Close Access Information Operations

The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conduc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Slavin, Jim
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Slavin, Jim
description The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA378025</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA378025</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA3780253</originalsourceid><addsrcrecordid>eNrjZFB2zskvTlVwTE5OLS5W8MxLyy_KTSzJzM9T8C9ILQKzinkYWNMSc4pTeaE0N4OMm2uIs4duSklmcnxxSWZeakm8o4ujsbmFgZGpMQFpAFs-I4o</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Close Access Information Operations</title><source>DTIC Technical Reports</source><creator>Slavin, Jim</creator><creatorcontrib>Slavin, Jim ; ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><description>The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.</description><language>eng</language><subject>ACCESS ; ATTACK ; Computer Systems Management and Standards ; DATA ACQUISITION ; INFORMATION SYSTEMS ; INFORMATION WARFARE ; INTELLIGENCE ; Military Intelligence ; MILITARY OPERATIONS ; MILITARY STRATEGY ; NATIONAL MILITARY STRATEGY ; NATIONAL SECURITY ; UNITED STATES</subject><creationdate>2000</creationdate><rights>APPROVED FOR PUBLIC RELEASE</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,778,883,27550,27551</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA378025$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Slavin, Jim</creatorcontrib><creatorcontrib>ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><title>Close Access Information Operations</title><description>The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.</description><subject>ACCESS</subject><subject>ATTACK</subject><subject>Computer Systems Management and Standards</subject><subject>DATA ACQUISITION</subject><subject>INFORMATION SYSTEMS</subject><subject>INFORMATION WARFARE</subject><subject>INTELLIGENCE</subject><subject>Military Intelligence</subject><subject>MILITARY OPERATIONS</subject><subject>MILITARY STRATEGY</subject><subject>NATIONAL MILITARY STRATEGY</subject><subject>NATIONAL SECURITY</subject><subject>UNITED STATES</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2000</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZFB2zskvTlVwTE5OLS5W8MxLyy_KTSzJzM9T8C9ILQKzinkYWNMSc4pTeaE0N4OMm2uIs4duSklmcnxxSWZeakm8o4ujsbmFgZGpMQFpAFs-I4o</recordid><startdate>20000410</startdate><enddate>20000410</enddate><creator>Slavin, Jim</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>20000410</creationdate><title>Close Access Information Operations</title><author>Slavin, Jim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA3780253</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2000</creationdate><topic>ACCESS</topic><topic>ATTACK</topic><topic>Computer Systems Management and Standards</topic><topic>DATA ACQUISITION</topic><topic>INFORMATION SYSTEMS</topic><topic>INFORMATION WARFARE</topic><topic>INTELLIGENCE</topic><topic>Military Intelligence</topic><topic>MILITARY OPERATIONS</topic><topic>MILITARY STRATEGY</topic><topic>NATIONAL MILITARY STRATEGY</topic><topic>NATIONAL SECURITY</topic><topic>UNITED STATES</topic><toplevel>online_resources</toplevel><creatorcontrib>Slavin, Jim</creatorcontrib><creatorcontrib>ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Slavin, Jim</au><aucorp>ARMY WAR COLL CARLISLE BARRACKS PA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Close Access Information Operations</btitle><date>2000-04-10</date><risdate>2000</risdate><abstract>The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA378025
source DTIC Technical Reports
subjects ACCESS
ATTACK
Computer Systems Management and Standards
DATA ACQUISITION
INFORMATION SYSTEMS
INFORMATION WARFARE
INTELLIGENCE
Military Intelligence
MILITARY OPERATIONS
MILITARY STRATEGY
NATIONAL MILITARY STRATEGY
NATIONAL SECURITY
UNITED STATES
title Close Access Information Operations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T17%3A29%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Close%20Access%20Information%20Operations&rft.au=Slavin,%20Jim&rft.aucorp=ARMY%20WAR%20COLL%20CARLISLE%20BARRACKS%20PA&rft.date=2000-04-10&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA378025%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true