38 results on '"PSYCHOLOGICAL OPERATIONS"'
Search Results
2. Operation Observant Compass and the Hunt for Joseph Kony: The Use of Special Operations Forces in Humanitarian Interventions.
- Author
-
Moriarty, Daniel
- Subjects
MILITARY medical personnel ,HUMANITARIAN intervention ,UNITED States armed forces ,GEOGRAPHIC information systems ,INTERVENTION (International law) - Abstract
Operation Observant Compass, the United States 2011–2017 military intervention in Central Africa to defeat Joseph Kony’s Lord’s Resistance Army, offers several lessons for students and practitioners of military geography. As opposed to previous humanitarian interventions, Operation Observant Compass featured a notably small force of roughly 100 special operations forces and support personnel. This special operations forces element, deployed to the tri-border region between the Democratic Republic of the Congo, South Sudan, and the Central African Republic, confronted an elusive enemy force in an operational area roughly 200 000 square kilometres in size. Using a mixedmethods approach, the study, on which this this article is based, argued that Operation Observant Compass resulted in a net positive humanitarian outcome despite failing to kill or capture Kony. First, using datasets on Lord’s Resistance Army attacks and Operation Observant Compass troop positions, this article presents a geospatial analysis of potential deterrence effects created by the deployment of special operations forces, such as the United States Special Forces or “Green Berets”. Second, using primary research conducted by the former psychological operations commander of Operation Observant Compass and the Ugandan People’s Defence Force counterpart, analysis is presented on the efficacy of psychological operations campaigns that sought to weaken the Lord’s Resistance Army through defections to regional security forces. The study also considered ancillary effects received through United States military medical personnel deployed in support of special operations forces, as well as a counterfactual argument in which United States forces were not directly deployed into the tri-border region. This article contributes to the existing literature by expanding understanding of a littlestudied chapter in foreign military deployments in sub-Saharan Africa, considering the nexus between use of special operations forces and humanitarian interventions. Methodologically, the use of a geographic information system argues for a consideration of geographical proximity between forces in creating a deterrent effect in “low-intensity” or irregular conflicts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. PSYCHOLOGICAL OPERATIONS DURING THE RUSSIAN WAR OF AGGRESSION IN UKRAINE.
- Author
-
STANCU, Marian Nicușor and CĂZĂNARU, George
- Subjects
- *
AGGRESSION (International law) , *UKRAINIANS , *SOCIAL networks , *DISINFORMATION , *WAR - Abstract
The article analyzes the way and motivation of the Russian Federation to carry out psychological operations in the war of aggression that it has unleashed in Ukraine from the perspective of the information environment. These operations are specific to the cognitive layer of the information environment and are aimed at influencing the perceptions, behavior, and decisions of both the Ukrainian population and the international community by using disinformation, propaganda, and manipulation. By analyzing these operations, it highlights how Russia has exploited the lack of robust regulation of social networks. The analysis underlines the importance of developing effective strategies to counter these operations by increasing information resilience and strengthening protection mechanisms against harmful external influences. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. COINTELPRO – program kontrwywiadowczy FBI z lat 1956–1971. Założenia, realizacja i ocena przez Komisję Churcha z 1976 roku – wybrane elementy.
- Author
-
Liber, Janusz
- Subjects
INTELLIGENCE service ,MASS surveillance ,WHISTLEBLOWERS ,WIRETAPPING ,CITIZENS - Abstract
Copyright of Security: Theory & Practice / Bezpieczeństwo.Teoria i Praktyka is the property of Andrzej Frycz Modrzewski Krakow University, AFM Publishing Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. Illustrative Examples of How to Measure Influence Operations: Experimental and Statistical Methods for Causal Inference.
- Author
-
Bryant, D. J.
- Subjects
CAUSAL inference ,NATIONAL security ,PSYCHOLOGICAL techniques ,EXPERIMENTAL design ,PROFESSIONAL employees - Abstract
National security influence professionals have always struggled with influence measures of effectiveness and operational assessments. This paper includes fictional examples that illustrate how experimental methods from psychological science can address this problem. Three fictional use cases are examined. A scientific approach to national security influence is essential to accumulating knowledge in this domain. Without it, the information operations community will continue to struggle to identify what works and why. [ABSTRACT FROM AUTHOR]
- Published
- 2024
6. How to Measure Strategic Influence: A New Science for National Security.
- Author
-
Bryant, D.
- Subjects
NATIONAL security ,EXPERIMENTAL design ,PROBLEM solving ,NATION-state - Abstract
The United States' national security strategy is an influence strategy--the effectiveness of which cannot be measured. The strategy's effectiveness is unmeasurable because influence operations still have not solved the assessment problem. The Department of Defense influence doctrine relies on unreliable practices from advertising and has never taken up a program of research to apply the very advanced psychological science of influence to the national security domain. Robust methods of operational design, variable control, and measurement are absent from national security influence, and there is no organization or mechanism to coordinate and deconflict operations across the whole of government. [ABSTRACT FROM AUTHOR]
- Published
- 2024
7. The Establishment of the Directorate Military Intelligence upon South Africa's Exit from the Commonwealth 1961-1971: In Pursuit of Recognition.
- Author
-
Pheiffer, Chris
- Subjects
INTELLIGENCE service ,MILITARY intelligence ,REFERENDUM ,ARCHIVAL resources ,DIPLOMATIC & consular service - Abstract
After South Africa had left the Commonwealth in 1961, the South African Defence Force had to develop its own intelligence capacity, as the British intelligence services ceased intelligence provision to South Africa. The Defence Force had limited experience in the field of intelligence as far as personnel, training and structures were concerned. It had no mandate, an insubordinate position in the higher military hierarchy, and no national legislation or departmental prescripts existed to direct its functions. Certain of its functions continuously migrated to other structures in the Defence Force, which hampered its development. Towards the end of the decade, the organisation was temporarily disbanded, and its functions taken over by a newly created Bureau of State Security. Despite these limitations, the Directorate Military Intelligence evolved into a comprehensive autonomous intelligence organisation over a period of ten years, directed by national legislation, and legitimised as one of the three principal intelligence organisations in South Africa. It performed the main intelligence functions as is globally accepted from the role of an intelligence organisation, viz. collection, analyses, counter-intelligence, and covert action. This article will provide a narrative, based mainly on primary archival sources, of the evolution of Directorate Military Intelligence between 1961 and 1971 despite the developmental challenges it faced. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Tom Sawyer as Philosopher: Lying and Deception on the Mississippi
- Author
-
Fallis, Don, Kowalski, Dean A., editor, Lay, Chris, editor, S. Engels, Kimberly, editor, and Johnson, David Kyle, Editor-in-Chief
- Published
- 2024
- Full Text
- View/download PDF
9. Information Operations and Social Media: Case Study of Indian Chronicles and Options for Pakistan
- Author
-
Maheen Shafeeq
- Subjects
Social Media ,Information Operations ,Psychological Operations ,Intelligence ,Surveillance ,Indian Chronicles ,Military Science ,Political science - Abstract
In the era of digital media, states have resorted to social media to pursue several agendas. In this regard, this paper sheds light on the evolving strategies of intelligence, surveillance and Information Operations (IO) conducted through social media sites. The paper examines various strategies of IO mentioned in U.S. military documents encompassing Military Deception (MILDEC), Computer Network Operations (CNO), Operations Security (OPSSEC), and Psychological Operations (PsyOps). The paper specifically evaluated the role of social media in PsyOps and coined the term Social Media PsyOps (SMPsyOps). It analyses how the Indian government employed these tactics to conduct IO against Pakistan unveiled in the Indian Chronicles by EU DisinfoLab. The paper argues that social media has become an open source of intelligence for conducting of IO by India and influencing opinions and perceptions of Pakistan in Western capitals. This has impacted Pakistan and therefore the paper recommends measures for the government of Pakistan on how to counter the growing Indian network of IO.
- Published
- 2024
- Full Text
- View/download PDF
10. Psychological and propaganda operations as a form of hybrid warfare
- Author
-
Parezanović Marko and Proroković Dušan
- Subjects
psychological operations ,propaganda operations ,hybrid war ,conventional war ,Social pathology. Social and public welfare. Criminology ,HV1-9960 - Abstract
Psychological and propaganda operations are inseparable part of hybrid warfare. The rapid complication of overall relations in the international community, especially since the beginning of 2022, has led to tectonic upheavals in the world order, which have caused numerous changes in front of our eyes. The world is changing today, perhaps faster than ever. In such complex political and security, economic and social circumstances, models of hybrid warfare gained additional importance and in a certain way, conditionally speaking, became an inseparable part of the foreign policy of the leading powers. In addition, hybrid actions of a psychological and propaganda nature have become an inseparable part of international relations. This paper first analyses the conceptual definition of the terms hybrid war, psychological and propaganda operations, and then explains the cause-and-effect relationships and examines their consequences on the offensive and defensive actors of international relations. Among the conclusions is the assertion that defensive actors may be completely unaware that a hybrid war is actually being waged against them by undertaking psychological and propaganda operations.
- Published
- 2024
- Full Text
- View/download PDF
11. THE EFFECTIVE APPLICATION OF STRATEGIC COMMUNICATION IN THE FIELD OF NATIONAL SECURITY
- Author
-
Rashadat ORUJOV and Vugar MAMMADZADA MAHAMMADALI
- Subjects
strategic communication ,information operations ,psychological operations ,public affairs ,national security ,Military Science - Abstract
The research is dedicated to “Strategic Communication” and its elements. Either core element of strategic communication is enlightened through study of literature. As a showcase the Second Karabakh War between Azerbaijan and Armenia is reviewed and studied. The outcomes achieved in the conclusion of the research prove the essence and importance of strategic communication in victory.
- Published
- 2023
12. Paradojas del Trumpismo, la crisis del fentanilo y la guerra contra los cárteles.
- Author
-
Correa-Cabrera, Guadalupe
- Subjects
- *
FOREIGN electoral interference , *INTERVENTION (International law) , *PHARMACEUTICAL policy , *TRUMPISM , *BORDER security - Abstract
The present article analyzes the construction of a key foundation of the movement (or ideology) known as "Trumpism" (or "Trumpist"), which is linked to the United States' drug policy and its relationship with Mexico. Firstly, it describes the origins of an anti-narcotics and border security strategy proposed by former President Donald Trump in 2017 and amplified by sympathetic politicians and supporters who consider a possible military intervention in Mexico as an electoral strategy in 2024. This analysis highlights the elements of misinformation and propaganda of the Trumpist strategy and revisits the use of psychological operations--outlined from the perspective of the U.S. Army manuals and the Central Intelligence Agency (CIA)--as a tool for persuasion and electoral marketing. The text serves as an analytical framework to explain part of the political discourse of Trumpism within the context of the 2024 elections. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Fear and Loathing in Luhansk.
- Author
-
Tyndall, Euan
- Abstract
This article is an exploration of Psychological Operations, focusing on both the role which fear plays in Psychological Operations, and how the Russian Federation employed Psychological Operations in the War in Ukraine (2014–2021). A qualitative methodology is used to explore fear as a neurological, psychological and social phenomenon, and how it may be utilised in Psychological Operations. The author finds that Russia's initial use of Psychological Operations was focused on making tactical gains against the Ukrainian military. Shock tactics, combined with strategic messaging, encouraged mass defections from the Ukrainian army and border guard, significantly degrading the combat effectiveness of Kyiv's forces, and increasing the likelihood of victory for the Donbass secessionists. The case study is limited in scope to 2014–2021. The paper can thus be read as both an analysis of one element of Russia's shaping phase prior to the 2022 invasion, and/or a framework for analysing the current stage of conflict. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. The Theory of Transitional Target Defence: A New Approach to Enhancing Cyber Deception.
