Full spectrum information superiority and dominance is key to influencing operations associated with war or Military Operations Other Than War (MOOTW). This survey of Computer Network Operations (CNO) introduces the concept of how Computer Network Attack (CNA), Computer Network Defense (CND), and Computer Network Exploitation (CNE) are leveraged to collect information, disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks that host them. Strategic and operational considerations will be considered to affect an adversary’s decision cycles with information superiority.
- Provide Overview of key DoD Policies: Joint Publication 3-13 and Department of Defense Directive 3600.01 Information Operations (IO)
- Provide Overview of the 5 elements of Computer Network Operations (CNO): Information Warfare (IW), Military Information Support Operations (MISO), formerly known as Psychological Operations (PSYOP), Military Deception (MILDEC), Operations Security (OPSEC) & Electronic Warfare (EW)
- Provide An introduction to how CNO uses Computer Network Attack (CNA) and Computer Network Exploitation (CNE) are used to collect information and affect physical and informational assets by destroy, disrupt, & delay capability.
- Explain Use of Diplomatic, Informational, Military, and Economic (DIME) activities that are used by the U.S. Government
- Explain Related military capabilities: Public Affairs (PA), Civilian Military Operations (CMO), and Military Support to Public Diplomacy (MSPD)
- Provide Introduction to Joint Intelligence Preparation of the Battlefield (JIPB)
- Explain Use of Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) to understand enemy battlespace
- Provide Considerations and impacts with regard to the Law of Armed Conflict (LOAC).
- Explain Exploitation of Confidentiality, Integrity, & Availability
- Explain Measuring effectiveness of tools (Measures of Performance (MOPs)/Measures of Effectiveness (MOEs)
- Discuss the Future of IO