CABINET OFFICE what peice of legislation gives you the authority to authorise JWP3-80 Information Operation in UK on the civilian population?

The request was refused by Cabinet Office.

Dear Cabinet Office,

This is a request for information which I believe you hold;

CABINET OFFICE can you please answer the following request for information,
what piece of legislation gives you the authority to authorise
JWP3-80 Information Operation in UK on the civilian population?
Activities limited by resource and imagination.
Activities carried out by MI5 MI6 GCHQ MOD with no known authorisations, no RIPA2000 authorisations, no valid warrants of any kind which is required under the security services act 1989 and Intelligence Services act 1994.

Can you please let me know what piece of legislation authorises any of the Intelligence services or MOD to execute JWP3-80 Information Operation on the civilian population here
in UK?

The activities carried out by the Intelligence services is stated specifically in this document JWP3-80 Information Operation is as follows;

https://www.scribd.com/doc/175220261/JWP...

JOINT WARFARE PUBLICATION 3-80 INFORMATION OPERATIONS
Joint Warfare Publication 3-80 (JWP 3-80)
dated June 2002is promulgated as directed by the Chiefs of Staff .
The Joint Doctrine & Concepts Centre Ministry of Defence Shrivenham
SWINDON Wilts SN6 8RF
Telephone number: 01793 787216/7Facsimile number: 01793 787232
E-mail: [email address]

page1-4
108.Cross-Government Direction and Co-ordination.
10 The Cabinet Office, possibly supported by a cross-government working group, provides strategic direction and objectives for the Info Campaign based on national objectives set as part of government policy. Each department then develops its own line of activity to meet the Info Campaign objectives. Co-ordination of this cross-government activity is achieved through a second working group drawn from appropriate departments and usually referred to as the Cross-Government Implementation Group (CGIG). MOD HQ is represented by DG Op Pol or by the Directorate of Targeting and Information Operations (DTIO) staff who will update direction to the wider MOD as required.

page 2A-1
ANNEX 2A  INFORMATION OPERATIONS TOOLS

2A1. Information Operations (Info Ops) can make use of all or any activities capable of exerting influence or conducting Counter-Command Activity (CCA); it is limited only by imagination and availability. However, the tools listed in this Annex, along with the separate but related activities of Media Ops and Civil-Military Co-operation(CIMIC), are likely to be those with the greatest applicability and utility.2A2.

Psychological Operations

The primary purpose of Psychological Operations(PSYOPS) is to influence the perceptions, attitudes and behaviour of selected individuals or groups in accordance with Info Ops themes. Unlike Media Ops, PSYOPS retains direct control over contents, dissemination and audience. Effective PSYOPS requires timely provision of resources such as linguistic support, graphics and print capability, broadcasting capability and other delivery mechanisms. Messages can be presented by
:a. Print: enduring but not responsive.
b. Radio: immediate impact on a large audience. Broad, simple and repeated messages are required.
c. TV: extremely powerful, depending on audience access.
d. Loudspeakers: localised impact dependent upon linguistic support and access to desired areas.
e. Face to face (lectures, meetings and plays) and word of mouth (rumour and gossip): can be very effective in changing attitudes but dependent on local willingness to enter dialogue.
f. Internet, faxes, pagers and mobile communications: can be effective but again is dependent on access.

PAGE 2A-2
2A4.Operations Security
OPSEC denies the adversary access to essential elements of friendly information, preventing him from deducing details of our activities, including Info Ops, as well as dispositions, intentions, capabilities and vulnerabilities. OPSEC reduces the amount of information available to the adversary decision-maker, making it easier to influence his perceptions and making effective decision-making more difficult.

2A5.Deception
The aim of deception is to mislead the adversary and thus persuade him to adopt a course of action that is to his disadvantage. It is often most effective when it aims to reinforce existing preconceptions and perceptions. Whilst OPSEC denies information to an adversary, reducing his capacity to make effective decisions, deception fills the void with information tailored for his consumption leading to definite but incorrect decision-making.

