Information Operations (United States)
   HOME

TheInfoList



OR:

Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of
electronic warfare Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum (EM spectrum) or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent ...
(EW), computer network operations (CNO),
psychological operations Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and M ...
(PSYOP),
military deception Military deception (MILDEC) is an attempt by a military unit to gain an advantage during warfare by misleading adversary decision makers into taking action or inaction that creates favorable conditions for the deceiving force. This is usually ac ...
(MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own." Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems. In the
U.S. Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage o ...
, information operations are often supervised by a Navy Information Operations Command (NIOC), for example in the
United States Tenth Fleet The U.S. Tenth Fleet is a functional formation and a numbered fleet in the United States Navy. It was first created as an anti-submarine warfare coordinating organization during the Battle of the Atlantic in the Second World War. It was reac ...
which has several NIOCs.


Information Operations (IO)


Electronic Warfare (EW)

* Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services. EW includes three major subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic warfare Support (ES). * EW as an IO Core Capability. EW contributes to the success of IO by using offensive and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial use of the EM spectrum while protecting friendly freedom of action in that spectrum. Expanding reliance on the EM spectrum for informational purposes increases both the potential and the challenges of EW in IO. The increasing prevalence of wireless telephone and computer usage extends both the utility and threat of EW, offering opportunities to exploit an adversary's electronic vulnerabilities and a requirement to identify and protect our own from similar exploitation. As the use of the EM spectrum has become universal in military operations, so has EW become involved in all aspects of IO. All of the core, supporting, and related IO capabilities either directly use EW or indirectly benefit from EW. In order to coordinate and deconflict EW, and more broadly all military usage of the EM spectrum, an electronic warfare coordination cell (EWCC) should be established by the JFC to reside with the component commander most appropriate to the operation. In addition, all joint operations require a joint restricted frequency list (JRFL). This list specifies protected, guarded, and taboo frequencies that should not normally be disrupted without prior coordination and planning, either because of friendly use or friendly exploitation. This is maintained and promulgated by the communications system directorate of a joint staff (J-6) in coordination with J-3 and the joint commander's electronic warfare staff (or EWCC, if delegated). * Domination of the Electromagnetic Spectrum. DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles (UAVs) or robots operated by adversaries.


Computer Network Operations (CNO)

* CNO as an IO Core Capability. The increasing reliance of unsophisticated militaries and terrorist groups on computers and computer networks to pass information to C2 forces reinforces the importance of CNO in IO plans and activities. As the capability of computers and the range of their employment broadens, new vulnerabilities and opportunities will continue to develop. This offers both opportunities to attack and exploit an adversary's computer system weaknesses and a requirement to identify and protect our own from similar attack or exploitation. * Computer network attack (CNA). Actions are taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Also called CNA. Computer network defense (CND). Actions are taken through the use of computer networks to protect, monitor, analyze, detect and respond to unauthorized activity within the Department of Defense information systems and computer networks. Also called CND. computer network exploitation. Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks. Also called CNE.


Psychological Operations (PSYOP)

* PSYOP as an IO Core Capability. PSYOP has a central role in the achievement of IO objectives in support of the JFC. In today's information environment even PSYOP conducted at the tactical level can have strategic effects. Therefore, PSYOP has an approval process that must be understood and the necessity for timely decisions is fundamental to effective PSYOP and IO. This is particularly important in the early stages of an operation given the time it takes to develop, design, produce, distribute, disseminate, and evaluate PSYOP products and actions. All PSYOP are conducted under the authority of interagency-coordinated and OSD approved PSYOP programs. The PSYOP program approval process at the national level requires time for sufficient coordination and resolution of issues; hence, JFCs should begin PSYOP planning as early as possible to ensure the execution of PSYOP in support of operations. A JFC must have an approved PSYOP program, execution authority, and delegation of product approval authority before PSYOP execution can begin. JFCs should request PSYOP planners immediately during the initial crisis stages to ensure the JFC has plenty of lead time to obtain the proper authority to execute PSYOP. PSYOP assets may be of particular value to the JFC in pre-/post-combat operations when other means of influence are restrained or not authorized. PSYOP must be coordinated with CI, MILDEC, and OPSEC to ensure deconfliction and control, CI operations are not compromised, and that all capabilities within IO are coordinated to achieve the objectives established in planning. There must be close cooperation and coordination between PSYOP and PA staffs in order to maintain credibility with their respective audiences, which is the purpose of the IO cell. PSYOP efforts are most effective when personnel with a thorough understanding of the language and culture of the TA are included in the review of PSYOP materials and messages. As the information environment evolves, the dissemination of PSYOP products is expanding from traditional print and broadcast to more sophisticated use of the Internet, facsimile messaging, text messaging, and other emerging media. The effectiveness of PSYOP is enhanced by the synchronization and coordination of the core, supporting, and related capabilities of IO; particularly public affairs (PA), MILDEC, CNO, civil-military operations (CMO), and EW. * Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. * 4th Psychological Operations Group


