SlideShare a Scribd company logo
1 of 14
Imperatives for Successful
Information Operations in a Coalition
 Setting - An Australian Perspective
              Captain Jeff Malone
           Directorate of Joint Plans
         Strategic Command Division
            Department of Defence
      Presentation to the 5th International CCRTS
             Canberra, 25th October 2000
This presentation is
 UNCLASSIFIED
Caveats
 The views contained herein are those of the author
  and should not be construed as representing the
  official position of the Department of Defence or
  the Australian Defence Force
 The presentation represents AN Australian view,
  not THE Australian view
Objectives
 Review recent coalition operations and the role of
  Information Operations within them
 Derive principles for success for IO in a coalition
  setting
Content
 The Contemporary Global Security environment
 Characteristics of Contemporary Coalition Operations
 The Nature of Information Operations
 Constraints imposed on Information Operations by the
  Coalition Setting
 Information Operations against Coalitions
 Enabling Information Operations in a Coalition Setting
The Contemporary Global
       Security Environment
 The New Interventionism
 The Peace Dividend (?)
 The Information Revolution
 Pervasive Global Electronic Media
 Sensitivity to Casualties
Characteristics of Contemporary
      Coalition Operations
 Primarily Peace or Humanitarian Operations
 Complex operational environment
 Legitimacy as a Centre of Gravity
 Coalition Heterogeneity
 Non-core Security Issues
 Trade-offs between operational efficiency and
  coalition cohesion
The Nature of Information
              Operations
 Coordinated Actions in the Information Environment
  to achieve Military Objectives
      Four Domains (Physical, Electromagnetic, Virtual,
       Perceptual)
 Synchronisation and deconfliction between domains
 Synchronisation and deconfliction between
  Information Operations and other military activities
 Involves both shaping and protective activities
 Involves both pro-active and reactive activities
Constraints on Information
     Operations in Coalitions
 Complexity of the coalition operating environment
 Lack of multi-national Information Operations
  doctrine
 Little consideration of multi-national considerations
  in national Information Operations doctrine
 Non-Acceptance of Information Operations
 Poor understanding of Information Operations
 Sensitivity of Information Operations
Information Operations Against
           Coalitions
 Perception Management Operations against
  Coalitions
    Coalition Composition

    Coalition Effectiveness

    Casualties

 Other targets of Adversary Perception
  Management Operations
 Other Adversary Information Operations
Enabling Information Operations in a
 Coalition Setting - General Issues
   Implications of operating within a coalition
   Coalition operations and Information Operations
    are inherently intertwined
   Adversaries will employ Information Operations
    against coalitions
Enabling Information Operations in a
 Coalition Setting - Political Issues
   Promote understanding and acceptance of
    Information Operations in international and regional
    organisations
   Incorporate Information Operations into bilateral
    exercises and regional engagement activities
   Incorporate Information Operations considerations
    into ROE lists
Enabling Information Operations in a
Coalition Setting - Operational Issues
   Use coalition composition to best advantage
   Use coalition coordination mechanisms to
    coordinate coalition Information Operations
   Incorporate multi-national considerations into
    national Information Operations doctrine
Conclusion

More Related Content

Similar to Imperatives for Successful Information Operations in Coalition Settings

Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxjeanettehully
 
Reach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information EnvironmentReach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information EnvironmentGov BizCouncil
 
Itsm Fusion Final
Itsm Fusion FinalItsm Fusion Final
Itsm Fusion Finaldjaehnig
 
Michael Poters Frame Work
Michael Poters Frame WorkMichael Poters Frame Work
Michael Poters Frame WorkKate Loge
 
Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Chris Furton
 
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docxITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docxvrickens
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsRd. R. Agung Trimanda
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Adfa Itee Presentation
Adfa Itee PresentationAdfa Itee Presentation
Adfa Itee Presentationsladepb
 

Similar to Imperatives for Successful Information Operations in Coalition Settings (20)

Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Simon Foley
Simon FoleySimon Foley
Simon Foley
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docx
 
Reach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information EnvironmentReach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information Environment
 
Itsm Fusion Final
Itsm Fusion FinalItsm Fusion Final
Itsm Fusion Final
 
301338685.pdf
301338685.pdf301338685.pdf
301338685.pdf
 
Michael Poters Frame Work
Michael Poters Frame WorkMichael Poters Frame Work
Michael Poters Frame Work
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
20100217 sopes overview for v3
20100217 sopes overview for v320100217 sopes overview for v3
20100217 sopes overview for v3
 
Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...
 
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docxITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Adfa Itee Presentation
Adfa Itee PresentationAdfa Itee Presentation
Adfa Itee Presentation
 

Imperatives for Successful Information Operations in Coalition Settings

  • 1. Imperatives for Successful Information Operations in a Coalition Setting - An Australian Perspective Captain Jeff Malone Directorate of Joint Plans Strategic Command Division Department of Defence Presentation to the 5th International CCRTS Canberra, 25th October 2000
  • 2. This presentation is UNCLASSIFIED
  • 3. Caveats  The views contained herein are those of the author and should not be construed as representing the official position of the Department of Defence or the Australian Defence Force  The presentation represents AN Australian view, not THE Australian view
  • 4. Objectives  Review recent coalition operations and the role of Information Operations within them  Derive principles for success for IO in a coalition setting
  • 5. Content  The Contemporary Global Security environment  Characteristics of Contemporary Coalition Operations  The Nature of Information Operations  Constraints imposed on Information Operations by the Coalition Setting  Information Operations against Coalitions  Enabling Information Operations in a Coalition Setting
  • 6. The Contemporary Global Security Environment  The New Interventionism  The Peace Dividend (?)  The Information Revolution  Pervasive Global Electronic Media  Sensitivity to Casualties
  • 7. Characteristics of Contemporary Coalition Operations  Primarily Peace or Humanitarian Operations  Complex operational environment  Legitimacy as a Centre of Gravity  Coalition Heterogeneity  Non-core Security Issues  Trade-offs between operational efficiency and coalition cohesion
  • 8. The Nature of Information Operations  Coordinated Actions in the Information Environment to achieve Military Objectives  Four Domains (Physical, Electromagnetic, Virtual, Perceptual)  Synchronisation and deconfliction between domains  Synchronisation and deconfliction between Information Operations and other military activities  Involves both shaping and protective activities  Involves both pro-active and reactive activities
  • 9. Constraints on Information Operations in Coalitions  Complexity of the coalition operating environment  Lack of multi-national Information Operations doctrine  Little consideration of multi-national considerations in national Information Operations doctrine  Non-Acceptance of Information Operations  Poor understanding of Information Operations  Sensitivity of Information Operations
  • 10. Information Operations Against Coalitions  Perception Management Operations against Coalitions  Coalition Composition  Coalition Effectiveness  Casualties  Other targets of Adversary Perception Management Operations  Other Adversary Information Operations
  • 11. Enabling Information Operations in a Coalition Setting - General Issues  Implications of operating within a coalition  Coalition operations and Information Operations are inherently intertwined  Adversaries will employ Information Operations against coalitions
  • 12. Enabling Information Operations in a Coalition Setting - Political Issues  Promote understanding and acceptance of Information Operations in international and regional organisations  Incorporate Information Operations into bilateral exercises and regional engagement activities  Incorporate Information Operations considerations into ROE lists
  • 13. Enabling Information Operations in a Coalition Setting - Operational Issues  Use coalition composition to best advantage  Use coalition coordination mechanisms to coordinate coalition Information Operations  Incorporate multi-national considerations into national Information Operations doctrine