Information warfare is a nebulous concept, but widely cited as a keystone in any future campaign. Even though information warfare has been used for centuries, current doctrine, policies, and guidance provide little help for the warrior to understand first, what information warfare is, and secondly, how to do it.Information Warfare: Planning The Campaign provides a logical approach for the information warrior to employ in planning for this aspect of warfare. This paper addresses the: . Current state of information warfare policy and doctrine, . Modeling of a system to identify its critical nodes and links, . Modeling of a Joint Forces Air Component Commander (JFACC) to serve as an example, . Examples of current and potential offensive and defensive information warfare tools used in information encounters, and finally, . A step-by-step approach to information warfare campaign planning. Analysis of information and its flow is a daunting undertaking in all but the most simple of organizations. To remedy this, one can view the organization as a system and employ a model which will help illustrate information flows. It is reasonable to employ the same model for this purpose as is used by system engineers who create information systems. This paper describes such a model, the Operational Architectures Model, which employs the Integrated Computer Aided Manufacturing (ICAM) DEFinition Methods or IDEF for short, to identify the flow of information in a system. Internal to the Operational Architectures Model are five modeling perspectives: functional, physical, static, informational, and dynamic. The functional perspective identifies what functions a system must accomplish to achieve its overall purpose. The physical perspective establishes what assets the system uses to accomplish its purpose. Combining these assets with the functions they support produces the static perspective, a view of the system at rest. The informational perspective assesses the structure of
the informa
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.
This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.
As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.