Military Deception (MILDEC)

* MILDEC is described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly forces’ mission. MILDEC and OPSEC are complementary activities — MILDEC seeks to encourage incorrect analysis, causing the adversary to arrive at specific false deductions, while OPSEC seeks to deny real information to an adversary, and prevent correct deduction of friendly plans. To be effective, a MILDEC operation must be susceptible to adversary collection systems and "seen" as credible to the enemy commander and staff. A plausible approach to MILDEC planning is to employ a friendly course of action (COA) that can be executed by friendly forces and that adversary intelligence can verify. However, MILDEC planners must not fall into the trap of ascribing to the adversary particular attitudes, values, and reactions that "mirror image" likely friendly actions in the same situation, i.e., assuming that the adversary will respond or act in a particular manner based on how we would respond. There are always competing priorities for the resources required for deception and the resources required for the real operation. For this reason, the deception plan should be developed concurrently with the real plan, starting with the commander's and staff's initial estimate, to ensure proper resourcing of both. To encourage incorrect analysis by the adversary, it is usually more efficient and effective to provide a false purpose for real activity than to create false activity. OPSEC of the deception plan is at least as important as OPSEC of the real plan, since compromise of the deception may expose the real plan. This requirement for close hold planning while ensuring detailed coordination is the greatest challenge to MILDEC planners. On joint staffs, MILDEC planning and oversight responsibility is normally organized as a staff deception element in the operations directorate of a joint staff (J-3).JCS, JP 3-58, Joint Doctrine for Military Deception (Washington, DC: GPO, 31 May 1996), v-vi. * MILDEC as an IO Core Capability. MILDEC is fundamental to successful IO. It exploits the adversary's information systems, processes, and capabilities. MILDEC relies upon understanding how the adversary commander and supporting staff think and plan and how both use information management to support their efforts. This requires a high degree of coordination with all elements of friendly forces’ activities in the information environment as well as with physical activities. Each of the core, supporting, and related capabilities has a part to play in the development of successful MILDEC and in maintaining its credibility over time. While PA should not be involved in the provision of false information, it must be aware of the intent and purpose of MILDEC in order not to inadvertently compromise it. * A message targeted to exploit a fissure between a key member of the adversary's leadership who has a contentious relationship with another key decision maker is an example. That message could cause internal strife resulting in the adversary foregoing an intended course of action and adopting a position more favorable to our interests.
Article title


Operations Security (OPSEC)

* OPSEC as an IO Core Capability. OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions. In particular, OPSEC complements MILDEC by denying an adversary information required to both assess a real plan and to disprove a deception plan. For those IO capabilities that exploit new opportunities and vulnerabilities, such as EW and CNO, OPSEC is essential to ensure friendly capabilities are not compromised. The process of identifying essential elements of friendly information and taking measures to mask them from disclosure to adversaries is only one part of a defense-in-depth approach to securing friendly information. To be effective, other types of security must complement OPSEC. Examples of other types of security include physical security, IA programs, computer network defense (CND), and personnel programs that screen personnel and limit authorized access. * What occurs, often, is that data is either leaked, stolen, or hacked online and the enemy has access to and can decipher what that information may say. This is especially true for defensive operational security. US servicemen and servicewomen may have
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
, multiple
blogs A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order ...
, or upload photos, which can lead to the enemy knowing troop movements and locations. With this information, setting up ambush and wreaking havoc on US and support personnel becomes much easier. Geo-tagging features of cellular phones especially, may cause this type of breach in OPSEC.