- Author
-
Turner, B. R., Ryan, R., Karie, N., and Guidetti, O.
- Subjects
DENIAL (Psychology) ,DECEPTION ,COMPUTER network security ,CYBERTERRORISM - Abstract
There have been many different approaches to implementing deceptive devices, but it is the contention of this paper that fundamentally every incarnation suffers from the same issue: it remains a deceptive device. As the use of deceptive devices has increased, attackers have become more aware of the threat they pose and have become more adept at detecting deceptive devices. This paper presents a new approach to enhancing cyber deception called Transitional Target Defence (TTD). TTD does not present a deceptive device for an attacker to reconnoitre but rather allows interaction with targets until the exploitation phase. Once the hostile traffic is detected, the attacker is redirected to a deceptive device. The authors discuss the utility of this technique in this paper and the increased complexity of the psychological theatre that comes with it. [ABSTRACT FROM AUTHOR]
- Published
- 2024
15. Jihādi Intelligence Activities in the Digital Realm
- Author
-
Haberl, Ferdinand J., Heshmati, Almas, Series Editor, and Haberl, Ferdinand J.
- Published
- 2023
- Full Text
- View/download PDF
16. The Elimination of the Greyzone as a Jihādi Covert Operation
- Author
-
Haberl, Ferdinand J., Heshmati, Almas, Series Editor, and Haberl, Ferdinand J.
- Published
- 2023
- Full Text
- View/download PDF
17. Eurasian Security from the Perspective of the Concept of Information-Psychological and Cognitive Confrontation
- Author
-
I. F. Kefeli and R. S. Vykhodets
- Subjects
information warfare ,informational and psychological warfare ,propaganda ,psychological operations ,informational impact ,Social Sciences ,Finance ,HG1-9999 ,Law ,Economic theory. Demography ,HB1-3840 - Abstract
The article is devoted to the analysis of the cognitive aspect of information and psychological confrontation in the Eurasian space, as well as to the study of the evolution of ideas that are currently commonly referred to by the term “information and psychological and cognitive confrontation”.Aim. To identify the specifics of ensuring Eurasian security in the perspective of the concept of information-psychological and cognitive confrontation.Tasks. To identify the information and psychological component in the CSTO collective security strategy, to analyze practical steps at the CSTO level in the field of countering destructive information influence, to determine the regulatory, political and organizational prerequisites for the formation of the CSTO collective information and psychological security system.Methods. The research uses both general scientific methods: analysis, synthesis, induction, and a number of special methods and approaches: comparative analysis, methodology of critical geopolitics, content analysis, informational and historical approaches.Results. The study showed that the formation of the modern concept of information-psychological and cognitive confrontation was significantly influenced by theoretical and applied research related to the understanding of the role of psychological operations and the use of special means of influencing the human psyche in modern military conflicts, as well as scientific developments in the field of studying modern methods of manipulation and propaganda, expanding the arsenal of means of hybrid conflicts, the weaponization of digital technologies, the emergence of new dimensions of international conflicts. Its subject includes systems and tools for the formation of public opinion, the peculiarities of human perception of information, as well as the whole range of methods and means of influencing public opinion and the psyche of an individual in peacetime and in combat conditions with the use of special information and psychological operations of strategic, tactical, operational level, as well as soft power tools.Conclusions. Today, more and more countries of the world are paying increased attention to the issues of ensuring information and psychological security. The desire of the post-Soviet states to preserve the political, economic and socio-cultural ties developed during their life in a single state, within the framework of new integration formats, the CIS, the EAEU, the CSTO, is increasingly faced with the problem of choosing a vector of foreign policy. Therefore, combining national interests and collective efforts to develop and conceptualize a unified approach to ensuring information and psychological security at the level of the main Eurasian cooperation formats, such as the EAEU, the CSTO and the SCO, is a priority task in the modern conflict realities of world politics.
- Published
- 2023
- Full Text
- View/download PDF
18. THE EFFECTIVE APPLICATION OF STRATEGIC COMMUNICATION IN THE FIELD OF NATIONAL SECURITY.
- Author
-
ORUJOV, Rashadat and MAMMADZADA MAHAMMADALI, Vugar
- Abstract
The research is dedicated to "Strategic Communication" and its elements. Either core element of strategic communication is enlightened through study of literatures. As a showcase the Second Karabakh War between Azerbaijan and Armenia is reviewed and studied. The outcomes achieved in the conclusion of the research proves the essence and importance of strategic communication in victory. [ABSTRACT FROM AUTHOR]
- Published
- 2023
19. The United States Special Operations Forces' Pivot to Great Power Competition and Its Implications for China.
- Author
-
Kai Liao
- Subjects
GREAT powers (International relations) ,NATIONAL security ,BELT & Road Initiative ,PRIVATE security services ,NON-state actors (International relations) ,INTEGRITY - Abstract
As the United States has made great power competition a central tenet of its national security strategy, the primary mission of the U.S. Special Operations Forces (SOF) has shifted from counterterrorism to great power competition accordingly. SOF's capabilities in the information domain, and its relationships with sub-state and non-state partners are major advantages in the "gray zone." Three branches of SOF are major actors operating in the gray zone: psychological operations forces that conduct information and psychological warfare in remote regions; civil affairs soldiers who gather intelligence and carry out influence operations in remote and politically sensitive regions; Special forces that motivate and advise local forces to conduct proxy operations for the United States. SOF's pivot to great power competition can threaten China's overseas interests, destabilize its periphery, and challenge its territorial integrity. In response, some Chinese private security companies (PSCs) are developing information capabilities and cultivating relationships with sub-state and non-state actors to compete for influence with SOF. The potential rivalry between SOF and Chinese PSCs may turn countries along the Belt and Road Initiative into playgrounds for great power competition and increase the possibility of armed conflicts between the two great powers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. INFORMATION WARFARE, MEDIA AND CIVILIANS.
- Author
-
Tomsu, Miroslav, Dzermansky, Martin, Cajkova, Nikola, and Wanecki, Pavel
- Subjects
- *
INFORMATION warfare , *MILITARY science , *INFORMATION & communication technologies , *DATA transmission systems , *ARMED Forces - Abstract
The progress in information and communication technologies in the transmission and sharing of data has fundamentally affected the armed forces, not only in terms of the development of information systems, control, and fire control systems but also in the conduct of war. The topic of the article is information warfare. The aim is to explain the meaning and concept of information warfare and to analyse the purpose of information warfare and its development in future security operations. The article first deals with the mutual relationship between information and military science and their concept of information. It continues with the characteristics of individual forms of information warfare, including the ways of conducting them. It explains the possible consequences of its action from information point of view. The benefit is considering the further possible development of some forms of information warfare and predicting probable implications in the event of their use. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Hibrid - concept definitoriu al războaielor, operațiilor și amenințărilor specifice secolului 21.
- Author
-
LUPULESCU, Georgiana-Daniela
- Subjects
WAR ,MILITARY science ,AMBIGUITY ,DISINFORMATION - Abstract
Copyright of Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I' is the property of Carol I National Defence University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
22. Issues of Resilience to Cyber-Enabled Psychological and Information Operations
- Author
-
Petra Mlejnková
- Subjects
information operations ,psychological operations ,information environment ,resilience ,cognitive resilience ,society-centric approach ,Military Science - Abstract
This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations. It presents the options currently available to an adversary to exploit the vulnerability of the information environment, chiefly the cognitive vulnerabilities of target groups. Thus, hostile interests are often pursued through manipulation, using disinformation, propaganda, algorithms and artificial intelligence. In the light of these developments, the article defines a society-centric approach, in which societal and human resilience are emphasised.
- Published
- 2022
- Full Text
- View/download PDF
23. Considerations on the role of information (-psychological) operations in Russian military thinking
- Author
-
Eveline MĂRĂȘOIU
- Subjects
psychological operations ,Russian thinking ,reflexive control ,Asymmetry ,Initial Period of War. ,Military Science ,International relations ,JZ2-6530 - Abstract
Russian military thinking and strategic documents attribute information warfare (and its associated concepts) to external authors only. This creates a vacuum in terms of how Russia actually implements itself information-psychological operations and how this fits into the broader Russian military thinking. This article looks at how information (-psychological) operations (IOs) are applied pragmatically through the prism of specific and well-established Russian concepts, such as Reflexive Control, Asymmetry and Initial Period of War, with a specific focus on the current conflict in Ukraine. It also looks at specific capabilities and formation in the field of IOs, as pertaining to the military field.
- Published
- 2023
- Full Text
- View/download PDF
24. Some Features of Information Support for Military Operations.
- Author
-
Zolotarev, P. S.
- Abstract
The Special Military Operation conducted in Ukraine showed not only the unsatisfactory state of the information support of the operation, but also revealed some new features that need to be taken into account. The article does not set the task of analyzing the reasons for the weak information support of the operation. However, attention is drawn to the fact that at the level of doctrinal documents, namely the Military Doctrines of Russia in 2010 and 2014, there is a negative trend in the objectivity of assessments of the features of modern military conflicts in terms of their information support. Among the manifested features of information support of operations, attention is drawn to a sharp reduction in the time of effectiveness of disinformation measures and the inadmissibility of substituting information operations planning with propaganda activities. The effectiveness of using the consolidation of the capabilities of space systems for various purposes in support of one of the conflicting parties and capable of having a significant impact on the success of military operations is noted. A number of recommendations aimed at bringing in line with the requirements of the time of planning and organization of information operations in Russia are formulated. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. INFLUENCE OPERATIONS, BETWEEN THE ETHICAL AND CRITICAL FACET.
- Author
-
AVĂDĂNEI, Angela-Karina
- Subjects
PROPAGANDA ,PRIMARY audience ,AUDIENCES - Abstract
The psychological operations (PSYOPS) doctrines of many NATO member states, including Romania, do not allow the use of influence activities on internal audiences. While this is an ethical provision, difficulties arise when formulating an adequate counter-propaganda strategy, as domestic groups that are susceptible to influence are targeted by an effective propaganda conducted by the adversary. The 2014 edition of the NATO doctrine on PSYOPS (psychological operations) was ambiguous with regard to this limitation, while the Romanian doctrine from 2016 kept it, in accordance with the older NATO doctrine from 2007. With this limitation PSYOPS risk being ineffective in countering propaganda, their role being restricted to analysing the effects of the propaganda on the audiences and making recommendations to counter it. Without using influence activities, the recommendations would be, based on the scenario, addressing the public or not (choosing “silence”) with information activities through the responsible structures. Going further, inform and influence activities (IIA) intertwine, which leads to the need for more clarity in the doctrines that regulate their employment. The propaganda of the Russian Federation in Donbas, that victimised the separatists leading to their support for the invasion of Ukraine is a relevant example for situations when PSYOPS should be allowed to target internal audiences. The present paper does not go into detail on the case of Ukraine but problematises on the above-mentioned ethical limitation that has the advantage of giving the adversary advantages on multiple levels. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Editorial: The age of mass deception: Manipulation and control in digital communications
- Author
-
Daniel Broudy and Richard G. Ellefritz
- Subjects
deception ,manipulation ,psychological operations ,internet memes ,digital communication ,deepfake ,Communication. Mass media ,P87-96 - Published
- 2022
- Full Text
- View/download PDF
27. The Impact of Organizational Design and Leadership on Strategic Communications.
- Author
-
Evans, Amber
- Subjects
- *
STRATEGIC communication , *INFORMATION warfare , *LEADERSHIP , *NATIONAL interest - Abstract
Information warfare, including strategic communications, is becoming ever more crucial in defending national interests and competing globally. Therefore, organizations are increasingly employing strategic communications within the information environment to pursue the organization's mission and goals. Unfortunately, many organizations lack strategic, structural, and environmental alignment, resulting in reduced efficiency and effectiveness of strategic communications. This article explores the current structure of many organizations defending and competing in a turbulent information environment, proposes a different configuration that balances efficiency and effectiveness, outlines the importance of innovation, and emphasizes the strategic role of leadership throughout the organization and change process. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. TEXTS, TWEETS, AND TACTICAL STRIKES: RUSSIAN INFORMATION WARFARE METHODS AND IMPLICATIONS FOR THE UNITED STATES AND NATO
- Author
-
Jasper, Scott E., Maness, Ryan, National Security Affairs (NSA), Defense Analysis (DA), Chesley, Brendan J., Jasper, Scott E., Maness, Ryan, National Security Affairs (NSA), Defense Analysis (DA), and Chesley, Brendan J.
