Preview

Information Superiority

Powerful Essays
Open Document
Open Document
1032 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Superiority
Information Superiority

CPT Woodrow Anderson CAX Class 757
Information Superiority
1

Purpose

To present the concept of information superiority and the drivers of success

Information Superiority

2

References
• FM 3-0, June 2001, Operations • FM 100-6, August 1996, Information Operations • Joint Publication (JP) 3-13, 13 February 2006, Information Operations • National Security Strategy, September 2002 • Joint Vision 2020 • Exploring Information Superiority, 2004 • Defense Information Superiority, GAO, August 1998 • Quadrennial Defense Review Report, Feb 2, 2006
Information Superiority
3

Outline
• • • • • • • • • Background Information Environment Characteristics of MIE Understanding Superiority Conditions of Superiority Contributors to Superiority Analysis Considerations Summary Conclusion
4

Information Superiority

Background
• Information Revolution • National and International Events • National Security Strategy • FY2008 DoD Budget

Information Superiority

5

Information Environment
• Global Information Environment
– Interactive and pervasive – Includes all individuals, organizations, or systems that collect, process, and disseminate information – Outside the control of military or National Command Authorities

• Military Information Environment
– Contained within the GIE – Consists of INFOSYS and organizations that support, enable, or significantly influence a specific military operation – Friendly and adversary, military and non-military
Information Superiority
6

Characteristics of MIE

Information Systems

Relevant Information and Intelligence

Operations

Information Superiority

7

Understanding Superiority
Information Superiority is…
• Achieving advantage • Management of an uninterrupted flow of information • Exploitation or disruption of an adversary’s management of information

For the purpose of…
• Executing decisions and taking action • Enhancing flexibility and agility •

You May Also Find These Documents Helpful

  • Powerful Essays

    IS 535 Essay Example

    • 1001 Words
    • 4 Pages

    helps a firm identify points at which information technology can most effectively enhance its competitive position.…

    • 1001 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Mccc Study Guide

    • 1046 Words
    • 5 Pages

    Preparation ⁃ Security ⁃ Disruption ⁃ Massing Effects ⁃ Flexibility 6. CHARACTERISTICS OF OFFENSIVE OPERATIONS (FM 3-0) ⁃ Surprise ⁃ Concentration ⁃ Audacity ⁃ Tempo 7. FORMS OF MANEUVER (FM 3.90) ⁃ Envelopment ⁃ Turning Movement ⁃ Infiltration ⁃ Penetration ⁃ Frontal Attack 8. TENETS OF BREACHING OPERATIONS (FM 3-21.10) ⁃ Intelligence ⁃ Breach Fundamentals ⁃ Breach Organization ⁃ Mass ⁃ Synchronization 9.…

    • 1046 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    The events of September 11th, 2001 have had a larger impact on the United States Intelligence Community than any single event in its history. It forced the U.S. Intelligence community to look critically at their policies, organization, and how they handled business. The Joint Inquiry, 9/11 Commission, and Inspectors General found numerous deficiencies in communication, technological capabilities, and limited oversight. The government responded to these gaps through creation of legislation, implementation of regulations, a massive restructuring of the intelligence community, and utilization of new technologies.…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    information systems while maintaining the accuracy of the information being exchanged. Its goal is to facilitate access to and…

    • 3649 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Accounting 450

    • 348 Words
    • 2 Pages

    the benefits produced by possessing and using the information minus the cost of producing it.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 8

    • 570 Words
    • 3 Pages

    f. Describe the information utility of this good. Is the information utility good or bad? Can you think of ways to improve it? (2-5 sentences. 1.0 points)…

    • 570 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Business Assignment

    • 829 Words
    • 3 Pages

    f. Describe the information utility of this good. Is the information utility good or bad? Can you think of ways to improve it? (2-5 sentences. 1.0 points)…

    • 829 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Wireless Technology Upgrade

    • 3174 Words
    • 13 Pages

    Porter, M.E & Millar, V.E (1985) ‘How information gives you a competitive advantage’ Harvard Business Review: 149-160.…

    • 3174 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Handle information

    • 579 Words
    • 2 Pages

    To ensure information is accessible for those who need to know, so that if information ever needs to be passed on and shared to other multi disciplinary teams, its easier to find the information required. Also to protect service users from fraud or identity theft and to maintain the rights of service users.…

    • 579 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Federal Tort Claims Act

    • 1331 Words
    • 6 Pages

    Assistant Secretary of Defense for Homeland Defense and America 's Security Affairs. (n.d.). Retrieved September 22, 2004 from http://policy.defense.gov…

    • 1331 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Law Enforcement Paper

    • 1265 Words
    • 6 Pages

    The FBI’s efforts in combating terrorism included collecting, analyzing, and sharing information and critical intelligence with other federal agencies and departments. Some of these departments are the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) as well as other agencies across the country (Schmalleger, 2009). Some changes were made by the FBI as a result of September, 11, 2001. For example, the FBI has made modernization of its information technology (IT) systems a top-level priority. This is a multi-phased program code-named Trilogy. With Trilogy, the FBI can do three important things: First, the FBI has deployed a secure high-speed network that enables people in the FBI offices around the country to share data, including audio, video, and image files. Second, the FBI has given its agents and intelligence analysts more than 30,000 new computers that run several modern software applications. Third, the FBI has developed an IT infrastructure that enables secure communication with FBI intelligence partners (Grabosky,…

    • 1265 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Business Communication D2

    • 1919 Words
    • 8 Pages

    In this assignment I will be evaluating the effectiveness of business information and its communication as key contributors to the success of an organisation.…

    • 1919 Words
    • 8 Pages
    Powerful Essays

Related Topics