Professional Documents
Culture Documents
INFORMATION OPERATIONS
INFORMATION OPERATIONS
INFORMATION OPERATIONS
Preface
2. This also sets forth the key elements, concepts, frameworks and principles
through which IO activities are anchored on as well as the composition of the
information environment; importance of information-related capabilities in support to
military operations; and identification of key stakeholders of the various IO activities.
It also determines the effective sustainment and depth to which the PA IO can conduct
decisive operations in support to its overall mission accomplishment.
4. The proponent of this manual is the Office of the Assistant Chief of Staff for
Civil-Military Operations, G7, Philippine Army. However, Doctrine and Capability
Integration Center (P), TRADOC, PA is responsible for the review and updating of this
material. Send comments or recommendations to further improve this manual to
Commander, TRADOC, PA (Attn: Director, DACIC) or via email at
dcannex45@gmail.com and via website at doctrinecenterpa.com. Feedbacks to this
publication are also welcome telephonically via the Bonifacio Telephone Exchange
trunk line number 845-9555 or military local line number 7650 extension 4971.
5. All publications, manuals and directives inconsistent with this manual are
hereby rescinded.
6. Unless this publication states otherwise, masculine nouns and pronouns do not
refer exclusively to men.
i
PAM 3-06
ii
PAM 3-06
Content Page
iii
PAM 3-06
iv
PAM 3-06
Chapter I
Understanding Information Operations
0101. Since the advent of the information age, governments and their militaries
worldwide recognize information as a forceful weapon and a critical element of national
power. The proliferation of technology has dramatically changed society as those with
access to, and control of information and information systems can easily shape
commerce, public opinion, and other issues relevant to national security.
0102. In the military sense, the operating environment, the wars, and conflicts that
occur are being shaped and enabled by information. Control over information, or lack
thereof, affects an organization’s ability to act proactively and decisively. State actors,
particularly the armed forces, can win wars and armed conflicts by exploiting,
disrupting, and disabling command and control systems, and other critical information
infrastructure of their enemies. Conversely, states can crumble through the
dissemination of black propaganda and disinformation by the adversaries.
0107. The IO underscore two essential elements: IRCs and integrated employment.
1
PAM 3-06
Information-Related Capabilities
0109. Traditionally, IRCs include, but not limited to, operations security (OPSEC),
military deception (MILDEC), civil-military operations (CMO), electronic warfare
(EW), psychological operations (PSYOPS), cyberspace operations (CO), special
technical operations (STO), and counterintelligence (US Department of Defense, 2016;
Beasley, 2002).
0112. Not even the most powerful army can operate in the modern operational
environment without influencing the information environment of one’s existing and
possible adversaries. Mission and operational planning must always consider the effects
of adversaries or possible adversaries’ information activities to one’s forces with the
same degree of importance an army gives to planning the desired effects of its
information activities to their intended recipients and against their enemies.
0113. Warfare entails knowledge-based operations at every echelon. The extent and
degree of such control over information and information systems affect the quality of
command and control across all levels of decision-making and engagement, from the
strategic down to the operational and tactical levels. Information operations enable the
effective integration, synchronization, and coordination of information across the full
range of the Army’s operations to enhance the elements of combat power (Hahn, 1998).
Information services (i.e., traditional, intelligence, CMO and communications) have
since served both leading and supporting functions to Army’s campaigns and actual
warfare functions of fire, maneuver and strike.
2
PAM 3-06
0114. Through IO, the Army’s organization can prepare and execute knowledge-based
warfare across the full range of military operations. Successful IO allow information to
reach Army decision-makers promptly and in an understandable form. Such requires
an information system that is secure at multiple classification levels that provides
seamless transfer of information from tactical to national levels; and, that are versatile
to adapt and to spread across the many force configurations and echelons found in
today’s Army.
0117. Information superiority is about Army forces being able to see first, understand
first, and act first. Army Forces cannot develop information superiority if they are
constantly reacting to enemy operations. Information superiority requires proactive
commanders, view relevant information, and “conduct (plan, prepare, execute and
continuously assess) operations accordingly” (“Chapter 11: Information superiority”,
n.d.; United States Department of the Army, 2016). To achieve information superiority,
commanders synchronize and target information as intensely as they do fires and
maneuver, CMO, intelligence and sustainment operations. They seek to make better use
of their information and information systems than adversaries or enemies do of theirs.
These information systems include the analysis, procedures, and training necessary to
extract and exploit intelligence and other critical information from raw data and present
it in a form that can be easily understood. Successful commanders are those who see,
understand, and then exploit the situation.
3
PAM 3-06
b. Information Management
c. Information Operations
0122. In the earlier sections, we established that IO are the Army’s actions that affect
adversary information and information systems while being able to defend one’s
information and information systems. The expanded the definition of IO “as actions to
affect adversary information and information systems while defending one’s
information and information systems and divides it into two major subcategories—
Information-in-Warfare (IIW) and Information Warfare (IW)” (US Air Force Doctrine
Document 2-5 as cited in Brice, n.d.). IIW is relevant in IO's “gain and exploit” aspects,
while IW is associated with IO's “attack and defend” aspects.
0123. How does IO work for the Army to attain information superiority? First,
information superiority is the ability of the Army to conduct direct or indirect
information warfare against its enemies successfully. Second, information superiority
means that the Army’s organization is capable to successfully defend or protect
“friendly information” from any direct or indirect attacks from adversary forces. And
third, information superiority requires the effective application of technologies to
intercept and gain “information transparency” against an opponent and maximizing the
utility of this information for operational planning (make offensive and defensive
4
PAM 3-06
decisions) to defeat any threat to the organization without suffering from information
overload. Conversely, understanding how IO works for a friendly organization can
provide enemies an understanding of how to attack it, defeat it, or deny it with
information superiority.
0126. Effective IO would benefit the Army’s LMC in two major ways: first,
information activities (both physical and non-physical, and lethal and non-lethal) would
help protect and defend own forces; and second, information activities can boost
offense against the adversary. IO serves as a “lynchpin” that integrates and
synchronizes other elements of the Army’s LMC (strategic and operational maneuver,
army diplomacy, and force development) to achieve both strategic and operational
objectives. In this sense, IO ensures that each LMC element supports and complements
one another towards the successful execution of other elements. Across the various
5
PAM 3-06
component activities of IO, IRCs support the Army’s ability to inform and influence
across a range of operations to shape desired outcomes.
0127. The LMC’s ultimate objective is to protect and defend the land force,
information infrastructures, systems, and capabilities would be critical in achieving
multiple objectives at the operational and tactical levels that focus on: dissuading and
deterring adverse intents; disrupting, mitigating, and redirecting adverse actions;
disrupting and destroying adversarial information infrastructures and systems; and
destroying and influencing adversary’s cognitive ability.
Points to Ponder
The most important thing to know about Inform and Influence Activities at the tactical
level is to keep it simple.
The only way to do this is by integration and synchronization with the Commander’s
Intent.
Don’t be afraid to recommend lethal options! However, must ensure that they are
considered as part of the planning process and approved by the commander.
IO does not have primary responsibility for themes and messages, that’s both a PsyOps
and Public Affairs Office responsibility.
IRCs are most effective when synchronized with each other and physical fires. If our
Information Related Capabilities are de-synced, then our ability to influence enemy decision-
making is degraded
6
PAM 3-06
Chapter II
Fundamentals of Information Operations
0201. This chapter presents a much detailed discussion on the key elements of IO,
particularly what the information environment is composed of, how important
information-related capabilities are to supporting military operations; and, who are the
key stakeholders of the various IO activities.
0203. As visualized in the IO framework in Figure 2.1, IO directly influence and shape
the will of the adversaries, neutrals and friendlies; and affect the military commander
and decision-maker’s understanding and the capabilities that promote the
understanding or the application of the will across a range of military operations to be
undertaken.
7
PAM 3-06
0204. Military’s IO are planned, designed and executed to “influence the emotions,
motives, objective reasoning, and ultimately the behavior” of the following groups of
people and audiences in a manner favorable to the originator’s objectives (United States
Department of the Army, 2016; United States Department of the Navy, 2014):
a. Friendlies. Which include national and local government leaders and decision-
makers; government officials; military decision-makers; own military troops,
dependents and relatives; police and other law enforcement agencies/units;
regional and international community; international, national and local media
practitioners; and, civil society organizations (e.g., religious, local and
international non-governmental organizations);
b. Neutrals. Which include various publics (to include government leadership and
decision-makers) who remain undecided, uncommitted, or are fence-sitters;
and,
Effects
8
PAM 3-06
9
PAM 3-06
0206. AFPM 3-14 provides some examples of how IO may support mission
accomplishment in all military operations. These are:
0207. The IO has key principles that will shape how IO integrates and directs
information activities to support the various military operations. (AFPM 3-03, 2010 as
cited in AFPM 3-14, 2019)
10
PAM 3-06
0213. Input to the targeting process. Targeting is the “process of selecting targets
and matching the appropriate response to them based on operational requirements and
capabilities” (Yingling, n.d.). As a knowledge-based process, information operations
must provide critical inputs to effective targeting. Targeting starts with a clear and
detailed understanding of the operational environment and the Commander’s intent.
Thus, information activities must identify the intended effects in the information
environment necessary to achieve the Commander’s intent (objectives) and a range of
actions to achieve those objectives when integrated into the overall operational plan.
0214. Early involvement and timely preparation. IO must effectively put all
necessary information at the start of the planning processes and throughout
11
PAM 3-06
Information Environment
0217. IE refers to the “virtual and physical space in which information is received,
processed, and conveyed” (NATO Bi-SC Information Operations Reference Book,
2010; Joint Publication (JP) 1-02 as cited in the US Department of Defense, 2016). It
consists of the information systems and the information itself.
a. Human
b. Infrastructure
c. Information
d. Decision-Making
e. Effects.
0219. Most of the IE is not under military control, adding to the challenges
commanders face. While they cannot control the entire information environment, they
must be prepared to operate within it. Interaction with the information environment
increases the complexity of Army operations. More than ever, commanders consider
how factors outside their area of operations (AO) may affect their operations. IO often
requires coordination with governmental and non-governmental agencies. Legal
limitations on IO vary according to the situation. This interaction may affect the impact
of tactics on operation and strategy. Military actions that are tactically or operationally
insignificant may influence strategy or even national policy when highlighted by the
media. Case in point, Marawi Siege wherein national government declared Martial Law
Rule in whole Mindanao. Therefore, operational commanders consider more than the
military conditions of the end state of a campaign. They consider the comprehensive
political, economic, environmental, and socio-cultural aspects of it as well.
12
PAM 3-06
0221. The actors include “leaders, individuals, and organizations”. Resources include
materials and systems used to collect, process, store, disseminate, display and protect
information. Human and automated systems “observe, orient, decide, and act (OODA
Loop) upon information in the information environment, making it the principal
environment for decision-making” (AFP, 2019).
0223. The IE is the “aggregate of individuals, organizations, and systems that collect
process, disseminate, or act on information”. The IE is the space through which both
actors and information systems interact to “observe, orient, decide, and act upon the
information” (AFP, 2019; US Department of Defense, 2016; United States Department
of the Army, 2016; United States Department of the Navy, 2014).
13
PAM 3-06
COGNITIVE DIMENSION
(human-centric)
0227. The physical dimension comprises “command and control systems, and the
supporting infrastructure that enables individuals and organizations to conduct
operations across the air, land, sea and cyberspace” (US Department of Defense, 2016;
AFP, 2019). It represents the tangible, real-world encompassing all physical platforms
and communications networks distributed and connected across national, economic,
and geographical boundaries. This dimension includes, but is not limited to, “human
beings, C2 facilities, printed documents, radio facilities, computer and other processing
units, smartphones, and any other objects subject to empirical measurement” (AFP,
2019).