- Abstract
The character of warfare is constantly evolving, beset by friction and clouded with relentless ambiguity. This study explores the rapidly changing operational environment through a focused analysis of the Kremlin’s military adventurism in Georgia, Syria, and Ukraine. This recently escalated conflict, encompassing the largest front on the European continent unseen since the Second World War, provides valuable insights into the complexity of warfare’s changing character. Specifically, the Kremlin’s evolving approach to Information Warfare reveals a proliferation of new technologies and means that seek to contest the information domain, maximize uncertainty, and paralyze the decision-making ability of their adversaries. This thesis addresses the following questions: 1) What new technological capabilities has the Kremlin employed to create psychological effects and disrupt decision-making at tactical and operational levels? 2) How effective are these methods, and how do they fit within a broader concept of Information Warfare? In addressing these questions, this research will trace the Kremlin’s post-2008 reforms and determine what enduring aspects of Russian Information Warfare (namely cyber, unmanned systems, and EMSO) tell us about the current operational environment. Finally, this research demonstrates how these observed methods may shape the future battlespace, and what wider tactical and operational implications these threats pose to the U.S. and her strategic partners., Major, United States Marine Corps, Approved for public release. Distribution is unlimited.
- Published
- 2023
29. Метод виявлення агентів соціальних мереж, що мають найбільший вплив
- Subjects
target audiences ,social networks ,соціальні мережі ,пошукова система ,social network agents ,psychological operations ,психологічна операція ,search system ,цільові аудиторії ,агенти соціальних мереж - Abstract
The article presents a method for identifying social network agents that have the greatest impact on a given target audience. The method combines data on the number of publications on a specific topic and the number of connections between agents in the social network. The comprehensive indicator described in the method characterizes the potential number of acts of disseminating information from the social network agent with the greatest influence to other agents in the social network who have connections with them. The method consists of five stages and can be useful for professionals in analyzing the impact of social network agents on target audiences during psychological operations. Using the search system SOFIYA, sets of social network agents that have the greatest impact were investigated, and who disseminate informational materials on two specified topics. Additionally, social network agents with the greatest impact were classified according to the type of their network activity, and their roles as posters, re-posters, commenters, and likers were determined., У статті розроблений метод виявлення агентів соціальних мереж, що мають найбільший вплив на визначену цільову аудиторію, який поєднує данні про кількість публікації за визначеною тематикою і кількість зв’язків агентів в соціальній мережі. Комплексний показник, що описаний у методі, характеризує потенційну кількість актів доведення інформаційних матеріалів від агента соціальної мережі, що має найбільший вплив, до інших агентів соціальної мережі, що мають з ним зв’язки. Метод складається з п'яти етапів та може бути корисним для фахівців під час аналізу впливу агентів соціальних мереж на цільові аудиторії при проведенні психологічної операції. За допомогою пошукової системи SOFIYA були досліджені множини агентів соціальної мережі, що мають найбільший вплив, які розповсюджують інформаційні матеріалі за двома визначеними тематиками. Також була проведена класифікація агентів соціальної мережі, що мають найбільший вплив, за видом їх мережевої активності та визначено їх ролі як постер, репостер, коментатор та той, що робить вподобання.
- Published
- 2023
30. A Russian Psyops Vehicle Rolled Toward Avdiivka, Trying To Lure Ukrainians Into Captivity. It Didn't Work.
- Author
-
Axe, David
- Subjects
CAPTIVITY ,UKRAINIANS ,PRISONERS of war ,LOUDSPEAKERS - Abstract
'There is no point in resisting,' was the message from the loudspeakers on the Russian ZS-88, a variant of the wheeled BTR-80 fighting vehicle. The Ukrainians ignored it. [ABSTRACT FROM AUTHOR]
- Published
- 2024
31. TEXTS, TWEETS, AND TACTICAL STRIKES: RUSSIAN INFORMATION WARFARE METHODS AND IMPLICATIONS FOR THE UNITED STATES AND NATO
- Author
-
Chesley, Brendan J., Jasper, Scott E., Maness, Ryan, and National Security Affairs (NSA), Defense Analysis (DA)
- Subjects
information dominance ,electronic warfare ,information warfare ,OIE ,information superiority ,cyber ,IO ,psychological operations ,C4I ,contested information environment ,Russia ,cyber strategy ,IW ,PSYOP ,information domain ,information operations ,operations in the information environment ,EW ,military deception ,MILDEC - Abstract
The character of warfare is constantly evolving, beset by friction and clouded with relentless ambiguity. This study explores the rapidly changing operational environment through a focused analysis of the Kremlin’s military adventurism in Georgia, Syria, and Ukraine. This recently escalated conflict, encompassing the largest front on the European continent unseen since the Second World War, provides valuable insights into the complexity of warfare’s changing character. Specifically, the Kremlin’s evolving approach to Information Warfare reveals a proliferation of new technologies and means that seek to contest the information domain, maximize uncertainty, and paralyze the decision-making ability of their adversaries. This thesis addresses the following questions: 1) What new technological capabilities has the Kremlin employed to create psychological effects and disrupt decision-making at tactical and operational levels? 2) How effective are these methods, and how do they fit within a broader concept of Information Warfare? In addressing these questions, this research will trace the Kremlin’s post-2008 reforms and determine what enduring aspects of Russian Information Warfare (namely cyber, unmanned systems, and EMSO) tell us about the current operational environment. Finally, this research demonstrates how these observed methods may shape the future battlespace, and what wider tactical and operational implications these threats pose to the U.S. and her strategic partners. Major, United States Marine Corps Approved for public release. Distribution is unlimited.
