| |
| |
Introduction | |
| |
| |
| |
Understanding the Problem | |
| |
| |
Information Operations | |
| |
| |
Emerging IO Theory | |
| |
| |
The day-to-day reality of how IO is conducted by the United States | |
| |
| |
The relevance of IO in the broader strategic theory | |
| |
| |
| |
A Theoretical Review of Information Operations in the United States | |
| |
| |
Theoretical Constructs | |
| |
| |
International Relations Theories-How they compare to IO | |
| |
| |
Liberalism | |
| |
| |
Realism | |
| |
| |
Alternate International Relations Theories | |
| |
| |
Definitions of Power, Information, and IO | |
| |
| |
Changing Views of Power | |
| |
| |
Soft Power | |
| |
| |
Power and the Information Age | |
| |
| |
| |
The Development of IO | |
| |
| |
The Role of Information in Warfare | |
| |
| |
The Role of Information in Government Organizations | |
| |
| |
Understanding Information Operations | |
| |
| |
IO Development in the United States | |
| |
| |
Historical IO Case Studies | |
| |
| |
From Hiroshima to the Berlin Wall-The Cold War Era | |
| |
| |
The Revolution in Military Affairs and the Global War on Terrorism | |
| |
| |
Translating Power into Outcomes-Kosovo (1999) | |
| |
| |
| |
Recent Changes to IO | |
| |
| |
Policy Changes: The Information Operations Roadmap | |
| |
| |
Critical Infrastructure Protection | |
| |
| |
Computer Network Defense | |
| |
| |
Defensive IO Policy that led to the creation of the Department of Homeland Security | |
| |
| |
U.S. IO Policy: Problems and Successes | |
| |
| |
U.S. Critical Infrastructure Protection Policies prior to 9/11 | |
| |
| |
PDD-68, "International Public Information" | |
| |
| |
IO Organizational Changes in the U.S. government | |
| |
| |
U.S. Critical Infrastructure Protection Policies after 9/11 | |
| |
| |
The Effects of 9/11 on IO Organizations | |
| |
| |
Summary | |
| |
| |
| |
IO Applicability to Theory and Practice | |
| |
| |
Why does IO matter? | |
| |
| |
Why is there no overall strategic theory in the United States for IO? | |
| |
| |
Does military doctrine equal IO strategic theory? | |
| |
| |
Why is the State Department not issuing strategic guidance? | |
| |
| |
Is Information Operations the best term? | |
| |
| |
Problems with the use of IO as a term | |
| |
| |
The need for taxonomy | |
| |
| |
Why is the top-down approach to IO not working in the U.S. government? | |
| |
| |
Is the Revolution in Military Affairs / Diplomatic Affairs an answer? | |
| |
| |
Why is the State Department failing in its public diplomacy role? | |
| |
| |
Why is there no rhyme or reason to the IO training and education curricula? | |
| |
| |
Can lessons be learned from the information assurance community? | |
| |
| |
Issues that still exist with developing commonality with respect to the IO training and education situation | |
| |
| |
| |
Key Findings in This Book | |
| |
| |
Suggestions for Improvement Based on the Soft System Methodology and Literature Review | |
| |
| |
A Plan to Develop an Overarching IO Theory | |
| |
| |
A Model to Establish a Taxonomy and Set of Definitions for IO | |
| |
| |
An Analysis of which Approaches and Processes Work Best to Support IO | |
| |
| |
Develop an International Standards Effort with Respect to IO Training and Education | |
| |
| |
Areas for Future Research | |
| |
| |
Conclusion | |
| |
| |
Bibliography | |
| |
| |
Index | |
| |
| |
About the Author | |