14
PAM 3-06
primarily affects the content and how the information flows across the military
organization.
0230. Within these dimensions are human and information system components that
are either “friendlies, adversaries, or neutrals” (AFP, 2019). It must also be understood
that the IE analysis is a continuous and ongoing process that starts from peacetime to
the emergence of war/conflict/crisis and the eventual return to stability or peaceful
order. This cyclical process can be observed and applied on every level of the Army’s
hierarchy and would only differ in the scope and level of detail.
0231. Moreover, as threats and challenges to security transcend beyond borders and
across multiple geographies, the Army IO involves interacting within the global IE.
Army adversaries are no longer bound within the limits of the Philippine territory. The
CPP-NPA-NDF and other terrorist groups operating in the country have international
networks targeted by the Army IO. Thus, the Army must maximize the use of all
information available through the military systems and open sources like media, the
Internet, and other global access information systems to assist military decision-makers
in achieving operational success.
Points to Ponder
Visualize how complex the Information Environment (IE) and focus your attention on
the three dimensions and the means they provide to create an effect on our selected inform and
influence activities audiences.
Understand the IE, determine what we want it to be, and then act to make it so. The
physical domain is basically the facts we observe, collect, collate, and reference to help form an
understanding. It includes the positive and negative consequences of our actions.
The information domain includes the messages, words, systems, procedures, policies,
and techniques we use to record, transfer, and share, shape or deny a common understanding
of our environment
.
The Cognitive domain is where information effects happen. It is the most difficult
domain to operate in. It is where perceptions of the truth are formed and directly influences
understanding and decision making. It is the most important domain.
Other considerations are the people, culture and prevailing governance practice. The
point is that there are many things which affect and shape the Information Environment and we
have to always be looking to leverage everything we have access to.
15
PAM 3-06
0233. Successful IOs require the proper identification of IRC that is most likely to
achieve the desired effects, not simply employment capability. Thus, the capabilities
used to support IO must be selected based on mission requirements (campaign
objectives, the operational environment, and adversary and friendly forces), which
ultimately dictate what capabilities a commander must use and how they are employed.
0234. The military, particularly the Army organization, is not new to employing IO.
During its campaign against the Hukbong Bayan Laban sa Hapon (HUKBALAHAP)
in the late 40s to early 50s, the Philippine Army implemented various IRCs ranging
from MILDEC to PsyOps and CMO activities, among others, that resulted in successful
military operations and subsequent surrender of enemy forces within 15 months.
MILDEC resulted in disruptions to enemy forces’ logistics and degradation of their
readiness. PsyOps led to surrender among enemy forces and boosted support from the
local population. CMO programs, particularly civil affairs and public affairs targeting
the general population, adversely impacted and influenced enemy information systems.
0235. Today, the Philippine Army IRCs being used as aligned to the AFPM 3-14 are
the following but not limited to:
a. Operations Security
b. Military Deception
c. Civil-Military Operations
16
PAM 3-06
behavior in one’s favor (achieving surprise, preserving friendly forces and equipment,
gaining time, minimizing adversary’s physical advantage, etc.). It deters hostile actions
and contributes to the success of any potential friendly offensive action.
0240. In IO, MILDEC is enhanced by using selected IRCs to promote the MILDEC
operations subtly. MILDEC operations apply the following basic deception techniques:
b. Feint, which is a type of attack used as a deception intended to draw the enemy’s
attention away from the area of the main attack. This includes the enemy
moving their reserves or shifting fire support in reaction to the feint. Feints must
appear real and therefore require some contact with the enemy, which usually
involve the conduct of a limited-objective attack ranging in size from a raid to
a supporting attack
d. Display, which aims to mislead the enemy’s visual senses (their observation by
radar, camera, infrared device, or human eyes) through simulations, disguises,
portrayals, or a combination of any of these measures
a. Public Affairs
b. Civil Affairs
17
PAM 3-06
c. Psychological Operations
0242. Public Affairs (PA), which includes “public information, and community
relations activities: that are directed towards local and foreign public audiences with an
interest in the military to promote a positive image of the military through the
dissemination of clear, accurate, credible and timely information (AFP, 2019; United
States Department of the Army, 2016).
0243. For example, media can be both an enabler and a risk to successful military
operations. For one, news coverage by media personnel provides an avenue for the
military to provide critical information that the general populace deems necessary for
transparency and accountability. However, their presence in the field could compromise
ongoing operations as uncensored broadcast materials could serve enemy forces’
sensitive and critical information. Media personnel may risk themselves being potential
hostages by the enemy. PA, through media management, has always been essential in
the Army’s various focused military operations and clearing operations, among others.
The establishment of media centers and the designation of a dedicated media team are
among the best practices in military PA. The objectives these practices fulfill are geared
towards establishing standards, protocols, limitations, and procedures on the release of
credible information for public consumption.
0247. This is a way for practitioners to be part of an IO Cell without jeopardizing the
commander and unit's credibility or their relationship with the public’s trust. PA is a
command responsibility. A PA will advise his commander, but, ultimately, we carry
out the commander's intent. We will talk in more detail about what public affairs does
specifically to support PA and civil affairs as part of an information campaign in later
units of instruction.
18
PAM 3-06
participate during tactical and operational missions, however, the capabilities retain
their own distinct identities and staff organization.
0250. Civil Affairs (CA), which include activities performed and supported by the
military to enhance the “good relationship between military forces and civil authorities
in the areas where military forces are present or operating” (AFP, 2019). Community
and stakeholder engagement and interagency coordination allow the military
organization to maximize the synergy of planning, preparation, implementation and
sustaining security programs, projects and activities. Among various stakeholders
targeted for such efforts include local chief executives (LCEs), community leaders,
religious sector, research and academic think-thanks, civil society groups, and other
non-governmental organizations. Their experience and influence in their respective
fields and communities make them credible third-party advocates in support of the
narratives and the agenda of the government.
0252. The role of CA in IO is gain and maintain relationships; build capacity within
the community and generate population confidence in, and positive perception of the
government and its actions.
0254. These activities may occur before, during, subsequent to, or in the absence of
other military actions.
0255. CA activities support the military unit’s initiatives to improve relations with
friendly forces, civilian populations, regional strategy and long-term goals by
strengthening the capabilities of the government in effectively applying it’s indigenous
resources to mitigate or resolve its instability, privation, or unrest.
0256. CA and PsyOps are mutually supportive within CMO. During military
operations other than war (MOOTW), PsyOps support various CA activities (establish
population control measures) to gain support for the government in the international
community, and reduce support or resources to those destabilizing forces threatening
legitimate processes of the government. CA personnel and forces can advise
commanders on the most effective military efforts to support friendly or civilian
welfare, security, and developmental programs, PsyOps maximize these efforts through
information products and programs. PsyOps publicize these CMO activities to generate
target population confidence in and positive perception of government actions.
19
PAM 3-06
base “to influence their emotions, motives, objective reasoning, and ultimately their
behavior” in a manner favorable to the originator’s objectives (NATO, 2010; OG7,
2008; United States Department of the Army, 2016). While enemy forces are the
primary targets of PsyOps, trapped civilians and hostages inside the main battle area
are also target audiences. PsyOps can be conducted traditionally through loudspeakers,
leaflets, textblast, radio broadcasts, tarpaulins, stakeholder engagements, digital/social
media operations, and counter violent extremism programs.
0258. Inherent to the CMO capability that being used by the above mentioned three
pillars is the combat photography/Combat Camera Team (COMPHO/ComCam), which
provides the Army and the rest of the military organization “with an imagery capability
to support operational and planning requirements across a range of military operations”
(AFP,2019). COMPHO supplies valuable imagery for MILDEC, PA, CA, PsyOps,
strategic communication (STRATCOM) and commanders that can be used to influence
selected audiences. Currently, COMPHO is an embedded function of the CMO.
0259. Army COMCAM rapidly deploys worldwide throughout the full spectrum of
military operations to capture, edit and transmit high definition still and video imagery
in support of commanders’ objectives. Army COMCAM units provide still and video
acquisition of all operations to include land, static airborne, and air assault operations.
Trained and equipped to operate under all and lighting conditions with both
conventional and special operations units.
20
PAM 3-06
After World War II, the Hukbong Bayan Laban sa Hapon (HUKBALAHAP), a guerilla
force created by Central Luzon farmers during the Japanese occupation, evolved into a
socialist/communist guerrilla movement. President Elpidio Quirino personally requested that
Lansdale be assigned to the Joint United States Military Assistance Group, Philippines, in
1950 to aid the Philippine Armed Forces' intelligence agencies in defeating the Communist
Hukbalahap. Lansdale was a pioneer in the field of psychological warfare. Lansdale employed
a method pioneered by the Imperial Japanese Army in the Philippines during World War II to
propagate tales that Aswangs, blood-sucking creatures in Philippine folklore, were loose in
the jungle. The Hukbalahap fled the location after his troops kidnapped an enemy soldier and
drained the blood from his body, leaving the corpse where it might be seen.
In one such operation, government psychological warfare squads propagated stories
that a vampire lived on a hill where the Hukbalahap was stationed, based on a superstitious
fear of Aswang (vampires) in the countryside. The Huks' location is advantageously located
on a high vantage point. As a result, the government forces must maintain control of the
decisive location.
Two nights later, on LTC Landsdale's orders, a government squad apprehended the
last guy on a night rebel patrol, punctured his neck with two holes, hung his body until the
blood drained out, and then returned the body to the trail. When the Huks saw the body of a
fallen friend, the entire Huk unit abandoned their camp and sought refuge elsewhere. That
allowed government forces to clear the contested territory.
According to reports, the locals, who had previously been either apathetic or
sympathetic to the Huk cause, were now afraid. The same pattern of holes, animal bites, and
carcasses appeared over the landscape in quick succession.
Lansdale and his team also employed the "eye of God," painted in the dead of night
on a wall facing the house of suspected Huk sympathizers. "The next morning, the
inexplicable presence of these malicious eyes had a severely sobering effect," Lansdale
recalled.
The Huks began to lose moral support in the territories they had controlled due to a
mix of logistical and factional issues. The Army's hunt and destroy missions continued and
intensified after the psychological operation was deemed adequate until Luis Taruc and most
of the Huks put down their arms in 1954 to accept a pardon.
Another of Landsdale's stories is about "Godless Communism," or perhaps it was just
confirmation of the Philippines' continuing culture and mythology. Whatever the operation
proved, it demonstrated that Filipinos, past and present, are still afraid of aswang in the face
of rebellions, wars, and political machinations.
Electronic Warfare
21
PAM 3-06
c. Electronic Support (ES), which involves “actions tasked by, or under the
direct control of, and operational commander, to search for, intercept, identify,
and locate sources of intentional and unintentional radiated electromagnetic
energy for immediate threat recognition, targeting, planning, and conduct of
future operations” (AFP, 2019).
Physical Attack
0262. This involves two aspects to create effects in the IE, namely:
a. Attacking command and control (C2) systems, which makes use of force to
deny systematically, disrupt, degrade or destruct selected adversary C2 systems
that will allow the military (Army) to gain an informational advantage.
Physical Security
0263. This aspect of security that is concerned with physical measures. It is “designed
to safeguard personnel, prevent unauthorized access to equipment, facilities, materials,
and documents, and safeguard them against espionage, sabotage, damage, and theft”
(AFP, 2019; United States Department of the Army, 2016). In short, physical security
is a system of a barrier placed between the potential intruder and the material to be
protected.
Counter-Intelligence
0264. Defined as the “total action taken by which information is gathered and
activities are conducted to protect that agency against espionage, theft of materials,
sabotage, assignations, or other intelligence activities conducted by, or on behalf of,
hostile foreign governments or other threatening foreign organizations (terrorist groups,
rogue military units, etc.)” (Encyclopedia of the CIA, 2003). It also refers to
“information gathered and activities conducted to identify, deceive, exploit, disrupt, or
protect against espionage, other intelligence activities, sabotage, or assassinations
conducted for or on behalf of foreign powers, organizations or persons, or their agents,
or international terrorist organizations or activities” (Executive Order 12333, 2008; JP
2-01.2, CI and HUMINT in Joint Operations, 2011).
