Close Access Information Operations
The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conduc...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force. |
---|