2A6.Electronic Warfare
Electronic Warfare (EW) consists of three disciplines:
Electronic Warfare Support Measures (ESM);
Electronic Countermeasures (ECM) and Electronic Protective Measures (EPM).
Each of these can make a valuable contribution to Info Ops

2A7.Physical Destruction
The use of force sends a strong message and consequently the direct application of force through physical destruction of adversary assets will significantly impact upon perceptions. Carefully applied force can play a major role in coercion and deterrence and in reducing an adversary's ability to exercise command. However, undue collateral damage and unnecessary casualties will have an adverse effect on public support. Whilst physical destruction will almost invariably be required the JTFC must consider and balance the potential negative impact that it may cause with the expected benefits.

2A8.Emerging Technology

. Emerging Technology includes the use of directed energy weapons such as Radio Frequency, Laser and acoustic and other non-lethal weapons. Their use may offer alternatives to the more direct use of physical force with the possibility of reduced collateral damage and thus greater public acceptability of any attack however, additional legal constraints may limit their availability

page 2A-3
2A9.Computer Network Operations

The opportunity for and effectiveness of Computer Network Operations (CNO) is proportional to the adversary's dependence on IT. CNO comprise attack, exploitation and defence:

a.Computer Network Attack
It may prove feasible to use novel approaches to gain access to computer networks to affect their data, processes or hardware, thereby degrading or destroying information capability.

b.Computer Network Exploitation
Computer Network Exploitation offers the opportunity to gain undetected access to information on adversary systems and indeed to make use of the system itself for our own use.

page 3-1
CHAPTER 3  PLANNING
301.Information and Intelligence Sources
Information Operations (Info Ops) is predicated on information and intelligence, the acquisition of which will need to draw on a wide range of sources:

a.Military Sources
Intelligence is accessed through J2 supported by the provision of the operational picture through J3. Additional information and intelligence is available from:(1) The Directorate of Targeting and Information Operations (DTIO)who provide the link into:(a) The Defence Intelligence Staff (DIS) (Operations Support Group).(b) National Agencies.(c) Allies and other nations.(d) The Target Systems Analysis process.(2) Permanent Joint HQ (PJHQ) Info Ops staff, who will liaise with PJHQ J2 staff to provide intelligence to the Joint Task Force HQ(JTFHQ) Info Ops staff.

b.Non-Military Sources
Info Ops staff will also need to draw on broader sources of information. These include:
(1) Civil-Military Co-operation (CIMIC) staff, who have contact with:
(a) Local communities, businesses, politicians.
(b) Other Government Departments (OGD).
(c) Humanitarian parties (UN, International Organisations (IO)and Non-governmental Organisations (NGO)).
(d) Local and refugee populations.(2) Open sources, such as the media, academia and the Internet. The media in particular can provide much useful information, such as background to the conflict, local and national politics and insights in to the will of all parties. Analysis of the media and of media reporting trends will also provide useful information on the impact of Info Ops

page 3-2
302.Terminology
Info Ops is directed by means of objectives, themes and messages, and tasks:
a.Objective
An objective is the desired outcome of one or more tasks.
b.Influence Activity Theme
. An Influence Activity theme is the broad idea or topic on which Influence Activity action is based; it is the line of persuasion.

c.Influence Activity Message
. The Influence Activity message is the practical expression of an Influence Activity theme; it is a targeted statement appropriate for the target audience.
d.Tasks
Tasks are specific actions involving the application of capability:(1) An Influence Activity task involves the application of capability in order to deliver an Influence Activity message and could range from delivering ordnance to broadcasting on civilian radio and TV stations.(2) A Counter-Command Activity (CCA) task involves the application of capability to affect, degrade, disrupt, deceive, destroy or deny the desired target.

I have already sent FOI's to MOD MI6 GCHQ Home office with no satisfactory reply.
I hope you can provide an answer.

Yours faithfully,

Miss shapla begum
poplar
London E14

FOI Team Mailbox, Cabinet Office

CABINET OFFICE REFERENCE:  FOI326819

Dear SHAPLA BEGUM

Thank you for your request for information. Your request was received
on 5/9/2018 and we are considering if it is appropriate to deal with under
the terms of the Freedom of Information Act 2000.

This email is just a short acknowledgement of your request.

When corresponding with the Cabinet Office, you may wish to be aware of
how we treat your personal Information.  This is set out in our personal
information charter, at the following
link: [1]https://www.gov.uk/government/organisati...

If you have any queries about this email, please contact the FOI team.
Please remember to quote the reference number above in any future
communications.

