794 results on '"PSYCHOLOGICAL OPERATIONS"'
Search Results
2. Operation Observant Compass and the Hunt for Joseph Kony: The Use of Special Operations Forces in Humanitarian Interventions.
- Author
-
Moriarty, Daniel
- Subjects
MILITARY medical personnel ,HUMANITARIAN intervention ,UNITED States armed forces ,GEOGRAPHIC information systems ,INTERVENTION (International law) - Abstract
Operation Observant Compass, the United States 2011–2017 military intervention in Central Africa to defeat Joseph Kony’s Lord’s Resistance Army, offers several lessons for students and practitioners of military geography. As opposed to previous humanitarian interventions, Operation Observant Compass featured a notably small force of roughly 100 special operations forces and support personnel. This special operations forces element, deployed to the tri-border region between the Democratic Republic of the Congo, South Sudan, and the Central African Republic, confronted an elusive enemy force in an operational area roughly 200 000 square kilometres in size. Using a mixedmethods approach, the study, on which this this article is based, argued that Operation Observant Compass resulted in a net positive humanitarian outcome despite failing to kill or capture Kony. First, using datasets on Lord’s Resistance Army attacks and Operation Observant Compass troop positions, this article presents a geospatial analysis of potential deterrence effects created by the deployment of special operations forces, such as the United States Special Forces or “Green Berets”. Second, using primary research conducted by the former psychological operations commander of Operation Observant Compass and the Ugandan People’s Defence Force counterpart, analysis is presented on the efficacy of psychological operations campaigns that sought to weaken the Lord’s Resistance Army through defections to regional security forces. The study also considered ancillary effects received through United States military medical personnel deployed in support of special operations forces, as well as a counterfactual argument in which United States forces were not directly deployed into the tri-border region. This article contributes to the existing literature by expanding understanding of a littlestudied chapter in foreign military deployments in sub-Saharan Africa, considering the nexus between use of special operations forces and humanitarian interventions. Methodologically, the use of a geographic information system argues for a consideration of geographical proximity between forces in creating a deterrent effect in “low-intensity” or irregular conflicts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. PSYCHOLOGICAL OPERATIONS DURING THE RUSSIAN WAR OF AGGRESSION IN UKRAINE.
- Author
-
STANCU, Marian Nicușor and CĂZĂNARU, George
- Subjects
- *
AGGRESSION (International law) , *UKRAINIANS , *SOCIAL networks , *DISINFORMATION , *WAR - Abstract
The article analyzes the way and motivation of the Russian Federation to carry out psychological operations in the war of aggression that it has unleashed in Ukraine from the perspective of the information environment. These operations are specific to the cognitive layer of the information environment and are aimed at influencing the perceptions, behavior, and decisions of both the Ukrainian population and the international community by using disinformation, propaganda, and manipulation. By analyzing these operations, it highlights how Russia has exploited the lack of robust regulation of social networks. The analysis underlines the importance of developing effective strategies to counter these operations by increasing information resilience and strengthening protection mechanisms against harmful external influences. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. COINTELPRO – program kontrwywiadowczy FBI z lat 1956–1971. Założenia, realizacja i ocena przez Komisję Churcha z 1976 roku – wybrane elementy.
- Author
-
Liber, Janusz
- Subjects
INTELLIGENCE service ,MASS surveillance ,WHISTLEBLOWERS ,WIRETAPPING ,CITIZENS - Abstract
Copyright of Security: Theory & Practice / Bezpieczeństwo.Teoria i Praktyka is the property of Andrzej Frycz Modrzewski Krakow University, AFM Publishing Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. Illustrative Examples of How to Measure Influence Operations: Experimental and Statistical Methods for Causal Inference.
- Author
-
Bryant, D. J.
- Subjects
CAUSAL inference ,NATIONAL security ,PSYCHOLOGICAL techniques ,EXPERIMENTAL design ,PROFESSIONAL employees - Abstract
National security influence professionals have always struggled with influence measures of effectiveness and operational assessments. This paper includes fictional examples that illustrate how experimental methods from psychological science can address this problem. Three fictional use cases are examined. A scientific approach to national security influence is essential to accumulating knowledge in this domain. Without it, the information operations community will continue to struggle to identify what works and why. [ABSTRACT FROM AUTHOR]
- Published
- 2024
6. How to Measure Strategic Influence: A New Science for National Security.
- Author
-
Bryant, D.
- Subjects
NATIONAL security ,EXPERIMENTAL design ,PROBLEM solving ,NATION-state - Abstract
The United States' national security strategy is an influence strategy--the effectiveness of which cannot be measured. The strategy's effectiveness is unmeasurable because influence operations still have not solved the assessment problem. The Department of Defense influence doctrine relies on unreliable practices from advertising and has never taken up a program of research to apply the very advanced psychological science of influence to the national security domain. Robust methods of operational design, variable control, and measurement are absent from national security influence, and there is no organization or mechanism to coordinate and deconflict operations across the whole of government. [ABSTRACT FROM AUTHOR]
- Published
- 2024
7. The Establishment of the Directorate Military Intelligence upon South Africa's Exit from the Commonwealth 1961-1971: In Pursuit of Recognition.
