< Back to Current Version

Defense Primer: Operations in the Information Environment

Changes from December 18, 2018 to January 14, 2020

This page shows textual changes in the document between the two versions indicated in the dates above. Textual matter removed in the later version is indicated with red strikethrough and textual matter added in the later version is indicated with blue.


Updated December 18, 2018January 14, 2020 Defense Primer: Information Operations Information Warfare While there is currently no official U.S. government (USG) definition of information warfare (IW), practitioners typically conceptualize it as a strategy for the use and management of information to pursue a competitive advantage, including both offensive and defensive operations. Strategy can be defined as the process of planning to achieve objectives and goals in the national interest. Operations link strategic objectives with tactics, techniques, and procedures. For IW strategy, that link is information operations (IO). Information Operations Current and pastPast definitions within the DOD have conceptualized IO, as opposed to IW, as as a purely military activity involving a set of tactics or capabilities. In DOD Joint Publication (JP) 3-13 and the IO Roadmap, IO consisted of five pillars: computer network operations (CNO), which include computer network attack, computer network defense, and computer network exploitation; psychological operations (PSYOP); electronic warfare (EW); operations security (OPSEC); and military deception (MILDEC). Computer network operations support IO with dissemination assets and the capabilities to deny or degrade and adversary’s ability to access, report, process, or disseminate information. Psychological operations are central to IO. PSYOP has been defined in DOD doctrine as “planned political, economic, military, and ideological activities directed towards foreign countries, organizations, and individuals in order to create emotions, attitudes, understanding, beliefs, and behavior favorable to the achievement of United States and military objectives.” Electronic Warfare represents military action involving the use of electromagnetic and directed energy (e.g., through radio, infrared, or radar) to control the electromagnetic spectrum or to attack the enemy. EW platforms provide a means of disseminating messages and shaping the information environment through the electronic dissemination of products. Operations Security is a systematic method to identify, control, and protect critical information and analyze friendly actions associated with military operations and other activities. In an IO context, OPSEC is the protection of plans and messages prior to execution through the proper use of information security, information assurance, physical security, and operations security. Military Deception involves actions that are executed to deliberately mislead adversary military decisionmakers about U.S. military capabilities, intentions, and operations. Unlike PSYOP, which are intended to influence and persuade, MILDEC is intended to deceive. In 2010, deception (MILDEC). With the advent of U.S. Cyber Command, CNO became cyberspace operations, offensive and defensive with its own doctrine in JP 3-12. In 2010, PSYOP became military information support operations operations (MISO), to reflect a broader range of activities and the existing Military Information Support Teams consisting of PSYOP personnel deployed at U.S. embassies overseas. Joint Publication 3-13.2 replaced the term psychological operations with military information support operations PSYOP with MISO to “more accurately reflect and convey the nature of planned peacetime or combat operations activities.” The name change reportedly caused administrative confusion, and the services are beginning to revert to the PSYOP label. With the advent of U.S. Cyber Command, CNO became cyberspace operations, offensive and defensive with its own doctrine in JP 3-12. The Secretary of Defense now The Secretary of Defense characterizes IO in JP 3-13 as as “the integrated employment, during military operations, of of information-related capabilities in concert with other lines lines of operation to influence, disrupt, corrupt, or usurp the the decision making of adversaries and potential adversaries adversaries while protecting our own.” This definition shifts shifted the focus from a set of tactics toward the desired effects and how to achieve them. JP 3-13 defines information-related capability capability (IRC) as a tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions. Strategic communication, public diplomacy and public and civil affairs, and cyberspace operations may be considered supporting capabilities. These efforts may take place in and throughout each of the global domains of air, land, sea, space, and cyberspace, and in various forms unrelated to cyberspace such as dropping pamphlets, cultural exchanges, jamming or broadcasting targeted communications, and foreign aid programs. Military Information Support Operations are one of Special Operations Forces’ (SOF’s) core activities, but IO is not the exclusive purview of SOF. All of these activities take place within the information environment, which is the aggregate of individuals, organizations, and systems that collect, disseminate, or act on information. This consists of three dimensions: the physical dimension, where information overlaps with the physical world; the information dimension, where information is collected, processed, stored, disseminated, displayed, and protected, including both the content and the flow of information between nodes; and the cognitive dimension, where human decisionmaking takes place based upon how information is perceived. All instruments of national power—diplomatic, informational, military, and economic (DIME)—can be projected and employed in the information environment, and by nonmilitary elements of the federal government. Types of Information In common parlance, the term “disinformation campaign” is often used interchangeably with information operations. However, disinformation or deception is only one of the informational tools that comprise an IW strategy; factual information can also be used to achieve strategic goals and in some cases more effectively than deceptive means. Different categories of information that may be used in IO include the following: Propaganda: This means the propagation of an idea or narrative that is intended to influence, similar to https://crsreports.congress.gov Defense Primer: Information Operations psychological or influence operations. It can be misleading but true, and may include stolen information. A government communicating its intent, policies, and values through speeches, press releases, and other public affairs can be considered propaganda. Misinformation: This is the spreading of unintentionally false information. Examples include Internet trolls who spread unfounded conspiracy theories or web hoaxes through social media, believing them to be true. Disinformation: Unlike misinformation, disinformation is intentionally false. Examples include planting false news stories in the media and tampering with private and/or classified communications before their widespread release. All of these activities take place within the information environment, which is the aggregate of individuals, organizations, and systems that collect, disseminate or act on information. This includes:  The Physical layer: Command and control systems and associated infrastructure.  