- Published
- 2022
32. Social networks as means of influence in hybrid conflicts
- Author
-
Mlinac, Nikola and Lasić-Lazić, Jadranka
- Subjects
kiber prostor ,social networks ,cyberspace ,Computer science and technology. Computing. Data processing ,psychological operations ,hybrid impact operations ,algorithms ,hibridna inteligencija ,dezinformacije ,umjetna inteligencija ,udc:004(043.3) ,društvene mreže ,informacijske strategije ,hibridne operacije utjecaja ,hybrid conflicts ,hybrid intelligence ,psihološke operacije ,information strategies ,hibidni sukobi ,artificial intelligence ,disinformation campaigns ,SOCIAL SCIENCES. Information and Communication Sciences ,disinformation ,algoritmi ,DRUŠTVENE ZNANOSTI. Informacijske i komunikacijske znanosti ,Računalna znanost i tehnologija. Računalstvo. Obrada podataka ,hybrid defence ,dezinformacijske kampanje ,hibridna obrana - Abstract
Rezultat istraživanja prikazan je u šest glavnih dijelova: „Informacijski prostor i novi obrasci organiziranja podataka i informacija“, „Informacijske strategije, društvene mreže i operacije utjecaja u kiber prostoru“, „ Hibridni sukobi i novi instrumenti moći u kiber prostoru“, „Novi instrumenti moći: hibridne prijetnje i hibridne operacije“, „Hibridne operacije u hibridnim sukobima i hibridnom ratovanju“ te „Novi obrasci prevencije i obrane od hibridnih prijetnji“. U prvom dijelu društvene mreže promatraju se kao snažni i učinkoviti komunikacijski i medijski alati za globalnu, masovnu, umreženu, neposrednu i anonimnu komunikaciju, koji se u kiber prostoru koriste i za učinkovito nametanje ideja, ideologija te za stvaranje i širenje dezinformacija. U drugom dijelu opisana je izvršena prilagodba informacijskih strategija i informacijskih operacija te su opisani novi obrasci planiranja, provođenja i djelovanja psiholoških i medijskih operacija u kojima različiti akteri (državni, nedržavni i korporativni) tehnologije umjetne inteligencije na društvenim mrežama zloupotrebljavaju za vlastite potrebe i interese. U trećem dijelu disertacije prikazani su uzroci i nastanak hibridnih sukoba, definicije i glavna obilježja. Potom su prikazane hibridne prijetnje i hibridne operacije utjecaja kao novi instrumenti moći u kiber prostoru koji su nastali kao posljedica zloupotrebe kiber prostora i tehnologija umjetne inteligencije na društvenim mrežama. Društvene mreže u ovom dijelu istraživanja promatraju se kao alati kojima se planiraju i provode hibridne operacije utjecaja koje se pak promatraju kao glavni informacijski instrument hibridne moći koji najsnažnije učinke ostvaruje kroz kiber prostor i služi za stvaranje snažnih i učinkovitih dezinformacija te ostalih vrsta hibridnih prijetnji. U petom dijelu disertacije prikazani su rezultati istraživanja povezani s reprezentativnim uzorkom poznatih i priznatih primjera zloupotreba tehnologija umjetne inteligencije na društvenim mrežama za planiranje i izvođenje hibridnih operacija utjecaja. Primarno se istražuju hibridne operacije utjecaja koje su izvodile Sjedinjene Američke Države i Ruska Federacija na različitim geografskim područjima i u različitim kontekstima. U šestom dijelu disertacije predloženi su novi obrasci prevencije i obrane od hibridnih prijetnji i operacija, izrada nove informacijske strategije te su predloženi mehanizmi i modeli obrane. Na kraju ovog dijela ukazano je na važnost i ulogu izgradnje digitalne i podatkovne suverenosti. Istraživanjem je potvrđena glavna hipoteza. Tehnologije umjetne inteligencije i društvene mreže u hibridnim sukobima koriste se kao snažni i učinkoviti taktički alati s potencijalnim strateškim posljedicama nad korpusom javnog znanja ciljanih publika u svrhu njegovog (pre)oblikovanja prema potrebama informacijskog napadača. Prikazano je da se radi o psihološkim operacijama strateškog karaktera u kojima se tehnologije umjetne inteligencije i sve društvene mreže, u prostorno i vremenski neograničenom opsegu, koriste kao dominantni i učinkoviti taktički alati, za stvaranje dezinformacija, različitih vrsta hibridnih prijetnji te konstantnih (24/7) informacijsko-psiholoških pritisaka usmjerenih prema ciljanim publikama (pojedinačno, grupno ili masovno), ovisno o potrebama i ciljevima informacijskog napadača. The results of the research are presented in six main parts, as follows: “Information space and new patterns of data and information organization”, “Information strategies, social networks and influence in cyberspace”, “Hybrid conflicts and new instruments of power in cyberspace”, “New instruments of power: hybrid threats and hybrid operations”, “Hybrid operations in hybrid conflicts and hybrid warfare” and “New patterns of prevention and defence against hybrid threats”. In the first part, social networks are considered as powerful and effective means of communication and media for global, mass, networked, direct and anonymous communication, which are used in cyberspace to effectively impose ideas, ideologies and create and spread disinformation. The second part describes the adjustment of information strategies and information operations, and describes new patterns of planning, implementation and operation of psychological and media operations in which various actors (state, non-state and corporate) use artificial intelligence technologies on social networks for their own needs and interests. The third part of the dissertation presents the causes and occurrence of hybrid conflicts, their definitions and main features. Then, hybrid threats and hybrid operations of influence are presented, as new instruments of power in cyberspace that have emerged as a result of cyberspace misuse and artificial intelligence technologies on social networks. In this part of the research, we observe social networks as means of planning and conducting hybrid influence operations, which we consider here as the main information instrument of hybrid power, that achieves the strongest effects through cyberspace and serves to create strong and effective disinformation and other types of hybrid threats. The fifth part of the dissertation presents the results of research related to a representative sample of known and recognized examples of misuse of artificial intelligence technologies on social networks for planning and conducting hybrid impact operations. The primary scope of research relates to the hybrid influence operations carried out by the United States and the Russian Federation in different geographical areas and in different contexts. The sixth part of the dissertation proposes new patterns of prevention and defence against hybrid threats and operations, the creation of a new information strategy, and defence mechanisms and models. The end of this section points out the importance and the role of building digital and data sovereignty. The research confirmed the main hypothesis. Artificial intelligence and social networking technologies in hybrid conflicts are used as powerful and efficient tactical tools, with potential strategic consequences for the body of public knowledge of target audiences, in order to (re)shape it according to the needs of the information attacker. We have demonstrated that these are psychological operations of a strategic nature, in which artificial intelligence technologies and all social networks are used as dominant and effective tactical means, in a spatially and temporally unlimited range, to create disinformation and other various types of hybrid threats and constant (24/7) informationpsychological pressures directed at target audiences (individually, in groups or en masse) depending on the needs and goals of the information attacker.
