1 / 138
文档名称:

Information operation - The reality of soft war.pdf

格式:pdf   页数:138
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Information operation - The reality of soft war.pdf

上传人:bolee65 2014/4/8 文件大小:0 KB

下载得到文件列表

Information operation - The reality of soft war.pdf

文档介绍

文档介绍:Information Operations:
The Hard Reality of Soft Power


Forward – Dr Dan Kuehl, Information Resources Management College, 4
National Defense University

Introduction 5
Electronic Disturbance Theatre
The Power of Information

Chapter 1 - Integration and Coherence - The Language of Information Operations 8
Power - What is Power?
Factors that Affect Power
Power in the Cold War Era - What has Changed?
Military Power and Asymmetric Threats
Information Operations Theory
IO Theory and Doctrine
Differences between IW and IO
Capabilities and Related Activities of Information Operations
The Evolution of IO Doctrine
Information anizations
Top-Level Leadership
IO and the Interagency Process
DOD - OSD and IO
DOD - Combat Support Agencies
The NSA's IO Architecture
The DISA's IO Architecture
DOD - The Joint Staff and IO
The CINCs
Additional DOD IO Elements
IO Interests
Department of State IO Concerns
Traditional DOS Structure
DOC IO Architecture
DOJ IO Architecture
Transnational IO Groups
Summary

Chapter 2 - Intelligence and Exploitation – Foundations for Conducting IO 29
The Application of IO
The Intelligence Cycle
The munity
1
IO and the IPB
The Releaseability Issues of IO
Conclusion

Chapter 3 - Information Protection- The Challenge to Modern Bureaucracies 39
Defensive Information Operations
Information Assurance work Defense
A View of Defensive Information Operations
Counter-Terrorism Information Operations
What is Terrorism?
Combating Terrorism
Fundamentals of CTIO
PDD-62 (Counter-Terrorism)
Simulated Domestic Counter-Terrorism Operations
Partnerships for Counter-Terrorism: “Track Two Diplomacy”
PDD-63 (Critical Infrastructure Protection)
Summary

Chapter 4 - Information Projection - Shaping the Global Village 61
Offensive Information Operations
work Attack
Space and its Relationship with IO
The