Equipment methods and tactics


EW


EC-130

The EC-130E Airborne Battlefield Command and Control Center (ABCCC) was based on a basic C-130E platform and provided tactical airborne command post capabilities to air commanders and ground commanders in low air threat environments. This EC-130E ABCCC has since been retired. The EC-130E Commando Solo was an earlier version of a U.S. Air Force and
Air National Guard The Air National Guard (ANG), also known as the Air Guard, is a federal military reserve force of the United States Air Force, as well as the air militia of each U.S. state, the District of Columbia, the Commonwealth of Puerto Rico, and the ter ...
psychological operations (PSYOPS) aircraft. This aircraft also employed a C-130E airframe, but was modified by using the mission electronic equipment from the retired EC-121S Coronet Solo aircraft. This airframe served during the first
Gulf War The Gulf War was a 1990–1991 armed campaign waged by a 35-country military coalition in response to the Iraqi invasion of Kuwait. Spearheaded by the United States, the coalition's efforts against Iraq were carried out in two key phases: ...
(Operation Desert Storm), the second Gulf War (Operation
Iraqi Freedom {{Infobox military conflict , conflict = Iraq War {{Nobold, {{lang, ar, حرب العراق (Arabic) {{Nobold, {{lang, ku, شەڕی عێراق ( Kurdish) , partof = the Iraq conflict and the War on terror , image ...
) and in Operation
Enduring Freedom Operation Enduring Freedom (OEF) was the official name used synonymously by the U.S. government for both the War in Afghanistan (2001–2014) and the larger-scale Global War on Terrorism. On 7 October 2001, in response to the September 11 at ...
. The EC-130E was eventually replaced by the EC-130J Commando Solo and was retired in 2006. The EC-130J Commando Solo is a modified C-130J Hercules used to conduct
psychological operations Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and M ...
(PSYOP) and civil affairs broadcast missions in the standard AM, FM, HF, TV, and military communications bands. Missions are flown at the maximum altitudes possible to ensure optimum propagation patterns. The EC-130J flies during either day or night scenarios with equal success, and is air-refuelable. A typical mission consists of a single-ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel. The Commando Solo is operated exclusively by the
Air National Guard The Air National Guard (ANG), also known as the Air Guard, is a federal military reserve force of the United States Air Force, as well as the air militia of each U.S. state, the District of Columbia, the Commonwealth of Puerto Rico, and the ter ...
, specifically the 193d Special Operations Wing (193 SOW), a unit of the
Pennsylvania Air National Guard The Pennsylvania Air National Guard (PA ANG) is the aerial militia of the Commonwealth of Pennsylvania, United States of America. It is, along with the Pennsylvania Army National Guard, an element of the Pennsylvania National Guard. As commonwe ...
operationally gained by the
Air Force Special Operations Command Air Force Special Operations Command (AFSOC), headquartered at Hurlburt Field, Florida, is the special operations component of the United States Air Force. An Air Force major command (MAJCOM), AFSOC is also the U.S. Air Force component command ...
(AFSOC). The 193 AOW is based at the Harrisburg Air National Guard Base (former Olmstead AFB) at
Harrisburg International Airport Harrisburg International Airport is a public airport in Middletown, Pennsylvania, nine miles (15 km) southeast of Harrisburg. It is owned by the Susquehanna Area Regional Airport Authority., effective September 16, 2022 The airport code ...
in Middletown,
Pennsylvania Pennsylvania (; ( Pennsylvania Dutch: )), officially the Commonwealth of Pennsylvania, is a state spanning the Mid-Atlantic, Northeastern, Appalachian, and Great Lakes regions of the United States. It borders Delaware to its southeast, ...
. The
U.S. Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage o ...
's EC-130Q Hercules
TACAMO TACAMO (Take Charge And Move Out) is a United States military system of survivable communications links designed to be used in nuclear warfare to maintain communications between the decision-makers (the National Command Authority) and the t ...
("Take Charge and Move Out") aircraft was a land-based naval aviation platform that served as a SIOP strategic communications link aircraft for the U.S. Navy's Fleet Ballistic Missile (FBM) submarine force and as a backup communications link for the USAF manned strategic bomber and intercontinental ballistic missile forces. To ensure survivability, TACAMO operated as a solo platform, well away from and not interacting with other major naval forces such as sea-based aircraft carrier strike groups and their carrier air wings or land-based maritime patrol aircraft Operated by Fleet Air Reconnaissance Squadron THREE (VQ-3) and Fleet Air Reconnaissance Squadron FOUR (VQ-4), the EC-130Q was eventually replaced by the U.S. Navy's current TACAMO platform, the
Boeing 707 The Boeing 707 is an American, long-range, narrow-body airliner, the first jetliner developed and produced by Boeing Commercial Airplanes. Developed from the Boeing 367-80 prototype first flown in 1954, the initial first flew on December 2 ...
-based E-6 Mercury.


Computer network operations


Stuxnet

Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing subs ...
is a
computer worm A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It wil ...
discovered in June 2010. It initially spreads via
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
, and targets
Siemens Siemens AG ( ) is a German multinational conglomerate corporation and the largest industrial manufacturing company in Europe headquartered in Munich with branch offices abroad. The principal divisions of the corporation are ''Industry'', ''E ...
industrial software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
that spies on and subverts industrial systems, and the first to include a
programmable logic controller A programmable logic controller (PLC) or programmable controller is an industrial computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, machines, robotic devices, or any activity t ...
(PLC) rootkit. In May 2011, the PBS program ''
Need To Know The term "need to know", when used by government and other organizations (particularly those related to the military or espionage), describes the restriction of data which is considered very sensitive. Under need-to-know restrictions, even if ...
'' cited a statement by Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they he Iraniansare having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet. According to the British ''
Daily Telegraph Daily or The Daily may refer to: Journalism * Daily newspaper, newspaper issued on five to seven day of most weeks * ''The Daily'' (podcast), a podcast by ''The New York Times'' * ''The Daily'' (News Corporation), a defunct US-based iPad new ...
'', a showreel that was played at a retirement party for the head of the
Israel Defense Forces The Israel Defense Forces (IDF; he, צְבָא הַהֲגָנָה לְיִשְׂרָאֵל , ), alternatively referred to by the Hebrew-language acronym (), is the national military of the Israel, State of Israel. It consists of three servic ...
(IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational successes as the IDF chief of staff.


Suter

Suter Suter is a surname. Notable people with the name include: * Alexis P. Suter (born 1963), American blues, and soul blues singer and songwriter * Andrew Burn Suter (1830–1895), Bishop of the Diocese of Nelson, New Zealand * August Suter (188 ...
is a military
computer program A computer program is a sequence or set of instructions in a programming language for a computer to Execution (computing), execute. Computer programs are one component of software, which also includes software documentation, documentation and oth ...
developed by
BAE Systems BAE Systems plc (BAE) is a British multinational arms, security, and aerospace company based in London, England. It is the largest defence contractor in Europe, and ranked the seventh-largest in the world based on applicable 2021 revenue ...
that attacks
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
s and communications systems belonging to an enemy. Development of the program has been managed by
Big Safari Big Safari is a United States Air Force program begun in 1952 which provides management, direction, and control of the acquisition, modification, and logistics support for special purpose weapons systems derived from existing aircraft and systems. ...
, a secret unit of the
United States Air Force The United States Air Force (USAF) is the air service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part of the United States Army Si ...
. It is specialised to interfere with the computers of integrated air defence systems. Suter was integrated into US unmanned aircraft by L-3 Communications. Three generations of Suter have been developed. Suter 1 allows its operators to monitor what enemy
radar Radar is a detection system that uses radio waves to determine the distance (''ranging''), angle, and radial velocity of objects relative to the site. It can be used to detect aircraft, Marine radar, ships, spacecraft, guided missiles, motor v ...
operators can see. Suter 2 lets them take control of the enemy's networks and direct their sensors. Suter 3, tested in Summer 2006, enables the invasion of links to time-critical targets such as battlefield
ballistic missile A ballistic missile is a type of missile that uses projectile motion to deliver warheads on a target. These weapons are guided only during relatively brief periods—most of the flight is unpowered. Short-range ballistic missiles stay within t ...
launchers or mobile
surface-to-air missile A surface-to-air missile (SAM), also known as a ground-to-air missile (GTAM) or surface-to-air guided weapon (SAGW), is a missile designed to be launched from the ground to destroy aircraft or other missiles. It is one type of anti-aircraft syst ...
launchers. The program has been tested with aircraft such as the EC-130, RC-135, and F-16CJ. It has been used in
Iraq Iraq,; ku, عێراق, translit=Êraq officially the Republic of Iraq, '; ku, کۆماری عێراق, translit=Komarî Êraq is a country in Western Asia. It is bordered by Turkey to Iraq–Turkey border, the north, Iran to Iran–Iraq ...
and
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan,; prs, امارت اسلامی افغانستان is a landlocked country located at the crossroads of Central Asia and South Asia. Referred to as the Heart of Asia, it is borde ...
since 2006. U.S. Air Force officials have speculated that a technology similar to Suter was used by the
Israeli Air Force The Israeli Air Force (IAF; he, זְרוֹעַ הָאֲוִיר וְהֶחָלָל, Zroa HaAvir VeHahalal, tl, "Air and Space Arm", commonly known as , ''Kheil HaAvir'', "Air Corps") operates as the aerial warfare branch of the Israel Defens ...
to thwart
Syria Syria ( ar, سُورِيَا or سُورِيَة, translit=Sūriyā), officially the Syrian Arab Republic ( ar, الجمهورية العربية السورية, al-Jumhūrīyah al-ʻArabīyah as-Sūrīyah), is a Western Asian country loc ...
n radars and sneak into their airspace undetected in Operation Orchard on 6 September 2007. The evasion of air defence radar was otherwise unlikely because the F-15s and
F-16 The General Dynamics F-16 Fighting Falcon is a single-engine multirole fighter aircraft originally developed by General Dynamics for the United States Air Force (USAF). Designed as an air superiority day fighter, it evolved into a successf ...
s used by the IAF were not equipped with stealth technology.


PSYOP


B (SOMS-B)

* Special Operation Media Systems - B (SOMS-B) --The SOMS-B is a ground-based HMMWV mounted radio and television broadcast system. Like the EC-130C/J it can broadcast on AM, FM, SW and VHF television frequencies. The SOMS-B also has the capability to produce programming or radio and television broadcasts


Other/Integrated


Radio


Radio Free Afghanistan

Radio Free Afghanistan (RFA) is the Afghan branch of Radio Free Europe / Radio Liberty's (RFE/RL) broadcast services. It broadcasts 12 hours daily as part of a 24-hour stream of programming in conjunction with Voice of America (VOA). RFA first aired in
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan,; prs, امارت اسلامی افغانستان is a landlocked country located at the crossroads of Central Asia and South Asia. Referred to as the Heart of Asia, it is borde ...
from 1985 to 1993 and was re-launched in January 2002. RFA produces a variety of cultural, political, and informational programs that are transmitted to listeners via shortwave, satellite and AM and FM signals provided by the
International Broadcasting Bureau The International Broadcasting Bureau (IBB) is the technical support outlet within the United States Agency for Global Media (USAGM) (former Broadcasting Board of Governors, BBG), which is a U.S. independent agency. The IBB supports the day-to- ...
. RFA's mission is "to promote and sustain democratic values and institutions in Afghanistan by disseminating news, factual information and ideas".


Radio in a Box

Radio is the dominant information tool to reach wide audiences in isolated, mountainous regions. The US military has deployed RIABs throughout Afghanistan in order to communicate with the residents. Due to a 70 percent illiteracy rate and lack of education in Afghanistan, radio is a vital communications tool used to broadcast information where radio ownership exceeds 80 percent.Radio in a Box (2011)
Radio in a Box
"Retrieved 2011-14-10"
The United States military operates approximately 100 RIABs and hire local Afghan DJs in Afghanistan to broadcast information and host call-in shows. The United States Army employed RIAB systems to broadcast anti-Taliban and anti-Al Qaeda messages and countered Taliban propaganda by pushing onto Taliban frequencies in Paktia Province.Army radio connects with Afghans (2009)

"Retrieved 2011-10-30"
Military Embraces Counterinsurgency in Afghanistan (2008)
Radio in a Box - Military Embraces Counterinsurgency in Afghanistan
"Retrieved 2011-11-11"
One advantage of employing RIAB systems is the ability to broadcast vital information immediately to a large audience in the event of a crisis.Radio in a Box - Giving Afghanistans Their Own Voice! (2010)

"Retrieved 2011-14-10"
One Afghan DJ has 50,000 listeners.In Afghan Fight, U.S. Takes to the Airwaves (2010)

"Retrieved 2011-14-10"
Nawa District Governor Abdul Manaf uses the local RIAB station to conduct weekly call-in shows and believes the RIAB system is one of his best communication tools to inform a large audience./The Busiest Man in Nawa (2011)
The Busiest Man in Nawa
"U.S. Marine Corps Releases", "Retrieved 2011-11-10"
In Afghanistan's Paktika province, which has a literacy rate of two percent, an estimated 92 percent of the residents listen to the radio every day. Radio programs transmitted using RIAB systems provide beneficial information to Afghan farmers in remote areas. In the isolated, mountainous Wazi Kwah district of
Paktika Province Paktika (Pashto/Dari: ) is one of the 34 provinces of Afghanistan, located in the eastern part of the country. Forming part of the larger Loya Paktia region, Paktika has a population of about 789,000, mostly ethnic Pashtuns. The town of Sharan ...
, a RIAB system supplies the only source of outside news.Local DJ celebrity to his Afghan listeners (2010)
Local DJ celebrity to his Afghan listeners
"Retrieved 2011-10-14"
Afghan National Army commanders use the RIAB to communicate to villagers and elders and provide thoughts to the community.Radio-in-a-Box: Afghanistan's New Warrior-DJs (2011)

"Retrieved 2011-10-14"
Afghans can use information distributed by the United States military such as how to react to an approaching military convoy or purpose or use of U.S.-sponsored agriculture programs. For general news, Afghans can also use other information outlets such as the BBC or VOA because RIAB systems are controlled by the US military.The Pentagon, Information Operations, and International Media Development (2010)
The Pentagon, Information Operations, and International Media Development
"A Report to the Center for International Media Assistance", :e27 "Retrieved 2011-10-14"
Special Operations first employed RIAB systems in Afghanistan in 2005 which improved their ability to supply information to and communicate with the local population in their areas of operation.Breaking the Afghan Insurgency (2007)
Breaking the Afghan Insurgency
"Special Warfare" 20 (5):e26 "Retrieved 2011-11-10"


Terrorists (IO from US Perspective)

"Terrorists are adept at integrating their physical acts of violence with IO. They make audio and video recordings of the incidents for distribution over the Internet and on television. Their violence becomes theater, staged for its psychological impact, and replayed over and over again in the media as IO." * "Terrorists employ all the IO capabilities of U.S. military doctrine, including the five core capabilities of PSYOP, military deception, EW, CNO, and OPSEC, and the supporting and related capabilities. They use IO to support both offensive operations (acts of terrorism) and defensive operations (e.g., protecting their hiding places). They use IO strategically in support of broad objectives. While terrorists do not speak and write of “IO,” they demonstrate an understanding of the value and methods of IO capabilities. Terrorists appear to be particularly adept at PSYOP, PA, counterpropaganda, and certain forms of OPSEC and deception, driven by their desire to simultaneously reach desired audiences and hide from their enemies. They recognize the value of various media, including the Internet, and exploit it to support their cause. Terrorists and their supporters have a CNO capability, with CNA manifesting itself as “electronic jihad” rather than as acts of terror."


Computer network operations

There are many examples of CNA and are generally done in support of other operations. Terrorists have integrated cyber attacks into their thinking, strategies, and operations as an extremely cost-effective way to harm the US and other adversaries. The same can be said for CNE, which is about penetrating computer networks before actually attacking them. Gaining access to specific networks is seen to be as part of the CNA process for terrorists (they do not distinguish between the two). As for CND, terrorists are aware of keeping data secure and websites running because they use the Internet. Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them. The methods they use include access controls, encryption, authentication, firewalls, intrusion detection, anti-viral tools, audits, security management, and security awareness and training. * "The Taliban have in recent months waged an intensifying information war with NATO forces in the country, distributing anti-government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014. A day rarely passes without a Taliban spokesman using Twitter to claim the destruction of numerous NATO armoured vehicles and the deaths of scores of Western or Afghan security forces, with NATO quickly countering in its own Twitter feeds. The Taliban also employ a sophisticated network of spokesmen to distribute messages and even have their own mobile radio broadcast service, which frequently moves location to avoid the threat of retaliatory airstrikes by NATO warplanes." ** The Taliban HAVE to rely on CNO and integrate it into their IO campaign as it is the most cost-effective method of disrupting Western forces. This is a prime example of how CNO is used in conjunction with PSYOP to achieve their objectives.


Steganography

When one considers that messages could be encrypted steganographically in
e-mail Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic (digital) version of, or counterpart to, mail, at a time when "mail" meant ...
messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light. Coupled with the "
chaffing and winnowing Chaffing and winnowing is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed ...
" technique, a sender could get messages out and cover their tracks all at once. Rumors about terrorists using steganography started first in the daily newspaper ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'' on 5 February 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web with links to
jihad Jihad (; ar, جهاد, jihād ) is an Arabic word which literally means "striving" or "struggling", especially with a praiseworthy aim. In an Islamic context, it can refer to almost any effort to make personal and social life conform with G ...
". A citation from the article: "''Lately,
al-Qaeda Al-Qaeda (; , ) is an Islamic extremist organization composed of Salafist jihadists. Its members are mostly composed of Arabs, but also include other peoples. Al-Qaeda has mounted attacks on civilian and military targets in various countr ...
operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com''". Other media worldwide cited these rumors many times, especially after the terrorist attack of
9/11 The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
, without ever showing proof. The Italian newspaper ''
Corriere della Sera The ''Corriere della Sera'' (; en, "Evening Courier") is an Italian daily newspaper published in Milan with an average daily circulation of 410,242 copies in December 2015. First published on 5 March 1876, ''Corriere della Sera'' is one of I ...
'' reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in
Milan Milan ( , , Lombard: ; it, Milano ) is a city in northern Italy, capital of Lombardy, and the second-most populous city proper in Italy after Rome. The city proper has a population of about 1.4 million, while its metropolitan city ...
had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The ''USA Today'' articles were written by veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations emerged that he had fabricated stories and sources. In October 2001, ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via
USENET Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it wa ...
to prepare and execute the 11 September 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development, published in April 2006 makes the following statements: * "...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." (p. 9–10) * "International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p. 41–42) * "The threat posed by steganography has been documented in numerous intelligence reports." (p. 42) Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images." By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media.


Military deception

A police search of a British, al-Qaeda member's home, uncovered what is now called "The al-Qaeda Training Manual", a techniques instruction book on deception, forgery, "blending in", hiding places, and the use of covers to blend into the terrorist area of operation (usually cities with large civilian populations). The philosophy the MILDEC is for the concealment of activities rather than misleading adversaries.


PSYOP

Terrorist PSYOP differs from American PSYOP in one two major areas. First, US PSYOP targets foreign adversaries and information is coordinated with many other agencies and screened before it is published. Second, while PSYOP by US and coalition forces is "designed to bring an end to violence and save lives, terrorist PSYOP is frequently directed toward promoting violence and threatening civilian populations with death and destruction. Suicide bombers are portrayed as martyrs rather than killers of innocent people." The Internet is the main resource to spread propaganda with al-Aqaeda and other terrorist groups. "According to Bruce Hoffman, before it was taken down, al-Qaeda's website Alneda.com emphasized three themes: 1)the West is implacably hostile to Islam, 2) the only way to address this threat and the only language the West understands is the logic of violence, and 3) jihad is the only option" Terrorists also like to use the Internet to recruit and persuade children to their cause. As Dorothy Denning has found, "Children are being taught to hate Jews and Westerners, and to take up arms against them hrough cartoons and comic-book style web pages, bedtime stories, and computer games.


OPSEC

All terrorists practice a high level of OPSEC since their need to be secret is how they can be successful. Whether it is the al-Qaeda training manual, online magazines targeted for the world, or the training of youth in Jihad camps, OPSEC is one of the first priorities for terrorists. Secure communications are big as well. The 11 September hijackers, for example, accessed anonymous Hotmail and Yahoo! accounts from computers at Kinko's and at a public library. Messages are also coded. Three weeks before the attacks,
Mohamed Atta Mohamed Mohamed el-Amir Awad el-Sayed Atta ( ; ar, محمد محمد الأمير عوض السيد عطا ; September 1, 1968 – September 11, 2001) was an Egyptian hijacker and the ringleader of the September 11 attacks in 2001 in which f ...
reportedly received a coded email message that read: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering." The faculties referred to the four targets (twin towers, Pentagon, and Capitol). The list of methods goes on and on and is very similar to the methods used in
organized crime Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally th ...
around the world.


Criticism

* "In tability, reconstruction, and COIN operations the most important targets of influence are not enemy commanders, but individuals and groups, both local and international, whose cooperation is vital to the mission’s success. Granted, joint and Army IO doctrine publications do not ignore these targets – PSYOP and counterpropaganda can be designed to influence them. But it is notable that the activities most directly aimed at influencing local and international audiences – functions such as public affairs, civil affairs, CMOs, and defense support to public diplomacy – are treated only as ‘related activities’ in IO doctrine, if they are mentioned at all" * "There must be a fundamental change of culture in how ISAF approaches operations. StratCom should not be a separate Line of Operation, but rather an integral and fully embedded part of policy development, planning processes, and the execution of operations. Analyzing and maximizing StratCom effects must be central to the formulation of schemes of maneuver and during the execution of operations. In order to affect this paradigm shift, ISAF HQ must synchronize all stratCom stakeholders. Implicit in this change of culture is the clear recognition that modern strategic communication is about credible dialogue, not a monologue where we design our systems and resources to deliver messages to target audiences in the most effective manner. This is now a population centric campaign and no effort should be spared to ensure that the Afghan people are part of the conversation. Receiving, understanding, and amending behavior as a result of messages received from audiences can be an effective method of gaining genuine trust and credibility. This would improve the likelihood of the population accepting ISAF messages and changing their behavior as a result."


See also

* Fifth Dimension Operations * Radicalization * Cyberware *
Electronic warfare Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum (EM spectrum) or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent ...
*
Black propaganda Black propaganda is a form of propaganda intended to create the impression that it was created by those it is supposed to discredit. Black propaganda contrasts with gray propaganda, which does not identify its source, as well as white propagand ...
*
Cyberwarfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
* Communications security *
Command and control warfare Command and control (abbr. C2) is a "set of organizational and technical attributes and processes ... hatemploys human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or e ...
*
Disinformation Disinformation is false information deliberately spread to deceive people. It is sometimes confused with misinformation, which is false information but is not deliberate. The English word ''disinformation'' comes from the application of the ...
*
Historical revisionism In historiography, historical revisionism is the reinterpretation of a historical account. It usually involves challenging the orthodox (established, accepted or traditional) views held by professional scholars about a historical event or times ...
* Gatekeeper (politics) *
Industrial espionage Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrated by governme ...
*
Irregular Warfare Irregular warfare (IW) is defined in United States joint doctrine as "a violent struggle among state and non-state actors for legitimacy and influence over the relevant populations." Concepts associated with irregular warfare are older than the te ...
*
iWar iWar is the term used by NATO to describe a form of Internet-based warfare. iWar comparisons iWar is distinct in that, information warfare pertains to issues of intelligence. Whereas cyber-warfare and cyber-terrorism, pertain to issues oextel ...
* Network-centric warfare * Political Warfare *
Psychological warfare Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and M ...
*
Public affairs (military) Public Affairs is a term for the formal offices of the branches of the United States Department of Defense whose purpose is to deal with the media and community issues. The term is also used for numerous media relations offices that are create ...
* Information Operations Roadmap * Propaganda in the Mexican Drug War *
The Institute of World Politics The Institute of World Politics (IWP) is a private graduate school of national security, intelligence, and international affairs in Washington DC, and Reston, Virginia. Founded in 1990, it offers courses related to intelligence, national securit ...
* Bolivarian propaganda


References


Bibliography

*


External links

{{External links, date=May 2016
U.S. Department of Defense Information Operations Related Documents

Operations Security (JP 3-13.3)

Military Deception (JP 3-13.4)

Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism
Yale Information Society Project Conference Paper (2005).
Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas
Presentation (PDF slides) to the Bantle - Institute for National Security and Counterterrorism (INSCT) Symposium, Syracuse University (2006). * K. A. Taipale
''Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet''
16 National Strategy F. Rev. 14 (Summer 2007).

Information operations and warfare Psychological warfare