and deception, use of fear andintimidation and propaganda wars.SkillsConstruct an Information Operations plan in the UK styleFormulate the effects sought through Information Operations
 
Recommend alternate courses of action based on self evaluation, evaluationof the target audience, and the needs of the primary stakeholder in theplanning processCourse TextAllen, P.D. (2007) Information Operations Planning, Artech House, Boston.Indicative ReadingAdams, J. (1998) The Next World War, Hutchinson, LondonAlberts, D.S., Garstka, J.J., Stein, F.P. (1999) Network Centric Warfare:Developing and Leveraging Information Superiority – 2nd Edition, CCRP Publications,Vienna, VA. Can be downloaded free of charge from: http://www,dodccrp.comArquilla, J., Ronfeldt, D. (1996) The Advent of Netwar, Rand Corporation,Santa Monica. Can be downloaded free of charge from: http://www.rand.orgArquilla, J., Ronfeldt, D. (Eds.). (2001). Networks and netwars. Santa Monica:Rand. Can be downloaded free of charge from: http://www.rand.orgArmistead, L. (ed.) Information Operations: Warfare and the Hard Reality ofSoft Power, Brasseys Inc. Washington DC.Denning, D.E. (1999) Information Warfare and Security, Addison Wesley,Reading: Mass.Erbschloe, M., Vacca, J.R. (2001) Information Warfare, McGraw-Hill.Forno, R., Baklarz R. (1999) The Art of Information Warfare second edition,Universal Publishers.Kott, A. [Ed.] (2007) Information Warfare and Organizational Decision Making, Artech House, Boston.Smith, E.R. (2002) Effects Based Operations: Applying Network CentricWarfare in Peace, Crisis, and War, CCRP, Washington. Can be downloaded free ofcharge from: http://www,dodccrp.comWaltz, E. (1998). Information Warfare Principles and Operations. ArtechHouse, Norwood.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->