Cyberspace Operations
22
PAM 3-06
of the Navy, 2014). It is further categorized into three distinct cyber missions based on
objectives and activities as follows:
Information Assurance
0267. Protects and defends “information and information systems by ensuring their
availability, integrity, authentication, confidentiality, and nonrepudiation”. In addition,
IA includes “providing for restoration of information systems by incorporating
protection, detection, and reaction capabilities” (AFP, 2019; United States Department
of the Army, 2016).
0268. There are five pillars of the information assurance model: availability, integrity,
authentication, confidentiality, and non-repudiation (PA Intelligence School, 2015).
a. Availability is ensuring the timely and easy access of authorized users to vital
information services. It requires that all data or system is in the place needed by
the user, at the time the user needs it, and in the form needed by the user. This
requires that all IT infrastructure and resources remain fully functional and
reliable even during adverse conditions, such as database conundrums or fall-
overs. An effective IA involves protecting against malicious codes, hackers, and
other threats that can hinder or block access to the military’s information
systems.
23
PAM 3-06
e. Non-repudiation is the assurance that neither the sender nor the intended
recipient of the information can deny sending, receiving, or accessing data. The
sender of data is provided with proof of delivery, while the recipient is provided
with proof of the sender’s identity. Security measures must be used to prove
identities and to validate the communication process.
0270. “Activities and measures are taken by Department of National Defense (DND)
and its AFP components to support and facilitate GRP public diplomacy efforts, not
solely in the area of IO” (AFP, 2019). IO capabilities are integrated under the direction
of the DND STRATCOM coordinating council or its equivalent.
Strategic Communication
24
PAM 3-06
Intelligence support
0275. INTEL and OPSEC requirements must be included in all IO support plans.
0276. IO does not own any of the capabilities available. It only coordinates, integrates,
synchronizes, negotiates, and de-conflicts the different IRCs and information effects.
0277. Figure 2.4 presents a matrix that matches the various IRCs with the desired
effects (end-state of military operations or activities).
Neutralize
Safeguard
Negotiate
Influence
Convince
Diminish
Degrade
Mislead
Destroy
Prevent
Defend
Disrupt
Protect
Expose
Exploit
Inform
Shape
Deny
IRCs
1. OPSEC X X
2. MILDEC X X X
3. CMO-PA X X X X
4. CMO-CA X X X
5. CMO-PSYOPS X X X
6. EW X X X X X X X X
7. Physical Attack X
8. PHYSEC X X
9. CI X X
10. CO X X X X X X
11. IA X X X X X X
12. COMPHO X X X X X
13. DSPD X X X X X X X
14. StratComm X X X X
15. Intelligence X X X X X X X X
support
Figure 2.4 – Matching IRCs with Intended Effects
25
PAM 3-06
The fall of Leoncio “Parago” Pitao, the central figure of the insurgency movement in Davao
Region and successive operational victories that followed, is the story of the right mix of seven lines
of operations, with strong emphasis on intelligence followed by CMO and focused military
operations.
The 10th Infantry Division during the leadership of MGEN EDUARDO M AÑO AFP employed
an operational design anchored on functional TRIAD, the Sword of Gideon Concept, and the Seven
(7) Lines of Operations (LOO).
The successful story of 10ID in a result of understanding the origins of the enemy, their
ideologies, objectives, and their strategies to attain these objectives.
The Sword of Gideon is a concept of operations capitalizing on the principle of mass and
concentration to decisively destroy the enemy. With the SoG Cocept, the battalion is also able to
efficiently employ its forces without disrupting its Community Support Program (CSPs)/CMO efforts
that should be made with the objective of shaping the battlefield. Identification and recruitment of
Sangay sa Partido sa Lokalidad (SPLs) and Militia ng Bayan (MB) and the completion of operational
data must be accomplished through CSPs as these are the critical ingredients to operationalize the
SoG concept.
As the 10ID’s campaign mission, priority areas shall be cleared using the seven Lines of
Operations (LOO). The LOOs provide a framework of the operational and tactical tasks a unit has
to do across the spectrum of operations from shaping to decisive to sustainment operaitons. It
should be noted that emphasis given to each LOO and the appropriate combination of some of all
of them may vary depending on the dynamics of the operational environment. The LOOs are as
follows:
1. Community Support Program – it involves the integration of the TRIAD elements
and is conducted by Community Support Teams that is composed of a regular Infantry Rifle Squad.
Each team is subdivided into three cells namely, Intelligence Cell, Combat Cell, and Civil-Military
Operations Cell.
2. Focused Military Operations – Tactical victory is the best Psyops. Several enemy
casualties and recovery of firearms from decisive encounters are propaganda itself. Effects of
decisive engagement are physical and mentally defeating to rebels therefore opportunities to
encourage the rebels to finally abandon the armed struggle. In able for enemy to surrender three
conditions must be present: 1) enemy must feel exhausted because of continuous operations; 2)
chances of getting killed during operations and; 3) option to surrender.
3. Stakeholder Engagement – social pressure from the stakeholders because military
alone cannot bring the basice services needed by the people. It is the duty of the military to prompt
local chief executive. Former rebels should be organized with the help of other stakeholders. It is
a showcase for the active rebels that there is a better life waiting for them if they decide to return to
return to the fold of the law. It also contributes to mission accomplishment since FRs come form
different organs and units in the movement, some were former political cadres while others from the
armed group, they can be tapped and consulted during mission planning. This is the main reason
CMO officers and stakeholders should work together in taking care of former rebels. Strategically,
engaging stakeholders to contribute to this effort is one way of bridging mutual interest and goals.
4. Intelligence – All intel units are “designed to work with one another”. The efforts of
these units should be regularly consolidated to boost intelligence capabilities and subsequent win
decisive victories. Intelligence units should maximize technology by mastering the use of
Geographical Information System (GIS), Intelligence Preparation of the Battlefield (IPB) and
Graphical Estimate of the Situation for Counter-insurgency (GESCON). Recruitment of Category A
asset including medics since the NPA employ them when they launch tactical offensives against the
government forces.
5. Legal Offensive – the 10ID campaign emphasized in implementing Army’s legal
offensive: 1) File cases against all aboveground and underground enemy personalities; 2) Use
former rebels as witnesses; and Every NPA-initiated violent incident must have a corresponding
case filed before appropriate court of law. The primary units assigned to do these are the intel and
CMO but combat units shall be the source of data and witnesses.
6. Information Operation – All tactical victories must be maximized to generate
surrenderees. The local media must be tapped to feature both combat and non-combat exploits
26
PAM 3-06
such as decisive encounters even in other units as well as during Serbisyo Caravans and
other successful peace and development initiatives conducted. Units must strive to have
airtime in local radio programs where the accomplishments and peace-building efforts of the
Army in communities can be conveyed to the people. It is also important for the Army troops
to participate in the activities of local government units and project an image of the AFP as
the best fighters of the lawless elements, especially during parades and exhibitions. A
deliberate show of force and capability demonstration in public events also very telling on the
might of the AFP.
7. Bayanihan Investment Protection & Security Operations (BIPSO) – Army
units should come-up with an inventory of all the infrastructure projects and business
activities in each army unit. The insurgent’s logistical lines of supply and resources that
should be cut off so they will be forced to abandon the armed struggle. TRIAD operations
should also be conducted to address all aspect of insurgent extortion activities. The CMO
should organize forums to educate businessmen on how to deny or counter any extortion
attempts. Meanwhile intel operations should focus on infiltration and entrapment operations
with the covert participation of businessmen. Combat patrols should be routinely conducted
on project sites while deliberate operations should be conducted on most threated targets.
Lines of efforts complement and support one another and are done simultaneously.
It is difficult to achieve decisive military operations without proper CSP and focused intel
operations. CSP on the other hand, can only be successful with the Army’s effective
engagement with local government units and line agencies. Decisive encounters, purposive
information operations, and continuous CSP activities, collectively result in increased number
of surrendered rebels. Moreover, successful intel operations should always be coupled with
proactive legal offensives. Lastly, denying the enemy their resources is done through
collaborative BIPSO and proper application of the TRIAD. By putting together the lines of
operations, it is the formula of success.
0278. According to AFPM 3-14, the Chief of Staff, AFP (CSAFP) shall serve as the
overall authority for ensuring the promulgation of standardized doctrine, tactics,
techniques and procedures, manpower authorizations, training, and institutional
sustainability of IO. The Deputy Chief of Staff for Operations (J3) shall serve as the
primary functional officer for IO at the military headquarters level.
0279. The Army Chief of Staff for Operations (G3) on behalf of the Commanding
General, Philippine Army (CG, PA), shall serve as the office of primary responsibility
(OPR) for oversight of the Army IO doctrine, organization, training, equipment,
leadership and education, personnel, and facilities (DOTMLPF) needs across the
Philippine Army organization. In addition, G3 will serve as the senior Army IO officer
responsible for integrating and synchronizing the Army’s information activities. Other
offices having responsibilities for IRCs will coordinate with G3 to ensure the consistent
and standardized application of IO policy, guidance, and program oversight.
0280. The IO officer is the principal staff officer responsible for the synchronizing the
IRCs and coordinates operations via the G3’s coordinating authority. Tasks are derived
from Mission Command and executed through Movement and Maneuver. Coordinates
and integrates IRCs ISO combined arms maneuver through the Information
27
PAM 3-06
0281. Consistent with AFPM 3-14, the Army leadership task-organizes a PA IO Cell
to integrate, coordinate, synchronize, and deconflict the use of IRCs to support actions
that will achieve the desired effects of the Commander’s Plan and the general military
objectives as a whole (as visualized in Figure 2.5). The primary role of the PA IO cell
is to ensure that military information activities are coherent and synchronized with other
actions affecting the information environment.
PA IO CELL
FSRR SFR(A) LRR ASR CMOR AIR AAR CBT AVN RGT
IO CELL IO CELL IO CELL IO CELL IO CELL IO CELL IO CELL ENGR BN IO CELL
IO CELL
PSYOPS
CENTER
0283. Functions of the PA IO Cell. Based on the principles and guidelines of the
AFPM 3-14, the following are the key functions of an IO cell:
28
PAM 3-06
c. Develops non-lethal and lethal IO target list for approval and integration into
the unit-targeting priorities
h. Coordinates media interface to ensure that press releases, etc. do not conflict
with the Commander’s intent
29
PAM 3-06
G2 § OPR on the development of intel-related capabilities (unit security practices, force protection, OPSEC,
counter-reconnaissance, deception, information, and personnel security)
§ Provides inputs on matters concerning OPSEC and readiness IRCs on intelligence
§ Designates primary and alternate representatives to the PA IO Cell
G3 § Overall OPR on the operationalization of the PA IO Cell
§ Acts as Chairperson of the PA IO Cell
§ Designates primary and alternate representatives to the PA IO Cell
G4 § OPR in providing for the logistical requirements (equipment and facilities readiness) of IRCs
§ Provides inputs on matters concerning logistical capability development of IRCs
§ Designates primary and alternate representatives to the PA IO Cell
G6 § OPR on the capability development of IRCs in terms of C4S (Command and Control Communications, and
Cyber Support) requirements
§ OPR on the proper utilization of cyber warfare, electronic warfare, and other C4S related capabilities
§ Develops platforms for propagation of IO products
§ Designates primary and alternate representatives to the PA IO Cell
G7 § OPR on the enhancement of the IRCs (PA, CA, ISA, SocMed, and PCVE) in support to execution of operations
§ Designates primary and alternate representatives to the PA IO Cell
All PAMUs § Organize respective IO Cell for the conduct of IO in respective areas
§ Develop IRCs for the enhancement of IO
0285. PA IO Cell Chief. The Army will designate a PA IO Cell Chief. In Army’s
case, the Assistant Chief of Staff for Operations, G3, will be the Chief, IO planner
whose primary mission is to integrate and synchronize all planning processes across the
Army organization. All IO aspects are coordinated with higher, adjacent, subordinate
staffs and among the supporting teams and cells of the PA IO system. The PA IO Cell
Chief shall also ensure that all IO portions of operational plans reflect the intent and
guidance of the CG, PA and are consistent with the Army’s LMC and applicable
military plans and policies of the AFP leadership.
30
PAM 3-06
0288. Inputs of Staff in IO Cell. The following are the inputs of each staff to the IO
cell: commander’s guidance, commander’s intent and CCIR; specified and implied
tasks; running estimates, isr products, target audience analysis; assessment of preview
IE activities and their effects. Higher messages and talking points; PA/PsyOps themes
and messages, measure of performance/measure of effectiveness; electronic warfare,
military deception, cyber operations plans; intel support plans and combined
information overlay.
0289. Results of IO Cell. The following are the result based on the planning of IO
cell: IO synchronization matrix; products (Print, radio, Social Media, et.al); CCIR/IR
nominations; updated target sync matrix; refined themes and messages, refined battle
drills and; updated operations officer.
0290. IO is an integrating function that enables the infantry division to use information
related capabilities to affect adversary decision making while protecting our own.
While IO is the integrated employment of IRCs, IO is separate and distinct from the
IRCs. While most of the actions taken by the IRCs will support IO objectives to either
affect adversary decision making or protect friendly decision making, the IRCs will
also execute independent activities in support of infantry division operations. Making
these distinctions highlights a key role for the commander in determining the role of
the IO element and its relationship to the IRCs. The commander has to weigh the type
of operation and the experience of IO and IRC personnel when determining how to
organize.
31
PAM 3-06
Chapter III
Information Operations Process
0301. This chapter identifies how the existing planning and decision-making process
of the Philippine Army is used in the context of IO. The doctrinal approach will be
reviewed and identify its application in the IO. This chapter also includes discussing
the tools used to measure the effect of the military operations on the mission objective
and different assessment approaches.
Operations Process
0302. The Army’s view on planning, preparing, executing, and assessing operations
IO planning must begin simultaneously with the PA campaign and its operational
planning. It must be an integral part and not an addition to the overall planning effort.
IO planning principles and processes should be parallel to established principles and
processes for operational planning. The IO staff coordinates and synchronizes all
available capabilities to accomplish operational objectives. Uncoordinated IO can
compromise, complicate, negate, or harm other AFP military operations, as well as
other government interagency information activities. AFP commanders must ensure
that IO planners are fully integrated into the planning and targeting process.
0303. As part of the planning process, the designation of a release and execution
authority in IO operation is required. Release authority provides the approval for IO
employment and normally specifies specific offensive means and capabilities provided
to the executive authority. Execution authority is described as the authority to employ
IO capabilities at a designated time and place. Normally, the mission commander has
overall authority for IO before, during and after an operation. However, the commander
may choose to delegate his authority to his operations officer.
a. Planning Initiation
b. Analysis of Mission
32
PAM 3-06
c. Development of COA
e. Comparison of COA
f. COA Finalization/Approval
h. Plan Refinement
d. Distinguish location, SOP, and routine of other staff organization that requires
IO interaction, and divide the coordination responsibilities among the IO staff
e. Start to identify the critical information needed for mission analysis and course
of action (COA) development and availability of required information.
(Continues throughout planning development)
g. Confirm and update PIRs and RFIs considering the time spent accomplishing
the requirements of IO (Consistently undertaken through the processes of
contingency planning
33
PAM 3-06
0306. Mission Analysis. During the analysis of the mission, the assigned mission is
assessed in order to identify the objectives and tasks of the commander and to plan the
instructions for subordinate elements. Key IO staff actions during this phase are the
following:
d. Identify accessible IO capabilities for the mission and determine at what level
should the authority for deployment and employment come
g. Incorporate the particulars of IO into the updated mission submitted for the
approval of the commander
h. Identify specific IO skills, sets the specialized tasks required for the mission,
and initiate augmentation request and or tasking
0307. COA Development. The initial estimates of staffs, mission and tasks, and the
planning guidance of the commander which are output from the mission analysis are
critical to the development of the COA. In this phase, Key IO staff actions are:
b. Update the section on the IO in the COAs in order to improve the estimates of
the staff.
0308. COA Analysis and War-gaming. The commander must war-game all
proposed COAs opposite the COAs of the enemy which were gathered from the
intelligence preparation of the battlespace (IPB). In this phase, the key IO staff actions
are:
34
PAM 3-06
0309. COA Comparison. COA comparison stars off with the analyzation and
evaluation of the advantages and disadvantages of each COA from the perspective of
all staff members. In this phase, key IO staff actions are:
b. Comparison of each COA about the IO requirements and per the available IO
resources
0311. Plan or Order Development. In this phase, the segment on IO of the plan or
order is developed by the IO Staff. Key IO staff actions are:
d. Inform the concerned commander of all issues and concerns raised during the
review and approval of the supporting
0312. Plan Refinement. During plan review, IO cell modifies/refines the plan as
necessary.
35
PAM 3-06
36
PAM 3-06
0316. The Army uses the MDMP in the development of the IO concept of support and
plans. It is done in order to identify problems or anticipated problem behaviors in the
context of the environment that may impede or prevent the achievement of supporting
objectives. The IO MDMP is not a stand-alone planning process but integrated into the
overall MDMP campaign of the PA unit. The IO plan is a supporting and
complementing plan. Figure 3.3 shows the full process of the MDMP. In this section,
the IO will be integrated into the MDMP and incorporate multi-agency synchronization
throughout the process.
37
PAM 3-06
0317. The process starts with the receipt of the mission through an order from higher
headquarters. This is the form of an operations order or a warning order. This is
important as this would alert all the concerned regarding the mission, identify the
available time for planning and preparation, and decide on the planning approach. Upon
the receipt of the mission, the PA HQ/unit should undertake the following:
a. The IO Officer must always be updated on the situation and the guidance from
initial planning while reviewing OPLAN estimates, conducting an initial
assessment of the time and resources available to plan, prepare, and begin
executing an operation.
c. The commander must issue initial guidance that includes the initial time
allocation, necessary coordination to perform, authorization of movements and
any reconnaissance and surveillance to initiate, initial information requirements,
planning schedules and locations, and additional tasks of the staff.
d. A warning order (WARNO) must be issued. It include but not be limited to the
type of operation, general site of operation, timeline, and all movements and
reconnaissance operations to be undertaken.
Mission Analysis
0318. Essential Tasks for IO. It is rare for a unit to conduct IO by itself. Instead,
there is always higher headquarters guidance and tasks. While the higher headquarters
have specifically assigned some tasks, others may be implied, meaning they must
accomplish specified tasks or the overall mission. Implied tasks require resources and
may not be administered. IO personnel identify tasks that the command must
accomplish to successfully affect adversary and friendly use of information from the
specified and implied tasks. These become the unit’s essential tasks for IO. Essential
tasks for IO should be limited to no more than five; any more than that will overburden
the subordinate element with developing tasks supporting essential IO tasks or create
an IO that is too complex to execute.
0319. A rule of thumb for validating an essential task is to ask: If the unit accomplishes
all other tasks marginally and does this one well, will it accomplish the mission? If the
answer is no, then the task is not essential. Suppose more than five essential tasks are
identified. In that case, IO personnel should question the validity of each essential task
or the nature of the requirements levied on the unit by higher headquarters.
38
PAM 3-06
identifying any organic and supporting IO-capable assets. Organic assets are resident
in assigned or attached forces. Supporting assets are available to the unit from a higher
headquarters or Government agency. Available assets are then compared with the IO
mission requirements (specified and implied tasks) to determine gaps in capabilities
and all supplementary assets required. To ensure the use of these assets, IO personnel
must start coordination early. IO planners face a challenge in expressing IO capabilities
to the commander and staff. A simple list of IO-capable assets or units—such as three
tactical ISA teams or two COMPHO teams—does not help the commander visualize
the command’s capabilities in the IE. In developing its product, IO personnel will
consider three basic questions:
b. What can IO effects be created or produced using supporting assets from the
higher headquarters?
0321. Restraints and Constraints for Information Operations. Restraints are the
things you cannot do, and constraints are the things you must do that do not qualify as
specified tasks but need to be identified and carried forward into COA development
and subsequent planning to affect how operations will be conducted.
0322. Like most other operations, information operations are restrained by rules of
engagement; Philippine national policy; international politics; and other legal, moral,
cultural, and operational factors. Additionally, IO personnel must consider that IRCs
have restraints of their own, particularly MILDEC, PsyOps, CO, and EW. Common
restraints include approval of authorities for deception operations, ISA products,
PsyOps themes to avoid, allied forces’ national policies and capabilities, restricted
targets and frequencies, and public affairs guidance (PAG). The limitations for IO can
be organized in terms of information content and flow to enhance understanding.
0325. Key IO staff actions. After mission analysis, the operations planning team
(OPT) or IO cell has done the following:
39
PAM 3-06
0326. Planners use the mission statement, commander’s intent, and commander’s
planning guidance to develop COAs. COA development provides options for how the
mission and commander’s intent might be accomplished while refining the
understanding of the problem. The IO planner aims to develop a concept of support that
generates effects that create information superiority over the adversary at the proper
time and place. An IO concept of support is examined to ensure that it is suitable,
feasible, acceptable, distinguishable, and complete concerning the current and
anticipated situation, mission, and commander’s intent (MCWP 3-40.4, MAGTF IO,
2016).
0327. Planning that was started during problem framing will continue during COA
development. The JIPOE/IPB products requested and developed will be reviewed for
applicability with the commander’s planning guidance. As necessary, IO-related
JIPOE/IPB products are modified and updated. As new information is received, CCIRs
are revised and additional requirements submitted.
0328. IO cell planning efforts continue to be closely linked with those of the OPT. In
the case of the Philippine Army, OPT is equivalent to TRIAD (G2, G3, and G7) staff
in the IO cell or the battle staff. The IO planner (G3) assists the OPT by graphically
displaying the significant characteristics of the information environment, allowing the
OPT to see the capabilities of both friendly and adversary forces. In coordination with
the Intelligence Officer (G2), the IO cell (battle staff) will conduct nodal analysis to
assess relative IRCs and provide the OPT (IO Cell) with an understanding of the
strengths and weaknesses of both friendly and adversary forces. In addition, the IO cell
conducts an assessment of friendly vulnerabilities to adversary information actions. The
IO cell also continues to refine its analysis of the adversary center of gravity (COG) to
determine the critical adversary vulnerabilities most susceptible to information
operations. The refined COG and critical vulnerabilities are used during the initial COA
Development.