The Informational layer: Networks and systems where information is stored.  The Cognitive layer: The minds of people who transmit and respond to information. All instruments of national power—diplomatic, informational, military, and economic (DIME)—can be projected and employed in the information environment. Cyber-Enabled Information Operations Cyberspace presents a force multiplier for IW activities. Social media and botnets can amplify a message or narrative, using all three elements of information to foment discord and confusion in a target audience. Much of today’s IO is conducted in cyberspace, leading many to associate IO with cybersecurity. Within DOD, however, IO and cyberspace operations are distinct doctrinal activities. https://crsreports.congress.gov Defense Primer: Information Operations Cyberspace operations can be used to achieve strategic information warfare goals; an offensive cyberattack, for example, may be used to create psychological effects in a target population. A foreign country may use cyberattacks to influence decisionmaking and change behaviors, for example the DPRK-attributed cyberattacks on Sony in late 2014. Cyber operations may be conducted for other information operations purposes, such as to disable or deny access to an adversary’s lines of communication or to demonstrate ability as a deterrent. IO may be overt, such as a government’s production and dissemination of materials intended to convey democratic values. In this case, the government sponsorship of such activity is known. Covert operations are those in which government sponsorship is denied if exposed. The anonymity afforded by cyberspace presents an ideal battlespace to conduct covert information operations. In JP 3-12, DOD defines cyberspace as “the global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.” Some have criticized this as lacking the cognitive, human element that the internet represents, which in turn could adversely affect how the military organizes, trains, and equips for IO in cyberspace. Additionally, there are concerns that the split between IO and cyberspace operations in doctrine and organization creates a stovepipe effect that hinders coordination of these closely related capabilities. As such, some services such as the Army and Air Force are reorganizing assets from Cyber Commands into Information Warfare Commands. The Marine Corps has created a Deputy Commandant for Information in order to oversee Operations in the Information Environment, to include cyberspace operations. Information as a Joint Function In 2017, JP-1 Doctrine of the Armed Forces of the United States was updated to establish information as the seventh joint function of the military, along with C2, intelligence, fires, movement and maneuver, protection, and sustainment. This designation has necessitated clarification and revisions in some DOD doctrine. Operations in the Information Environment In 2018, DOD issued a Joint Concept for Operations in the Information Environment. According to this document, the IE comprises and aggregates numerous social, cultural, cognitive, technical, and physical attributes that act upon and affect knowledge, understanding, beliefs, world views, and, ultimately, actions of an individual, group, system, community, or organization. The IE also includes technical systems and their use of data. The IE directly affects and transcends all operating environments. New DOD policy would define Operations in the Information Environment (OIE) as actions taken to generate, preserve, and apply informational power against a relevant actor in order to increase or protect competitive advantage or combat power potential within all domains of the operating environment. OIE span the competition continuum (cooperation, competition short of armed conflict, and warfighting). This definition of the continuum would align with the 2018 National Defense Strategy, which emphasizes information warfare as competition short of open warfare. IW is defined not as a strategy but as a subset of OIE conducted during both competition below armed conflict and during warfighting in order to dominate the IE at a specific place and time. IO would be defined not as a set of capabilities but as the staff function that synchronizes IRCs for the Commander to conduct OIE. Superseded by the Information Joint Function, IO may in the future considered a legacy term by the DOD. Who Is Responsible for the “I” in DIME? Within the USG Who Is Responsible for the “I” in DIME? Within the U.S. government, much of the current information information operations doctrine and capability resides with the military. Many consider DOD to be relatively wellfundedwell-funded, leading some to posit that the epicenter for all IW activities should be the Pentagon. Some fear that military leadership of the IW sphere represents the militarization of cyberspace, or the weaponization of information. In addition, the military may not possess the best tools to successfully lead information efforts across the USG Title 10 Title 10 U.S.C. 2241 prohibits DOD from domestic “publicity or propaganda,” although the terms are undefined. It is unclear how IW/IO relate to this so-called military propaganda ban relate to this so-called military propaganda ban. P.L. 115232 tasked the State Department’s Global Engagement Center (GEC) to “direct, USG to recognize, understand, expose, and counter foreign state and foreign non-state propaganda and disinformation efforts.” P.L. 116-92 created a Principal Information Operations Advisor within DOD to coordinate and deconflict its operations with the GEC, who is the lead. Information Operations as an Act of War? Some have questioned whether tampering with, interfering with, or otherwise influencing a sovereign nation’s democratic processes in an IW campaign is an act of war that could trigger a military response, and not necessarily in cyberspace. A similar question is whether a cyberattack that falls below the threshold of damage and destruction that a kinetic event would impart could be considered an armed attack under international law. Relevant Statutes Title 10, U.S. Code, Armed Forces, Section 164: Organize and employ commands and forces. Title 50, U.S. Code, War and National Defense, Section 3093: Secure US interests by conducting covert actions U.S. policy suggests that these types of operations fall below the threshold of armed conflict. CRS Reports CRS Report R45142, Information Warfare: Issues for Congress, by Catherine A. Theohary. Other Resources DOD. Joint Publication 3-13, Information Operations, November 27, 2012. DOD. Defense Directive 3600.01, Information Operations, May May 2, 2013. Catherine A. Theohary, Specialist in National Security Policy, Cyber and Information Operations https://crsreports.congress.gov IF10771 Defense Primer: Information Operations Disclaimer This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role. CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However, as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the permission of the copyright holder if you wish to copy or otherwise use copyrighted material. https://crsreports.congress.gov | IF10771 · VERSION 45 · UPDATED