- Author
-
Pheiffer, Chris
- Subjects
INTELLIGENCE service ,MILITARY intelligence ,REFERENDUM ,ARCHIVAL resources ,DIPLOMATIC & consular service - Abstract
After South Africa had left the Commonwealth in 1961, the South African Defence Force had to develop its own intelligence capacity, as the British intelligence services ceased intelligence provision to South Africa. The Defence Force had limited experience in the field of intelligence as far as personnel, training and structures were concerned. It had no mandate, an insubordinate position in the higher military hierarchy, and no national legislation or departmental prescripts existed to direct its functions. Certain of its functions continuously migrated to other structures in the Defence Force, which hampered its development. Towards the end of the decade, the organisation was temporarily disbanded, and its functions taken over by a newly created Bureau of State Security. Despite these limitations, the Directorate Military Intelligence evolved into a comprehensive autonomous intelligence organisation over a period of ten years, directed by national legislation, and legitimised as one of the three principal intelligence organisations in South Africa. It performed the main intelligence functions as is globally accepted from the role of an intelligence organisation, viz. collection, analyses, counter-intelligence, and covert action. This article will provide a narrative, based mainly on primary archival sources, of the evolution of Directorate Military Intelligence between 1961 and 1971 despite the developmental challenges it faced. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Tom Sawyer as Philosopher: Lying and Deception on the Mississippi
- Author
-
Fallis, Don, Kowalski, Dean A., editor, Lay, Chris, editor, S. Engels, Kimberly, editor, and Johnson, David Kyle, Editor-in-Chief
- Published
- 2024
- Full Text
- View/download PDF
9. Information Operations and Social Media: Case Study of Indian Chronicles and Options for Pakistan
- Author
-
Maheen Shafeeq
- Subjects
Social Media ,Information Operations ,Psychological Operations ,Intelligence ,Surveillance ,Indian Chronicles ,Military Science ,Political science - Abstract
In the era of digital media, states have resorted to social media to pursue several agendas. In this regard, this paper sheds light on the evolving strategies of intelligence, surveillance and Information Operations (IO) conducted through social media sites. The paper examines various strategies of IO mentioned in U.S. military documents encompassing Military Deception (MILDEC), Computer Network Operations (CNO), Operations Security (OPSSEC), and Psychological Operations (PsyOps). The paper specifically evaluated the role of social media in PsyOps and coined the term Social Media PsyOps (SMPsyOps). It analyses how the Indian government employed these tactics to conduct IO against Pakistan unveiled in the Indian Chronicles by EU DisinfoLab. The paper argues that social media has become an open source of intelligence for conducting of IO by India and influencing opinions and perceptions of Pakistan in Western capitals. This has impacted Pakistan and therefore the paper recommends measures for the government of Pakistan on how to counter the growing Indian network of IO.
- Published
- 2024
- Full Text
- View/download PDF
10. Psychological and propaganda operations as a form of hybrid warfare
- Author
-
Parezanović Marko and Proroković Dušan
- Subjects
psychological operations ,propaganda operations ,hybrid war ,conventional war ,Social pathology. Social and public welfare. Criminology ,HV1-9960 - Abstract
Psychological and propaganda operations are inseparable part of hybrid warfare. The rapid complication of overall relations in the international community, especially since the beginning of 2022, has led to tectonic upheavals in the world order, which have caused numerous changes in front of our eyes. The world is changing today, perhaps faster than ever. In such complex political and security, economic and social circumstances, models of hybrid warfare gained additional importance and in a certain way, conditionally speaking, became an inseparable part of the foreign policy of the leading powers. In addition, hybrid actions of a psychological and propaganda nature have become an inseparable part of international relations. This paper first analyses the conceptual definition of the terms hybrid war, psychological and propaganda operations, and then explains the cause-and-effect relationships and examines their consequences on the offensive and defensive actors of international relations. Among the conclusions is the assertion that defensive actors may be completely unaware that a hybrid war is actually being waged against them by undertaking psychological and propaganda operations.
- Published
- 2024
- Full Text
- View/download PDF
11. THE EFFECTIVE APPLICATION OF STRATEGIC COMMUNICATION IN THE FIELD OF NATIONAL SECURITY
- Author
-
Rashadat ORUJOV and Vugar MAMMADZADA MAHAMMADALI
- Subjects
strategic communication ,information operations ,psychological operations ,public affairs ,national security ,Military Science - Abstract
The research is dedicated to “Strategic Communication” and its elements. Either core element of strategic communication is enlightened through study of literature. As a showcase the Second Karabakh War between Azerbaijan and Armenia is reviewed and studied. The outcomes achieved in the conclusion of the research prove the essence and importance of strategic communication in victory.
- Published
- 2023
12. Paradojas del Trumpismo, la crisis del fentanilo y la guerra contra los cárteles.
- Author
-
Correa-Cabrera, Guadalupe
- Subjects
- *
FOREIGN electoral interference , *INTERVENTION (International law) , *PHARMACEUTICAL policy , *TRUMPISM , *BORDER security - Abstract
The present article analyzes the construction of a key foundation of the movement (or ideology) known as "Trumpism" (or "Trumpist"), which is linked to the United States' drug policy and its relationship with Mexico. Firstly, it describes the origins of an anti-narcotics and border security strategy proposed by former President Donald Trump in 2017 and amplified by sympathetic politicians and supporters who consider a possible military intervention in Mexico as an electoral strategy in 2024. This analysis highlights the elements of misinformation and propaganda of the Trumpist strategy and revisits the use of psychological operations--outlined from the perspective of the U.S. Army manuals and the Central Intelligence Agency (CIA)--as a tool for persuasion and electoral marketing. The text serves as an analytical framework to explain part of the political discourse of Trumpism within the context of the 2024 elections. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Fear and Loathing in Luhansk.
- Author
-
Tyndall, Euan
- Abstract
This article is an exploration of Psychological Operations, focusing on both the role which fear plays in Psychological Operations, and how the Russian Federation employed Psychological Operations in the War in Ukraine (2014–2021). A qualitative methodology is used to explore fear as a neurological, psychological and social phenomenon, and how it may be utilised in Psychological Operations. The author finds that Russia's initial use of Psychological Operations was focused on making tactical gains against the Ukrainian military. Shock tactics, combined with strategic messaging, encouraged mass defections from the Ukrainian army and border guard, significantly degrading the combat effectiveness of Kyiv's forces, and increasing the likelihood of victory for the Donbass secessionists. The case study is limited in scope to 2014–2021. The paper can thus be read as both an analysis of one element of Russia's shaping phase prior to the 2022 invasion, and/or a framework for analysing the current stage of conflict. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. The Theory of Transitional Target Defence: A New Approach to Enhancing Cyber Deception.
- Author
-
Turner, B. R., Ryan, R., Karie, N., and Guidetti, O.
- Subjects
DENIAL (Psychology) ,DECEPTION ,COMPUTER network security ,CYBERTERRORISM - Abstract
There have been many different approaches to implementing deceptive devices, but it is the contention of this paper that fundamentally every incarnation suffers from the same issue: it remains a deceptive device. As the use of deceptive devices has increased, attackers have become more aware of the threat they pose and have become more adept at detecting deceptive devices. This paper presents a new approach to enhancing cyber deception called Transitional Target Defence (TTD). TTD does not present a deceptive device for an attacker to reconnoitre but rather allows interaction with targets until the exploitation phase. Once the hostile traffic is detected, the attacker is redirected to a deceptive device. The authors discuss the utility of this technique in this paper and the increased complexity of the psychological theatre that comes with it. [ABSTRACT FROM AUTHOR]
- Published
- 2024
15. Jihādi Intelligence Activities in the Digital Realm
- Author
-
Haberl, Ferdinand J., Heshmati, Almas, Series Editor, and Haberl, Ferdinand J.
