Information Operations Condition (INFOCON) | Public Intelligence (2024)

Department of Defense

July 25, 2009

Overview

Information Operations Condition (INFOCON) is a threat level system in the United States similar to that of DEFCON or FPCON. INFOCON is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack.

The Structure of the System

The INFOCON level is ultimately decided by the Commander of U.S. Strategic Command (CDRUSSTRATCOM). The system extends across all Department of Defense Information systems on the Non-classified Internet Protocol Routing Network (NIPRNET) and the Secret Internet Protocol Router Network (SIPRNET).

A “For Official Use Only” directive from 2006 describes the INFOCON system as:

. . . including responsibilities, processes, and procedures, applies to Non-classified Internet Protocol Routing Network (NIPRNET) and Secret Internet Protocol Router Network (SIPRNET) systems under the purview of the Joint Chiefs of Staff and all DoD activities within the unified commands, military services, and DoD Agencies, as well as the non-DoD NetOps COI (NetOps CONOPS, Joint Concept of Operations for Global Information Grid NetOps). It is executed by unified and service commanders, base/pos /camp/station/vessel commanders and agency directors with authority over information systems and networks (operational and/or support) (hereafter collectively referred to as “commanders”).1

The same directive describes the system as “a framework within which the Commander USSTRATCOM (CDRUSSTRATCOM), regional commanders, service chiefs, base/post/camp/station/vessel commanders, or agency directors can increase the measurable readiness of their networks to match operational priorities.”2

INFOCON Threat Levels

There are five levels of INFOCON, which recently changed to more closely correlate to DEFCON levels. They are:

  • INFOCON 5 is characterized by routine NetOps, normal readiness of information systems and networks that can be sustained indefinitely. Information networks are fully operational in a known baseline condition with standard information assurance policies in place and enforced. During INFOCON 5, system and network administrators will create and maintain a snapshot baseline of each server and workstation in a known good configuration and develop processes to update that baseline for authorized changes.
  • INFOCON 4 increases NetOps readiness, in preparation for operations or exercises, with a limited impact to the end-user. System and network administrators will establish an operational rhythm to validate the known good image of an information network against the current state and identify unauthorized changes. Additionally, user profiles and accounts are reviewed and checks conducted for dormant accounts. By increasing the frequency of this validation process, the state of an information network is confirmed as unaltered (i.e., good) or determined to be compromised. This level of readiness may or may not be characterized by an increased intelligence watch and strengthened security (port blocking, increased scans) measures of information systems and networks. Impact to end-users is negligible.
  • INFOCON 3 further increases NetOps readiness by increasing the frequency of validation of the information network and its corresponding configuration. Impact to end-users is minor.
  • INFOCON 2 is a readiness condition requiring a further increase in frequency of validation of the information network and its corresponding configuration. The impact on system administrators will increase in comparison to INFOCON 3 and will require an increase in preplanning, personnel training, and the exercising and pre-positioning of system rebuilding utilities. Use of “hot spare” equipment can substantially reduce downtime by allowing rebuilding in parallel. Impact to end-users could be significant for short periods, which can be mitigated through training and scheduling.
  • INFOCON 1 is the highest readiness condition and addresses intrusion techniques that cannot be identified or defeated at lower readiness levels (e.g., kernel root kit). It should be implemented only in those limited cases where INFOCON 2 measures repeatedly indicate anomalous activities that cannot be explained except by the presence of these intrusion techniques. Until such time as more desirable detection methods are available, the most effective method for ensuring the system has not been compromised in this manner is to reload operating system software on key infrastructure servers (e.g., domain controllers, Exchange servers, etc.) from an accurate baseline.
    Rebuilding should be expanded to other servers as resources permit and intrusion detection levels indicate. Once baseline comparisons no longer indicate anomalous activities, INFOCON 1 should be terminated. The impact on system administrators will be significant and will require an increase in preplanning, personnel training, and the exercising and pre-positioning of system rebuilding utilities. Use of “hot spare” equipment can substantially reduce downtime by allowing rebuilding in parallel. Impact to end-users could be significant for short periods, which can be mitigated through training and scheduling.3

Share this:

Source notes:

  1. Strategic Command Directive (SD) 527-1 – Public Intelligence []
  2. Ibid. []
  3. Ibid. []
Information Operations Condition (INFOCON) | Public Intelligence (2024)
Top Articles
The BEST Deviled Eggs Recipe (So Easy!) - Oh Sweet Basil
Authentic Mutton Curry (Lamb Curry Recipe)
7 C's of Communication | The Effective Communication Checklist
Umn Pay Calendar
Rubfinder
Declan Mining Co Coupon
litter - tłumaczenie słowa – słownik angielsko-polski Ling.pl
Walthampatch
Flights To Frankfort Kentucky
Samsung Galaxy S24 Ultra Negru dual-sim, 256 GB, 12 GB RAM - Telefon mobil la pret avantajos - Abonament - In rate | Digi Romania S.A.
1-833-955-4522
The best TV and film to watch this week - A Very Royal Scandal to Tulsa King
Mccain Agportal
Pinellas Fire Active Calls
Shopmonsterus Reviews
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
Gina Wilson All Things Algebra Unit 2 Homework 8
Purdue 247 Football
Bòlèt Florida Midi 30
683 Job Calls
Ihub Fnma Message Board
Chime Ssi Payment 2023
Craig Woolard Net Worth
What Equals 16
Table To Formula Calculator
Hobby Lobby Hours Parkersburg Wv
Obituaries, 2001 | El Paso County, TXGenWeb
Current Students - Pace University Online
Hoofdletters voor God in de NBV21 - Bijbelblog
Pch Sunken Treasures
Ma Scratch Tickets Codes
B.k. Miller Chitterlings
Moxfield Deck Builder
Unlock The Secrets Of "Skip The Game" Greensboro North Carolina
Domina Scarlett Ct
ATM Near Me | Find The Nearest ATM Location | ATM Locator NL
Oriellys Tooele
Omaha Steaks Lava Cake Microwave Instructions
Noaa Marine Weather Forecast By Zone
Restored Republic June 6 2023
062203010
manhattan cars & trucks - by owner - craigslist
Promo Code Blackout Bingo 2023
30 Years Of Adonis Eng Sub
Avatar: The Way Of Water Showtimes Near Jasper 8 Theatres
Gw2 Support Specter
Slug Menace Rs3
Westport gun shops close after confusion over governor's 'essential' business list
Walmart Front Door Wreaths
Sams La Habra Gas Price
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
211475039
Latest Posts
Article information

Author: Ms. Lucile Johns

Last Updated:

Views: 6281

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Ms. Lucile Johns

Birthday: 1999-11-16

Address: Suite 237 56046 Walsh Coves, West Enid, VT 46557

Phone: +59115435987187

Job: Education Supervisor

Hobby: Genealogy, Stone skipping, Skydiving, Nordic skating, Couponing, Coloring, Gardening

Introduction: My name is Ms. Lucile Johns, I am a successful, friendly, friendly, homely, adventurous, handsome, delightful person who loves writing and wants to share my knowledge and understanding with you.