0329. The IO cell closely follows the development of the OPT’s COAs to ensure that
the IO concept of support adequately supports these COAs. The IO cell may formulate
an IO concept of support that will identify IO actions to be implemented regardless of
the eventual COA that is adopted. In addition, the IO cell creates a concept of support
40
PAM 3-06
for every COA developed by the OPT. Just as every COA will have to meet the OPT’s
criteria for suitability, feasibility, acceptability, distinguishability, and completeness,
the IO cell must ensure that the IO concept of support can pass a similar review. Each
IO concept of support must address the following:
f. How will the unit employ IRCs and other organic capabilities to accomplish the
tasks?
g. How is the IO concept nested with the higher headquarters’ IO plan and scheme
of maneuver?
a. Adequate. COA must realize the mission in the scope set in the commander’s
guidance
b. Feasible. COA must realize the mission in the timeline and given the limitations
on resources
c. Acceptable. COA should consider the costs and risks with the outcome/s gained
d. Distinguishable. COA should be unidentical and distinct from the other COAs
0331. Key IO staff actions. After COA development, the OPT or IO cell has
developed the following:
a. An overall IO concept
b. An IO support concept for every COA to include objectives and purposes for
essential IO tasks, target nominations, and an assessment plan to measure the
effectiveness of the tasks
41
PAM 3-06
0332. The commander must war-game the initial COA opposite the COA of the
opponent that were gathered through JIPOE/IPB depending on the available time. COA
war game examines and refines the broad option(s) in light of adversary capabilities
and potential actions/reactions, as well as the characteristics peculiar to the
environment. All friendly COA should be war-gamed opposite chosen adversary
COAs. COA wargaming assists the planners in identifying strengths and weaknesses,
associated risks, and asset shortfalls for each friendly COA. The IO cell’s objective in
the war game is to refine and validate both the overall IO support concept and the
specific IO concepts of support for every COA while fully participating in the COA
war game. The IO actions are integrated into the COA war game in an interactive
process to determine the impact on both friendly and adversary capabilities. The IO cell
observes and records the benefits and gaps of every COA and the capability of IO to
support each COA. For future planning, it also identifies possible branches and
potential sequels based on the IO concept.
0333. Key IO staff actions. During this phase, the key IO staff actions are:
0334. At the conclusion of COA analysis and war gaming, the OPT and the IO cell
should have developed the following:
42
PAM 3-06
0335. COA comparison begins with the assessment and evaluation of the benefits and
gaps of every COA by all members of the staff.
0336. Key IO staff actions. During this phase, the key IO staff actions are:
0337. During COA approval, the commander evaluates all friendly COAs against his
established criteria, against each other, and then selects the COA that will best
accomplish the mission or forms an alternate COA. As appropriate, the IO cell provides
additional comparison criteria directly relevant to IO that may assist the commander in
his decision. The IO results from the COA war game are briefed as a separate,
supporting concept by the IO cell or presented by the OPT as an element of the overall
plan.
0338. In any event, the IO cell should ensure that the commander is apprised of the
effects that operations in the IE have created. The IO cell is also responsible for ensuring
that IO's impact and anticipated effect upon the adversary targets for each COA and the
relative merit of each COA from an IO perspective are provided to the commander.
0339. COA narrative should include the operational mission, situation in the area and
COAs, analysis of opposing COAs, friendly COAs comparison and recommendations.
This should also include the operational description, which includes the operation,
reference, description of military operations, operational description, and remarks.
Orders Production
0340. The IO staff should develop the section on IO of the plan or order of the mission,
taking the commander’s COA decision, mission statement, intent, and guidance and
develops orders to direct the unit's actions. Thus, orders serve as the principal means
by which the commander expresses his decision, commander’s intent, and guidance.
0341. The IO cell is responsible for taking the overall IO concept of support and the
concept of support specific to the COA selected by the commander and turning them
into appropriate sections of the OPORD under the direction of the IO officer. However,
the IO cell must be careful not to let the requirement to develop and explain information
activities and contributions to the operation overwhelm the primary purposes of the IO
appendix, which are to:
43
PAM 3-06
0342. During order reconciliation and crosswalks, the IO cell may be called upon to
review the IO sections of the orders, identify gaps in planning or discrepancies, provide
corrective action, and finalize IPB products. If fragmentary orders are issued, then the
IO cell will ensure appropriate instructions are given to IO-capable units (MCWP 3-
40.4, MAGTF IO, 2016).
0343. Key IO staff actions. In this phase, the key IO staff actions are:
d. Inform the concerned commander of all issues and concerns raised during the
review and approval of the supporting
Plan Refinement
0344. The changes in the IE and in the PA and developments may come at any point.
Thus, on the final stage, refinements must be made to the plans. The plans are:
a. Adequate. The range and concepts imbedded in the planned operations must be
accomplish the mission while working within the planning guidance released.
e. Compliant with Doctrine. The plan complies with doctrine to the maximum
extent possible
Multi-Agency Synchronization
0345. Consultations with select civilian agencies are also key in the accomplishment
of the mission. IO activities should be done through inter-agency coordination and
collaboration since they are on the same side as the government. Partnership with
civilian agencies is vital as they have the resources needed that should be vital or even
44
PAM 3-06
enhance the COAs and orders put in place. With these resources, the Army’s logistics
and support personnel would lessen to include the cutting of costs.
Targeting
0348. Activities coordinated through IO focus directly on influencing will, affecting
understanding and on those capabilities that promote understanding of the application
of will. Therefore, IO targeting must be simple and authoritative. Its objective must be
easily understood in both current and future operations. They must focus on the assets
of enemy capabilities that could interfere in the successful conduct.
0349. Targeting Cycle. As reflected in PAFM 3-01 and PAM 3-041, the principles
of effective targeting were the foundation in coming up with the six phases of the
targeting cycle. The cycle indicates the targeting alternatives for the objectives for
combat operations of the commander at the same time reducing unintentional and
undesirable consequences.
0350. Targeting meetings. This is chaired typically by the operations staff, which
functions to synchronize the targeting efforts of the staff. The IO cell is a distinct and
separate working group effort that feeds the staff to target meetings. Members of
targeting meetings look at how the staff achieves the desired effects to meet the themes
and messages developed in the IO cell for different audiences. The IO officer looks at
how the staff integrates information-related capabilities into operations to achieve the
desired effects. Targeting and IO are both integrating processes that affect and reinforce
each other. Information-related capabilities provide assets that detect targets, deliver
45
PAM 3-06
effects, and then assess these effects. Military information activities include a wide
range of actions and will be achieved by lethal and non-lethal means. Concerning
human factors, it is important to realize that any element of targeting activity may
influence a range of audiences and create other unintended effects. The IO cell
coordinates the assessment of the possible impact of such activity and proposes
appropriate actions.
b. Political, legal and rules of engagement (ROE) issues, which may include
international law, custom and practice, host nation agreements/arrangements,
support by other nations and other sensitivities
c. Those arising from social and cultural attitudes will limit information activity
options and lead to the development of rules of behavior
46
PAM 3-06
b. High Payoff Target (HPT). It is a target that would greatly damage the
functions vital to the enemy within the area of interest of friendly commanders.
It is greatly important to acquire and engage HPTs (AFPM 3-14). Priority IO-
related HPTs includes, but not limited to: enemy C2 links/nodes, intelligence
collection methods/equipment, supporting institutions/organizations,
supporting military equipment/systems, automated data systems/decision
support systems, human networks, populace support and or any other target that
is designated as an HPT. HPT is a single or a grouped target set.
1) Center of Gravity. The AFP (2013) defines this as the source of power that
provides moral or physical strength, freedom of action, or will act. All
objectives are directly associated to a COG. COGs vary at different levels
however, these are nested. It is important to remember that ISO directly looks
47
PAM 3-06
into the legitimacy and influence over a population. However, territorial defense
aims to situate direct action to defeat the enemy forces, to eliminate the war-
making capacity of the enemy or to create an environment that would change
the structure and policies of the enemy. Thus, the population would be both
considered the enemy and friendly COG in an ISO environment.
48
PAM 3-06
0356. As the staff evaluates each potential target for each CARVER factor, the analyst
enters the numerical value into a matrix. After evaluating all the potential targets, the
analyst adds the scores for each target. The totals represent the relative desirability of
each potential target and constitute a prioritized list of targets. Staffs consider the targets
with the highest totals first for engagement.
49
PAM 3-06
e. Effect. Effects on the populace can alienate the local inhabitants, strengthen the
resistance movement, or trigger reprisals against the indigenous people in the
immediate target area. The IO analyst must calculate and weigh collateral
damage against the expected military benefit to determine if an engagement is
advisable under the concept of proportionality. Collateral damage includes, but
is not limited to, civilian injuries, deaths, and adverse economic, social, and
political impacts of the proposed engagement.
1) There are two types of targeting effects, namely direct or indirect. As defined
in the AFP IO Manual (AFPM 3-14), (a) direct effects are the immediate, first
order of effects of a military action (i.e. employment results of weapons, etc.),
that are unchanged by intervening situations or processes. These are easy to
identify. On the other hand, (b) indirect effects are the delayed and displaced
second and third-order effects of military action. Indirect effects are not easy to
identify because of varied behavior of the enemy which can mask the extent.
Indirect effects are commonly IO effects.
2) There are three (3) fundamental characteristics of direct and indirect effects
which may qualitatively affect the enemy’s capabilities. (a) Cumulative Nature
of Effects. The compounding of effects is common. For direct effects, it is
common to see it being greater than the immediate consequences while for
indirect effects, it combines to create greater change comparing to the total
consequences. It is possible that it may occur simultaneously or at different
levels of the operations while lower-order effects are being accomplished. (b)
Cascading Nature of Effects. Indirect effects can indirectly affect the target
system of the enemy, at times even influencing other target systems. This
commonly happens through common and critical nodes connected to the target
systems. Indirect effects cascades usually from the top to bottom levels of war.
50
PAM 3-06
3) There is a possibility that an event and direct effects associated with the event
may have expanded effects over time and distance. With this, there is a need to
use the Measures of Effectiveness (MOEs) which is a tool to measure results
achieved from the overall mission and accomplishment of assigned tasks. These
MOEs are necessary prior to the combat assessment. Assessments commonly
are at the tactical, operational, and strategic levels of war to include destroyed
equipment and resources. It is important to identify the time when the
predetermined conditions on the enemy’s operational employment and overall
strategy was met together with the information on whether the effects are
recurring or not. These information is important in the continuing intelligence
analysis that helps in the placement of combat assessment measures
0357. Targeting Priorities. The targeting team must identify their priorities during
every phase or critical event during the operation. Targeting priorities are reflected in
the following products:
a. High Payoff Target List (HPTL). The HPTL is a list of selected HPTs. Loss
of single or multiple assets on this list is expected to reduce the enemy capability
significantly. This is to provide additional support for the success of a friendly
COA.
0358. The IO Officer and the targeting team develop or contribute to developing these
products during the phases of planning and execution. The commander approves the
ISM concurrently with the approval of the COA. The IO officer ensures that the ISM
includes all the relevant information necessary to engage an IO-related target. On the
other hand, the IO-related vulnerability analysis being done by the intelligence staff and
the IO officer provides the basis in deciding which of the IO-related targets to engage
and when to engage them.
51
PAM 3-06
below shows the four functions of IO targeting and the related IO planning actions
associated with them.
a. Decide. This occurs parallel with planning and the ongoing military decision-
making process (MDMP). During the decide phase, the IO planner, in
conjunction with the members of the IO cell who are designated as the “IO
targeting team,” establishes the target selection priorities and determines the
intelligence collection criteria for each target.
b. Detect. This occurs in both the IO planning and execution cycle thus involved
in the accurate identification and location of the HPTs to be effectively engaged
for a reasonable effect. During the detect phase, the intelligence collection plan
(ICP) is focused on answering priority intelligence requirements (PIR)
associated with the selected targets. Detecting targets for non-lethal attacks
requires intensive intelligence support and accurate methods to measure the
effectiveness of targeting. Target detection is an ongoing process that is flexible
enough to meet the changes in the operation as the situation develops.
c. Deliver. This takes place in the execution phase despite the engagement of IO-
related targets during the preparation of the overall operations of the command.
During this phase, IO HPTs are tracked and engaged. At the same time
simultaneously, intelligence collection assets continue to locate and accurately
describe lesser refined or future HPTs as priority targets or combined target sets.