- Published
- 2023
- Full Text
- View/download PDF
16. The Elimination of the Greyzone as a Jihādi Covert Operation
- Author
-
Haberl, Ferdinand J., Heshmati, Almas, Series Editor, and Haberl, Ferdinand J.
- Published
- 2023
- Full Text
- View/download PDF
17. Eurasian Security from the Perspective of the Concept of Information-Psychological and Cognitive Confrontation
- Author
-
I. F. Kefeli and R. S. Vykhodets
- Subjects
information warfare ,informational and psychological warfare ,propaganda ,psychological operations ,informational impact ,Social Sciences ,Finance ,HG1-9999 ,Law ,Economic theory. Demography ,HB1-3840 - Abstract
The article is devoted to the analysis of the cognitive aspect of information and psychological confrontation in the Eurasian space, as well as to the study of the evolution of ideas that are currently commonly referred to by the term “information and psychological and cognitive confrontation”.Aim. To identify the specifics of ensuring Eurasian security in the perspective of the concept of information-psychological and cognitive confrontation.Tasks. To identify the information and psychological component in the CSTO collective security strategy, to analyze practical steps at the CSTO level in the field of countering destructive information influence, to determine the regulatory, political and organizational prerequisites for the formation of the CSTO collective information and psychological security system.Methods. The research uses both general scientific methods: analysis, synthesis, induction, and a number of special methods and approaches: comparative analysis, methodology of critical geopolitics, content analysis, informational and historical approaches.Results. The study showed that the formation of the modern concept of information-psychological and cognitive confrontation was significantly influenced by theoretical and applied research related to the understanding of the role of psychological operations and the use of special means of influencing the human psyche in modern military conflicts, as well as scientific developments in the field of studying modern methods of manipulation and propaganda, expanding the arsenal of means of hybrid conflicts, the weaponization of digital technologies, the emergence of new dimensions of international conflicts. Its subject includes systems and tools for the formation of public opinion, the peculiarities of human perception of information, as well as the whole range of methods and means of influencing public opinion and the psyche of an individual in peacetime and in combat conditions with the use of special information and psychological operations of strategic, tactical, operational level, as well as soft power tools.Conclusions. Today, more and more countries of the world are paying increased attention to the issues of ensuring information and psychological security. The desire of the post-Soviet states to preserve the political, economic and socio-cultural ties developed during their life in a single state, within the framework of new integration formats, the CIS, the EAEU, the CSTO, is increasingly faced with the problem of choosing a vector of foreign policy. Therefore, combining national interests and collective efforts to develop and conceptualize a unified approach to ensuring information and psychological security at the level of the main Eurasian cooperation formats, such as the EAEU, the CSTO and the SCO, is a priority task in the modern conflict realities of world politics.
- Published
- 2023
- Full Text
- View/download PDF
18. (Mis)Understanding Afghanistan : an ethnographic examination of 'human elements' affecting the nexus between understanding and strategy in population-centric conflict
- Author
-
Gavriel, Alexei, Donnan, Hastings, and Sousa, Paulo
- Subjects
303.6 ,Afghanistan ,intelligence ,conflict ,human intelligence (HUMINT) ,counterinsurgency ,ethnographic intelligence (ETHINT) ,population-centric conflict ,Taliban ,civil affairs ,psychological operations ,strategic communication ,atmospherics ,human terrain ,ethnography ,cognitive anthropology ,psychological anthropology ,applied anthropology ,conflict zone research ,organisational ethnography - Abstract
(Mis)Understanding Afghanistan is an ethnographic examination of human elements affecting the nexus between understanding and strategy in population-centric conflict during the US/NATO engagement (2001-2015). Fieldwork traces processes of knowledge production that delineate three primary actor-groups of focus in the research: (1) 'those that collect data' - 'knowledge-producers' engaged in the production of 'understanding' of problems for decision-makers; (2) 'those data is collected for' - 'counterinsurgents' that consumed produced knowledge to devise problem-solving 'strategy'; and, (3) 'those data is collected on' - 'the population' that experienced the 'application' of understanding and strategy in their local communities. Divided into two parts, the body of the study maintains a holistic perspective through utilisation of a 'zoom-in/zoom-out' approach centred around aspects of the inquiry that affect each group of actors, examining them individually, and then the interaction as a whole. Part I provides a zoomed-out orientation of the inter-related ethnographic contexts of the inquiry: first, the 'historical context' of Afghanistan's cultural and political past that would shape its present from pre-history up until the events of 9/11; second, the 'situational context' of US-led counterinsurgency in Afghanistan (2001-2015) with focus on periodised changes in strategy that are then reflected back to Afghanistan's ethnographic record; third, the 'institutional context' of US security and intelligence organisations from WWII, to the end of the Cold War, and into the post-9/11 era with focus on changing institutional attitudes and competencies towards human and technological aspects of understanding and strategy. Part II zooms-in from these wider ethnographic contexts to the field where the initiating chapter establishes how these issues manifested in the context of the fieldwork environment and were experienced amongst each actor-group. It then zooms-in further with three corresponding chapters focused on specific issues related to understanding, strategy, and application: the first, on 'understanding', examines sources of population-centric understanding utilised by counterinsurgents in Afghanistan to inform strategy; the second, on 'strategy', examines counterinsurgent institutional culture and dysfunction that imposed barriers to the formulation of effective strategy; the third, on 'application', examines how the absence or presence of different forms of understanding enabled or hindered the development of effective strategy, as experienced in localised settings throughout Afghanistan. The conclusion zooms-back-out to examine the wider view of how these issues are interrelated through combining all of the above factors in an analysis of 'human problems' and the nexus between understanding and strategy.