Yours sincerely,

 Knowledge and Information Management Unit

Cabinet Office

E: [2][Cabinet Office request email]

References

Visible links
1. https://www.gov.uk/government/organisati...
2. mailto:[email address]

Dear FOI Team Mailbox,

Thank you for your acknowledgment of receipt of my request for information.
I will like to clarify this is not a request for personal information, it is a general query as to
if JWP3-80 Information Operation is being executed in UK authorised by who and under what rule of law.
Thank you.

Yours sincerely,

Miss shapla begum
Poplar
London E14

FOI Team Mailbox, Cabinet Office

1 Attachment

Please find attached the reply to your FOI request

 

 

 

Regards

 

 

FOI Team

Room 405

70 Whitehall,

London, SW1A 2AS

E-mail -[1][Cabinet Office request email] 

References

Visible links
1. mailto:[email address]

Dear Cabinet Office,

Please pass this on to the person who conducts Freedom of Information reviews.

I am writing to request an internal review of Cabinet Office's handling of my FOI request 'CABINET OFFICE what peice of legislation gives you the authority to authorise JWP3-80 Information Operation in UK on the civilian population?'.

JWP3-80 Information Operation clearly states it is a crown copyright MOD document, it has full
address in the document.
Excerpts taken from JWP3-80 Information Operation.
The Joint Doctrine & Concepts Centre Ministry of Defence Shrivenham SWINDON Wilts SN6 8RFTelephone number: 01793 787216/7Facsimile number: 01793 787232E-mail: [email address]

CONDITIONS OF RELEASE1. This information is Crown copyright and the intellectual property rights for this publication belong exclusively to the Ministry of Defence (MOD). No material or information contained in this publication should be reproduced, stored in a retrieval system, or transmitted in any form outside MOD establishments, except as authorised by both the sponsor and the MOD where appropriate.2. This information is released by the United Kingdom Government to a recipient Government for defence purposes only. It may be disclosed only within the Defence Department of a recipient Government, except as otherwise authorised by the MOD.3. This information may be subject to privately owned rights.

page 1-4
108.Cross-Government Direction and Co-ordination
10The Cabinet Office, possibly supported by a cross-government working group, provides strategic directionand objectives for the Info Campaign based on national objectives set as part of government policy. Each department then develops its own line of activity to meet theInfo Campaign objectives. Co-ordination of this cross-government activity isachieved through a second working group drawn from appropriate departments andusually referred to as the Cross-Government Implementation Group (CGIG). MOD

page 1-5
SECTION III  MINISTRY OF DEFENCE ACTIVITY

109.Higher Level Direction
. The MOD directs the military line of activity,through the DCMO, to meet the Cabinet Office Objectives including those of the InfoCampaign. Depending on the level of involvement, the MOD contribution mayinitially be managed from within MOD HQ (DTIO), supported by PJHQ. At theoperational level, the JTFC is responsible for Info Ops, with the Joint Commander (JtComd) setting boundaries and providing direction and support within the context of the Info Campaign.

The document states Cabinet office authorises jwp3-80 Information Operations ,yet Cabinet office has denied holding any information on the subject matter.

A full history of my FOI request and all correspondence is available on the Internet at this address: https://www.whatdotheyknow.com/request/c...

Yours faithfully,

miss shapla begum
poplar
london

FOI Team Mailbox, Cabinet Office

CABINET OFFICE REFERENCE:  IR326819

Dear SHAPLA BEGUM

Thank you for your request for an internal review. Your request was
received on 8/10/18 and is being dealt with under the terms of the Freedom
of Information Act 2000.

This email is just a short acknowledgement of your request.

If you have any queries about this email, please contact the FOI team.
Please remember to quote the reference number above in any future
communications.

Yours sincerely,

Knowledge and Information Management Unit

Cabinet Office

E: [1][Cabinet Office request email]

 

References

Visible links
1. mailto:[Cabinet Office request email]

FOI Team Mailbox, Cabinet Office

1 Attachment

Please find attached the reply to your IR request

 

 

 

Regards

 

 

FOI Team

Room 405

70 Whitehall,

London, SW1A 2AS

E-mail -[1][Cabinet Office request email] 

References

Visible links
1. mailto:[email address]