When a new target is identified and located, the IO cell determines the most
appropriate “delivery system” required to service the target for a specific desired
effect, synchronizes the engagement with ongoing operations or mission needs,
and develops mechanisms for measuring effectiveness. During the delivery
52
PAM 3-06
d. Assess. This function occurs throughout all phases of an operation but most
intense during execution. The effects of lethal/physical attacks on IO-related
targets are assessed using traditional target assessment processes and
methodologies. The effects of non-lethal attacks on IO-related targets require
non-traditional methods, techniques and processes to assess or measure
effectiveness. The IO's role in assessing target payoff or adjusting effects to a
target or target node is continuous throughout the current operations and the
follow-on post-operation phases. All IO core elements, including related
activities and supporting military enablers, used to collect information that
provides an accurate assessment of IO targeting efforts when collated.
0360. Targeting assessment and prioritization occurs daily within the IO cell. IO
activities in close contact with the civilian populace, civil government or non-
government agencies/groups are valuable intelligence augmentation assets in collecting
and analyzing targeted assessment. CMO (PA, PsyOps, CA), chaplains/religious
leaders, military police/civil law enforcement, finance/resource managers, logisticians,
non-governmental organization (NGO) personnel, medical personnel, government
interagency representatives and local government officials are but a few of the possible
contributors in the assessment of the effects of non-lethal IO targeting. Operations will
use the success established as a criteria throughout the COA analysis to assess the
effectiveness of the and monitor the targets as necessary thus, the continuous
assessment. Following the assessment, IO, in conjunction with the current operations,
determines whether to engage with the target, terminate the engagement, or engage with
the target through a different element. This decision is founded on whether the
engagement undertaken realizes the IO objective and the success of the mission.
0361. It is difficult to capture the effects of the target engagement due to the large
amount of information generated during its operations. Therefore, IO, Intelligence, and
CMO work closely together in the IO cell to develop meaningful and timely battle
damage assessments or measures of effectiveness for an IO-related target. Additionally,
operations must establish the processes and systems together with the supplemental
staff elements, specifically intelligence, which will allow efficient and timely
information dissemination necessary for IO targeting.
0362. IO Targeting Process. In targeting, lethal and non-lethal fires are synchronized
with the outcomes of the operating systems in other battlefields. Considering the target
guidance and targeting objectives provided by the Commander, the IO cell develops the
IO targets, assigns targets to systems/methods where it is best suited to achieve the
desired effect and synchronizes these targets into the operational timeline (what or who
to engage, where to engage, when to engage, and what method will be used for the
engagement) and the overall integrated Joint targeting process. IO targeting is a cyclical
process (determined by the command’s battle rhythm) that supports both offensive and
53
PAM 3-06
Assessment
0365. Evaluating the operation against criteria of success allows the commander and
staff to make decisions and adjust the plan. Assessment entails the following three
tasks:
b. Continuously monitor the situation and progress of the operation toward the
commander’s desired end state
0366. The IO officer uses various means to conduct assessments, some internal to the
organizations, others external. When time and resources permit, multiple sources help
corroborate other sources and strengthen the conclusions drawn from results. The
commonly used sources are reports of intelligence assets; Soldier and leader
engagements; CMO; polling and surveys (both AFP generated and external – whether
contracted or not); media monitoring and analysis, especially local channels; unified
action partners; conversations with local partners; passive monitoring; and, patrol and
spot reports.
0368. Objective Development. The objective statement helps staff decide which
effects and information-related capabilities they need to achieve the commander’s
intent to shape the IE. Figure 3.7 below shows how to develop the IO objective
statement through effect, target, action, and purpose.
54
PAM 3-06
a. The effect describes the specific desired outcome. Normally inform or influence
is the most commonly used effect under the IO construct. Additional effects
such as deceive, degrade, deny, destroy, disrupt, exploit, isolate, mitigate, and
neutralize will be used. The backward planning process dictates starting with
the desired effect to ensure follow-on actions are coordinated
b. The target portion is a detailed description of the target. The specific target
audience could be a demographic of the population, an individual, a defined
area, or a piece of equipment with the associated capability
c. Action specifies the behavior or capability of the target. The desired target
behavior/effect must be measurable, observable, and specific. The units or
assets tasked to observe and report on the target now have a specific criterion to
refer to and can confirm or deny seeing the desired target behavior/effect
d. Purpose explains and justifies the benefit of engaging the target. It directly links
to the commander’s intent and mission. Purpose is the planned rationale for the
operational benefit that affects the target demonstrate, by performing this action
55
PAM 3-06
Figure 3.8 shows how each part of activity, descriptor, subject, metric, and baseline
leads to a measure of effectiveness.
0370. The activity specifies the desired direction of change (increase or decrease).
Increasing or decreasing describes how the specific subject (noun) is desired to change.
0371. The descriptor is a restatement of the target mentioned in the IO objective. The
descriptor is the target audience and is responsible for performing the activity.
0372. The subject is a noun related directly to the affected activity. The subject is what
the IO cell is trying to influence the target to do. The subject is the measurable,
observable, and specific item that observers or other tasked assets can note.
0373. The metric is the numerical percentage threshold of effectiveness that the IO
cell derives from the MDMP, commander’s guidance, research, and analysis. The
metric is the percentage goal how specific activity will change to prove effectiveness.
0374. The baseline is the historical measure from which the current metric is
determined to show statistical or acceptable significance. The IO cell may have to
establish a baseline metric if no historical metrics exist. In some cases, it may take
several months to establish a baseline. The lack of a historical basis for comparison
lengthens the time to determine if the measure of effectiveness is successful.
56
PAM 3-06
0377. The medium describes the product format used to disseminate the message. The
medium can describe any type of print, broadcast, electronic, physical, or personal
method to disseminate a message or a talking point.
0378. The delivery states how and where IRCs delivered the medium or product to the
audience. The delivery method helps to define how a selected audience reacts to a mode
of delivery. The specific delivery method also allows units and assets to support the
measure of performance.
0379. The target provides a detailed description of the selected audience as described
in the IO effect.
0380. IO cannot generate effects if IRCs do not execute tasks successfully. As such,
assessment accounts for task execution. Because task completion affects execution as
well as assessment, representatives and subordinate units of IRCs report
accomplishment of their respective tasks. Performance measures are not measures of
success—they gauge task completion. MOPs are future operations the IO cell needs
information about from units and fellow staff to generate effects. Figure 3.10 below
shows a completely developed measure of performance in terms of quantity, medium,
delivery, and target.
57
PAM 3-06
58
PAM 3-06
59
PAM 3-06
60
PAM 3-06
61
PAM 3-06
Table 3.4 – IO Actions during MDMP compared with the targeting process
MDMP Step IO Action Targeting Action
Receipt of • Conduct COG • Determine specified,
Mission and analysis • implied, and essential
Mission Analysis • Determine specified, • fire support tasks
implied, and essential • Determine HPTL
IO tasks • Translate status of
• Select targets for fire
nomination to HVTL • support assets into
• Determine • capabilities
supporting IRC • Develop draft
• Determine targeting
supporting IO • objectives or essential
Objectives and • fire support tasks
essential IO tasks • Nominate targets to
• Product: Restated • HPTL
mission for IO;
Initial synch targets
effects statements
COA Development • Input to the concept • Develop concept of
of fires • fires (or effects)
• (or effects • Develop initial HPTL
• Target nominations • Quantify effects for
to • essential support
• HPTL tasks
• Quantify effects
• Product: Initial IO
• Synch Matrix (ISM);
• Effects statements
• refined
COA Analysis and COA • Results of IOWG • Finalize concept of
Comparison • Input to ISM fires
• Discuss 1, 2, 3rd • Finalize HPTL
order • Develop Fires Synch
• of effects • Matrix
• Product: ISM • Develop support
control
• measures
COA Approval • Targets approved, • Brief fire support
• added to ISM plan
• as part of each COA
Orders Production, • Synchronize IO and • Write fires paragraph
Dissemination, and Fire of
Transition • Support Annexes • OPORD/Plan and
Fire
• Support Annex
62
PAM 3-06
Chapter IV
Information Operations in Army Operations
0401. This chapter identifies how the IO applied to Army operations, particularly in
the counterinsurgency and full-spectrum operations. It also recognizes the fundamental
principles of war, tenets of army operations, and combat power elements that provide
the basis for full spectrum operations. For example, as an element of combat power,
information enhances leadership and magnifies the effects of maneuver, firepower, and
protection.
0405. IO is an integral part of the full spectrum of the Army operations to affect
friendly, neutral, and adversarial human and automated decision-making systems while
protecting one’s own from detrimental factors. To affect desired targets would mean
using various capabilities to inform, attack, or protect. IO is applicable in the situation,
63
PAM 3-06
0406. Four conditions define the spectrum of conflict--Stable Peace, Unstable Peace,
Insurgency, and General War. The dynamic interactions between the actors characterize
the operational environment. Actors can be internal or external, state or non-state, and
individual or collective. Interactions play an important role in determining the nature
of the operational environment. Interactions may involve one, many, or all of the
following operational variables: political, military, economic, social, informational, and
infrastructure; however, the political and military interactions usually provide the best
insights into the nature of the operational environment. The spectrum of conflict
provides an exceptional tool to visualize and describe the nature of the operational
environment but offers little insight into military forces' actual operations.
0407. The main task of the Army information is to inform and influence activities. In
full spectrum operations and an environment situated by information, messages,
themes, and actions are inextricably limited, effective full spectrum operations require
integrated themes and messages synchronized with actions. The most powerful
message that soldiers send is their actions on the ground. (HQDA, 2010a, para 7-1)
0408. IO is the integrated and synchronized use of selected military and non-military
capabilities in order to affect friendly, neutral, and adversarial human and automated
decision-making systems while protecting our own. Institutionalizing IO and applying
it to various AFP and PA missions create operational advantages and opportunities for
success.
0409. The fundamental principles of war, tenets of Army operations, and elements of
combat power provide the basis for full spectrum operations. The elements of combat
power are building blocks that underlie combat power generation to produce
overwhelming effects. The principles of war guide and instruct commanders as they
combine elements of combat power. The principles reflect the distillation of Army
experience into a set of time-tested guidelines. The tenets of Army operations
characterize both the substance and form of full-spectrum operations. The tenets
permeate Army doctrine. The operational framework relates the activities of Army
forces in time, space and purpose. Combined with tenets of Army operations, the
framework provides commanders with a conceptual basis for applying combat power.
Commanders combine and use the capabilities of combined arms formation in
complementary, reinforcing and asymmetric ways. Combined arms organizations
apply combat power to achieve decisive results across the range of operations. Combat
operation focuses on reducing the strength and equipment of the adversary through
decisive combat engagements; intelligence operation focuses on finding the adversary,
and CMO focuses on gaining public support and destroying the will of the adversary to
fight.
64
PAM 3-06
0411. Information is not neutral; opposing sides use it, directly and indirectly, to gain
exploitable advantages and apply them against selected targets. Some examples
illustrate the use of information as an element of combat power; in 2017, during the
Marawi crisis, IO and PsyOps were heavily used to demoralize the adversary, rescue
civilians and boost the morale of the friendly forces. The weakening of the enemy’s
will to fights was combined with the demonstrated destructive power of Army and Air
Force assets that convinced many enemy troops to surrender. The use of military
deception (an element of IO) was also highlighted by using feint and ruse during
numerous combat operations to constrict the enemy’s movement towards designated
engagement areas resulting in the decisive encounter like the death of Isnilon Hapilon,
the erstwhile emir of the "Philippine Province” the Islamic State of Iraq and the Levant
(ISIL) until his death during Marawi crisis.
0412. Support to national development improves the condition of the people, thus
eliminating socio-economic issues (poverty, illiteracy, and lack of basic services).
However, the enemies use these issues to discredit the government and influence people
to fight the government.
Counterinsurgency Operations
0413. Counterinsurgency (COIN) operations may equate to full spectrum operation at
the tactical level because it is also a combination of offensive, defensive, and stability
operations. COIN offensive operations focus on eliminating the insurgents. COIN
defensive operations focus on protecting the populace and infrastructure from insurgent
attacks. COIN stability operations focus on addressing the root causes that allowed the
insurgency to come into existence. Determining the combination is not easy since it
varies depending on the situation, the mission, and the commander’s desired end-state.
These three operations are sometimes conducted simultaneously within the different
parts of the area of operations.
65
PAM 3-06
Civil-Military Operations
0415. CMO helps mitigate the impact of the violence on the people and builds public
trust and confidence in the Army and the government during man-made disasters like
terrorism and armed conflict. Furthermore, CMO mitigates the effects of the operational
mission as the Army is obligated to manage the people during these situations. CMO
also helps isolate the threat groups and prevent them from influencing them and gaining
public support. The ability of the PA to decrease the impact on the lives of the people
during calamities and natural disasters further increases public trust and confidence.
0416. In the PA context, PsyOps by deeds sends a strong message to the subconscious
of the target audiences by projecting an image through posting and actuations. This
shapes the perception of the people, thus gaining support and legitimacy in the process.
Thus, the major deliverable of PsyOps is influencing the adversary and neutrals while
informing friendlies.
0417. The PA IO task to inform and influence are under PA and PsyOps, respectively.
The distinction between “each line of effort” has a different purpose and effect. These
lines of effort may rely on the same capabilities to accomplish these effects and must
be integrated closely to ensure unity of effort in words, images and actions. This is to
avoid the contradiction of the appearance that may undermine the force’s efforts.
(HQDA, 2010a, para 7-12) It has been contested that the PsyOps influence task tends
to manipulate people or target audience while the public affairs task is to inform and
also influence its target audience.
0418. There are also contentions on the definition of strategic communication and IO.
Strategic communication, by essence, is coordinated efforts to inform, influence, and
persuade in pursuit of national objectives (Paul 2009a). The difference between IO and
strategic communications (StratCom) is the latter is at the highest level and involves
the whole of government. At the same time, the former rested within StratCom and is
conducted exclusively by the DND.
0421. Once the end state is already established, IO objectives shall be determined to
attain the end state. Selecting the appropriate military and non-military capabilities that
will best suit the attainment of objectives follows. Then, on each of the capabilities, the
activities are lined up to accomplish the mission. Most often, AFP operations are
66
PAM 3-06
simultaneously integrated with those of the other agencies of the government. This
requires the AFP personnel to be knowledgeable and skillful in integrating and using
information and information systems and planning and executing military missions in
support of national security and interest.
67
PAM 3-06
Annex A
Conducting Information Operations
General. Since many IO objectives and tasks require long lead times to create the
desired effects, preparation for IO often starts in advance of other operational
requirements. IO preparation is G7, PA requirement at all appropriate levels of
command. The Division/Regimental equivalent IO Cell synchronizes all the major IO
elements and related activities to achieve unity of effort. The IO Cell brings together
the representatives of the different organizations responsible for all IO capabilities. In
most cases, PA Triad and Operational Security (OPSEC) representatives are always
engaged in the final preparation for conducting IO and for this activity, OPSEC is
strictly observed. Commanders may designate or require other representatives of IO
capabilities, special battlefield operating systems and coordinating staff sections to
participate in the final preparation as the mission requires.
68
PAM 3-06
69
PAM 3-06
The IO Staff
70
PAM 3-06
operational planning requirements are initiated and undertaken within the operation.
Upon receipt of the mission or planning task, the concerned IO Staff develops a
tentative IO Concept of Operations, determines the critical IO tasks/capabilities and its
prerequisites, and identifies the AFP staff functional specialties that will be required to
participate when the IO Cell convenes to begin the formal planning process. Typically,
the IO Staff may be composed of:
a. IO Chief
b. Deputy IO Chief
c. IO Planner
d. Senior Staff IO NCO/Planner
e. Junior NCO OPSEC Planner
f. Intelligence Officer/Planner or NCO
g. Public Affairs (PA) Officer/Planner
h. Information Support Activities (ISA) NCO/Planner
i. Civil Affairs (CA) NCO/Planner
* Not assigned, but generally included via staff relationships
2. Intelligence, PA, CA, ISA, and IO Staff members assigned to the IO Staff also
serve as direct liaisons and principal facilitators to their respective professional,
functional specialties.
a. GHQ, PA
b. Division
The IO Cell Meeting. The IO Cell shall meet daily during ongoing operations, at least
once a week during regular days, or as often as necessary to proactively engage in
anticipatory planning. IO Cell meetings should never exceed one hour. If more time is
needed, it shall convene more frequently than to convene on longer periods. By doing
so, current and afterthoughts stay fresh in the mind of the participants. The Operations
facilitate the IO Cell to ensure that a broad range of IO capabilities is integrated and
synchronized with the ongoing or planned operations. The IO cell structure must be
flexible to accommodate various deliberate crises or ad-hoc planning under a certain
operational circumstance. To ensure that the attendee’s time is optimized, the IO Staff
shall prepare/disseminate well to the IO Cell the agenda-related materials before the
meeting. The agenda should be standardized to the greatest extent possible to streamline
the administration of the meeting. IO Cell meetings bring together a diverse cross-
section of AFP military professionals and civilian Subject Matter Experts (SME) to
provide enhancing thoughts and good inputs during serious discussions in every
meeting. Their time is valuable, and their attendance contributes to the success of the
IO Cell. It is noted that if the attendee’s time and experiences are wasted, or their views
are not considered, they will quickly lose their interest and may not attend any more to
any meeting or worse; they may attend but will not contribute any input at all. Enhanced
knowledge or ideas of subject matter experts are far more important to the successful
collaboration in the IO Cell than giving importance to the ranks of the attendees. Well-
thought-out IO will emerge naturally in a comfortable setting that will promote and
71
PAM 3-06
72
PAM 3-06
Annex B
Support Relationship between Information Related Capability
73
PAM 3-06
74
PAM 3-06
Annex C
Example of an Information Operations Agenda
1. Roll Call
2. Announcements
3. Current Situation (Briefed by Intelligence and Operations)
a. Last 24 Hours
75
PAM 3-06
10. Date, Time and Location of next IO Cell Meeting. The next IO Cell Meeting
schedule and venue should be set during the current meeting before the group adjourns.
This will enable members to prioritize the IO Cell Meeting in their respective schedules
before other calls on their time arise.
Note: A written summary of the meeting should be finalized within 24 hours and
provided to the chief of operations for distribution. IO Cells should transmit IO Cell
meeting summaries to fellow IO Cells. Summaries will be retained as permanent record
for future reference.
76
PAM 3-06
Annex D
Example of an Information Operations Estimate
Originating
Section and
Issuing HQs
Place of Issue
Date/Time Group
IO ESTIMATE NO. ______________
1. MISSION.
a. Mission. Restated Mission of the Command.
b. IO Concept. Identify the main effect the commander wants to achieve with IO
expressed about his forces and activities.
1) Costs versus Benefits. Compare the costs of IO in each COA based on the
resources and time required executing them in relation to the operational
impact of their success.
2) Risk to Mission and Friendly Assets. Compare the level of risk to COA
success and friendly assets should IO fail or be compromised.
3) Chance of Success. Summarize the advantage and disadvantages for IO in
each COA to evaluate the chance of success in each.
77
PAM 3-06
b. IO in COA 1.
c. IO in COA 2.
78
PAM 3-06
Annex E
Example of an Information Operations Supporting Plan Annex
References:
a. ___________
b. ___________
c. ___________
1. Situation
b. Friendly.
c. Environment.
a) Identify key people, organizations and groups in the AO that will operate in
the information environment to affect friendly and enemy operations.
b) Describe likely objectives and activities of these key people, organizations
and groups in the AO that will affect IO.
79
PAM 3-06
3. EXECUTION
a) Operations Security. State how OPSEC tasks will deny the enemy
knowledge of the EEFI of the operation. Synchronize this element with
the other IO elements. Refer to Appendix 1, Operations Security, for
detailed information.
b) Information Support Activities (ISA). State how the ISA tasks will
degrade, disrupt, deny, or influence the enemy to support the
accomplishment of the operation. Identify the audiences and desired
effects, in priority, for ISA to support the commander’s intent.
Synchronize this element with the other IO elements. Refer to Appendix
2 (ISA) for detailed information.
c) Military Deception. State how the MILDEC tasks will deceive and
influence the enemy. State how MILDEC supports the accomplishment
of the operation. Synchronize this element with the other IO elements.
Refer to Appendix 3 (Military Deception) for detailed information.
d) Electronic Warfare. State how the EW tasks will degrade, disrupt, deny,
and deceive the enemy. State the defensive and offensive EW measures.
Identify target sets and effects, by priority, for EW operations. State how
80
PAM 3-06
81
PAM 3-06
APPENDICES:
1. Operations Security (OPSEC)
2. Information Support Activities (ISA)
3. Military Deception (MILDEC)
4. Electronic Warfare (EW)
5. IO Execution Matrix
6. Others as required
82
PAM 3-06
Annex F
Example of a Simplified Information Operations Synchronization Matrix
MISSION:
COMMANDERS INTENT:
END STATE:
Operational IO
IO Tasks Element MOP MOE
Objectives Objectives
83
PAM 3-06
MISSION:
COMMANDERS INTENT:
END STATE:
Operational
IO Objectives IO Tasks Element MOP MOE
Objectives
1. Strengthen 1.1 Convince T.1.1.A: Develop ISA MOP3.1.1: MOE 3.1.1: ID
public support regional and distribute multi- Number of in number of the
for… populace to media products for broadcast and positive media
support… local/regional print media stories reporting
Activities, in media products on the benefits
order to promote distributed of … (2OE)
peace, P1.1.A To demonstrating
prosperity, and demonstrate the the benefits
future combined benefits of activities from…
operations T2.1.5 Provide COMPHO MOP3.1.2: MOE 3.1.2: ID
products depicting PAO Number of in number of the
combined broadcast and positive media
operations print media stories reporting
successes. products on the benefits
distributed of combined
P2.1.B: Gamer depicting the operations…
support for success of (2OE)
activities combined
operations
3.2 Prevent T.3.2.A: PAO MOP3.2.1: MOE 3.2.1: ID
adversaries from Coordinate, Messages are in number of the
interfering with… develop and distributed to media stories
Activities in order distribute themes local/regional that contains
to maintain and messages media distributed
possible regional explaining AFP reinforcing the messages…
development missions/successes positive aspects (2OE)
of activities…
P.3.2.A Obtain and MOE 3.2.2: ID
reinforce support in number of
with local populace requests for
and local/regional additional
leadership information
received (3OE)
T3.2.D Active ATFP OPSEC MOP3.2.4: MOE 3.2.5: ID
posture and ATFP/OPSEC in number of
OPSEC measures standards are soldiers carrying
are in place, posted in unit ATFP/OPSEC
monitored and facilities and cards (2OE)
adhered to… reinforced
through MOE 3.2.6: ID
P3.2.D: Mitigate command in numbers of
adversaries actions orderings. ATFP/OPSEC
against… violations (3OE)
84
PAM 3-06
Annex G
Operations Security Process
Identification of EEFI
85
PAM 3-06
86
PAM 3-06
87
PAM 3-06
88
PAM 3-06
89
PAM 3-06
Threat Matrix
90
PAM 3-06
91
PAM 3-06
92
PAM 3-06
2. Use Figure D-5 as a decision chart for probability, combining the values for threat
and vulnerability.
93
PAM 3-06
3. Determine the risk by multiplying probability times impact. The measure of impact
in this example can be determined by reviewing the value of the CI that is
susceptible to HUMINT collection. Should multiple items of CI be susceptible to
exploitation by a given vulnerability, the analyst makes a decision on the combined
value of that CI. Most often, the combined value is the highest value placed on any
one CI item.
4. Use Figure 4-2 as a decision chart for risk, combining the values for probability and
impact. For example, if the threat is high and the vulnerability is medium high, the
probability of compromise is medium high. If the value of the CI is medium high,
the risk is medium.