- Published
- 2021
19. THE EFFECTIVE APPLICATION OF STRATEGIC COMMUNICATION IN THE FIELD OF NATIONAL SECURITY.
- Author
-
ORUJOV, Rashadat and MAMMADZADA MAHAMMADALI, Vugar
- Abstract
The research is dedicated to "Strategic Communication" and its elements. Either core element of strategic communication is enlightened through study of literatures. As a showcase the Second Karabakh War between Azerbaijan and Armenia is reviewed and studied. The outcomes achieved in the conclusion of the research proves the essence and importance of strategic communication in victory. [ABSTRACT FROM AUTHOR]
- Published
- 2023
20. The United States Special Operations Forces' Pivot to Great Power Competition and Its Implications for China.
- Author
-
Kai Liao
- Subjects
GREAT powers (International relations) ,NATIONAL security ,BELT & Road Initiative ,PRIVATE security services ,NON-state actors (International relations) ,INTEGRITY - Abstract
As the United States has made great power competition a central tenet of its national security strategy, the primary mission of the U.S. Special Operations Forces (SOF) has shifted from counterterrorism to great power competition accordingly. SOF's capabilities in the information domain, and its relationships with sub-state and non-state partners are major advantages in the "gray zone." Three branches of SOF are major actors operating in the gray zone: psychological operations forces that conduct information and psychological warfare in remote regions; civil affairs soldiers who gather intelligence and carry out influence operations in remote and politically sensitive regions; Special forces that motivate and advise local forces to conduct proxy operations for the United States. SOF's pivot to great power competition can threaten China's overseas interests, destabilize its periphery, and challenge its territorial integrity. In response, some Chinese private security companies (PSCs) are developing information capabilities and cultivating relationships with sub-state and non-state actors to compete for influence with SOF. The potential rivalry between SOF and Chinese PSCs may turn countries along the Belt and Road Initiative into playgrounds for great power competition and increase the possibility of armed conflicts between the two great powers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Insurgency and counterinsurgency in Peru, 1962-1966
- Author
-
Heeg, Jason and Foster, William
- Subjects
Insurgency ,Counterinsurgency ,Terrorism ,Revolutionary Warfare ,Unconventional Warfare ,Civic Action ,Psychological Operations - Abstract
Insurgency and counterinsurgency in the developing world were crucial aspects of the global Cold War. Economic, political, religious, and social factors created tensions at the international, national, and local levels that drove conflict. Scholars can gain an increased understanding of these characteristics through the study of historical examples, such as the Cuban-inspired insurgency against the government of Peru. The leaders of the Cuban government wanted to export their revolution throughout Latin America and turn the Peruvian Andes into the Sierra Maestra of South America. As a result, members of the New Left in Peru began an insurgency in 1962. By 1966, the Peruvian security forces had quickly and efficiently eliminated the insurgent threat. Most literature on the Peruvian Cold War experience of the mid-1960s argues the New Left failed due to internal mistakes. I combine recently uncovered documents and reinterpret the existing literature to show that it was the competence of the Peruvian security forces, not the incompetence of the insurgents, that resulted in a government victory. ‘Victory’, however, is an elusive term, there were numerous outcomes, some positive, some negative, which had a profound impact on Peruvian society and hemispheric security. This dissertation examines these understudied events and seeks to explain their significance in the context of Latin America’s Cold War story.
- Published
- 2020
- Full Text
- View/download PDF
22. INFORMATION WARFARE, MEDIA AND CIVILIANS.
- Author
-
Tomsu, Miroslav, Dzermansky, Martin, Cajkova, Nikola, and Wanecki, Pavel
- Subjects
- *
INFORMATION warfare , *MILITARY science , *INFORMATION & communication technologies , *DATA transmission systems , *ARMED Forces - Abstract
The progress in information and communication technologies in the transmission and sharing of data has fundamentally affected the armed forces, not only in terms of the development of information systems, control, and fire control systems but also in the conduct of war. The topic of the article is information warfare. The aim is to explain the meaning and concept of information warfare and to analyse the purpose of information warfare and its development in future security operations. The article first deals with the mutual relationship between information and military science and their concept of information. It continues with the characteristics of individual forms of information warfare, including the ways of conducting them. It explains the possible consequences of its action from information point of view. The benefit is considering the further possible development of some forms of information warfare and predicting probable implications in the event of their use. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Hibrid - concept definitoriu al războaielor, operațiilor și amenințărilor specifice secolului 21.
- Author
-
LUPULESCU, Georgiana-Daniela
- Subjects
WAR ,MILITARY science ,AMBIGUITY ,DISINFORMATION - Abstract
Copyright of Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I' is the property of Carol I National Defence University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
24. Issues of Resilience to Cyber-Enabled Psychological and Information Operations
- Author
-
Petra Mlejnková
- Subjects
information operations ,psychological operations ,information environment ,resilience ,cognitive resilience ,society-centric approach ,Military Science - Abstract
This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations. It presents the options currently available to an adversary to exploit the vulnerability of the information environment, chiefly the cognitive vulnerabilities of target groups. Thus, hostile interests are often pursued through manipulation, using disinformation, propaganda, algorithms and artificial intelligence. In the light of these developments, the article defines a society-centric approach, in which societal and human resilience are emphasised.
- Published
- 2022
- Full Text
- View/download PDF
25. Considerations on the role of information (-psychological) operations in Russian military thinking
- Author
-
Eveline MĂRĂȘOIU
- Subjects
psychological operations ,Russian thinking ,reflexive control ,Asymmetry ,Initial Period of War. ,Military Science ,International relations ,JZ2-6530 - Abstract
Russian military thinking and strategic documents attribute information warfare (and its associated concepts) to external authors only. This creates a vacuum in terms of how Russia actually implements itself information-psychological operations and how this fits into the broader Russian military thinking. This article looks at how information (-psychological) operations (IOs) are applied pragmatically through the prism of specific and well-established Russian concepts, such as Reflexive Control, Asymmetry and Initial Period of War, with a specific focus on the current conflict in Ukraine. It also looks at specific capabilities and formation in the field of IOs, as pertaining to the military field.
- Published
- 2023
- Full Text
- View/download PDF
26. Some Features of Information Support for Military Operations.
- Author
-
Zolotarev, P. S.
- Abstract
The Special Military Operation conducted in Ukraine showed not only the unsatisfactory state of the information support of the operation, but also revealed some new features that need to be taken into account. The article does not set the task of analyzing the reasons for the weak information support of the operation. However, attention is drawn to the fact that at the level of doctrinal documents, namely the Military Doctrines of Russia in 2010 and 2014, there is a negative trend in the objectivity of assessments of the features of modern military conflicts in terms of their information support. Among the manifested features of information support of operations, attention is drawn to a sharp reduction in the time of effectiveness of disinformation measures and the inadmissibility of substituting information operations planning with propaganda activities. The effectiveness of using the consolidation of the capabilities of space systems for various purposes in support of one of the conflicting parties and capable of having a significant impact on the success of military operations is noted. A number of recommendations aimed at bringing in line with the requirements of the time of planning and organization of information operations in Russia are formulated. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. Possible scenarios of psychological operations against the human resources of the Army of the Islamic Republic of Iran
- Author
-
Ali Farhadi, Majid Yusefi, and Mahmood Sheikh Hassani
- Subjects
scenario ,psychological operations ,human capital ,cohesion ,de-identification ,Military Science - Abstract
The Supreme Leader, Ayatollah Khamenei (as), has summarized the plans of global arrogance against the Iranian nation in three sentences: first: psychological warfare, second: economic warfare, and third: countering scientific progress and authority; Accordingly, the purpose of this study is to formulate possible scenarios of enemy psychological operations against human capital. The present research is an applied research in terms of purpose and a part of future exploratory research in terms of method, which has been done by screenwriting method. In this study, preliminary data were collected using literature review and expert meetings. Utilizing the expertise of experts from among the multitude of factors and impulses affecting psychological operations against AJA; Identification and framework of scenarios are explained. The statistical population of the study was a leadership group of 10 talented people and a group of experts with a talented 6 people collaborated in developing the scenarios. Using Peter Schwartz's model framework and Roland Berger quantification methods, based on the ranking of key factors and drivers identified based on importance and uncertainty by experts, finally two factors of cohesion between the army and the armed forces (General Staff, IRGC) , NAJA and the Ministry of Defense), creating disruption in religious, revolutionary and national beliefs (de-identification) gained a higher rank, which, being placed in the axes of a matrix, formed the basis for the formation of four scenarios with the titles; Divisiveness, defeat of will, absorption and transformation, deception and sedition.
- Published
- 2021
- Full Text
- View/download PDF
28. Psychological Operations in Turkish offensive into north-eastern Syria: A Case Study of the Turkish Radio and Television Corporation (TRT)
- Author
-
Mohammad Hosein Shoaee and Javad Sabouri Kazaj
- Subjects
psychological operations ,turkey ,turkish offensive into north-eastern syria ,syria ,Military Science - Abstract
By learning about the role and effects of the media in the field of international communication, governments are increasingly using the techniques of psychological operations to influence and persuade public opinion. One such case is Turkey's military offensive in northern Syria, which has been widely reported in various international media. The study seeks to discover the psychological techniques used by the Turkish National Broadcasting Corporation (TRT). In this way, 192 news by purposive Sampling in the form of relevant theoretical saturation on the official website in Turkish from October 8 to November 13, 2017 were analyzed by the method of qualitative content analysis. The results of this study indicated that the maximum use of various techniques in order to persuade the people of the country in the form of psychological operations has been the main policy of this media and in line with Turkey's military operations. The media has used ten techniques of psychological operations including anesthesia, incitement, labeling, incitement, non-verbal language, divisiveness, intimidation, enmity, dehumanization of the enemy and ideation.
- Published
- 2021
- Full Text
- View/download PDF
29. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study
- Author
-
Varga, Stefan, Brynielsson, Joel, Horndahl, Andreas, Rosell, Magnus, Alhajj, Reda, Series Editor, Glässer, Uwe, Series Editor, Liu, Huan, Series Editor, Wittek, Rafael, Series Editor, Zeng, Daniel, Series Editor, Aggarwal, Charu C., Advisory Editor, Brantingham, Patricia L., Advisory Editor, Gross, Thilo, Advisory Editor, Han, Jiawei, Advisory Editor, Manásevich, Raúl, Advisory Editor, Masys, Anthony J., Advisory Editor, Morselli, Carlo, Advisory Editor, Tayebi, Mohammad A., editor, and Skillicorn, David B., editor
- Published
- 2020
- Full Text
- View/download PDF
30. The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon?
- Author
-
Geraldes, Sofia Martins, Masys, Anthony J., Series Editor, Bichler, Gisela, Advisory Editor, Bourlai, Thirimachos, Advisory Editor, Johnson, Chris, Advisory Editor, Karampelas, Panagiotis, Advisory Editor, Leuprecht, Christian, Advisory Editor, Morse, Edward C., Advisory Editor, Skillicorn, David, Advisory Editor, Yamagata, Yoshiki, Advisory Editor, Moehlecke de Baseggio, Eva, editor, Schneider, Olivia, editor, and Szvircsev Tresch, Tibor, editor
- Published
- 2020
- Full Text
- View/download PDF
31. INFLUENCE OPERATIONS, BETWEEN THE ETHICAL AND CRITICAL FACET.
- Author
-
AVĂDĂNEI, Angela-Karina
- Subjects
PROPAGANDA ,PRIMARY audience ,AUDIENCES - Abstract
The psychological operations (PSYOPS) doctrines of many NATO member states, including Romania, do not allow the use of influence activities on internal audiences. While this is an ethical provision, difficulties arise when formulating an adequate counter-propaganda strategy, as domestic groups that are susceptible to influence are targeted by an effective propaganda conducted by the adversary. The 2014 edition of the NATO doctrine on PSYOPS (psychological operations) was ambiguous with regard to this limitation, while the Romanian doctrine from 2016 kept it, in accordance with the older NATO doctrine from 2007. With this limitation PSYOPS risk being ineffective in countering propaganda, their role being restricted to analysing the effects of the propaganda on the audiences and making recommendations to counter it. Without using influence activities, the recommendations would be, based on the scenario, addressing the public or not (choosing “silence”) with information activities through the responsible structures. Going further, inform and influence activities (IIA) intertwine, which leads to the need for more clarity in the doctrines that regulate their employment. The propaganda of the Russian Federation in Donbas, that victimised the separatists leading to their support for the invasion of Ukraine is a relevant example for situations when PSYOPS should be allowed to target internal audiences. The present paper does not go into detail on the case of Ukraine but problematises on the above-mentioned ethical limitation that has the advantage of giving the adversary advantages on multiple levels. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
32. Editorial: The age of mass deception: Manipulation and control in digital communications
- Author
-
Daniel Broudy and Richard G. Ellefritz
- Subjects
deception ,manipulation ,psychological operations ,internet memes ,digital communication ,deepfake ,Communication. Mass media ,P87-96 - Published
- 2022
- Full Text
- View/download PDF
33. PSYCHOLOGICAL OPERATIONS: FROM THE COMMUNICATION, MEDIA, PROPAGANDA, AND SOCIO-CULTURAL PERSPECTIVE
- Author
-
Hendra Kaprisma
- Subjects
mind ,propaganda ,psychological operations ,socio-culture ,war ,Military Science - Abstract
This millennial era that is inseparable with technological advancement, the role of media and communication become more crucial. Those two components shape up and influence human psychological development. Media and communication are two aspects that intertwined from both good and bad influence. Those good and bad stigmas are also inseparable from propaganda. The strength of propaganda depends on whether or not the socio-cultural element is accurately used to deliver the selected message. Sciences regarding social system have become more important because it is related to potential target to support the psychological operations. The psychological operations consisted of delivering a particular message or information through selected media (product) to influence or modify the behavior of the receiver (target audience). In the context of national resilience, astagatra is also known as one of the aspects that influence the success of psychological operations. Therefore, this paper will discuss the study of psychological operations from several disciplines such as communication, media, propaganda, and socio-cultural perspective. The study regarding history and development of psychological operations will be explained using critical-literacy methods strengthened by literature review. This research finds that psychological operations are one of the ways that shown to influence human mindset and trait, or behavior to a specific target audience that supported by intertwining aspects such as communication, media, propaganda, and socio-cultural aspects that significant to the success of psychological operations of a particular country.
- Published
- 2020
- Full Text
- View/download PDF
34. Investigation of Components of Psychological Operations Based on the Semiotics of Double Conflicts In the debate, 'Saadi's Controversy'
- Author
-
somayyeh kianmehr, khodabakhsh Asadollahi, and amin navakhtimogadam
- Subjects
saadi ,psychological operations ,debate ,semiotics of dual contrasts ,Language and Literature - Abstract
The story of the debate between Saadi and the contender is one of the best debates of Persian literature that has been repeatedly investigated, but debates as one of the techniques of psychological operations (the power of influencing the mind and mind of the audience indirectly and better transfer Concept and Thought) has not been analyzed. To this end, in this study, by identifying the components of the psychological operations available in the debate as one of the "psychological operations techniques" using the semiotics of Levi Strause's dual contradictions, Saadi's methods and approaches were pursued to achieve the desired goals. Been investigated. According to the results, Saadi, using the layout of the contradictions, with the purpose and the previous planning, in the form of a deliberate debate with his subtlety, his intuitive thought and thought to the audience, in the latent layer of the story (profound construction) Has transmitted. In order to achieve this, he has used the components of psychological operations in the form of a beautiful debate. In this way, Saadi has analyzed the contradictions of the conflicts and the contradictions of these two strata, and ultimately, with the adventures and disadvantages of both groups, the goal of balancing is reached in the face of social conflict. And introduces a new classification of these two strata to the audience
- Published
- 2020
- Full Text
- View/download PDF
35. The Impact of Organizational Design and Leadership on Strategic Communications.
- Author
-
Evans, Amber
- Subjects
- *
STRATEGIC communication , *INFORMATION warfare , *LEADERSHIP , *NATIONAL interest - Abstract
Information warfare, including strategic communications, is becoming ever more crucial in defending national interests and competing globally. Therefore, organizations are increasingly employing strategic communications within the information environment to pursue the organization's mission and goals. Unfortunately, many organizations lack strategic, structural, and environmental alignment, resulting in reduced efficiency and effectiveness of strategic communications. This article explores the current structure of many organizations defending and competing in a turbulent information environment, proposes a different configuration that balances efficiency and effectiveness, outlines the importance of innovation, and emphasizes the strategic role of leadership throughout the organization and change process. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
36. Information and Psychological Operations as a Challenge to Security and Defence
- Author
-
Petra Vejvodová
- Subjects
Information Environment ,Information Operations ,Psychological Operations ,Resilience ,Security Forces ,Vulnerability. ,Military Science - Abstract
The article focuses on information and psychological operations as a challenge for the security and defence establishments of NATO member states. A conceptualisation of the terms ‘information operations’ and ‘psychological operations’ is discussed in the contexts of reshaping the war-and-peace dichotomy, and of resilience and deterrence. It is suggested that these terms suffer from a normative approach to the paradigm of war and peace, and to the use of non-military means. This may lead to the greater vulnerability of security and defence systems in confrontation with an adversary. Also, special attention is paid to the vulnerabilities of security and armed forces, being overlooked in concepts of resilience.
- Published
- 2019
- Full Text
- View/download PDF
37. CONCEPTUAL APPROACHES ON INFORMATION WARFARE AND SOME OF ITS COMPONENTS Teodor.
- Author
-
BADIU, Teodor
- Subjects
INFORMATION warfare ,PUBLIC spaces ,NON-state actors (International relations) ,FAKE news ,ALTERNATIVE mass media - Abstract
In the case of information warfare, it no longer exists a demarcation line between the state of pace or the state of war, this type of war being used by the state and non-state actors because of its effectiveness and the difficulty of being traced and repelled. In addition, it is known that the Russian Federation used information activities against Western and Eastern European countries. To see the specificity of information operations, we must define the concepts and components that underlie information warfare and the perspective Russian military thinkers have on information activities. Even if the paper does not describe in detail all the components of the information warfare, it is important for us to clarify the role of information operations and its components as part of information warfare, as well as the terms that are often used in the public and academic area, such as disinformation, manipulation, propaganda, fake news etc. To better understand the Russian information activity, the paper provides some specific examples from Poland, the Czech Republic and Slovakia. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
38. Białoruskie i rosyjskie działania dezinformacyjne wobec Polski: w kontekście antyreżimowych protestów przeciwko Alaksandrowi Łukaszence.
- Author
-
BRYJKA, FILIP
- Subjects
INFORMATION warfare ,PRESIDENTIAL elections ,INTERVENTION (International law) ,DISINFORMATION ,ASSASSINATION ,HISTORICAL revisionism - Abstract
Since August 2020, the political situation in Belarus has become one of the key elements of Russia’s information warfare against the transatlantic community. The main target of Belarusian and Russian information and psychological operations is Poland, repeatedly accused of interfering in the internal affairs of Belarus, inspiring a colour revolution, waging a hybrid war, supporting separatism, historical revisionism, preparation of military intervention or organising an armed coup and assassination of Lukashenko. The main research problem of this article is the answer to the question: what disinformation activities are Belarus and Russia conducting against Poland in connection with the political situation in Belarus after the falsification of the results of the presidential elections of 9 August 2020. The author analyses, among others, why Poland has become the main target of Belarusian and Russian disinformation operations, what the goals are of these activities, on what issues the Belarusian and Russian information narrative towards Poland is focused, and what the effectiveness is of these influence operations. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. NEUTRALIZING THE INTENTIONS OF PSYCHOLOGICAL OPERATIONS
- Author
-
Anatoly I. Petrenko
- Subjects
psychological operations ,counter-defamation programs ,conditions of effectiveness of counteracting psychological operations ,fakes ,psychological impact ,behavior programming ,Political science - Abstract
Aim. Analysis of psychological factors and tools aimed at neutralizing the destructive effect on the psyche. Proposals for the organization of counter-defamation programs.Methodology. A specific example of organizing a foil of a psychological operations plan is considered. Analysis of destructive content (fake) materials has been carried out. The study used methods of included observation, generalization, content analysis and interpretation of the results. Results. The patterns of psychological operations have been defined. The ways to neutralize their destructive influence are shown. Research implications. The results of the study contribute to the theory and practice of counteracting psychological operations.
- Published
- 2021
- Full Text
- View/download PDF
40. WAYS TO INCREASE RESILIENCE TO HYBRID THREATS TRANSCENDENT WARFARE - TRANSPERSONAL WAR COMPONENT OF HYBRID WARFARE
- Author
-
Aliodor MANOLEA
- Subjects
Hybrid warfare ,PSYOP ,psychological operations ,psychological warfare ,Strategic mindwar ,transpersonal warfare ,PsychoInformational Distal Influence ,Military Science - Abstract
In the future there will be no wars similar to those of the past, but a new kind of war, the Hybrid Warfare, which is different from the others, since its internal elements are based on principles much changed than previous ones. These are extensive wars, encompassing virtually all fields: political, economic, social, cultural, military and mental. Under the terms of the current geopolitical and military situation, soldiers are subjected to intense stress, emotional type engrammic conditioning and dysfunctions with consequences on psychicological balance, on the health status, psychological features that can be influenced by both classical, conventional and by Mind Control type methods. Currently, in different armies, influencing the human psyche has become a true “weapon”3 and we show that concepts such as PSYOPS (Psychological Operations), the MindWar (Psychological Warfare) with their extensions Strategic MindWar and Transcendent Warafre are manifestations of the Psycho-Informational Distal Influence (PsiDI).
- Published
- 2018
41. Information Operations from the Polish Point of View
- Author
-
Zbigniew Modrzejewski
- Subjects
Information Operations ,Information Activities ,Information Environment ,Psychological Operations ,Military Science - Abstract
Information operations are still not understood very well. For many people, Info Ops are simply computer warfare or psychological operations. The main purpose of the article is to describe the fundamental aspects of information operations in the Polish doctrinal document. The content of the paper includes presentation of key definitions and explanation of how the information environment should be perceived. The author made also an attempt to describe key capabilities and techniques integrated and coordinated through information operations.
- Published
- 2018
- Full Text
- View/download PDF
42. Manoeuvring and Generating Effects in the Information Environment
- Author
-
Ducheine, Paul A L, van Haaster, Jelle, van Harskamp, Richard, Oonincx, Patrick J., Editor-in-chief, de Pee-Vencken, F., Managing editor, Ducheine, Paul A.L., editor, and Osinga, Frans P.B., editor
- Published
- 2017
- Full Text
- View/download PDF
43. Countering Psychological Operations and Deceptions that Indoctrinate Anti-Islam Hate and Violence.
- Author
-
FIRINCI, Yusuf
- Subjects
VIOLENCE ,NATIONALISM ,TERRORISM ,CYBERSPACE ,ISLAM - Abstract
Copyright of International Journal of Politics & Security (IJPS) is the property of Inono Universitesi, Malatya and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
44. Neurocognitive hacking: A new capability in cyber conflict?
- Author
-
Heslen, John J.
- Subjects
- *
EMAIL hacking , *PROPAGANDA , *TERROR management theory , *CINGULATE cortex , *COMPUTER networks , *COMMUNITY support - Abstract
This article presents a discussion of neurocognitive hacking and its potential for use at the strategic, operational, and tactical levels of cyber conflict. Neurocognitive hacking refers to the ability to activate specific neural areas of the brain, via subliminal or supraliminal stimuli, to shape the behavioral outcomes of an adversary. Research suggests that awareness of mortality-related stimuli has neural correlates in the right amygdala and left anterior cingulate cortex and mediates negative behavior toward out-group members, including unconscious discriminatory behavior. Given its in-group/out-group dynamic, the phenomenon could be exploited for use in information operations toward target populations, specifically ones that are multiethnic, multicultural, or multireligious. Although development of the theoretical framework behind neurocognitive hacking is ongoing, mortality-related stimuli are proposed to activate one's unconscious vigilance system to further evaluate the locus and viability of the suspect stimuli. Research suggests that the subsequent discriminatory affective reactions directed toward out-group members are representative of automatic heuristics evolved to protect the organism in the event a stimulus represents a more serious threat to survival. Therefore, presenting mortality-related stimuli over computer networks to targeted audiences may facilitate the ingestion of tailored propaganda or shaping of specific behavioral outcomes within a population, including sowing division in a target community or weakening support for a specific political regime. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
45. Hybrid warfare in Brazil: The highest stage of the military insurgency.
- Author
-
Leirner, Piero C.
