I have been working on an information operations graduate/masters degree curriculum using the sections, topics, and strategies found in Information Operations (JP3-13) as a starting point for course titles, and course learning objectives. The expectation is that each course would be a semester in length and approximately 3 semester hours for a standard of 48 hours of instruction (16 weeks, 3 hours a week). The next step would be topify (my favorite new word) the following courses into lectures or sub-topics within each discipline.
My preference is to create the course with 14 lectures and 2 days of formal assessments, semester papers using a paper delivery pattern I currently use of topic, annotated bibliography, outline, draft, presentation, final paper delivery. I also like to run graduate classes as seminar based on literature rather than text books driving the students into the finding of assigned papers and extending that knowledge through finding associated topics.
The curriculum is as follows:
IO 500 Information Operations (overview)
This course is an overview of the information operations space. Topics to be covered include psyop, mildec, opsec, ew, and cno. This course as an over view prepares students with the domain specific language and concepts necessary for future classes. The physical, informational, and cognitive dimensions will be discussed.This course is a pre-requisite for all other courses except decision sciences and social theory.
Students will define the core IO disciplines
Students will compare and contrast the core and supporting IO disciplines
Students will examine each IO discipline and compare and contrast with the others.
Students will define a holistic approach to IO
Students will refine and reflect on the ethical and boundary issues of IO
IO 510 Psychological Operations
This course covers selected methods in relaying information to audiences for the expressed purpose of modifying behaviors. Methods and case studies of historical psychological operations are discussed for their relevant efficacy and merits.
Students will examine the strategic effects of PSYOP
Students will discuss the employment and efficacy of PSYOP
Students will describe the differences between PSYOP and Public Affairs
Students will examine the coordination of PSYOP with the other IO disciplines
Students will describe and reflect on the ethical and boundary issues of PSYOP
IO 520 Military Deception
This course covers military operations that are used to mislead or cause and adversary to take specific actions. Case studies and historical examples will expose students to the variety of elements involved.
Students will define and explain course of action employments
Students will discuss, compare and contrast how OPSEC and MILDEC are related.
Students will examine approaches to analyzing adversary collections mechanisms.
Students will examine and discuss how adversary cultural and technological indicators effect employment of MILDEC
Students will describe and reflect on the ethical and boundary issues of MILDEC
IO 530 Operational Security
This course covers the necessity of protecting critical information systems and capability. Students will examine the various issues with crating reliable secure and robust information systems that support the organization/enterprise.
Students will reflect on the necessity of not being the victim of IO
Students will define and explain systems assurance and security.
Students will be exposed to the concepts of confidentiality, integrity, and availability
Students will explain and refine the inter-locking requirements of OPSEC and IO
Students will describe and reflect on the ethical and boundary issues of OPSEC
IO 540 Electronic Warfare
This course involves the discussion of methods to interrupt or degrade the electronic tools of an adversary through a variety of means. Students will be exposed to concepts that interrupts or use the electro magnetic spectrum as a tool of reconnaissance and interruption of command and control.
Students will define and discuss the eletro magnetic spectrum
Students will examine the information and transmission strategies
Students will describe and examine the characteristics of different technologies involved in EW
Students will reflect and consider the historical examples of EW and their efficacy
Students will describe and reflect on the ethical and boundary issues of EW
IO 550 Computer Network Operations
This course covers the use of computer networks in the support of information operations. The student will examine the myriad information technology infrastructures and the use of tools to attack, deceive, degrade, disrupt, deny, exploit, and defend electronic information infrastructure.
The student will define the scope of a computer network.
The student will examine the relative role of information technology within information operations.
The student will explain the vulnerabilities, threats, and relative risks to computer networks and the paths to exploitation.
The student will demonstrate an understanding of computer network attack and computer network defense
Students will describe and reflect on the ethical and boundary issues of CNO
IO 560 Decision Sciences
This course is an overview of the different types of decision sciences. Topics to be covered include OODA, and critical node analysis. The goal for students is to be able to provide decision support on “deny, deceive, destroy, or exploit” within the information operation environment.
The student will define and describe OODA and the relative impact on IO
The student will evaluate other decision support mechanisms and compare them to OODA (example IPDE).
The student will compare and contrast the mechanisms in support of decisions and the merits from different perspectives
The student will demonstrate through modeling the decision cycle.
Students will describe and reflect on the ethical and boundary issues of Decision Sciences
IO 570 Intelligence Operations and Support
This class will discuss the gathering of information from an adversary and the assessment cycle of intelligence operations. The student will be exposed to the intelligence system and the various factors of intelligence operations in support of IO.
The student will examine intelligence activities and the various roles of intelligence in support of IO
The student will discuss the various methods of protection from espionage or counter intelligence
The student will reflect and consider the issues with various technologies and their capabilities
The student will synthesize the other disciplines of IO and create an assessment of a case study target
Students will describe and reflect on the ethical and boundary issues of Intelligence Operations
IO 580 Social Theory
This class will consider the make up of societies and the various cultural difference in communications conduits. Students will be exposed to the various theories of the interconnected nature of societies with and without technology. Specifically technology and communications advances will be examined to see how information operations are negatively impacted or assisted.
Students will define and describe social network theory
Students will using case studies complete a social network analysis
Students will examine the differences between cultures that have wide spread technology adoption and those that repudiate technology.
Students will use case studies to determine the effects and outcomes of close knit versus loosely coupled networks and their resilience
Students will describe and reflect on the ethical and boundary issues of social networking theory
IO 590 Network Centric Warfare
This is the capstone course for the program. The students will be given a case study detailing all aspects (to be considered) of an information operation target. In this course the students will work all aspects of information operations from beginning to end and produce a cohesive plan for a tactical information operation.
TBD on a class by class basis see description.
Students will examine the concepts of network centric warfare and the effect on informaton operations
Students will use prior course work to complete a information operation plan
Students will while working in a group determine the objectives and considerations of an information operation.
Thesis (3 hours)