- Published
- 2022
33. ANALYZING KEY COMMUNICATORS
- Author
-
Houck, Shannon C., Burks, Robert E., Defense Analysis (DA), Wingate, Alexander R., Gerik, Kyle M., Benson, John A., Houck, Shannon C., Burks, Robert E., Defense Analysis (DA), Wingate, Alexander R., Gerik, Kyle M., and Benson, John A.
- Abstract
As history has shown, members of social groups trust select individuals who can access information and provide persuasive perspectives. Known by the Department of Defense as key communicators, these personalities maintain a great deal of influence deriving their authority from various official, cultural, religious, and social statuses within their respective communities. Although psychological operations and other national security personnel understand their value, current government training and processes do not adequately address the need for effective analysis of key communicators. The purpose of this research is to develop a foundational PSYOP analytical process to improve how practitioners select key communicators to support military objectives. Drawing from academic theories, scientific processes, and the experience of military service members, how can PSYOP personnel analyze key communicators to leverage their social networks? The research reviewed relevant theories, systems, processes, techniques, and procedures to develop the key communicator analytical process (KCAP). This process and its associated tool were designed to guide practitioners as they identify, categorize, organize, visualize, and evaluate relevant qualitative and quantitative communicator and audience variables to yield an appropriate index score with which to compare against others. Finally, this tool was applied to a historical case study to validate its functionality in future operational settings., Major, United States Army, Major, United States Army, Major, United States Army, Approved for public release. Distribution is unlimited.
- Published
- 2022
34. EDUCATIONAL SPECIAL OPERATIONS WARGAME
- Author
-
Burks, Robert E., Crenshaw, John, USAJFKSWCS, Defense Analysis (DA), Plotkin, Alex E., Plotkin, Barbara J., Burks, Robert E., Crenshaw, John, USAJFKSWCS, Defense Analysis (DA), Plotkin, Alex E., and Plotkin, Barbara J.
- Abstract
The role of special operations is becoming increasingly more critical within Multi-domain Operations (MDO). Special operations forces (SOF) are the predominant persistent military presence globally. SOF will continue to facilitate an accurate understanding of the operational environment for decision makers, shaping the environment to prevent armed conflict and, when necessary, providing a marked advantage for the general-purpose force over an adversary to return to competition quickly. In addition, SOF remains the force of choice for the DOD for countering violent extremist organizations and must balance that responsibility with their role in competition with near-peer adversaries. Currently, U.S. Army Special Warfare and School is modernizing and optimizing each Qualification Course. The Army Special Operations (ARSOF) Captains Career Course (CCC) has recently modified its curriculum to include SOF-specific training to best prepare future ARSOF leaders to employ Special Forces, Civil Affairs, and Psychological Operations within the MDO construct. This wargame is designed for the new ARSOF officers who attend the ARSOF CCC. The wargame allows the students to work within a simulated multi-domain environment applying the course curriculum and SOF doctrine within the constraints of the course that has limit time, resources, and personnel. The goal of the wargame is to assist SOF captains as they prepare to take operational teams overseas in operational and combat deployments., 2nd SWTG/ USAJFKSWCS, Outstanding Thesis, Major, United States Army, Major, United States Army, Approved for public release. Distribution is unlimited.
- Published
- 2022
35. IDENTIFYING INFLUENCERS FOR PSYOP
- Author
-
Houck, Shannon C., Cunningham, Daniel T., Defense Analysis (DA), Ware, Charles M., III, Siebenaller, Aaron, Houck, Shannon C., Cunningham, Daniel T., Defense Analysis (DA), Ware, Charles M., III, and Siebenaller, Aaron
- Abstract
Social media has become one of the primary modes of communication throughout the world, especially in developed countries. Nearly every user of social media in its various forms or applications has an audience he or she can influence and a set of influencers from which he or she receives information. U.S. Psychological Operations (PSYOP) personnel focus on influencing foreign target audiences in their audience’s own language but have been slow to adapt to the use of social media as a means of influence. Drawing from principles used in influencer marketing, we ask, How can U.S. PSYOP forces and their partners best identify social media influencers with whom they can partner in their effort to change the behavior of foreign target audiences? Through this study, we identified the main factors for influence on social media using both quantitative and qualitative analysis and developed a decision-making tool to identify the key communicators, in particular social media influencers, who can elicit the desired behavioral change in a target audience. The seven-category influencer scorecard we created provides a low-tech, situationally adaptable method for identifying influencers with whom U.S. PSYOP can partner to execute a PSYOP series., Major, United States Army, Major, United States Army, Approved for public release. Distribution is unlimited.
