Air Force Doctrine Document 3-13: Information Operations, Network Warfare, Electronic Warfare (EW), Information, Air and Space Superiority, Integrated Control Enablers

Nonfiction, History, Military, Strategy
Cover of the book Air Force Doctrine Document 3-13: Information Operations, Network Warfare, Electronic Warfare (EW), Information, Air and Space Superiority, Integrated Control Enablers by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781476127460
Publisher: Progressive Management Publication: April 16, 2012
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781476127460
Publisher: Progressive Management
Publication: April 16, 2012
Imprint: Smashwords Edition
Language: English

This Air Force Doctrine Document (AFDD) establishes doctrinal guidance for information operations (IO). The Air Force carries out information operations to support national and military objectives. The term "information operations" applies across the range of military operations from peace to war to reconstitution. During crisis or conflict, warfighters conduct information operations against an adversary. However, even when the United States is at peace, the Air Force is fully engaged, conducting IO on a daily basis. For example, because of the increasing dependence on information and the global information environment, the Air Force may be vulnerable to network attack, and so conducts network defense around the clock.

Information has long been a key part of human competition—those with a superior ability to gather, understand, control, and use information have always had a substantial advantage on the battlefield. From the earliest recorded battles to the most recent military operations, history is full of examples of how the right information at the right time has influenced military struggles. The Air Force recognizes the importance of gaining a superior information advantage—an advantage obtained through information operations (IO) fully integrated with air and space operations. Today, gaining and maintaining information superiority are critical tasks for commanders and vital elements of fully integrated kinetic and nonkinetic effects-based operations. Information operations are conducted across the range of military operations, from peace to war to reconstitution. To achieve information superiority, our understanding and practice of information operations have undergone a doctrinal evolution that streamlines the focus of IO to improve the focus on warfighting.

The new framework of information operations groups the capabilities of influence operations, electronic warfare operations, and network warfare operations according to effects achieved at the operational level. Each of these capabilities consists of separate and distinct sub-capabilities that, when combined and integrated, can achieve effects greater than any single capability. Integrated Control Enablers (ICE) is a new term used to define what was formerly expressed as information-in-warfare, or IIW. As our understanding of IO has advanced we have come see that ICE are not IO, but rather the "gain and exploit" capabilities that are critical to all air, space, and information operations. This new framework reflects the interactive relationship found between the defend/attack and the gain/exploit capabilities in today's Air Force.

Air Force doctrine recognizes a fully integrated spectrum of military operations. Information operations, like air and space operations, ought to be effects-based. Both air and space operations can support and leverage information operations, just as information operations can support and leverage both air and space operations. Through the horizontal integration of air, space, and IO, we will be able to fully realize the potential of air and space power for the joint force.

Contents: Chapter One - The Nature Of Information Operations * Chapter Two - Influence Operations * Chapter Three - Network Warfare Operations * Chapter Four - Electronic Warfare Operations * Chapter Five - Information Operations Planning And Execution * Chapter Six - Integrated Control Enablers * Chapter Seven - Education And Training

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This Air Force Doctrine Document (AFDD) establishes doctrinal guidance for information operations (IO). The Air Force carries out information operations to support national and military objectives. The term "information operations" applies across the range of military operations from peace to war to reconstitution. During crisis or conflict, warfighters conduct information operations against an adversary. However, even when the United States is at peace, the Air Force is fully engaged, conducting IO on a daily basis. For example, because of the increasing dependence on information and the global information environment, the Air Force may be vulnerable to network attack, and so conducts network defense around the clock.

Information has long been a key part of human competition—those with a superior ability to gather, understand, control, and use information have always had a substantial advantage on the battlefield. From the earliest recorded battles to the most recent military operations, history is full of examples of how the right information at the right time has influenced military struggles. The Air Force recognizes the importance of gaining a superior information advantage—an advantage obtained through information operations (IO) fully integrated with air and space operations. Today, gaining and maintaining information superiority are critical tasks for commanders and vital elements of fully integrated kinetic and nonkinetic effects-based operations. Information operations are conducted across the range of military operations, from peace to war to reconstitution. To achieve information superiority, our understanding and practice of information operations have undergone a doctrinal evolution that streamlines the focus of IO to improve the focus on warfighting.

