Latest Articles and Content
- Winter IO Sphere: The winter edition of the IO Sphere has been published and posted. The theme for this issue is IO Assessments. Articles in this issue include: “Foundations for Assessments” written by Dr. Christopher Paul; “US Public Diplomacy – Three Challenges” by Mr. Donald Bishop; “Strategic Diaspora” by Mr. Aaron Henninger; “Holistic Targeting” by Mr. Bruce Judisch; “Information Operations Megatrends” by Mr. Roger Gaebel; and “Iran and the Evaluation” of US Psyop by Mr. Njdeh Asisium. The IO Sphere is available in PDF version and e-reader versions for Kindle, Nook, iBooks, and other types of e-reader hardware and can be downloaded directly to your system from the website. We are currently starting on the Spring 2014 issue of the IO Sphere which will be published on 1 April 2014. The theme for the spring issue will be IO Force Development. The call for articles for this issue is out and closes on 15 Feb 2014. Beginning in 2014 we will be publishing a classified supplement as needed. If you wish to publish an article but are unable to keep in unclassified, send it to the IO Sphere Editor at email@example.com. All submissions must be releasable to four eyes and can’t exceed Secret level.
- Calendar Year 2014 IO Sphere Themes: The JIOWC Director has selected the themes for the CY 14 IO Sphere. We believe we have a robust set of themes this year which should each build upon the previous theme providing a common thread throughout the year. This article provides the coming year’s themes as well as the JIOWC Director’s thoughts on how each issue should be shaped. As well, the new themes, submission deadlines, and publication dates can be found in the Article Submission page. We welcome any and all submissions to the journal as this journal is written by the community.
- Fall IO Sphere: The Fall edition of the IO Sphere has been published and posted to the web at home.iosphere.org. The theme for this issue is IO Best Practices. The IO Sphere is available in PDF version and e-reader versions for Kindle, Nook, iBooks, and other types of e-reader hardware and can be downloaded directly to your system from the website.We are currently starting on the Winter issue of the IO Sphere which will be published on 31 December 2013. The theme for the fall issue will be IO Assessments. The call for articles for this issue is out and closes on 15 November 2013.
- IO Sphere, Summer 2013: All versions of the Summer 2013 edition of IO Sphere have been posted and are ready for download.
- (New) House Foreign Affairs Committee hearing: The House Foreign Affairs Committee held hearings on June 26th on the mission of the Broadcasting Board of Governors (BBG) and future of US international broadcasting. Citing an ongoing “information war”, the committee called upon experts to provide testimony on ways to reform/revamp the BBG and public diplomacy in general. Statements by the committee chairman and witnesses from the hearing “Broadcasting Board of Governors: An Agency Defunct” can be found here.
- Strategic Landpower White Paper: This white paper is the first of a number of think pieces to be published by a combined, Army, Marine Corps, SOCOM Strategic Landpower Task Force (SLTF) that stood up in late 2012. The SLTF’s objective is to integrate the psychological or “human domain” aspects of conflict into military thinking and planning.
- OPSEC Video of the Week: OPSEC Video of the Week: CNET On Cars – Personal Data in Your Car: Wipe it out was added to our OPSEC video page on 13 May. This video details the six things your car knows about you and the associated dangers. It also tells you how to wipe that data so that it’s not available to thieves.
- Redefining Information Operations: In this essay, Colonel Carmine Cicalese examines the changing definition of IO and its impact on the joint force commander’s planning and execution of military operations. This essay was first published in Joint Force Quarterly in April 2013.
- Rossen Reports: Criminals use webcams for spying: Stop and think for one moment…where have you placed your laptop around the house? What direction is your desktop pointing? An experienced hacker can access your webcam in less than a minute and gain access to your most private moments. This entry describes the dangers of webcams and some simple steps you can take to secure yourself. Includes link to the Rossen Report on our OPSEC Videos page.
- Comprehensive Approach to Joint Information Operations Force Development: This article attempts to describe a process for systematically linking force management concepts and functions, as they relate to IO in the joint arena, with the training and education provided to personnel in, or en route to, joint IO assignments.
- IO Sphere, Spring 2013: All versions of the Spring 2013 edition of IO Sphere have been posted and are ready for download.