- Subjects
IRREGULAR warfare ,BRAZILIAN politics & government, 2003- ,PSYCHOLOGICAL warfare ,RIGHT-wing extremists ,ELECTIONS ,ARMED Forces - Abstract
Since 2013, Brazil has undergone various moments of political turbulence, ultimately culminating in the seizure of power by the Far Right. The lack of clarity on how this movement has been led and the role played by the military in the political arena allows us to ask if Brazil has been the target of a form of hybrid warfare—similar to the kind experienced by various other countries that have undergone sudden changes in regime (such as Ukraine and Egypt, and more recently Honduras and Paraguay). This article explores the limits and implications of applying the notion of hybrid warfare to the Brazilian case, seeking to understand how politics came to be merged with elements adopted from military strategies and tactics. Based on my own ethnographic experience with military personnel, I aim to show how, with the assistance of other state powers, they produced a high-impact psychological operation that paved the way for the 2018 elections and the seizure of power by the Far Right. Following this line of analysis, I argue that in the Brazilian case, there has been a hybrid warfare as well as an insurgency of state corporations and their networks. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
46. MAJOR EFFECTS OF PSYOPS ON MILITARY ACTIONS
- Author
-
Daniel POP
- Subjects
psychological operations ,major effects ,boomerang effect ,Military Science - Abstract
Day by day, the international environment shows that psychological operations (PSYOPS) are absolutely essential in order to achieve success in a modern military operation. PSYOPS are less expensive than other military actions but can have long lasting effects. They could be used for both defense and attack and for other operations during crises or peace time. With respect to what I previously stated, the results of a psychological campaign are not instantly obvious, they cannot be scientifically evaluated and measured and are not immediate. Furthermore, these effects of psychological action are difficult to assess mathematically, with the exception of those situations when urging the enemy to surrender. Forcing procedures in an effort to produce faster and more convincing results of a psychological campaign may inadvertently lead to saturation, intoxication, and also to an aggressive campaign which sometimes could be too much for both the intentional real target audience and the unintentional one. This could easily generate a boomerang effect with unwanted or disastrous results for the originator.
- Published
- 2017
47. ANALYSIS OF TRAINING AND CONDUCT OF PSYCHOLOGICAL OPERATIONS ACCORDING TO NATO STANDARDS
- Author
-
Володимир Миколайович Чернега, Олександр Володимирович Войтко, and Володимир Володимирович Рахімов
- Subjects
information operations ,psychological operations ,information influence ,Industrial safety. Industrial accident prevention ,T55-55.3 - Abstract
Russian Federationstill continues to use the entire available arsenal of anti Ukrainian actions in the information space. Actions againstUkraineare realized in a shape of information campaigns, which include the complex of information operations, separated psychological operations and actions. As the result, information warfare against Ukraine, the level of support of the state sovereignty in information space, current socio-political, financial and economical situation in Ukraine, other factors of influence of external and internal security environment raised the list of tasks for Armed Forces of creation and realization of adequate counteractions against threats in information space, of information support of training and use of the Armed Forces of Ukraine and caused the need of searching and implementation of new methods, forms and ways of actions in information space by entire means and assets, expanding their respective capabilities. The article discusses the main provisions of approaches to the preparation and conduct of psychological operations in the United States Armed Forces.
- Published
- 2017
- Full Text
- View/download PDF
48. TEXTS, TWEETS, AND TACTICAL STRIKES: RUSSIAN INFORMATION WARFARE METHODS AND IMPLICATIONS FOR THE UNITED STATES AND NATO
- Author
-
Jasper, Scott E., Maness, Ryan, National Security Affairs (NSA), Defense Analysis (DA), Chesley, Brendan J., Jasper, Scott E., Maness, Ryan, National Security Affairs (NSA), Defense Analysis (DA), and Chesley, Brendan J.
- Abstract
The character of warfare is constantly evolving, beset by friction and clouded with relentless ambiguity. This study explores the rapidly changing operational environment through a focused analysis of the Kremlin’s military adventurism in Georgia, Syria, and Ukraine. This recently escalated conflict, encompassing the largest front on the European continent unseen since the Second World War, provides valuable insights into the complexity of warfare’s changing character. Specifically, the Kremlin’s evolving approach to Information Warfare reveals a proliferation of new technologies and means that seek to contest the information domain, maximize uncertainty, and paralyze the decision-making ability of their adversaries. This thesis addresses the following questions: 1) What new technological capabilities has the Kremlin employed to create psychological effects and disrupt decision-making at tactical and operational levels? 2) How effective are these methods, and how do they fit within a broader concept of Information Warfare? In addressing these questions, this research will trace the Kremlin’s post-2008 reforms and determine what enduring aspects of Russian Information Warfare (namely cyber, unmanned systems, and EMSO) tell us about the current operational environment. Finally, this research demonstrates how these observed methods may shape the future battlespace, and what wider tactical and operational implications these threats pose to the U.S. and her strategic partners., Major, United States Marine Corps, Approved for public release. Distribution is unlimited.
- Published
- 2023
49. Метод виявлення агентів соціальних мереж, що мають найбільший вплив
- Subjects
target audiences ,social networks ,соціальні мережі ,пошукова система ,social network agents ,psychological operations ,психологічна операція ,search system ,цільові аудиторії ,агенти соціальних мереж - Abstract
The article presents a method for identifying social network agents that have the greatest impact on a given target audience. The method combines data on the number of publications on a specific topic and the number of connections between agents in the social network. The comprehensive indicator described in the method characterizes the potential number of acts of disseminating information from the social network agent with the greatest influence to other agents in the social network who have connections with them. The method consists of five stages and can be useful for professionals in analyzing the impact of social network agents on target audiences during psychological operations. Using the search system SOFIYA, sets of social network agents that have the greatest impact were investigated, and who disseminate informational materials on two specified topics. Additionally, social network agents with the greatest impact were classified according to the type of their network activity, and their roles as posters, re-posters, commenters, and likers were determined., У статті розроблений метод виявлення агентів соціальних мереж, що мають найбільший вплив на визначену цільову аудиторію, який поєднує данні про кількість публікації за визначеною тематикою і кількість зв’язків агентів в соціальній мережі. Комплексний показник, що описаний у методі, характеризує потенційну кількість актів доведення інформаційних матеріалів від агента соціальної мережі, що має найбільший вплив, до інших агентів соціальної мережі, що мають з ним зв’язки. Метод складається з п'яти етапів та може бути корисним для фахівців під час аналізу впливу агентів соціальних мереж на цільові аудиторії при проведенні психологічної операції. За допомогою пошукової системи SOFIYA були досліджені множини агентів соціальної мережі, що мають найбільший вплив, які розповсюджують інформаційні матеріалі за двома визначеними тематиками. Також була проведена класифікація агентів соціальної мережі, що мають найбільший вплив, за видом їх мережевої активності та визначено їх ролі як постер, репостер, коментатор та той, що робить вподобання.
- Published
- 2023
50. On Cyber-Enabled Information Warfare and Information Operations
- Author
-
Lin, Herbert, Kerr, Jaclyn, and Cornish, Paul, book editor
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.