FAS

On the Conduct of Army Information Operations

10.15.18 | 1 min read | Text by Steven Aftergood

The planning and execution of US Army information operations are the subject of a new Army manual for practitioners.

Information operations are activities that involve the use of information to support US and allied military objectives and/or to degrade adversary functions. The field of information operations includes military deception, cyberspace operations, and other sub-disciplines.

The first step is to characterize and assess the information environment.

Information Operations (IO) officers “identify human networks, groups, and subgroups that affiliate along religious, political, or cultural lines, including commonly held beliefs and local narratives.”

Once such networks are identified, information operators devise ways to influence, control or subvert them.

“IO officers focus their analysis on preferred means, methods, and venues that each social affiliation uses to interact and communicate and the ways each collectively constructs reality. Analysis examines biases, pressure points, general leanings, and proclivities, especially as they pertain to support or opposition of friendly and adversarial forces.”

SeeThe Conduct of Information Operations, ATP 3-13.1, October 4, 2018.

publications
See all publications
Government Capacity
Blog
The National Security Council’s Decision-Making Process: When Consensus Becomes a Constraint

The emphasis on interagency consensus, while well-intentioned, has become a structural impediment to bold or innovative policy options. When every agency effectively holds veto power over proposals, the path of least resistance becomes maintaining existing approaches with minor modifications.

01.22.25 | 4 min read
read more
Environment
Press release
Position on the Re-Introduction of H.R. 471 – The Fix Our Forests Act

The Federation of American Scientists supports H.R. 471, the re-introduction of the Fix Our Forests Act.

01.17.25 | 2 min read
read more
Emerging Technology
day one project
Policy Memo
Fighting Fakes and Liars’ Dividends: We Need To Build a National Digital Content Authentication Technologies Research Ecosystem

As people become less able to distinguish between what is real and what is fake, it has become easier than ever to be misled by synthetic content, whether by accident or with malicious intent. This makes advancing alternative countermeasures, such as technical solutions, more vital than ever before. 

01.17.25 | 12 min read
read more
Government Capacity
Blog
Herding Unicorns: Sharing Resources Speeds Hiring

Throughout this phase of work, there are many actions hiring managers and staffing specialists can take to streamline the process and improve the quality of eligible candidates. Most importantly, hiring managers and staffing specialists can collaborate within and across agencies to expedite and simplify the process.

01.17.25 | 10 min read
read more