- Marine Corps Operating Concept for IO
- Navy’s Information Dominance 2013-2028
- JIOWC IO 2020 White Paper: The JIOWC has produced a draft white paper which envisions the information environment (IE) and how IO will be employed in 2020. Its purpose is to foster a shared vision for building the future joint IO force as the Quadrennial Defense Review process gets underway…more
- USSOUTHCOM Posture Statement
- House Armed Services Committee helps shape QDR 2014
- USCENTCOM Posture Statement
- Call for Articles
- MISO and Cyber OperationsToward an Integrated Cyber Defense
- IO Sphere Journal – “Coalition IO”
- Carrying IO Outside the Bubble
- Redefining Information Warfare Boundaries for an Army in a Wireless World
- OPSEC: Beyond the Halls and Walls; Why OPSEC’s Role in Planning is Imperative
- RAND Response to “Why Rand Missed the Point” Paper
- The Effectiveness of US Military Information Operations in Afghanistan 2001-2010: Why RAND Missed the Point
- Director of the Joint Staff Signs New Joint IO Doctrine
- Information Operations Best Practices Collaboration
- Flashback: Congressional Testimony on IO and SC
- Terrorism Online: The Web’s Role in Radicalization
IO News Articles
(New) Out to Maximize the Internet’s Vast Space (Published in Dialogo by USSOCOM for the Latin America Audience): In mid-April 2013, the Information Operations (IO) divisions from U.S. Southern Command and U.S. Northern Command co-hosted an IO Subject Matter Expert Exchange, bringing together military representatives from ten countries from within the Americas to discuss lessons learned, best practices, and the ways ahead on this domain. Mr. Austin Branch, Senior Information Operations Director at the Office of the Under Secretary of Defense (Policy) came to Miami to take part of the exchange and urge participants to really work together and convert plans into actions. Mr. Branch also took some time to talk to Diálogo one-to-one on this topic…more
(New) Information Operations Brings Together Regional Experts (Published in Dialogo by USSOCOM for the Latin America Audience): During three days of presentations, open and sincere discussions of each country’s situation, and sessions to pave the way ahead, representatives from 11 countries in the Americas came together at the U.S. Southern Command (SOUTHCOM) for a Subject Matter Expert Exchange (SMEE) on Information Operations (IO)…more
Report: Cyberattacks a key threat to U.S. national security: Cyberattacks are an increasing threat at home, while extremists continue to make inroads in Middle Eastern and African countries that are in transition after the Arab Spring, according to the U.S. intelligence community’s worldwide threat assessment. (Director of National Intelligence, James Clapper, Statement for the record to the Senate Select Committee on Intelligence can be found here)…more
We Aren’t the World (MISO): IN THE SUMMER of 1995, a young graduate student in anthropology at UCLA named Joe Henrich traveled to Peru to carry out some fieldwork among the Machiguenga, an indigenous people who live north of Machu Picchu in the Amazon basin…more
Chinese cyberspies have hacked most Washington institutions, experts say (Cyber): Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies, and this is the usual answer: almost all of them…more
Russian lawmaker claims meteor impact was US weapons test (Propaganda): Russian nationalist lawmaker Vladimir Zhirinovsky, long known for his flamboyance and outrageous remarks, said Friday that meteorite fragments had not rained down on Russia in the morning, but that the light flashes and tremors in several of the country’s regions resulted from US weapons tests…more
US Congressman calls for tougher action on China cyber theft (Cyber): The U.S. government must confront China about its cyber attacks against United States-based companies, said House intelligence committee chair, Rep. Mike Rogers (R-Mich.)…more
Iran’s self-aggrandising ‘fake’ fighter plane and a history of doctored photos (Propaganda): There is an unreal history of the modern world in which inconvenient facts become idyllic fantasies, a history made on desktops and screens – an archive of nonsense…more
Khamenei’s Mounting Pressures (Influence): Negotiations on the Iranian nuclear program are set to re-start in February, but Iran’s previous foot dragging in agreeing to a time and venue for the negotiations has been vexing for U.S. and allied diplomats…more
US cybersecurity plan aimed at keeping China out of America’s networks (Cyber): President Barack Obama signed an executive order Tuesday aimed at helping protect the computer networks of crucial American industries from cyberattacks and prodded Congress to enact legislation that would go even further…more
Companies use cyber defense to limit damage (Cyber): SEATTLE — Disclosures last week about network intrusions at the New York Times and the Federal Reserve demonstrate that some companies have begun taking progressive steps to detect – and limit damage – from persistent cyberintruders…more
(Inform/Influence): HONG KONG — China’s neighbors are scared of what it’s capable of. But despite Beijing’s warlike rhetoric in disputes with Japan and the Philippines, Dr. Ruan Zongze, one of China’s most influential foreign policy insiders, says China is “committed to peaceful resolution and peaceful dialogue.”…more
North African militants are here to stay (Inform/Influence): CAIRO, Egypt — The rise of Islamist movements following the recent popular uprisings in North Africa played a direct role in the hostage crisis that claimed more than 80 lives in the Algerian desert last week. And they’re set to become a defining characteristic of the region’s political landscape, analysts say…more
CNN: Al-Assad’s grip on power “slipping away,” Medvedev says (Inform/Influence): Syrian President Bashar al-Assad’s odds of holding power “are slipping away” as the nearly 2-year-old revolt against his rule ginds on, Russian Prime Minister Dmitry Medvedev says…more
Is War in the Sixth Domain the End of Clausewitz?: (Influence) This is a guest post from the ‘blogs of war’ website written by Chloe Diggins & Clint Arizmendi are Research & Analysis Officers at the Australian Army’s Land Warfare Studies Centre.: Warfare takes place across four domains: land, air, sea and space. Recently – in search of a comparative advantage over the enemy – cyberspace was included as the fifth domain. In the future, this will no longer be the case, the human mind will be the sixth and perhaps the only domain of warfare…more