Welcome to the Unhypnotize Truth Community!
A great place to discuss conspiracies, UFOs, NWO, truth, reality and enlightenment.

• » Conspiracies Discussions
• » UFOs and Extraterrestrial
• » Spiritual and Paranormal
• » World and Alternative News

Its time to wake up to the global conspiracy...and move beyond...
Our community is here to spread truth, discuss the Global Conspiracy and the world wide Truth Movement!

YES! I want to register for free right now!
Results 1 to 1 of 1

Thread: Future Military Objecktives Sep 2008

  1. #1
    UHF JUNKIE UHF Moderator Rank ricklbert's Avatar
    Join Date
    Jan 2009
    Location
    Powell River, British Columbia, Canada
    Posts
    2,611
    Rep Power
    10

    Future Military Objecktives Sep 2008

    PLEASE READ THIS IT IS VERY IMPORTANT........ultimate strategic objective of IO is to deter a potential or actual adversary or other TA from
    taking actions that threaten U.S. national interests. In addition, IO actions executed through
    civilian-controlled portions of the global information environment must account for U.S. policy and legal
    issues, as well as potentially disruptive infrastructure issues, through civil-military coordination at all
    levels. IO actions that may cause unintended reactions from U.S. or foreign populaces also require
    civil-military coordination.
    B-106. IO may target human decision making or automated decision support systems with specific
    actions. Technology allows for increasingly precise targeting of automated decision making and affords
    more sophisticated ways to protect it. However, targeting automated decision making is only effective if the
    adversary is relying on it.
    B-107. The focus of IO is on the decision maker and the information environment to affect decision
    making and thinking processes, knowledge, and understanding of the situation. IO can affect data,
    information, and knowledge in three basic ways:
    ” By taking specific psychological, electronic, or physical actions that add, modify, or remove
    information from the environment of various individuals or groups of decision makers.
    ” By taking actions to affect the infrastructure that collects, communicates, processes, and stores
    information in support of targeted decision makers.
    ” By influencing the way people receive, process, interpret, and use data, information, and
    knowledge.
    B-108. Commanders use IO capabilities in both offensive and defensive operations simultaneously to
    accomplish the mission, increase their force effectiveness, and protect their organizations and systems.
    Fully integrating IO capabilities requires planners to treat IO as a single function. Commanders can use IO
    capabilities to accomplish the following:
    ” Destroy. Destruction is damaging a system or entity so badly that it cannot perform any function
    without being replaced or entirely rebuilt.
    ” Disrupt. Disruption is breaking or interrupting the flow of information.
    ” Degrade. Degradation is reducing the effectiveness or efficiency of adversary C2 or
    communications systems and information collection efforts or means. IO can also degrade the
    morale of a unit, the target’s value, or the quality of adversary decisions and actions.
    ” Deny. Denial is preventing the adversary from accessing and using critical information, systems,
    and services.
    ” Deceive. Deception is causing a person to believe what is not true. MILDEC seeks to mislead
    adversary decision makers by manipulating their perception of reality.
    ” Exploit. Exploitation is gaining access to adversary C2 systems to collect information or to plant
    false or misleading information.
    ” Influence. Influence is causing others to behave in a manner favorable to U.S. forces.
    ” Protect. Protection is taking action to guard against espionage or capture of sensitive equipment
    and information.
    ” Detect. Detection is discovering or discerning the existence, presence, or fact of an intrusion into
    information systems.
    ” Restore. Restoration is bringing information and information systems back to their original state.
    ” Respond. Response is reacting quickly to an adversary’s or others’ IO attack or intrusion.
    B-109. SC constitutes focused USG efforts to understand and engage key audiences to create, strengthen,
    or preserve conditions favorable for the advancement of USG interests, policies, and objectives through
    coordinated programs, plans, themes, messages, and products synchronized with the actions of all elements
    of national power. DOD efforts must be part of a governmentwide approach to develop and implement a
    more robust SC capability. The DOD must also support and participate in USG SC activities to understand,
    inform, and influence relevant foreign audiences, including the DOD’s transition to and from hostilities,
    security, military forward presence, and stability operations. PA, DSPD, and IO capabilities primarily
    accomplish DOD transition and coordination.
    Last edited by ricklbert; February 6th, 2009 at 10:07 AM.
    “How is freedom measured, in individuals as in nations? By the resistance which has to be overcome, by the effort it costs to stay aloft. One would have to seek the highest type of free man where the greatest resistance is constantly being overcome: five steps from tyranny, near the threshold of the danger of servitude.”

    Friedrich Nietzsche

Similar Threads

  1. Contact Has Begun (2008)
    By New UFO Hunter in forum UFOs and ETs
    Replies: 0
    Last Post: January 12th, 2011, 03:00 PM
  2. Replies: 0
    Last Post: December 23rd, 2010, 03:11 PM
  3. Replies: 0
    Last Post: October 17th, 2009, 08:42 AM
  4. Iran calls West's nuke allegations untrue Sep 25,
    By CASPER in forum Other Conspiracies
    Replies: 0
    Last Post: September 25th, 2009, 04:52 PM
  5. Sep 1th Images and Crosses
    By CASPER in forum Eye Openers
    Replies: 0
    Last Post: June 24th, 2009, 12:45 PM

Tags for this Thread