- Published
- 2022
36. ANALYZING KEY COMMUNICATORS
- Author
-
Wingate, Alexander R., Gerik, Kyle M., Benson, John A., Houck, Shannon C., Burks, Robert E., and Defense Analysis (DA)
- Subjects
key communicators ,social network analysis ,key communicator analytical process ,KCAP ,social identity theory ,influencers ,psychological operations ,social exchange theory ,social movement theory ,PSYOP ,key communicator analytical tool ,social capital ,information environment ,communication cycle - Abstract
As history has shown, members of social groups trust select individuals who can access information and provide persuasive perspectives. Known by the Department of Defense as key communicators, these personalities maintain a great deal of influence deriving their authority from various official, cultural, religious, and social statuses within their respective communities. Although psychological operations and other national security personnel understand their value, current government training and processes do not adequately address the need for effective analysis of key communicators. The purpose of this research is to develop a foundational PSYOP analytical process to improve how practitioners select key communicators to support military objectives. Drawing from academic theories, scientific processes, and the experience of military service members, how can PSYOP personnel analyze key communicators to leverage their social networks? The research reviewed relevant theories, systems, processes, techniques, and procedures to develop the key communicator analytical process (KCAP). This process and its associated tool were designed to guide practitioners as they identify, categorize, organize, visualize, and evaluate relevant qualitative and quantitative communicator and audience variables to yield an appropriate index score with which to compare against others. Finally, this tool was applied to a historical case study to validate its functionality in future operational settings. Major, United States Army Major, United States Army Major, United States Army Approved for public release. Distribution is unlimited.
- Published
- 2022
37. Hybridní hrozby: Osvědčené postupy pro potírání dezinformací a propagandy
- Author
-
Lopez, Antoine Louis Marie, Střítecký, Vít, and Ludvík, Jan
- Subjects
Ukraine ,revisionism ,revizionismus ,Rusko ,migrace ,Informační válka ,Ukrajina ,COVID-19 ,Russia ,psychologické operace ,migration ,Information warfare ,psychological operations - Abstract
This thesis examines the extent of Russian information warfare efforts targeted at the West in recent years, highlighting the strategic use of information warfare by Russia to destabilize the West. Information warfare, which consists of but is not limited to disinformation, misinformation, demoralization, and psychological operations, as well as the overall concept of revisionism, and sources of revisionist thought in modern Russia, are detailed through a theoretical discussion. This discussion highlights the cultural and geographically based notions that blur a wholistic understanding of these concepts, particularly in their Russian application. Four case studies, focusing on Russian information warfare attempts surrounding COVID-19, migration crises, and the ongoing war in Ukraine, serve to demonstrate the danger posed by Russia's information warfare capabilities, by analyzing the origins, goals, targets, and methods of these attempts. The research conducted leads to multiple conclusions. First, Russian information warfare campaigns are successful when they exploit existing feelings or emotions but have so far not been able to create entirely new ones, whether anger or fear. Second, recent proactive efforts to thwart Russian information warfare in the West have so far been successful. Third,...
- Published
- 2022
38. Υβριδικός Πόλεμος
- Subjects
Psychological operations ,Ψυχολογικές Επιχειρήσεις ,War ,Υβριδικός ,Πόλεμος ,Hybrid - Abstract
Στόχος της παρούσας διπλωματικής εργασίας είναι να σκιαγραφήσει την εξέλιξη των πολεμικών επιχειρήσεων στη σύγχρονη εποχή μέσα από αυτό που η τρέχουσα βιβλιογραφία ονομάζει υβριδικές. Παρόλο που ο όροι υβριδικές επιχειρήσεις και υβριδικός πόλεμος αποτελούν νεολογισμούς η ουσία τους συναντάται ήδη από την εποχή της αρχαιότητας με χαρακτηριστικό παράδειγμα τη χρήση του Δούρειου ίππου στον Tρωικό πόλεμο. Το πνεύμα του Υβριδικού Πολέμου έγκειται πέρα των συμβατικών μέσων διεξαγωγής των πολεμικών επιχειρήσεων με την αξιοποίηση μεθόδων τακτικών και όπλων τα οποία δεν συγκαταλέγονται στα παραδοσιακά έχοντας ως απώτερο στόχο την επίτευξη πολιτικών σκοπών. Με αυτό το τρόπο διαδίκτυο, μέσα μαζικής ενημέρωσης, μη κρατικοί δρώντες, οργανώσεις, εξεγέρσεις, οικονομικές εξαρτήσεις μεταξύ κρατών, εγκληματικότητα αλλά και τρομοκρατία δύναται να εργαλειοποιηθούν και να αποτελέσουν μερικά από τα εργαλεία προς εκμετάλλευση αυτού του σκοπού στο πεδίο των υβριδικών επιχειρήσεων. Τέλος, υπό αυτό το πρίσμα, επιχειρείται η καλύτερη κατανόηση της δράσης των υβριδικών επιχειρήσεων, μέσω της παρουσίασης σχετικών ιστορικών παραδειγμάτων από τη ναζιστική Γερμανία και τη πυραυλική κρίση στη Κούβα μέχρι τη Κίνα και τις ρωσικές επιχειρήσεις στη Κριμαία, The purpose of this dissertation is to outline the evolution of “hybrid warfare”, a term that has become a household word in the current academic literature. Although the term hybrid operations and hybrid warfare are neologisms, their essential function is known from ancient times with the typical example of the Trojan horse. Hybrid Warfare transcends conventional weaponry and means in use for combat operations. It includes tactical methods and weapons utilized in order to obtain the ultimate goal of achieving specific political ends. Keeping that in mind, internet, media, non-state actors, organizations, uprisings, economic dependencies between states, crime, terrorism, etc. are potential weapons to be exploited in the field of hybrid warfare. Finally, from the «hybrid» point of view, relevant historical examples are presented from Nazi Germany and the Cuban Missile Crisis to China and Russian operations in Crimea
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.