94
PAM 3-06
95
PAM 3-06
Annex H
Example Information Operations Action on Critical Activities
96
PAM 3-06
97
PAM 3-06
Annex I
Sample Information Operations Concept Matrix Plan
98
PAM 3-06
Annex J
Concept of Strategic Information Operations against KFR
99
PAM 3-06
Annex K
Sample Information Operations Sync Matrix
100
PAM 3-06
Annex L
Information Operations Related Intelligence Questions
These questions should be answered when building different IO-related Intel products.
However, these are meant as a guide only, and the IO Planner and Intel Analyst should
not be confined to just these questions. IO has three dimensions:
• Physical Dimension: Key individuals and human networks and technical and
physical infrastructure that supports the information flow to an audience.
• Informational Dimension: Content of information that influences effect and the
way it flows to an audience.
• Cognitive Dimension: The beliefs of a person or persons whose decisions can
impact the Commander’s End State.
Physical Dimension:
• Who are the people the TA associates with?
o Key individuals that have a close relationship with the TA and provide
advice and counseling:
▪ Who are the key advisors (family, business, religious,
organization)?
▪ What are the primary beliefs of these advisors (attitude towards
the US)?
▪ Who is the TA’s spokesman?
o Human networks the TA uses for support:
▪ What organizations or groups does the TA associate with
(political, business, criminal, media, religious, tribal) and how
close is he to them?
▪ What are the goals of these groups?
▪ Does he have a media cell?
• What equipment and facilities does the TA have?
o Technical infrastructure needed to produce, process, receive, send, and
store information so the TA can interact with others and make decisions:
▪ What technical resources does the TA have access to?
▪ What media does he have access to, control, or own?
▪ What means does he use to communicate with others (email,
social network tools, phones, courier, radio)?
o Physical infrastructure that houses the TA’s technical infrastructure and
those associated with the TA:
▪ Where are the media facilities that the TA uses?
▪ What religious facilities does the TA use?
▪ Where does the TA socialize?
▪ What front companies does the TA utilize?
▪ Where is the TA’s residence and place he conducts business?
o Can the TA actually send and receive information?
▪ Does the environment support the actual ability to send and
receive information?
▪ What or who is most capable?
Informational Dimension:
101
PAM 3-06
• What is the content of the information? Content of the message that the TA
thinks will influence others to help meet his goals.
o Who is the message intended for?
o Why was the message or image sent? Is the TA pushing out his ideology
or responding to someone or some event?
o What does the message say, and what are its key points or themes?
o How do the themes in the message compare to themes in past messages?
Does it represent anything new?
o What do the images show?
o Is the TA emphasizing any particular part of his ideology more than
other parts?
• How is the information sent? How the message flows so its intended audience
will hear and see it.
o Who is sending the message?
o How is the message being passed – method (how), tempo (speed),
language, format (style)?
o What format is the message in (written, verbal, image)?
o Is the message or image clear, and will it be easily understood by the
intended audience?
o How is the quality of the product?
o Is the message being picked up and passed by others?
o Is the intended audience receiving it?
o Are unintended audiences receiving it? How are they reacting to it, and
what impact is it having on them?
• Is there any competing information?
o Is the message being countered by another group? If so, how?
o What does the counter message say?
o How is it being received by the intended audience compared to the TA’s
message?
Cognitive Dimension:
102
PAM 3-06
• Who does the TA influence? Decide how to react and who and how to engage
and influence to meet goals.
o What has the TA most likely decided to do?
o Who has the TA decided to engage and influence, and why?
o What is the TA’s end state?
Physical Dimension:
• What are the basic demographics of the AO?
o Size of the population.
o Location/density of the population.
o Percentage of rural versus urban. Primary areas for each.
o Age and sex statics.
o Number above and below the poverty level.
o Literacy and education level.
o Primary livelihoods.
o Cultural highlights of groups.
o Type of government that governs the population.
o The level of government, religion, or other restrictions the population
lives under.
• Who are the main groups that have the most influence?
o Consider tribal, business, government, military, militia, religious,
political, criminal, etc.
o Include who these groups are, where they are located, and what type of
infrastructure they own or control (media, mosques, businesses, etc.).
o Identify who the primary leaders of these groups are to include who their
key lieutenants are and where these leaders are based.
o Identify what other groups ally themselves with these groups.
o Who or what outside of the groups influences the group?
o Consider the NGOs or international groups operating in the country and
their role with the main groups and general population.
• What is the radio, TV, print, and internet infrastructure?
o Who owns the media?
o How their news is slanted.
o Penetration into the population.
o Who the main groups favor and trust.
o Location of the media.
o The medium radio and TV use – antenna or satellite.
• What is the telecom infrastructure?
o Who owns the telecom?
o Penetration into the population.
o What is the most popular?
o Location of the supporting infrastructure.
• Where/what are the major communication hubs.
o Consider mosques, markets, gas stations, schools, etc.
• For the government, HN military, militias, insurgents groups, and perhaps
political groups, what does their C2 structure consist of, and where are the major
components of that structure located?
• How sophisticated is the environment?
103
PAM 3-06
o Does the environment support the actual ability to send and receive
information?
o What or who is most capable?
Informational Dimension:
• What are the dominant narratives in the AO?
o Consider narratives that impact all groups as well as narratives that the
main groups stress.
• What are the other competing narratives in the AO?
• How are the narratives being passed?
o Consider method (how), tempo (speed), language, format (style) and the
format of the narrative (written, verbal, image)?
• What other information is being passed, by whom, and how?
• How are decisions by the decision-makers of the main groups passed?
Cognitive Dimension:
• How do the main groups see themselves?
o Consider, at a minimum, family, religious, cultural, tribal variables.
• What are the main perceptions of the main groups towards their government,
insurgents, their economy, business, other regional countries, and outsiders
(such as the US and NGOs)?
• How does the population as a whole and/or the main groups see themselves or
others based on a historical incident/event?
• What current events or issues may be impacting their perceptions?
o Consider those events and issues inside the AO and outside.
• What are the main groups most concerned with?
o Consider local events, regional, international, economy, family, etc.
• Why do they send or support certain narratives?
104
PAM 3-06
Annex M
Record of Changes
105
PAM 3-06
Glossary
Attack
Refers to any offensive action taken, whether in lethal or non-lethal form, intended for
adversaries.
Civil Affairs
A function of CMO; refers to specialized projects (e.g., construction, medical, dental,
veterinary activities) performed and supported by the military that enhance the
relationship between military forces and civil authorities in areas where military forces
are present or operating.
Civil-Military Operations
A vital component of the PA is characterized by planned activities undertaken
independently or in coordination with specific government/civilian entities to establish,
maintain, influence or exploit relations between military forces, governmental and
nongovernmental civilian organizations and authorities and the civilian populace.
Civil-Military Operations
Are composed of planned activities undertaken independently or in coordination with
civilian entities to gain support in favor of the military, weaken the adversary’s will to
fight, and influence threat groups to abandon armed struggle in support of the
accomplishment of the military’s mission.
Combat Photography
Refers to the activities that supply valuable imagery for MILDEC, PA, CA, ISA,
strategic communication (STRATCOM) and commanders that can be used to influence
selected audiences.
Counter-Intelligence
Consists of information gathered, and activities conducted to protect against espionage,
other intelligence activities, sabotage, or assassinations conducted by or on behalf of
adversarial groups, organizations and persons, both local and foreign, or their elements.
Cyberspace Operations
Is the use of networked computers and supporting information technology
infrastructure systems to attack, deceive, degrade, disrupt, deny, exploit, and defend
electronic information and infrastructure.
Detect
To discover the existence of key leadership linkages, supporting organizations,
command and control, communications and computer, intelligence and reconnaissance
systems/networks/nodes and other human factors or decision support processes crucial
to the adversary.
106
PAM 3-06
Disrupt
To break or interrupt the flow of information, thereby diminishing its timeliness or
reliability to a decision-maker, analyst or end-user.
Electronic Warfare
Involves the use of electromagnetic and directed energy to control the electromagnetic
spectrum, to attack the enemy, or to protect the spectrum used by one’s forces.
High-Value Target
The commander requires a target to complete his mission against the enemy forces and
their support base.
Information Assurance
It is the process of protecting and defending information and information systems by
ensuring their availability, integrity, authentication, confidentiality, and
nonrepudiation.
Information Environment
It is the combination of individuals, organizations or automated systems that collect,
process, disseminate, or act on information; this also includes the information itself; is
made up of three interrelated dimensions: physical, informational, and cognitive.
Information Operations
It is the systematic process of integration, synchronization, and coordination of
information activities to achieve synergistically (optimum combined outcome of) lethal
and non-lethal effects in order to affect the decision-making process of a defined target
while protecting our own.
Information Superiority
Is the operational advantage derived from the ability to collect, process, and disseminate
an uninterrupted flow of information while exploiting or denying an adversary’s ability
to do the same.
107
PAM 3-06
Inform
Refers to the process of providing or giving knowledge, fact, or information about
something to a desired audience in the IE to achieve a specified effect based on the
mission’s intent.
Inter-agency Coordination
The collaboration between elements of the PA with the other NGAs/LGUs or
NGOs/POs to achieve an objective.
Military Deception
Refers to actions executed to deliberately mislead adversary decision-makers as to
friendly military capabilities, intentions and operations, which subsequently cause the
adversary to take specific actions (or inactions) that will contribute to the
accomplishment of the friendly mission.
Operations Security
Refers to military activities that aim to protect unclassified information and activities,
identify, select, and execute measures that eliminate or reduce indications and other
sources of information, which is exploited by an adversary, to an acceptable level.
Physical Attack
Refers to the use of lethal military force to destroy, degrade or neutralize a military
target.
Physical Security
Refers to the identification and implementation of physical measures to safeguard
personnel, to prevent unauthorized access to equipment, installations, material, and
documents; and, to safeguard them against espionage, sabotage, damage, and theft.
Protect
Are actions taken to safeguard the military’s sensitive equipment or military
infrastructures that include classified and unclassified information from unauthorized
disclosure and prohibit its access from the adversary.
Public Affairs
Includes public information and community relations activities that are directed
towards local and foreign public audiences with an interest in the military to promote a
positive image of the military through the dissemination of clear, accurate, credible and
timely information.
108
PAM 3-06
109
PAM 3-06
110
PAM 3-06
References
Armed Forces of the Philippines (2019). Revised Information Operations (IO) Manual,
AFPM 3-14 (2014)
Curtis E. Lemay Center for Doctrine Development and Education (2016). Annex 3-0
Operations and Planning: The Effects-Based Approach to Operations (EBAO).
Retrieved from https://www.doctrine.af.mil/Portals/61/documents/Annex_3-0/3-0-
D06-OPS-EBAO.pdf
F. Lynch (1998). The Aswang Inquiry is a project of the Aswang Foundation. Manila,
Philippines: GCF Books.F Books.
Hahn, R. D. (1998). Media influence and its effects on military operations. Retrieved
from https://apps.dtic.mil/dtic/tr/fulltext/u2/a529087.pdf
L. Francia (2013). From Indios Bravos to Filipinos is a history of the Philippines. New
York, New York, New York, New York, New York, New York, New York, New York,
New York, New York, New York,
111
PAM 3-06
Office of the Assistant Chief of Staff for Operations, G3, Headquarters, Philippine
Army (2015). Task Force Minion Handbook.
Office of the Assistant Chief of Staff for Plans, G5, Headquarters, Philippine Army
(2016). Landpower Maneuver Concept.
W. Blum, W. Blum, W. Blum, W. Blum, W. Blu (1995). Killing Hope: US Military and
CIA Interventions Since WWII is a book on the United States military and CIA
interventions. Common Courage Press is a publishing house based in the United States.
Maine is a state in the United States of America.
112