The new framework of information operations groups the capabilities of influence operations, electronic warfare operations, and network warfare operations according to effects achieved at the operational level. Each of these capabilities consists of separate and distinct sub-capabilities that, when combined and integrated, can achieve effects greater than any single capability. Integrated Control Enablers (ICE) is a new term used to define what was formerly expressed as information-in-warfare, or IIW. As our understanding of IO has advanced we have come see that ICE are not IO, but rather the "gain and exploit" capabilities that are critical to all air, space, and information operations. This new framework reflects the interactive relationship found between the defend/attack and the gain/exploit capabilities in today's Air Force.

Air Force doctrine recognizes a fully integrated spectrum of military operations. Information operations, like air and space operations, ought to be effects-based. Both air and space operations can support and leverage information operations, just as information operations can support and leverage both air and space operations. Through the horizontal integration of air, space, and IO, we will be able to fully realize the potential of air and space power for the joint force.

Contents: Chapter One - The Nature Of Information Operations * Chapter Two - Influence Operations * Chapter Three - Network Warfare Operations * Chapter Four - Electronic Warfare Operations * Chapter Five - Information Operations Planning And Execution * Chapter Six - Integrated Control Enablers * Chapter Seven - Education And Training

More books from Progressive Management

Cover of the book Guide to Field Marshall William J. Slim: The Great General of World War II, Pivotal Role of Air Mobility in the Burma Campaign, Theoretical Thinking and the Impact of Theory on Campaign Planning by Progressive Management
Cover of the book Histories of the Soviet / Russian Space Program: Volume 4: Soviet Space Programs: 1976-80 - Launch Vehicles, Political Goals and Purposes, International Cooperation In Space, Future by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force Criminal Investigations, Technical Surveillance Countermeasures, Counterintelligence, Protective Service Matters - Special Investigations by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 14 Technical Crew Debriefing with Unique Observations about the Third Lunar Landing - Astronauts Shepard, Mitchell and Roosa by Progressive Management
Cover of the book NASA's Space Shuttle Program: Astronaut Oral Histories (Set 2) - Duffy, Dunbar, Engle, Fabian, Fisher, Fullerton, Gregory, Hartsfield, Hart, Hauck, Hawley, Hoffman - Columbia, Challenger Accidents by Progressive Management
Cover of the book Mach 3+: NASA/USAF YF-12 Flight Research, 1969-1979, Lockheed Blackbird Spyplanes as NASA/USAF Research Platforms (NASA SP-2001-4525) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Stability - Army Doctrine Reference Publication No. 3-07 and Stability Operations Field Manual 3-07 (Professional Format Series) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) RECCE-J, Multiservice Procedures for Requesting Reconnaissance Information in a Joint Environment - MCRP 2-2.1 by Progressive Management
Cover of the book Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) by Progressive Management
Cover of the book Complete Guide to al-Shabaab, al-Qaeda, Mujahideen Youth Movement (MYM), Terrorism in East Africa, Somalia, Mall Attack in Nairobi, Kenya, Transnational Terrorist Threat by Progressive Management
Cover of the book The Art of Aerial Warfare: Instrument of War, Political Dimensions, Military Effects of Strategic Attack, Douhet's Argument, Objectives of Attack, Realities of War, Unintended Asymmetric Consequences by Progressive Management
Cover of the book 2012 Defense Acquisitions: Assessments of Selected Weapon Programs by the GAO - Army, Navy, Air Force Weapons Systems including UAS Programs, Missiles, Ships, F-35 JSF, Carriers, Space Fence by Progressive Management
Cover of the book Turning the Vertical Flank: Airpower as a Maneuver Force in the Theater Campaign: Historic Analysis from Ancient Greece and Rome to the Napoleonic Era and Gettysburg, Normandy, Yom Kippur War by Progressive Management
Cover of the book Preparing for an Era of Persistent Conflict: Low Intensity Conflict, Piracy, Somalia, Terrorism, Case Study of U.S. Iraq Invasion Decision, Clausewitz's Trinity, Unified Command Plan History by Progressive Management
Cover of the book Women Marines in World War I: Recruiting, Enrollment, Housing, Uniforms, Pay, Assignments to Duty, Drill and Parades, Discipline, Social, Benefits, After the War by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy