Close Access Information Operations
The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conduc...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Slavin, Jim |
description | The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA378025</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA378025</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA3780253</originalsourceid><addsrcrecordid>eNrjZFB2zskvTlVwTE5OLS5W8MxLyy_KTSzJzM9T8C9ILQKzinkYWNMSc4pTeaE0N4OMm2uIs4duSklmcnxxSWZeakm8o4ujsbmFgZGpMQFpAFs-I4o</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Close Access Information Operations</title><source>DTIC Technical Reports</source><creator>Slavin, Jim</creator><creatorcontrib>Slavin, Jim ; ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><description>The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.</description><language>eng</language><subject>ACCESS ; ATTACK ; Computer Systems Management and Standards ; DATA ACQUISITION ; INFORMATION SYSTEMS ; INFORMATION WARFARE ; INTELLIGENCE ; Military Intelligence ; MILITARY OPERATIONS ; MILITARY STRATEGY ; NATIONAL MILITARY STRATEGY ; NATIONAL SECURITY ; UNITED STATES</subject><creationdate>2000</creationdate><rights>APPROVED FOR PUBLIC RELEASE</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,778,883,27550,27551</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA378025$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Slavin, Jim</creatorcontrib><creatorcontrib>ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><title>Close Access Information Operations</title><description>The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.</description><subject>ACCESS</subject><subject>ATTACK</subject><subject>Computer Systems Management and Standards</subject><subject>DATA ACQUISITION</subject><subject>INFORMATION SYSTEMS</subject><subject>INFORMATION WARFARE</subject><subject>INTELLIGENCE</subject><subject>Military Intelligence</subject><subject>MILITARY OPERATIONS</subject><subject>MILITARY STRATEGY</subject><subject>NATIONAL MILITARY STRATEGY</subject><subject>NATIONAL SECURITY</subject><subject>UNITED STATES</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2000</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZFB2zskvTlVwTE5OLS5W8MxLyy_KTSzJzM9T8C9ILQKzinkYWNMSc4pTeaE0N4OMm2uIs4duSklmcnxxSWZeakm8o4ujsbmFgZGpMQFpAFs-I4o</recordid><startdate>20000410</startdate><enddate>20000410</enddate><creator>Slavin, Jim</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>20000410</creationdate><title>Close Access Information Operations</title><author>Slavin, Jim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA3780253</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2000</creationdate><topic>ACCESS</topic><topic>ATTACK</topic><topic>Computer Systems Management and Standards</topic><topic>DATA ACQUISITION</topic><topic>INFORMATION SYSTEMS</topic><topic>INFORMATION WARFARE</topic><topic>INTELLIGENCE</topic><topic>Military Intelligence</topic><topic>MILITARY OPERATIONS</topic><topic>MILITARY STRATEGY</topic><topic>NATIONAL MILITARY STRATEGY</topic><topic>NATIONAL SECURITY</topic><topic>UNITED STATES</topic><toplevel>online_resources</toplevel><creatorcontrib>Slavin, Jim</creatorcontrib><creatorcontrib>ARMY WAR COLL CARLISLE BARRACKS PA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Slavin, Jim</au><aucorp>ARMY WAR COLL CARLISLE BARRACKS PA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Close Access Information Operations</btitle><date>2000-04-10</date><risdate>2000</risdate><abstract>The information age comes with the challenge of implementing offensive information operations. As the United States executes the National Military Strategy, we must understand that our future threats may value information even more than we do. We have to further delineate responsibilities for conducting offensive information operations. With the technological security advances and reliance upon closed information systems, we must prepare an operational force that will be prepared to conduct close access offensive information operations. Finally, we must have the necessary intelligence collection for supporting such a force.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA378025 |
source | DTIC Technical Reports |
subjects | ACCESS ATTACK Computer Systems Management and Standards DATA ACQUISITION INFORMATION SYSTEMS INFORMATION WARFARE INTELLIGENCE Military Intelligence MILITARY OPERATIONS MILITARY STRATEGY NATIONAL MILITARY STRATEGY NATIONAL SECURITY UNITED STATES |
title | Close Access Information Operations |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T17%3A29%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Close%20Access%20Information%20Operations&rft.au=Slavin,%20Jim&rft.aucorp=ARMY%20WAR%20COLL%20CARLISLE%20BARRACKS%20PA&rft.date=2000-04-10&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA378025%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |