fbpx
Wikipedia

Information Operations (United States)

Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to [1] Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems.[1]

History of Information Operations in the U.S. Military edit

 
U.S. Army leaflet targeting the 45th North Korean Division

The modern U.S. military can trace its use of information operations back to World War 2 when the Army activated the 23rd Headquarters Special Troops, known as the "Ghost Army", on January 20, 1944. This secretive unit was responsible for executing 22 large-scale military deceptions in Europe using techniques such as inflatable vehicles, false radio transmissions, loud-speaker sound effects, and phone generals.[2] Specific operations the 23rd was noted for having success was D-Day and Operation Viersen. Today the 23rd, has been attributed as saving the lives of 15,000 to 30,000 American service members.[3] In the Pacific, the Navy successfully conducted its first electronic warfare activities later in the war when TBM Avenger aircraft were fitted with receivers and rudimentary jammers to locate and jam Japanese air search radars.[4]

Despite the success of the 23rd, deception was never used in a significant way in Korean War,[5] however psychological warfare was routinely conducted by the Eighth Army, predominantly in the form of airborne leaflets, including a weekly "news" leaflet dropped on communist forces, but also included radio and loudspeaker broadcasts.[6][7] During the war forces under United Nations Command used electronic jamming, much like the Navy at the end of World War 2, against radar on radar-directed anti-aircraft guns, particularly during Operation Strangle.[8] Though these examples fall within the capabilities associated with information operations, they were applied in specific circumstances for particular missions and not de-conflicted or synchronized for maximum effect. Because of their discrete applications, information operations was not fully exercised during the war as it is known today.

Much the same as in the Korean War, deception was also disregarded as a practice during the Vietnam War.[5]

In the mid-1990s, the U.S. Department of Defense began characterizing doctrine known as Command and Control Warfare (C2W) which was described as a strategy to attack the decision-making, or command and control (C2) capabilities of an adversary while protecting the decision-making capabilities of friendly forces.[9] It focused on a robust targeting system and defined five core capabilities, called pillars, it leverages: operations security, military deception, psychological operations, electronic warfare, and physical destruction.[10]

On December 9, 1996, the Deputy Secretary of Defense, John P. White approved the Department of Defense release of a then Secret Directive S-3600.1 that codified the concept of Information Operations.[11] This directive mandated the U.S. Armed Services to develop their own doctrine, training, and equipment, to execute information operations.[11]

Shortly after the release of DODD S-3600.1, the U.S. Army stood up the Land Information Warfare Activity/Information Dominance Center (LIWA/IDC), which would eventually transition into the 1st Information Operations Command (Land), and established the Information Operations functional area in April 1999 to specially train and assign commissioned officers to plan and conduct IO.[12]

During this time, the Army National Guard began to engage in developing their own information operations capabilities, establishing ad hoc information operations field support teams (FSTs), and vulnerability assessments teams (VATs), coordinated with the LIWA/IDC. National Guard units from Washington, Iowa, Vermont, and Texas were part of this early development.

Information Operations (IO) edit

 
Comes from JP 3-13 (Joint Publication) and pertains to Information Operations (Info Ops) in the United States.

Information Operations is considered an umbrella term to describe the coordination activities required to plan, synchronize, and assess operations, activities, and investments typically related to the non-lethal capabilities of psychological operations, cyberspace operations, civil-military operations, public affairs, operations security, and military deception. Operational U.S. military units at the flag-officer level typically have an Information Operations directorate known as the G-39 (for Army or Marine headquarters) or J-39 (for joint headquarters), for example, following the ConStaff system. These directorates typically have an array of personnel from information operations generalists, intelligence analysts, psychological operations specialists, and cyber and electronic warfare officers. Different headquarters have included civil affairs, space and cyberspace operations within the directorate while others have organized them under separate directorates within the staff.

In recent years, the U.S. military has stood up unique task forces solely focused on information operations, such as the U.S. Pacific Fleet's Fleet Information Warfare Command Pacific.[13]

U.S. Military Information Operations edit

U.S. Department of Defense Information Operations edit

 
JIOWC Emblem

The Joint Information Operations Warfare Center (JIOWC) was created by the U.S. Strategic Command (USSTRATCOM) sometime around 2004 or 2005 at Lackland Air Force Base, Texas, with the intent of coordinating and executing U.S. information operations at the strategic level.[14] On September 12, 2011, by executive order, the JIOWC was chartered as a Chairman's Controlled Activity aligned under the Joint Staff.[15] The JIOWC falls within the Joint Staff Operations Directorate (J3), through the Deputy Director Global Operations, J39 (DDGO).

U.S. Army Information Operations edit

 
56th TIOG Change of Command Ceremony at JBLM, WA on May 7, 2017.

U.S. Army Combined Army Center includes the U.S. Army Information Operations Proponent (USAIOP) whose mission is to executes Total Army Force Modernization responsibilities across the DOTMLPF-P to meet the Army's requirement for Information Operations.[16]

In the United States Army, units division-sized or larger have an IO staff directorate, known as the G-39, responsible for the integration of information operations capabilities. These directorates are often augmented by IO Field Support Teams from the following Army IO units:

Information Operations Qualification edit

In the Army, only commissioned officers are formally qualified in the Information Operations functional area, known as FA30. Officers can qualified through one of two courses:

  • IO Qualification Course (IOQC) - a 12-week, 480-hour resident course taught at the Combined Army Center, Fort Leavenworth, KS.[17]
  • IO Qualification Course - Reserve Component (IOQC-RC) - a two-phase course taught by the National Guard Information Operations School, 3-124th Information Operations (IO) Battalion, Vermont Army National Guard. Phase one consists of 415 hours of study consisting of 20 four-hour synchronous class periods held weekly. Phase 2 is a 15-day resident exercise held at the Regional Readiness Training Center collocated with Norwich University in Northfield, Vermont.[18]

Most Army commissioned officers, warrant officers, and noncomissioned officers have the option of earning the P4 Information Operations Additional Skill Identifier (ASI) by attending one of two 10-day courses:

  • Tactical Information Operations Planners Course (TIOPC)[19]
  • Army Information Operations Planners Course (AIOPC)

U.S. Navy & Marine Corps Information Operations edit

 
Navy Information Dominance Warfare Insignia

In the United States Navy, information operations are often supervised by a Navy Information Operations Command (NIOC), for example in the United States Tenth Fleet which has several NIOCs.

In the United States Marine Corps, the proponent for information operations is the Marine Corps Information Operations Center (MCIOC) at Marine Corps Base Quantico, Virginia.

U.S. Air Force Information Operations edit

 
Air Force Information Operations Badge

The United States Air Force bases its Information Operations doctrine from Air Force Doctrinal Publication (AFDP) 3–13, Information in Air Force Operations.[20]

Air Force officers can serve as Information Operations Officers, Air Force Specialty Code (AFSC) 14FX, after completing the Information Operations Professional Course (IOPC).[21]

U.S. Air Force Information Operations Units:

Many U.S. Air Force units have redesignated between Information Operations, Cyberspace Operations, and Intelligence. For example, the 39th IO Sqdn's official website identifies itself as a subordinate organization of the 688th Information Operations Wing, however the Wing's official website identifies itself as a Cyberspace Operations unit.[22] [23]

Information Related Capabilities edit

Electronic Warfare (EW) edit

 
U.S. Military personnel assigned to the 4th Psychological Operations Group, 193rd Special Operations Wing, Pennsylvania Air National Guard (PA ANG) broadcast television and radio programming
 
EC-130J Commando Solo
  • Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services. EW includes three major subdivisions:
    • Electronic Attack (EA)
    • Electronic Protection (EP)
    • Electronic warfare Support (ES)
  • EW supports information operations by using offensive and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial use of the electromagnetic spectrum (EMS) while protecting friendly freedom of action in that spectrum. Expanding reliance on the EMS for informational purposes increases both the potential and the challenges of EW in IO. The increasing prevalence of wireless telephone and computer usage extends both the utility and threat of EW, offering opportunities to exploit an adversary's electronic vulnerabilities and a requirement to identify and protect our own from similar exploitation. As the use of the EMS has become universal in military operations, so has EW become involved in IO. All of the core, supporting, and related IO capabilities can either directly use EW or indirectly benefit from EW. In order to coordinate and deconflict EW, and more broadly all military usage of the EMS, an Electronic Warfare Coordination Cell (EWCC) may be established to reside with the component commander most appropriate to the operation. In addition, all joint operations require a joint restricted frequency list (JRFL). This list specifies protected, guarded, and taboo frequencies that should not normally be disrupted without prior coordination and planning, either because of friendly use or friendly exploitation. This is maintained and promulgated by the communications system directorate of a joint staff (J-6) in coordination with J-3 and the joint commander's electronic warfare staff (or EWCC, if delegated).[1]
  • Domination of the Electromagnetic Spectrum. DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles (UAVs) or robots operated by adversaries.[24]

Computer Network Operations (CNO) edit

  • CNO as an IO Core Capability. The increasing reliance of unsophisticated militaries and terrorist groups on computers and computer networks to pass information to C2 forces reinforces the importance of CNO in IO plans and activities. As the capability of computers and the range of their employment broadens, new vulnerabilities and opportunities will continue to develop. This offers both opportunities to attack and exploit an adversary's computer system weaknesses and a requirement to identify and protect our own from similar attack or exploitation.[1]
  • Computer network attack (CNA). Actions are taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.
  • Computer network defense (CND). Actions are taken through the use of computer networks to protect, monitor, analyze, detect and respond to unauthorized activity within the Department of Defense information systems and computer networks.
  • Computer network exploitation (CNE). Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.

Psychological Operations (PSYOP) edit

 
Soldiers from the U.S. Army's 350th Tactical Psychological Operations, 10th Mountain Division, drop leaflets over a village near Hawijah in Kirkuk province, Iraq, on 6 March 2008.
 
U.S. Army PSYOP Force structure
 
NATO leaflet in Libya
  • PSYOP as an IO Core Capability. PSYOP has a central role in the achievement of IO objectives in support of the JFC. In today's information environment even PSYOP conducted at the tactical level can have strategic effects. Therefore, PSYOP has an approval process that must be understood and the necessity for timely decisions is fundamental to effective PSYOP and IO. This is particularly important in the early stages of an operation given the time it takes to develop, design, produce, distribute, disseminate, and evaluate PSYOP products and actions. All PSYOP are conducted under the authority of interagency-coordinated and OSD approved PSYOP programs. The PSYOP program approval process at the national level requires time for sufficient coordination and resolution of issues; hence, JFCs should begin PSYOP planning as early as possible to ensure the execution of PSYOP in support of operations. A JFC must have an approved PSYOP program, execution authority, and delegation of product approval authority before PSYOP execution can begin. JFCs should request PSYOP planners immediately during the initial crisis stages to ensure the JFC has plenty of lead time to obtain the proper authority to execute PSYOP. PSYOP assets may be of particular value to the JFC in pre-/post-combat operations when other means of influence are restrained or not authorized. PSYOP must be coordinated with CI, MILDEC, and OPSEC to ensure deconfliction and control, CI operations are not compromised, and that all capabilities within IO are coordinated to achieve the objectives established in planning. There must be close cooperation and coordination between PSYOP and PA staffs in order to maintain credibility with their respective audiences, which is the purpose of the IO cell. PSYOP efforts are most effective when personnel with a thorough understanding of the language and culture of the TA are included in the review of PSYOP materials and messages. As the information environment evolves, the dissemination of PSYOP products is expanding from traditional print and broadcast to more sophisticated use of the Internet, facsimile messaging, text messaging, and other emerging media. The effectiveness of PSYOP is enhanced by the synchronization and coordination of the core, supporting, and related capabilities of IO; particularly public affairs (PA), MILDEC, CNO, civil-military operations (CMO), and EW.[25]
  • Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.
  • 4th Psychological Operations Group

Military Deception (MILDEC) edit

 
Simulated OH-58C Kiowa helicopter and simulated fuel blivets during a deception operation on 10 November 1990 carried out by the XVIII Airborne Corps Deception Cell. This simulated forward arming and refueling point (FARP) at TL 139512 in the Eastern Province of Saudi Arabia was approximately 45 kilometers northwest of An Nuariya.
  • MILDEC is described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly forces' mission. MILDEC and OPSEC are complementary activities – MILDEC seeks to encourage incorrect analysis, causing the adversary to arrive at specific false deductions, while OPSEC seeks to deny real information to an adversary, and prevent correct deduction of friendly plans. To be effective, a MILDEC operation must be susceptible to adversary collection systems and "seen" as credible to the enemy commander and staff. A plausible approach to MILDEC planning is to employ a friendly course of action (COA) that can be executed by friendly forces and that adversary intelligence can verify. However, MILDEC planners must not fall into the trap of ascribing to the adversary particular attitudes, values, and reactions that "mirror image" likely friendly actions in the same situation, i.e., assuming that the adversary will respond or act in a particular manner based on how we would respond. There are always competing priorities for the resources required for deception and the resources required for the real operation. For this reason, the deception plan should be developed concurrently with the real plan, starting with the commander's and staff's initial estimate, to ensure proper resourcing of both. To encourage incorrect analysis by the adversary, it is usually more efficient and effective to provide a false purpose for real activity than to create false activity. OPSEC of the deception plan is at least as important as OPSEC of the real plan, since compromise of the deception may expose the real plan. This requirement for close hold planning while ensuring detailed coordination is the greatest challenge to MILDEC planners. On joint staffs, MILDEC planning and oversight responsibility is normally organized as a staff deception element in the operations directorate of a joint staff (J-3).[26]
  • MILDEC as an IO Core Capability. MILDEC is fundamental to successful IO. It exploits the adversary's information systems, processes, and capabilities. MILDEC relies upon understanding how the adversary commander and supporting staff think and plan and how both use information management to support their efforts. This requires a high degree of coordination with all elements of friendly forces' activities in the information environment as well as with physical activities. Each of the core, supporting, and related capabilities has a part to play in the development of successful MILDEC and in maintaining its credibility over time. While PA should not be involved in the provision of false information, it must be aware of the intent and purpose of MILDEC in order not to inadvertently compromise it.[26]
  • A message targeted to exploit a fissure between a key member of the adversary's leadership who has a contentious relationship with another key decision maker is an example. That message could cause internal strife resulting in the adversary foregoing an intended course of action and adopting a position more favorable to our interests.[27]
  • Article title

Operations Security (OPSEC) edit

 
Someone Talked
  • OPSEC as an IO Core Capability. OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions. In particular, OPSEC complements MILDEC by denying an adversary information required to both assess a real plan and to disprove a deception plan. For those IO capabilities that exploit new opportunities and vulnerabilities, such as EW and CNO, OPSEC is essential to ensure friendly capabilities are not compromised. The process of identifying essential elements of friendly information and taking measures to mask them from disclosure to adversaries is only one part of a defense-in-depth approach to securing friendly information. To be effective, other types of security must complement OPSEC. Examples of other types of security include physical security, IA programs, computer network defense (CND), and personnel programs that screen personnel and limit authorized access.[28]
  • What occurs, often, is that data is either leaked, stolen, or hacked online and the enemy has access to and can decipher what that information may say. This is especially true for defensive operational security. US servicemen and servicewomen may have Facebook, multiple blogs, or upload photos, which can lead to the enemy knowing troop movements and locations. With this information, setting up ambush and wreaking havoc on US and support personnel becomes much easier. Geo-tagging features of cellular phones especially, may cause this type of breach in OPSEC.[29][30][31]

Equipment methods and tactics edit

EW edit

EC-130 edit

The EC-130E Airborne Battlefield Command and Control Center (ABCCC) was based on a basic C-130E platform and provided tactical airborne command post capabilities to air commanders and ground commanders in low air threat environments. This EC-130E ABCCC has since been retired.

The EC-130E Commando Solo was an earlier version of a United States Air Force and Air National Guard psychological operations (PSYOPS) aircraft. This aircraft also employed a C-130E airframe, but was modified by using the mission electronic equipment from the retired EC-121S Coronet Solo aircraft. This airframe served during the first Gulf War (Operation Desert Storm), the second Gulf War (Operation Iraqi Freedom) and in Operation Enduring Freedom. The EC-130E was eventually replaced by the EC-130J Commando Solo and was retired in 2006.

The EC-130J Commando Solo is a modified C-130J Hercules used to conduct psychological operations (PSYOP) and civil affairs broadcast missions in the standard AM, FM, HF, TV, and military communications bands. Missions are flown at the maximum altitudes possible to ensure optimum propagation patterns. The EC-130J flies during either day or night scenarios with equal success, and is air-refuelable. A typical mission consists of a single-ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel. The Commando Solo is operated exclusively by the Air National Guard, specifically the 193d Special Operations Wing (193 SOW), a unit of the Pennsylvania Air National Guard operationally gained by the Air Force Special Operations Command (AFSOC). The 193 AOW is based at the Harrisburg Air National Guard Base (former Olmstead AFB) at Harrisburg International Airport in Middletown, Pennsylvania.

The United States Navy's EC-130Q Hercules TACAMO ("Take Charge and Move Out") aircraft was a land-based naval aviation platform that served as a SIOP strategic communications link aircraft for the U.S. Navy's Fleet Ballistic Missile (FBM) submarine force and as a backup communications link for the USAF manned strategic bomber and intercontinental ballistic missile forces. To ensure survivability, TACAMO operated as a solo platform, well away from and not interacting with other major naval forces such as sea-based aircraft carrier strike groups and their carrier air wings or land-based maritime patrol aircraft Operated by Fleet Air Reconnaissance Squadron THREE (VQ-3) and Fleet Air Reconnaissance Squadron FOUR (VQ-4), the EC-130Q was eventually replaced by the U.S. Navy's current TACAMO platform, the Boeing 707-based E-6 Mercury.

Computer network operations edit

Stuxnet edit

Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment. While it is not the first time that hackers have targeted industrial systems,[32] it is the first discovered malware that spies on and subverts industrial systems,[33] and the first to include a programmable logic controller (PLC) rootkit.[34][35]

In May 2011, the PBS program Need To Know cited a statement by Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet.[36] According to the British Daily Telegraph, a showreel that was played at a retirement party for the head of the Israel Defense Forces (IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational successes as the IDF chief of staff.[37]

Suter edit

Suter is a military computer program developed by BAE Systems that attacks computer networks and communications systems belonging to an enemy. Development of the program has been managed by Big Safari, a secret unit of the United States Air Force. It is specialised to interfere with the computers of integrated air defence systems.[38][dead link] Suter was integrated into US unmanned aircraft by L-3 Communications.[39]

Three generations of Suter have been developed. Suter 1 allows its operators to monitor what enemy radar operators can see. Suter 2 lets them take control of the enemy's networks and direct their sensors. Suter 3, tested in Summer 2006, enables the invasion of links to time-critical targets such as battlefield ballistic missile launchers or mobile surface-to-air missile launchers.

The program has been tested with aircraft such as the EC-130, RC-135, and F-16CJ.[38] It has been used in Iraq and Afghanistan since 2006.[40][41]

U.S. Air Force officials have speculated that a technology similar to Suter was used by the Israeli Air Force to thwart Syrian radars and sneak into their airspace undetected in Operation Orchard on 6 September 2007. The evasion of air defence radar was otherwise unlikely because the F-15s and F-16s used by the IAF were not equipped with stealth technology.[39][40]

Psychological Operations Capabilities edit

Radio in a Box edit

 
United States Psychological Operations

Radio is the dominant information tool to reach wide audiences in isolated, mountainous regions. The US military has deployed RIABs throughout Afghanistan in order to communicate with the residents. Due to a 70 percent illiteracy rate and lack of education in Afghanistan, radio is a vital communications tool used to broadcast information where radio ownership exceeds 80 percent.[42][43] The United States military operates approximately 100 RIABs and hire local Afghan DJs in Afghanistan to broadcast information and host call-in shows.[44] The United States Army employed RIAB systems to broadcast anti-Taliban and anti-Al Qaeda messages and countered Taliban propaganda by pushing onto Taliban frequencies in Paktia Province.[45][46] One advantage of employing RIAB systems is the ability to broadcast vital information immediately to a large audience in the event of a crisis.[44] One Afghan DJ has 50,000 listeners.[47] Nawa District Governor Abdul Manaf uses the local RIAB station to conduct weekly call-in shows and believes the RIAB system is one of his best communication tools to inform a large audience.[48] In Afghanistan's Paktika province, which has a literacy rate of two percent, an estimated 92 percent of the residents listen to the radio every day.[46][47] Radio programs transmitted using RIAB systems provide beneficial information to Afghan farmers in remote areas.[42] In the isolated, mountainous Wazi Kwah district of Paktika Province, a RIAB system supplies the only source of outside news.[49] Afghan National Army commanders use the RIAB to communicate to villagers and elders and provide thoughts to the community.[50] Afghans can use information distributed by the United States military such as how to react to an approaching military convoy or purpose or use of U.S.-sponsored agriculture programs. For general news, Afghans can also use other information outlets such as the BBC or VOA because RIAB systems are controlled by the US military.[51] Special Operations first employed RIAB systems in Afghanistan in 2005 which improved their ability to supply information to and communicate with the local population in their areas of operation.[52]

B (SOMS-B) edit

  • Special Operation Media Systems – B (SOMS-B)

--The SOMS-B is a ground-based HMMWV mounted radio and television broadcast system. Like the EC-130C/J it can broadcast on AM, FM, SW and VHF television frequencies. The SOMS-B also has the capability to produce programming or radio and television broadcasts[53][54]

Other/Integrated edit

Radio edit

Radio Azadi edit

Radio Aazadi, formerly known as Radio Free Afghanistan (RFA) is the Afghan branch of Radio Free Europe / Radio Liberty's (RFE/RL) broadcast services. It broadcasts 12 hours daily as part of a 24-hour stream of programming in conjunction with Voice of America (VOA). RFA first aired in Afghanistan from 1985 to 1993 and was re-launched in January 2002. RFA produces a variety of cultural, political, and informational programs that are transmitted to listeners via shortwave, satellite and AM and FM signals provided by the International Broadcasting Bureau. RFA's mission is "to promote and sustain democratic values and institutions in Afghanistan by disseminating news, factual information and ideas".[55]

Adversarial IO edit

Terrorists (IO from US Perspective) edit

"Terrorists are adept at integrating their physical acts of violence with IO. They make audio and video recordings of the incidents for distribution over the Internet and on television. Their violence becomes theater, staged for its psychological impact, and replayed over and over again in the media as IO."[56]

  • "Terrorists employ all the IO capabilities of U.S. military doctrine, including the five core capabilities of PSYOP, military deception, EW, CNO, and OPSEC, and the supporting and related capabilities. They use IO to support both offensive operations (acts of terrorism) and defensive operations (e.g., protecting their hiding places). They use IO strategically in support of broad objectives. While terrorists do not speak and write of "IO", they demonstrate an understanding of the value and methods of IO capabilities. Terrorists appear to be particularly adept at PSYOP, PA, counterpropaganda, and certain forms of OPSEC and deception, driven by their desire to simultaneously reach desired audiences and hide from their enemies. They recognize the value of various media, including the Internet, and exploit it to support their cause. Terrorists and their supporters have a CNO capability, with CNA manifesting itself as "electronic jihad" rather than as acts of terror."[57]

Computer network operations edit

There are many examples of CNA and are generally done in support of other operations. Terrorists have integrated cyber attacks into their thinking, strategies, and operations as an extremely cost-effective way to harm the US and other adversaries.[58]

The same can be said for CNE, which is about penetrating computer networks before actually attacking them. Gaining access to specific networks is seen to be as part of the CNA process for terrorists (they do not distinguish between the two).[58]

As for CND, terrorists are aware of keeping data secure and websites running because they use the Internet. Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them. The methods they use include access controls, encryption, authentication, firewalls, intrusion detection, anti-viral tools, audits, security management, and security awareness and training.[58]

  • "The Taliban have in recent months waged an intensifying information war with NATO forces in the country, distributing anti-government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014. A day rarely passes without a Taliban spokesman using Twitter to claim the destruction of numerous NATO armoured vehicles and the deaths of scores of Western or Afghan security forces, with NATO quickly countering in its own Twitter feeds. The Taliban also employ a sophisticated network of spokesmen to distribute messages and even have their own mobile radio broadcast service, which frequently moves location to avoid the threat of retaliatory airstrikes by NATO warplanes."[59]
    • The Taliban HAVE to rely on CNO and integrate it into their IO campaign as it is the most cost-effective method of disrupting Western forces. This is a prime example of how CNO is used in conjunction with PSYOP to achieve their objectives.

Steganography edit

When one considers that messages could be encrypted steganographically in email messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light. Coupled with the "chaffing and winnowing" technique, a sender could get messages out and cover their tracks all at once.

 
An example showing how terrorists may use forum avatars to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with using "växjö" as password.

Rumors about terrorists using steganography started first in the daily newspaper USA Today on 5 February 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web with links to jihad". A citation from the article: "Lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com". Other media worldwide cited these rumors many times, especially after the terrorist attack of 9/11, without ever showing proof. The Italian newspaper Corriere della Sera reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The USA Today articles were written by veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations emerged that he had fabricated stories and sources.

In October 2001, The New York Times published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the 11 September 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development,[60] published in April 2006 makes the following statements:

  • "...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." (p. 9–10)
  • "International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p. 41–42)
  • "The threat posed by steganography has been documented in numerous intelligence reports." (p. 42)

Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images."[61]

By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media.

Military deception edit

A police search of a British, al-Qaeda member's home, uncovered what is now called "The al-Qaeda Training Manual", a techniques instruction book on deception, forgery, "blending in", hiding places, and the use of covers to blend into the terrorist area of operation (usually cities with large civilian populations).[62] The philosophy the MILDEC is for the concealment of activities rather than misleading adversaries.[63]

PSYOP edit

Terrorist PSYOP differs from American PSYOP in one two major areas. First, US PSYOP targets foreign adversaries and information is coordinated with many other agencies and screened before it is published. Second, while PSYOP by US and coalition forces is "designed to bring an end to violence and save lives, terrorist PSYOP is frequently directed toward promoting violence and threatening civilian populations with death and destruction. Suicide bombers are portrayed as martyrs rather than killers of innocent people."[64]

The Internet is the main resource to spread propaganda with al-Aqaeda and other terrorist groups. "According to Bruce Hoffman, before it was taken down, al-Qaeda's website Alneda.com emphasized three themes: 1)the West is implacably hostile to Islam, 2) the only way to address this threat and the only language the West understands is the logic of violence, and 3) jihad is the only option"[64][65]

Terrorists also like to use the Internet to recruit and persuade children to their cause. As Dorothy Denning has found, "Children are being taught to hate Jews and Westerners, and to take up arms against them [through cartoons and comic-book style web pages, bedtime stories, and computer games]".[66]

OPSEC edit

All terrorists practice a high level of OPSEC since their need to be secret is how they can be successful. Whether it is the al-Qaeda training manual, online magazines targeted for the world, or the training of youth in Jihad camps, OPSEC is one of the first priorities for terrorists.[67]

Secure communications are big as well. The 11 September hijackers, for example, accessed anonymous Hotmail and Yahoo! accounts from computers at Kinko's and at a public library.[68] Messages are also coded. Three weeks before the attacks, Mohamed Atta reportedly received a coded email message that read: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering."[69] The faculties referred to the four targets (twin towers, Pentagon, and Capitol).[70]

The list of methods goes on and on and is very similar to the methods used in organized crime around the world.

Criticism edit

  • In 2011, Lt. Col. Michael Holmes, a member of the Army's 71st TIOG serving on the NATO Training Mission-Afghanistan staff, communicated alleged use of illegal PSYOP on visiting U.S. dignitaries, claiming such orders originated from Lt. Gen. William Caldwell.[71][72] Among the alleged targets were American Senators John McCain and Carl Levin, government ministers, and European diplomats. Holmes' disclosure resulted in several news articles, most notably a Rolling Stone article titled, "Another Runaway General: Army Deploys Psy-Ops on U.S. Senators" authored by Michael Hastings who recently earned fame for his reporting on General Stanley McChrystal the previous year. Hastings' article "The Run Away General" ultimately led to McChrystal's firing by President Obama.[73] Media reports stated that the Holmes' IO unit was subjected to a retaliatory campaign when it resisted the order to influence the targets, including a subsequent reprimand against Lt. Col. Holmes.[74] Army investigators ultimately determined Holme's claims of illegal psychological operations were "not substantiated."[75]
  • "In [stability, reconstruction, and COIN operations], the most important targets of influence are not enemy commanders, but individuals and groups, both local and international, whose cooperation is vital to the mission's success. Granted, joint and Army IO doctrine publications do not ignore these targets – PSYOP and counterpropaganda can be designed to influence them. But it is notable that the activities most directly aimed at influencing local and international audiences – functions such as public affairs, civil affairs, CMOs, and defense support to public diplomacy – are treated only as 'related activities' in IO doctrine, if they are mentioned at all"[76]
  • "There must be a fundamental change of culture in how ISAF approaches operations. StratCom should not be a separate Line of Operation, but rather an integral and fully embedded part of policy development, planning processes, and the execution of operations. Analyzing and maximizing StratCom effects must be central to the formulation of schemes of maneuver and during the execution of operations. In order to affect this paradigm shift, ISAF HQ must synchronize all stratCom stakeholders. Implicit in this change of culture is the clear recognition that modern strategic communication is about credible dialogue, not a monologue where we design our systems and resources to deliver messages to target audiences in the most effective manner. This is now a population centric campaign and no effort should be spared to ensure that the Afghan people are part of the conversation. Receiving, understanding, and amending behavior as a result of messages received from audiences can be an effective method of gaining genuine trust and credibility. This would improve the likelihood of the population accepting ISAF messages and changing their behavior as a result."[77]

See also edit

References edit

  1. ^ a b c d (PDF). Archived from the original (PDF) on 8 February 2015. Retrieved 4 April 2015.{{cite web}}: CS1 maint: archived copy as title (link)
  2. ^ "Ghost Army: The Combat Con Artists of World War II". The National World War 2 Museum Official Website. The National World War 2 Museum. Retrieved 27 November 2023.
  3. ^ Gormly, Kellie B. "How the Ghost Army of WWII Used Art to Deceive the Nazis". Smithsonian Magazine Official Website. Smithsonian Magazine. Retrieved 27 November 2023.
  4. ^ "Electronic Attack Wing Pacific: Command History". Naval Air Force, U.S. Pacific Fleet Official Site. U.S. Navy. Retrieved 27 November 2023.
  5. ^ a b Meier, William A. "Deception: Here to Stay!" (PDF). Defense Technical Information Center. U.S. Naval War College. Retrieved 27 November 2023.
  6. ^ Brauer, Albert C. "PSYCHOLOGICAL WARFARE KOREA 1951" (PDF). North Dakota State University Libraries Official Website. Georgetown University.
  7. ^ "Psychological Warfare in Korea: An Interim Report". The Public Opinion Quarterly. 15 (1 (Spring 1951)): 66.
  8. ^ "BATTLE OF KOREA: Deadly Flak". Time. 11 February 1952. ISSN 0040-781X. Retrieved 12 August 2021.
  9. ^ Hutcherson, Norman B. (September 1994). COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE (PDF). Maxwell Air Force Base, Alabama: Air University Press. p. xiv. Retrieved 25 December 2023.
  10. ^ Hutcherson, Norman B. (September 1994). COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE (PDF). Maxwell Air Force Base, Alabama: Air University Press. p. xiv. Retrieved 25 December 2023.
  11. ^ a b Hutcherson, Norman B. (9 December 1996). DODD S-3600.1 Information Operations (IO). Washington, D.C.: U.S. Department of Defense. Retrieved 25 December 2023.
  12. ^ "Chapter 2: Officer Classification System" (PDF). U.S. Army Official Website. U.S. Army. Retrieved 25 December 2023.
  13. ^ Pomerleau, Mark (16 February 2023). "Here's what the new information warfare command in the Pacific is doing". Defensescoop. Retrieved 5 December 2023.
  14. ^ Ambinder, Marc (20 May 2010). "The Secret Pentagon Spy Ring". The Atlantic. Retrieved 24 January 2022.
  15. ^ "The Unified Command Plan and Combatant Commands: Background and Issues for Congress". crsreports.congress.gov/. Congressional Research Service. Retrieved 5 December 2023.
  16. ^ "U.S. Army Information Operations Proponent (USAIOP)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  17. ^ "IO Qualification Course (IOQC)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  18. ^ "IO Qualification Course (RC)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  19. ^ "Tactical IO Planner Course (TIOPC)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  20. ^ Information In Air Force Operations (PDF). U.S. Air Force. 1 February 2023. Retrieved 26 November 2023.
  21. ^ "Information Operations Officer". The Official Website of the U.S. Air Force. U.S. Air Force. Retrieved 26 November 2023.
  22. ^ "39th Information Operations Squadron". Hurlbert Field Official Website. U.S. Air Force. Retrieved 26 November 2023.
  23. ^ "688th Cyberspace Wing". 16th Air Force (Air Forces Cyber) Official Website. U.S. Air Force. Retrieved 26 November 2023.
  24. ^ "DOD Information Operations Roadmap" (PDF). Gwu.edu. 30 October 2003. p. 61. Retrieved 20 May 2016.]
  25. ^ "Joint Publication 3-53 : Doctrine for Joint Psychological Operations" (PDF). Gwu.edu. Retrieved 20 May 2016.
  26. ^ a b JCS, JP 3-58, Joint Doctrine for Military Deception (Washington, DC: GPO, 31 May 1996), v-vi.
  27. ^ , p. 98
  28. ^ (PDF). Archived from the original (PDF) on 21 July 2013. Retrieved 4 April 2015.{{cite web}}: CS1 maint: archived copy as title (link)
  29. ^ "Military Personnel Warned Against Geotagging Photos". RedOrbit Staff & Wire Reports. Retrieved 18 April 2012.
  30. ^ Post, Global. "Army: Facebook geotagging dangerous for soldiers". Tucson Sentinel. Retrieved 18 April 2012.
  31. ^ "OPSEC". Army Spouses Online Facebook. Retrieved 18 April 2012.
  32. ^ . Siemens. 30 September 2010. Archived from the original on 21 April 2021. Retrieved 5 December 2010.
  33. ^ Robert McMillan (16 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Archived from the original on 25 May 2012. Retrieved 16 September 2010.
  34. ^ "Last-minute paper: An indepth look into Stuxnet". Virus Bulletin.
  35. ^ "Stuxnet worm hits Iran nuclear plant staff computers". BBC News. 26 September 2010.
  36. ^ Gary Samore speaking at the 10 December 2010 Washington Forum of the Foundation for Defense of Democracies in Washington DC, reported by C-Span and contained in the PBS program Need to Know ("Cracking the code: Defending against the superweapons of the 21st century cyberwar", 4 minutes into piece)
  37. ^ Williams, Christopher (15 February 2011). "Israel video shows Stuxnet as one of its successes". The Daily Telegraph. London. Retrieved 14 February 2012.
  38. ^ a b David A. Fulghum; Michael A. Dornheim; William B. Scott. "Black Surprises". Aviation Week and Space Technology. Retrieved 5 October 2007.
  39. ^ a b John Leyden (4 October 2007). "Israel suspected of 'hacking' Syrian air defences". The Register. Retrieved 5 October 2007.
  40. ^ a b David A. Fulghum (3 October 2007). "Why Syria's Air Defenses Failed to Detect Israelis". Aviation Week and Space Technology. Retrieved 5 October 2007.
  41. ^ David A. Fulghum (14 January 2007). "Technology Will Be Key to Iraq Buildup". Aviation Week and Space Technology.
  42. ^ a b "Afghanistan's "radio war" | @pritheworld". Archived from the original on 15 April 2013. Retrieved 24 April 2012.
  43. ^ Radio in a Box (2011). Radio in a Box 25 April 2012 at the Wayback Machine "Retrieved 2011-14-10"
  44. ^ a b Radio in a Box – Giving Afghanistans Their Own Voice! (2010). Radio in a Box – Giving Afghanistans Their Own Voice! "Retrieved 2011-14-10"
  45. ^ Army radio connects with Afghans (2009). Army radio connects with Afghans 15 October 2009 at the Wayback Machine "Retrieved 2011-10-30"
  46. ^ a b Military Embraces Counterinsurgency in Afghanistan (2008). Radio in a Box – Military Embraces Counterinsurgency in Afghanistan 2 March 2012 at the Wayback Machine "Retrieved 2011-11-11"
  47. ^ a b In Afghan Fight, U.S. Takes to the Airwaves (2010). In Afghan Fight, U.S. Takes to the Airwaves "Retrieved 2011-14-10"
  48. ^ /The Busiest Man in Nawa (2011). The Busiest Man in Nawa "U.S. Marine Corps Releases", "Retrieved 2011-11-10"
  49. ^ Local DJ celebrity to his Afghan listeners (2010). Local DJ celebrity to his Afghan listeners "Retrieved 2011-10-14"
  50. ^ Radio-in-a-Box: Afghanistan's New Warrior-DJs (2011). Radio-in-a-Box: Afghanistan's New Warrior-DJs "Retrieved 2011-10-14"
  51. ^ The Pentagon, Information Operations, and International Media Development (2010). The Pentagon, Information Operations, and International Media Development 6 January 2011 at the Wayback Machine "A Report to the Center for International Media Assistance", :e27 "Retrieved 2011-10-14"
  52. ^ Breaking the Afghan Insurgency (2007). Breaking the Afghan Insurgency "Special Warfare" 20 (5):e26 "Retrieved 2011-11-10"
  53. ^ DOCUMENT CALLED IO IN OEF AND IF -saved in your folder
  54. ^ "SOMS-B 2 MRBS Antenna System". Federal Business Opportunities. Retrieved 18 April 2012.
  55. ^ . RadioFreeEurope/RadioLiberty. Archived from the original on 23 April 2012. Retrieved 24 April 2012.
  56. ^ Denning (2005), p. 6
  57. ^ Denning (2005), p. 20
  58. ^ a b c Denning (2005), p. 11
  59. ^ Taylor, Rob (27 April 2012). "Taliban website hacked as Afghan cyber war heats up". Reuters US. Retrieved 27 April 2012.
  60. ^ Federal Plan for Cyber Security and Information Assurance Research and Development National Science and Technology Council, April 2006
  61. ^ "The New Issue of Technical Mujahid, a Training Manual for Jihadis". The Jamestown Foundation.
  62. ^ "The Al Qaeda Manual" (PDF). Justice.gov. Retrieved 20 May 2016.
  63. ^ Denning (2005), p. 7
  64. ^ a b Denning (2005)
  65. ^ Bruce Hoffman, "Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment," Studies in Conflict & Terrorism, 26:429-442, 2003.
  66. ^ Denning (2005), p. 5
  67. ^ Denning (2005), p. 12
  68. ^ Brian Ross, "A Secret Language," ABCNEWS.com, 4 October 2001.
  69. ^ 58 "Virtual Soldiers in a Holy War," Ha'aretz Daily, 16 September 2002.
  70. ^ Denning (2005), p. 13
  71. ^ William Levesque, Officer says he refused 'illegal' order in Afghanistan, St. Petersburg Times (Feb. 25, 2011.); Army to Investigate Rolling Stone's Psy-Ops Report, Atlantic Monthly (Feb. 24 2011).
  72. ^ Major Garrett, Key Senator Calls Psyops Charges Serious, but He Denies Feeling Manipulated, National Journal (Feb. 20, 2011).
  73. ^ Stuart, Tessa. "Obama Publishes Account of Firing Gen. McChrystal On the Same Day McChrystal Briefs Biden". Rolling Stone Official Website. Rolling Stone. Retrieved 28 November 2023.
  74. ^ Phil Stewart, U.S. Probes if Senators Targeted by Afghan Psy-Ops Unit, Reuters (Feb. 24, 2011); see also Rajiv Chandrasekaran, Military to investigate claim that psy-ops team was used to influence U.S. senators, Wash. Post (Feb. 24, 2011).
  75. ^ Ukman, Jason. "Lt. Gen. Caldwell cleared of allegations he ordered psy-ops team to influence lawmakers". The Washington Post Official Website. Retrieved 28 November 2023.
  76. ^ Baker, Ralph (2006). . Military Review. pp. 34–35. Archived from the original on 5 August 2011. Retrieved 26 April 2012.
  77. ^ McChrystal, Gen. Stanley A. (21 September 2009). "COMISAF Initial Assessment". US Department of Defense. Retrieved 17 April 2012.

Bibliography edit

External links edit

  • U.S. Army Information Operations Proponent (USIOP) Official Website
  • U.S. Marine Corps Information Operations Center Official Website
  • U.S. Department of Defense Information Operations Related Documents
  • Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism, Yale Information Society Project Conference Paper (2005).
  • Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, Presentation (PDF slides) to the Bantle – Institute for National Security and Counterterrorism (INSCT) Symposium, Syracuse University (2006).
  • K. A. Taipale, Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet, 16 National Strategy F. Rev. 14 (Summer 2007).
  • White House FAQ about the WoT

information, operations, united, states, information, operations, redirects, here, other, uses, information, warfare, neutrality, this, article, disputed, relevant, discussion, found, talk, page, please, remove, this, message, until, conditions, october, 2023,. Information Operations redirects here For other uses see Information warfare The neutrality of this article is disputed Relevant discussion may be found on the talk page Please do not remove this message until conditions to do so are met October 2023 Learn how and when to remove this template message This article s factual accuracy is disputed Relevant discussion may be found on the talk page Please help to ensure that disputed statements are reliably sourced April 2024 Learn how and when to remove this template message Information Operations is a category of direct and indirect support operations for the United States Military By definition in Joint Publication 3 13 IO are described as the integrated employment of electronic warfare EW computer network operations CNO psychological operations PSYOP military deception MILDEC and operations security OPSEC in concert with specified supporting and related capabilities to 1 Information Operations IO are actions taken to affect adversary information and information systems while defending one s own information and information systems 1 Contents 1 History of Information Operations in the U S Military 1 1 Information Operations IO 1 2 U S Military Information Operations 1 2 1 U S Department of Defense Information Operations 1 2 2 U S Army Information Operations 1 2 2 1 Information Operations Qualification 1 2 3 U S Navy amp Marine Corps Information Operations 1 2 4 U S Air Force Information Operations 2 Information Related Capabilities 2 1 Electronic Warfare EW 2 2 Computer Network Operations CNO 2 3 Psychological Operations PSYOP 2 4 Military Deception MILDEC 2 5 Operations Security OPSEC 2 6 Equipment methods and tactics 2 6 1 EW 2 6 2 EC 130 2 7 Computer network operations 2 7 1 Stuxnet 2 7 2 Suter 2 8 Psychological Operations Capabilities 2 8 1 Radio in a Box 2 8 2 B SOMS B 2 9 Other Integrated 2 9 1 Radio 2 9 1 1 Radio Azadi 3 Adversarial IO 3 1 Terrorists IO from US Perspective 3 2 Computer network operations 3 2 1 Steganography 3 3 Military deception 3 4 PSYOP 3 5 OPSEC 4 Criticism 5 See also 5 1 References 5 1 1 Bibliography 5 2 External linksHistory of Information Operations in the U S Military edit nbsp U S Army leaflet targeting the 45th North Korean DivisionThe modern U S military can trace its use of information operations back to World War 2 when the Army activated the 23rd Headquarters Special Troops known as the Ghost Army on January 20 1944 This secretive unit was responsible for executing 22 large scale military deceptions in Europe using techniques such as inflatable vehicles false radio transmissions loud speaker sound effects and phone generals 2 Specific operations the 23rd was noted for having success was D Day and Operation Viersen Today the 23rd has been attributed as saving the lives of 15 000 to 30 000 American service members 3 In the Pacific the Navy successfully conducted its first electronic warfare activities later in the war when TBM Avenger aircraft were fitted with receivers and rudimentary jammers to locate and jam Japanese air search radars 4 Despite the success of the 23rd deception was never used in a significant way in Korean War 5 however psychological warfare was routinely conducted by the Eighth Army predominantly in the form of airborne leaflets including a weekly news leaflet dropped on communist forces but also included radio and loudspeaker broadcasts 6 7 During the war forces under United Nations Command used electronic jamming much like the Navy at the end of World War 2 against radar on radar directed anti aircraft guns particularly during Operation Strangle 8 Though these examples fall within the capabilities associated with information operations they were applied in specific circumstances for particular missions and not de conflicted or synchronized for maximum effect Because of their discrete applications information operations was not fully exercised during the war as it is known today Much the same as in the Korean War deception was also disregarded as a practice during the Vietnam War 5 In the mid 1990s the U S Department of Defense began characterizing doctrine known as Command and Control Warfare C2W which was described as a strategy to attack the decision making or command and control C2 capabilities of an adversary while protecting the decision making capabilities of friendly forces 9 It focused on a robust targeting system and defined five core capabilities called pillars it leverages operations security military deception psychological operations electronic warfare and physical destruction 10 On December 9 1996 the Deputy Secretary of Defense John P White approved the Department of Defense release of a then Secret Directive S 3600 1 that codified the concept of Information Operations 11 This directive mandated the U S Armed Services to develop their own doctrine training and equipment to execute information operations 11 Shortly after the release of DODD S 3600 1 the U S Army stood up the Land Information Warfare Activity Information Dominance Center LIWA IDC which would eventually transition into the 1st Information Operations Command Land and established the Information Operations functional area in April 1999 to specially train and assign commissioned officers to plan and conduct IO 12 During this time the Army National Guard began to engage in developing their own information operations capabilities establishing ad hoc information operations field support teams FSTs and vulnerability assessments teams VATs coordinated with the LIWA IDC National Guard units from Washington Iowa Vermont and Texas were part of this early development Information Operations IO edit nbsp Comes from JP 3 13 Joint Publication and pertains to Information Operations Info Ops in the United States Information Operations is considered an umbrella term to describe the coordination activities required to plan synchronize and assess operations activities and investments typically related to the non lethal capabilities of psychological operations cyberspace operations civil military operations public affairs operations security and military deception Operational U S military units at the flag officer level typically have an Information Operations directorate known as the G 39 for Army or Marine headquarters or J 39 for joint headquarters for example following the ConStaff system These directorates typically have an array of personnel from information operations generalists intelligence analysts psychological operations specialists and cyber and electronic warfare officers Different headquarters have included civil affairs space and cyberspace operations within the directorate while others have organized them under separate directorates within the staff In recent years the U S military has stood up unique task forces solely focused on information operations such as the U S Pacific Fleet s Fleet Information Warfare Command Pacific 13 U S Military Information Operations edit U S Department of Defense Information Operations edit nbsp JIOWC EmblemThe Joint Information Operations Warfare Center JIOWC was created by the U S Strategic Command USSTRATCOM sometime around 2004 or 2005 at Lackland Air Force Base Texas with the intent of coordinating and executing U S information operations at the strategic level 14 On September 12 2011 by executive order the JIOWC was chartered as a Chairman s Controlled Activity aligned under the Joint Staff 15 The JIOWC falls within the Joint Staff Operations Directorate J3 through the Deputy Director Global Operations J39 DDGO U S Army Information Operations edit nbsp 56th TIOG Change of Command Ceremony at JBLM WA on May 7 2017 U S Army Combined Army Center includes the U S Army Information Operations Proponent USAIOP whose mission is to executes Total Army Force Modernization responsibilities across the DOTMLPF P to meet the Army s requirement for Information Operations 16 In the United States Army units division sized or larger have an IO staff directorate known as the G 39 responsible for the integration of information operations capabilities These directorates are often augmented by IO Field Support Teams from the following Army IO units nbsp 1st Information Operations Command at Fort Belvoir Maryland nbsp 56th Theater Information Operations Group ARNG at Joint Base Lewis McChord Washington nbsp 71st Theater Information Operations Group ARNG at Camp Mabry Texas nbsp 151st Theater Information Operations Group USAR at Fort Totten Queens New York nbsp 152nd Theater Information Operations Group USAR at Camp Parks California Deactivated Information Operations Qualification edit In the Army only commissioned officers are formally qualified in the Information Operations functional area known as FA30 Officers can qualified through one of two courses IO Qualification Course IOQC a 12 week 480 hour resident course taught at the Combined Army Center Fort Leavenworth KS 17 IO Qualification Course Reserve Component IOQC RC a two phase course taught by the National Guard Information Operations School 3 124th Information Operations IO Battalion Vermont Army National Guard Phase one consists of 415 hours of study consisting of 20 four hour synchronous class periods held weekly Phase 2 is a 15 day resident exercise held at the Regional Readiness Training Center collocated with Norwich University in Northfield Vermont 18 Most Army commissioned officers warrant officers and noncomissioned officers have the option of earning the P4 Information Operations Additional Skill Identifier ASI by attending one of two 10 day courses Tactical Information Operations Planners Course TIOPC 19 Army Information Operations Planners Course AIOPC U S Navy amp Marine Corps Information Operations edit nbsp Navy Information Dominance Warfare InsigniaIn the United States Navy information operations are often supervised by a Navy Information Operations Command NIOC for example in the United States Tenth Fleet which has several NIOCs In the United States Marine Corps the proponent for information operations is the Marine Corps Information Operations Center MCIOC at Marine Corps Base Quantico Virginia U S Air Force Information Operations edit nbsp Air Force Information Operations BadgeThe United States Air Force bases its Information Operations doctrine from Air Force Doctrinal Publication AFDP 3 13 Information in Air Force Operations 20 Air Force officers can serve as Information Operations Officers Air Force Specialty Code AFSC 14FX after completing the Information Operations Professional Course IOPC 21 U S Air Force Information Operations Units nbsp 39th Information Operations Squadron at Hurlburt Field Florida Many U S Air Force units have redesignated between Information Operations Cyberspace Operations and Intelligence For example the 39th IO Sqdn s official website identifies itself as a subordinate organization of the 688th Information Operations Wing however the Wing s official website identifies itself as a Cyberspace Operations unit 22 23 Information Related Capabilities editElectronic Warfare EW edit Main article Electronic Warfare nbsp U S Military personnel assigned to the 4th Psychological Operations Group 193rd Special Operations Wing Pennsylvania Air National Guard PA ANG broadcast television and radio programming nbsp EC 130J Commando Solo Electronic warfare EW refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum attack an enemy or impede enemy assaults via the spectrum The purpose of electronic warfare is to deny the opponent the advantage of and ensure friendly unimpeded access to the EM spectrum EW can be applied from air sea land and space by manned and unmanned systems and can target communication radar or other services EW includes three major subdivisions Electronic Attack EA Electronic Protection EP Electronic warfare Support ES EW supports information operations by using offensive and defensive tactics and techniques in a variety of combinations to shape disrupt and exploit adversarial use of the electromagnetic spectrum EMS while protecting friendly freedom of action in that spectrum Expanding reliance on the EMS for informational purposes increases both the potential and the challenges of EW in IO The increasing prevalence of wireless telephone and computer usage extends both the utility and threat of EW offering opportunities to exploit an adversary s electronic vulnerabilities and a requirement to identify and protect our own from similar exploitation As the use of the EMS has become universal in military operations so has EW become involved in IO All of the core supporting and related IO capabilities can either directly use EW or indirectly benefit from EW In order to coordinate and deconflict EW and more broadly all military usage of the EMS an Electronic Warfare Coordination Cell EWCC may be established to reside with the component commander most appropriate to the operation In addition all joint operations require a joint restricted frequency list JRFL This list specifies protected guarded and taboo frequencies that should not normally be disrupted without prior coordination and planning either because of friendly use or friendly exploitation This is maintained and promulgated by the communications system directorate of a joint staff J 6 in coordination with J 3 and the joint commander s electronic warfare staff or EWCC if delegated 1 Domination of the Electromagnetic Spectrum DOD now emphasizes maximum control of the entire electromagnetic spectrum including the capability to disrupt all current and future communication systems sensors and weapons systems This may include 1 navigation warfare including methods for offensive space operations where global positioning satellites may be disrupted or 2 methods to control adversary radio systems and 3 methods to place false images onto radar systems block directed energy weapons and misdirect unmanned aerial vehicles UAVs or robots operated by adversaries 24 Computer Network Operations CNO edit Main article Computer network operations CNO in the Military Domain See also Cyber Operations CNO as an IO Core Capability The increasing reliance of unsophisticated militaries and terrorist groups on computers and computer networks to pass information to C2 forces reinforces the importance of CNO in IO plans and activities As the capability of computers and the range of their employment broadens new vulnerabilities and opportunities will continue to develop This offers both opportunities to attack and exploit an adversary s computer system weaknesses and a requirement to identify and protect our own from similar attack or exploitation 1 Computer network attack CNA Actions are taken through the use of computer networks to disrupt deny degrade or destroy information resident in computers and computer networks or the computers and networks themselves Computer network defense CND Actions are taken through the use of computer networks to protect monitor analyze detect and respond to unauthorized activity within the Department of Defense information systems and computer networks Computer network exploitation CNE Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks Psychological Operations PSYOP edit Main article Psychological Operations United States See also Military information support operations nbsp Soldiers from the U S Army s 350th Tactical Psychological Operations 10th Mountain Division drop leaflets over a village near Hawijah in Kirkuk province Iraq on 6 March 2008 nbsp U S Army PSYOP Force structure nbsp NATO leaflet in Libya PSYOP as an IO Core Capability PSYOP has a central role in the achievement of IO objectives in support of the JFC In today s information environment even PSYOP conducted at the tactical level can have strategic effects Therefore PSYOP has an approval process that must be understood and the necessity for timely decisions is fundamental to effective PSYOP and IO This is particularly important in the early stages of an operation given the time it takes to develop design produce distribute disseminate and evaluate PSYOP products and actions All PSYOP are conducted under the authority of interagency coordinated and OSD approved PSYOP programs The PSYOP program approval process at the national level requires time for sufficient coordination and resolution of issues hence JFCs should begin PSYOP planning as early as possible to ensure the execution of PSYOP in support of operations A JFC must have an approved PSYOP program execution authority and delegation of product approval authority before PSYOP execution can begin JFCs should request PSYOP planners immediately during the initial crisis stages to ensure the JFC has plenty of lead time to obtain the proper authority to execute PSYOP PSYOP assets may be of particular value to the JFC in pre post combat operations when other means of influence are restrained or not authorized PSYOP must be coordinated with CI MILDEC and OPSEC to ensure deconfliction and control CI operations are not compromised and that all capabilities within IO are coordinated to achieve the objectives established in planning There must be close cooperation and coordination between PSYOP and PA staffs in order to maintain credibility with their respective audiences which is the purpose of the IO cell PSYOP efforts are most effective when personnel with a thorough understanding of the language and culture of the TA are included in the review of PSYOP materials and messages As the information environment evolves the dissemination of PSYOP products is expanding from traditional print and broadcast to more sophisticated use of the Internet facsimile messaging text messaging and other emerging media The effectiveness of PSYOP is enhanced by the synchronization and coordination of the core supporting and related capabilities of IO particularly public affairs PA MILDEC CNO civil military operations CMO and EW 25 Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions motives objective reasoning and ultimately the behavior of foreign governments organizations groups and individuals 4th Psychological Operations Group Military Deception MILDEC edit Main article Military deception See also Category World War II deception operations nbsp Simulated OH 58C Kiowa helicopter and simulated fuel blivets during a deception operation on 10 November 1990 carried out by the XVIII Airborne Corps Deception Cell This simulated forward arming and refueling point FARP at TL 139512 in the Eastern Province of Saudi Arabia was approximately 45 kilometers northwest of An Nuariya MILDEC is described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities intentions and operations thereby causing the adversary to take specific actions or inactions that will contribute to the accomplishment of the friendly forces mission MILDEC and OPSEC are complementary activities MILDEC seeks to encourage incorrect analysis causing the adversary to arrive at specific false deductions while OPSEC seeks to deny real information to an adversary and prevent correct deduction of friendly plans To be effective a MILDEC operation must be susceptible to adversary collection systems and seen as credible to the enemy commander and staff A plausible approach to MILDEC planning is to employ a friendly course of action COA that can be executed by friendly forces and that adversary intelligence can verify However MILDEC planners must not fall into the trap of ascribing to the adversary particular attitudes values and reactions that mirror image likely friendly actions in the same situation i e assuming that the adversary will respond or act in a particular manner based on how we would respond There are always competing priorities for the resources required for deception and the resources required for the real operation For this reason the deception plan should be developed concurrently with the real plan starting with the commander s and staff s initial estimate to ensure proper resourcing of both To encourage incorrect analysis by the adversary it is usually more efficient and effective to provide a false purpose for real activity than to create false activity OPSEC of the deception plan is at least as important as OPSEC of the real plan since compromise of the deception may expose the real plan This requirement for close hold planning while ensuring detailed coordination is the greatest challenge to MILDEC planners On joint staffs MILDEC planning and oversight responsibility is normally organized as a staff deception element in the operations directorate of a joint staff J 3 26 MILDEC as an IO Core Capability MILDEC is fundamental to successful IO It exploits the adversary s information systems processes and capabilities MILDEC relies upon understanding how the adversary commander and supporting staff think and plan and how both use information management to support their efforts This requires a high degree of coordination with all elements of friendly forces activities in the information environment as well as with physical activities Each of the core supporting and related capabilities has a part to play in the development of successful MILDEC and in maintaining its credibility over time While PA should not be involved in the provision of false information it must be aware of the intent and purpose of MILDEC in order not to inadvertently compromise it 26 A message targeted to exploit a fissure between a key member of the adversary s leadership who has a contentious relationship with another key decision maker is an example That message could cause internal strife resulting in the adversary foregoing an intended course of action and adopting a position more favorable to our interests 27 Article title Operations Security OPSEC edit See also Operations security nbsp Someone Talked OPSEC as an IO Core Capability OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions In particular OPSEC complements MILDEC by denying an adversary information required to both assess a real plan and to disprove a deception plan For those IO capabilities that exploit new opportunities and vulnerabilities such as EW and CNO OPSEC is essential to ensure friendly capabilities are not compromised The process of identifying essential elements of friendly information and taking measures to mask them from disclosure to adversaries is only one part of a defense in depth approach to securing friendly information To be effective other types of security must complement OPSEC Examples of other types of security include physical security IA programs computer network defense CND and personnel programs that screen personnel and limit authorized access 28 What occurs often is that data is either leaked stolen or hacked online and the enemy has access to and can decipher what that information may say This is especially true for defensive operational security US servicemen and servicewomen may have Facebook multiple blogs or upload photos which can lead to the enemy knowing troop movements and locations With this information setting up ambush and wreaking havoc on US and support personnel becomes much easier Geo tagging features of cellular phones especially may cause this type of breach in OPSEC 29 30 31 Equipment methods and tactics edit EW edit EC 130 edit Main article Lockheed EC 130 The EC 130E Airborne Battlefield Command and Control Center ABCCC was based on a basic C 130E platform and provided tactical airborne command post capabilities to air commanders and ground commanders in low air threat environments This EC 130E ABCCC has since been retired The EC 130E Commando Solo was an earlier version of a United States Air Force and Air National Guard psychological operations PSYOPS aircraft This aircraft also employed a C 130E airframe but was modified by using the mission electronic equipment from the retired EC 121S Coronet Solo aircraft This airframe served during the first Gulf War Operation Desert Storm the second Gulf War Operation Iraqi Freedom and in Operation Enduring Freedom The EC 130E was eventually replaced by the EC 130J Commando Solo and was retired in 2006 The EC 130J Commando Solo is a modified C 130J Hercules used to conduct psychological operations PSYOP and civil affairs broadcast missions in the standard AM FM HF TV and military communications bands Missions are flown at the maximum altitudes possible to ensure optimum propagation patterns The EC 130J flies during either day or night scenarios with equal success and is air refuelable A typical mission consists of a single ship orbit which is offset from the desired target audience The targets may be either military or civilian personnel The Commando Solo is operated exclusively by the Air National Guard specifically the 193d Special Operations Wing 193 SOW a unit of the Pennsylvania Air National Guard operationally gained by the Air Force Special Operations Command AFSOC The 193 AOW is based at the Harrisburg Air National Guard Base former Olmstead AFB at Harrisburg International Airport in Middletown Pennsylvania The United States Navy s EC 130Q Hercules TACAMO Take Charge and Move Out aircraft was a land based naval aviation platform that served as a SIOP strategic communications link aircraft for the U S Navy s Fleet Ballistic Missile FBM submarine force and as a backup communications link for the USAF manned strategic bomber and intercontinental ballistic missile forces To ensure survivability TACAMO operated as a solo platform well away from and not interacting with other major naval forces such as sea based aircraft carrier strike groups and their carrier air wings or land based maritime patrol aircraft Operated by Fleet Air Reconnaissance Squadron THREE VQ 3 and Fleet Air Reconnaissance Squadron FOUR VQ 4 the EC 130Q was eventually replaced by the U S Navy s current TACAMO platform the Boeing 707 based E 6 Mercury Computer network operations edit Stuxnet edit Main article Stuxnet Stuxnet is a computer worm discovered in June 2010 It initially spreads via Microsoft Windows and targets Siemens industrial software and equipment While it is not the first time that hackers have targeted industrial systems 32 it is the first discovered malware that spies on and subverts industrial systems 33 and the first to include a programmable logic controller PLC rootkit 34 35 In May 2011 the PBS program Need To Know cited a statement by Gary Samore White House Coordinator for Arms Control and Weapons of Mass Destruction in which he said we re glad they the Iranians are having trouble with their centrifuge machine and that we the US and its allies are doing everything we can to make sure that we complicate matters for them offering winking acknowledgement of US involvement in Stuxnet 36 According to the British Daily Telegraph a showreel that was played at a retirement party for the head of the Israel Defense Forces IDF Gabi Ashkenazi included references to Stuxnet as one of his operational successes as the IDF chief of staff 37 Suter edit Main article Suter computer program Suter is a military computer program developed by BAE Systems that attacks computer networks and communications systems belonging to an enemy Development of the program has been managed by Big Safari a secret unit of the United States Air Force It is specialised to interfere with the computers of integrated air defence systems 38 dead link Suter was integrated into US unmanned aircraft by L 3 Communications 39 Three generations of Suter have been developed Suter 1 allows its operators to monitor what enemy radar operators can see Suter 2 lets them take control of the enemy s networks and direct their sensors Suter 3 tested in Summer 2006 enables the invasion of links to time critical targets such as battlefield ballistic missile launchers or mobile surface to air missile launchers The program has been tested with aircraft such as the EC 130 RC 135 and F 16CJ 38 It has been used in Iraq and Afghanistan since 2006 40 41 U S Air Force officials have speculated that a technology similar to Suter was used by the Israeli Air Force to thwart Syrian radars and sneak into their airspace undetected in Operation Orchard on 6 September 2007 The evasion of air defence radar was otherwise unlikely because the F 15s and F 16s used by the IAF were not equipped with stealth technology 39 40 Psychological Operations Capabilities edit Radio in a Box edit Main article Radio in a box nbsp United States Psychological Operations Radio is the dominant information tool to reach wide audiences in isolated mountainous regions The US military has deployed RIABs throughout Afghanistan in order to communicate with the residents Due to a 70 percent illiteracy rate and lack of education in Afghanistan radio is a vital communications tool used to broadcast information where radio ownership exceeds 80 percent 42 43 The United States military operates approximately 100 RIABs and hire local Afghan DJs in Afghanistan to broadcast information and host call in shows 44 The United States Army employed RIAB systems to broadcast anti Taliban and anti Al Qaeda messages and countered Taliban propaganda by pushing onto Taliban frequencies in Paktia Province 45 46 One advantage of employing RIAB systems is the ability to broadcast vital information immediately to a large audience in the event of a crisis 44 One Afghan DJ has 50 000 listeners 47 Nawa District Governor Abdul Manaf uses the local RIAB station to conduct weekly call in shows and believes the RIAB system is one of his best communication tools to inform a large audience 48 In Afghanistan s Paktika province which has a literacy rate of two percent an estimated 92 percent of the residents listen to the radio every day 46 47 Radio programs transmitted using RIAB systems provide beneficial information to Afghan farmers in remote areas 42 In the isolated mountainous Wazi Kwah district of Paktika Province a RIAB system supplies the only source of outside news 49 Afghan National Army commanders use the RIAB to communicate to villagers and elders and provide thoughts to the community 50 Afghans can use information distributed by the United States military such as how to react to an approaching military convoy or purpose or use of U S sponsored agriculture programs For general news Afghans can also use other information outlets such as the BBC or VOA because RIAB systems are controlled by the US military 51 Special Operations first employed RIAB systems in Afghanistan in 2005 which improved their ability to supply information to and communicate with the local population in their areas of operation 52 B SOMS B edit Special Operation Media Systems B SOMS B The SOMS B is a ground based HMMWV mounted radio and television broadcast system Like the EC 130C J it can broadcast on AM FM SW and VHF television frequencies The SOMS B also has the capability to produce programming or radio and television broadcasts 53 54 Other Integrated edit Radio edit Radio Azadi edit Main article Radio Azadi Radio Aazadi formerly known as Radio Free Afghanistan RFA is the Afghan branch of Radio Free Europe Radio Liberty s RFE RL broadcast services It broadcasts 12 hours daily as part of a 24 hour stream of programming in conjunction with Voice of America VOA RFA first aired in Afghanistan from 1985 to 1993 and was re launched in January 2002 RFA produces a variety of cultural political and informational programs that are transmitted to listeners via shortwave satellite and AM and FM signals provided by the International Broadcasting Bureau RFA s mission is to promote and sustain democratic values and institutions in Afghanistan by disseminating news factual information and ideas 55 Adversarial IO editTerrorists IO from US Perspective edit This article contains too many or overly lengthy quotations Please help summarize the quotations Consider transferring direct quotations to Wikiquote or excerpts to Wikisource February 2015 Terrorists are adept at integrating their physical acts of violence with IO They make audio and video recordings of the incidents for distribution over the Internet and on television Their violence becomes theater staged for its psychological impact and replayed over and over again in the media as IO 56 Terrorists employ all the IO capabilities of U S military doctrine including the five core capabilities of PSYOP military deception EW CNO and OPSEC and the supporting and related capabilities They use IO to support both offensive operations acts of terrorism and defensive operations e g protecting their hiding places They use IO strategically in support of broad objectives While terrorists do not speak and write of IO they demonstrate an understanding of the value and methods of IO capabilities Terrorists appear to be particularly adept at PSYOP PA counterpropaganda and certain forms of OPSEC and deception driven by their desire to simultaneously reach desired audiences and hide from their enemies They recognize the value of various media including the Internet and exploit it to support their cause Terrorists and their supporters have a CNO capability with CNA manifesting itself as electronic jihad rather than as acts of terror 57 Computer network operations edit There are many examples of CNA and are generally done in support of other operations Terrorists have integrated cyber attacks into their thinking strategies and operations as an extremely cost effective way to harm the US and other adversaries 58 The same can be said for CNE which is about penetrating computer networks before actually attacking them Gaining access to specific networks is seen to be as part of the CNA process for terrorists they do not distinguish between the two 58 As for CND terrorists are aware of keeping data secure and websites running because they use the Internet Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them The methods they use include access controls encryption authentication firewalls intrusion detection anti viral tools audits security management and security awareness and training 58 The Taliban have in recent months waged an intensifying information war with NATO forces in the country distributing anti government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014 A day rarely passes without a Taliban spokesman using Twitter to claim the destruction of numerous NATO armoured vehicles and the deaths of scores of Western or Afghan security forces with NATO quickly countering in its own Twitter feeds The Taliban also employ a sophisticated network of spokesmen to distribute messages and even have their own mobile radio broadcast service which frequently moves location to avoid the threat of retaliatory airstrikes by NATO warplanes 59 The Taliban HAVE to rely on CNO and integrate it into their IO campaign as it is the most cost effective method of disrupting Western forces This is a prime example of how CNO is used in conjunction with PSYOP to achieve their objectives Steganography edit Main article Steganography See also Steganography Alleged use by terrorists When one considers that messages could be encrypted steganographically in email messages particularly e mail spam the notion of junk e mail takes on a whole new light Coupled with the chaffing and winnowing technique a sender could get messages out and cover their tracks all at once nbsp An example showing how terrorists may use forum avatars to send hidden messages This avatar contains the message Boss said that we should blow up the bridge at midnight encrypted with mozaiq using vaxjo as password Rumors about terrorists using steganography started first in the daily newspaper USA Today on 5 February 2001 in two articles titled Terrorist instructions hidden online and Terror groups hide behind Web encryption In July the same year an article was titled even more precisely Militants wire Web with links to jihad A citation from the article Lately al Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay com Other media worldwide cited these rumors many times especially after the terrorist attack of 9 11 without ever showing proof The Italian newspaper Corriere della Sera reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers and that these images had been used to hide secret messages although no other Italian paper ever covered the story The USA Today articles were written by veteran foreign correspondent Jack Kelley who in 2004 was fired after allegations emerged that he had fabricated stories and sources In October 2001 The New York Times published an article claiming that al Qaeda had used steganography to encode messages into images and then transported these via e mail and possibly via USENET to prepare and execute the 11 September 2001 terrorist attack The Federal Plan for Cyber Security and Information Assurance Research and Development 60 published in April 2006 makes the following statements immediate concerns also include the use of cyberspace for covert communications particularly by terrorists but also by foreign intelligence services espionage against sensitive but poorly defended data in government and industry systems subversion by insiders including vendors and contractors criminal activity primarily involving fraud and theft of financial or identity information by hackers and organized crime groups p 9 10 International interest in R amp D for steganography technologies and their commercialization and application has exploded in recent years These technologies pose a potential threat to national security Because steganography secretly embeds additional and nearly undetectable information content in digital products the potential for covert dissemination of malicious software mobile code or information is great p 41 42 The threat posed by steganography has been documented in numerous intelligence reports p 42 Moreover an online terrorist training manual the Technical Mujahid a Training Manual for Jihadis contained a section entitled Covert Communications and Hiding Secrets Inside Images 61 By early 2002 a Cranfield University MSc thesis developed the first practical implementation of an online real time Counter Terrorist Steganography Search Engine This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to narrowing the field suggesting that interception capacity was never the difficulty but rather prioritising the target media Military deception edit A police search of a British al Qaeda member s home uncovered what is now called The al Qaeda Training Manual a techniques instruction book on deception forgery blending in hiding places and the use of covers to blend into the terrorist area of operation usually cities with large civilian populations 62 The philosophy the MILDEC is for the concealment of activities rather than misleading adversaries 63 PSYOP edit See also Martyrdom video Terrorist PSYOP differs from American PSYOP in one two major areas First US PSYOP targets foreign adversaries and information is coordinated with many other agencies and screened before it is published Second while PSYOP by US and coalition forces is designed to bring an end to violence and save lives terrorist PSYOP is frequently directed toward promoting violence and threatening civilian populations with death and destruction Suicide bombers are portrayed as martyrs rather than killers of innocent people 64 The Internet is the main resource to spread propaganda with al Aqaeda and other terrorist groups According to Bruce Hoffman before it was taken down al Qaeda s website Alneda com emphasized three themes 1 the West is implacably hostile to Islam 2 the only way to address this threat and the only language the West understands is the logic of violence and 3 jihad is the only option 64 65 Terrorists also like to use the Internet to recruit and persuade children to their cause As Dorothy Denning has found Children are being taught to hate Jews and Westerners and to take up arms against them through cartoons and comic book style web pages bedtime stories and computer games 66 OPSEC edit All terrorists practice a high level of OPSEC since their need to be secret is how they can be successful Whether it is the al Qaeda training manual online magazines targeted for the world or the training of youth in Jihad camps OPSEC is one of the first priorities for terrorists 67 Secure communications are big as well The 11 September hijackers for example accessed anonymous Hotmail and Yahoo accounts from computers at Kinko s and at a public library 68 Messages are also coded Three weeks before the attacks Mohamed Atta reportedly received a coded email message that read The semester begins in three more weeks We ve obtained 19 confirmations for studies in the faculty of law the faculty of urban planning the faculty of fine arts and the faculty of engineering 69 The faculties referred to the four targets twin towers Pentagon and Capitol 70 The list of methods goes on and on and is very similar to the methods used in organized crime around the world Criticism editThis article contains too many or overly lengthy quotations Please help summarize the quotations Consider transferring direct quotations to Wikiquote or excerpts to Wikisource February 2015 In 2011 Lt Col Michael Holmes a member of the Army s 71st TIOG serving on the NATO Training Mission Afghanistan staff communicated alleged use of illegal PSYOP on visiting U S dignitaries claiming such orders originated from Lt Gen William Caldwell 71 72 Among the alleged targets were American Senators John McCain and Carl Levin government ministers and European diplomats Holmes disclosure resulted in several news articles most notably a Rolling Stone article titled Another Runaway General Army Deploys Psy Ops on U S Senators authored by Michael Hastings who recently earned fame for his reporting on General Stanley McChrystal the previous year Hastings article The Run Away General ultimately led to McChrystal s firing by President Obama 73 Media reports stated that the Holmes IO unit was subjected to a retaliatory campaign when it resisted the order to influence the targets including a subsequent reprimand against Lt Col Holmes 74 Army investigators ultimately determined Holme s claims of illegal psychological operations were not substantiated 75 In stability reconstruction and COIN operations the most important targets of influence are not enemy commanders but individuals and groups both local and international whose cooperation is vital to the mission s success Granted joint and Army IO doctrine publications do not ignore these targets PSYOP and counterpropaganda can be designed to influence them But it is notable that the activities most directly aimed at influencing local and international audiences functions such as public affairs civil affairs CMOs and defense support to public diplomacy are treated only as related activities in IO doctrine if they are mentioned at all 76 There must be a fundamental change of culture in how ISAF approaches operations StratCom should not be a separate Line of Operation but rather an integral and fully embedded part of policy development planning processes and the execution of operations Analyzing and maximizing StratCom effects must be central to the formulation of schemes of maneuver and during the execution of operations In order to affect this paradigm shift ISAF HQ must synchronize all stratCom stakeholders Implicit in this change of culture is the clear recognition that modern strategic communication is about credible dialogue not a monologue where we design our systems and resources to deliver messages to target audiences in the most effective manner This is now a population centric campaign and no effort should be spared to ensure that the Afghan people are part of the conversation Receiving understanding and amending behavior as a result of messages received from audiences can be an effective method of gaining genuine trust and credibility This would improve the likelihood of the population accepting ISAF messages and changing their behavior as a result 77 See also editBlack propaganda Bolivarian propaganda Command and control warfare Communications security Cyberware Cyberwarfare Disinformation Electronic Warfare Fifth Dimension Operations Gatekeeper politics Historical revisionism Information Operations Roadmap Industrial espionage Irregular Warfare iWar Military Deception Network centric warfare Operations Security Propaganda in the Mexican Drug War Military Public Affairs The Institute of World Politics Joint Information Operations Warfare Center Political Warfare Psychological Operations Psychological warfare Radicalization References edit a b c d Archived copy PDF Archived from the original PDF on 8 February 2015 Retrieved 4 April 2015 a href Template Cite web html title Template Cite web cite web a CS1 maint archived copy as title link Ghost Army The Combat Con Artists of World War II The National World War 2 Museum Official Website The National World War 2 Museum Retrieved 27 November 2023 Gormly Kellie B How the Ghost Army of WWII Used Art to Deceive the Nazis Smithsonian Magazine Official Website Smithsonian Magazine Retrieved 27 November 2023 Electronic Attack Wing Pacific Command History Naval Air Force U S Pacific Fleet Official Site U S Navy Retrieved 27 November 2023 a b Meier William A Deception Here to Stay PDF Defense Technical Information Center U S Naval War College Retrieved 27 November 2023 Brauer Albert C PSYCHOLOGICAL WARFARE KOREA 1951 PDF North Dakota State University Libraries Official Website Georgetown University Psychological Warfare in Korea An Interim Report The Public Opinion Quarterly 15 1 Spring 1951 66 BATTLE OF KOREA Deadly Flak Time 11 February 1952 ISSN 0040 781X Retrieved 12 August 2021 Hutcherson Norman B September 1994 COMMAND amp CONTROL WARFARE PUTTING ANOTHER TOOL IN THE WAR FIGHTER S DATA BASE PDF Maxwell Air Force Base Alabama Air University Press p xiv Retrieved 25 December 2023 Hutcherson Norman B September 1994 COMMAND amp CONTROL WARFARE PUTTING ANOTHER TOOL IN THE WAR FIGHTER S DATA BASE PDF Maxwell Air Force Base Alabama Air University Press p xiv Retrieved 25 December 2023 a b Hutcherson Norman B 9 December 1996 DODD S 3600 1 Information Operations IO Washington D C U S Department of Defense Retrieved 25 December 2023 Chapter 2 Officer Classification System PDF U S Army Official Website U S Army Retrieved 25 December 2023 Pomerleau Mark 16 February 2023 Here s what the new information warfare command in the Pacific is doing Defensescoop Retrieved 5 December 2023 Ambinder Marc 20 May 2010 The Secret Pentagon Spy Ring The Atlantic Retrieved 24 January 2022 The Unified Command Plan and Combatant Commands Background and Issues for Congress crsreports congress gov Congressional Research Service Retrieved 5 December 2023 U S Army Information Operations Proponent USAIOP U S Army Combined Arms Center Retrieved 26 November 2023 IO Qualification Course IOQC U S Army Combined Arms Center Retrieved 26 November 2023 IO Qualification Course RC U S Army Combined Arms Center Retrieved 26 November 2023 Tactical IO Planner Course TIOPC U S Army Combined Arms Center Retrieved 26 November 2023 Information In Air Force Operations PDF U S Air Force 1 February 2023 Retrieved 26 November 2023 Information Operations Officer The Official Website of the U S Air Force U S Air Force Retrieved 26 November 2023 39th Information Operations Squadron Hurlbert Field Official Website U S Air Force Retrieved 26 November 2023 688th Cyberspace Wing 16th Air Force Air Forces Cyber Official Website U S Air Force Retrieved 26 November 2023 DOD Information Operations Roadmap PDF Gwu edu 30 October 2003 p 61 Retrieved 20 May 2016 Joint Publication 3 53 Doctrine for Joint Psychological Operations PDF Gwu edu Retrieved 20 May 2016 a b JCS JP 3 58 Joint Doctrine for Military Deception Washington DC GPO 31 May 1996 v vi p 98 Archived copy PDF Archived from the original PDF on 21 July 2013 Retrieved 4 April 2015 a href Template Cite web html title Template Cite web cite web a CS1 maint archived copy as title link Military Personnel Warned Against Geotagging Photos RedOrbit Staff amp Wire Reports Retrieved 18 April 2012 Post Global Army Facebook geotagging dangerous for soldiers Tucson Sentinel Retrieved 18 April 2012 OPSEC Army Spouses Online Facebook Retrieved 18 April 2012 Building a Cyber Secure Plant Siemens 30 September 2010 Archived from the original on 21 April 2021 Retrieved 5 December 2010 Robert McMillan 16 September 2010 Siemens Stuxnet worm hit industrial systems Computerworld Archived from the original on 25 May 2012 Retrieved 16 September 2010 Last minute paper An indepth look into Stuxnet Virus Bulletin Stuxnet worm hits Iran nuclear plant staff computers BBC News 26 September 2010 Gary Samore speaking at the 10 December 2010 Washington Forum of the Foundation for Defense of Democracies in Washington DC reported by C Span and contained in the PBS program Need to Know Cracking the code Defending against the superweapons of the 21st century cyberwar 4 minutes into piece Williams Christopher 15 February 2011 Israel video shows Stuxnet as one of its successes The Daily Telegraph London Retrieved 14 February 2012 a b David A Fulghum Michael A Dornheim William B Scott Black Surprises Aviation Week and Space Technology Retrieved 5 October 2007 a b John Leyden 4 October 2007 Israel suspected of hacking Syrian air defences The Register Retrieved 5 October 2007 a b David A Fulghum 3 October 2007 Why Syria s Air Defenses Failed to Detect Israelis Aviation Week and Space Technology Retrieved 5 October 2007 David A Fulghum 14 January 2007 Technology Will Be Key to Iraq Buildup Aviation Week and Space Technology a b Afghanistan s radio war pritheworld Archived from the original on 15 April 2013 Retrieved 24 April 2012 Radio in a Box 2011 Radio in a Box Archived 25 April 2012 at the Wayback Machine Retrieved 2011 14 10 a b Radio in a Box Giving Afghanistans Their Own Voice 2010 Radio in a Box Giving Afghanistans Their Own Voice Retrieved 2011 14 10 Army radio connects with Afghans 2009 Army radio connects with Afghans Archived 15 October 2009 at the Wayback Machine Retrieved 2011 10 30 a b Military Embraces Counterinsurgency in Afghanistan 2008 Radio in a Box Military Embraces Counterinsurgency in Afghanistan Archived 2 March 2012 at the Wayback Machine Retrieved 2011 11 11 a b In Afghan Fight U S Takes to the Airwaves 2010 In Afghan Fight U S Takes to the Airwaves Retrieved 2011 14 10 The Busiest Man in Nawa 2011 The Busiest Man in Nawa U S Marine Corps Releases Retrieved 2011 11 10 Local DJ celebrity to his Afghan listeners 2010 Local DJ celebrity to his Afghan listeners Retrieved 2011 10 14 Radio in a Box Afghanistan s New Warrior DJs 2011 Radio in a Box Afghanistan s New Warrior DJs Retrieved 2011 10 14 The Pentagon Information Operations and International Media Development 2010 The Pentagon Information Operations and International Media Development Archived 6 January 2011 at the Wayback Machine A Report to the Center for International Media Assistance e27 Retrieved 2011 10 14 Breaking the Afghan Insurgency 2007 Breaking the Afghan Insurgency Special Warfare 20 5 e26 Retrieved 2011 11 10 DOCUMENT CALLED IO IN OEF AND IF saved in your folder SOMS B 2 MRBS Antenna System Federal Business Opportunities Retrieved 18 April 2012 Afghanistan Radio Free Europe Radio Liberty RadioFreeEurope RadioLiberty Archived from the original on 23 April 2012 Retrieved 24 April 2012 Denning 2005 p 6 Denning 2005 p 20 a b c Denning 2005 p 11 Taylor Rob 27 April 2012 Taliban website hacked as Afghan cyber war heats up Reuters US Retrieved 27 April 2012 Federal Plan for Cyber Security and Information Assurance Research and Development National Science and Technology Council April 2006 The New Issue of Technical Mujahid a Training Manual for Jihadis The Jamestown Foundation The Al Qaeda Manual PDF Justice gov Retrieved 20 May 2016 Denning 2005 p 7 a b Denning 2005 Bruce Hoffman Al Qaeda Trends in Terrorism and Future Potentialities An Assessment Studies in Conflict amp Terrorism 26 429 442 2003 Denning 2005 p 5 Denning 2005 p 12 Brian Ross A Secret Language ABCNEWS com 4 October 2001 58 Virtual Soldiers in a Holy War Ha aretz Daily 16 September 2002 Denning 2005 p 13 William Levesque Officer says he refused illegal order in Afghanistan St Petersburg Times Feb 25 2011 Army to Investigate Rolling Stone s Psy Ops Report Atlantic Monthly Feb 24 2011 Major Garrett Key Senator Calls Psyops Charges Serious but He Denies Feeling Manipulated National Journal Feb 20 2011 Stuart Tessa Obama Publishes Account of Firing Gen McChrystal On the Same Day McChrystal Briefs Biden Rolling Stone Official Website Rolling Stone Retrieved 28 November 2023 Phil Stewart U S Probes if Senators Targeted by Afghan Psy Ops Unit Reuters Feb 24 2011 see also Rajiv Chandrasekaran Military to investigate claim that psy ops team was used to influence U S senators Wash Post Feb 24 2011 Ukman Jason Lt Gen Caldwell cleared of allegations he ordered psy ops team to influence lawmakers The Washington Post Official Website Retrieved 28 November 2023 Baker Ralph 2006 The Decisive Weapon A Brigade Combat Team Commander s Perspective on Information Operations Military Review pp 34 35 Archived from the original on 5 August 2011 Retrieved 26 April 2012 McChrystal Gen Stanley A 21 September 2009 COMISAF Initial Assessment US Department of Defense Retrieved 17 April 2012 Bibliography edit Denning Dorothy E 18 August 2005 Information Operations and Terrorism PDF Defense Technical Information Center Archived from the original on 18 May 2015 External links edit This article s use of external links may not follow Wikipedia s policies or guidelines Please improve this article by removing excessive or inappropriate external links and converting useful links where appropriate into footnote references May 2016 Learn how and when to remove this template message U S Army Information Operations Proponent USIOP Official Website U S Marine Corps Information Operations Center Official Website U S Department of Defense Information Operations Related Documents Operations Security JP 3 13 3 Military Deception JP 3 13 4 Destabilizing Terrorist Networks Disrupting and Manipulating Information Flows in the Global War on Terrorism Yale Information Society Project Conference Paper 2005 Seeking Symmetry in Fourth Generation Warfare Information Operations in the War of Ideas Presentation PDF slides to the Bantle Institute for National Security and Counterterrorism INSCT Symposium Syracuse University 2006 K A Taipale Seeking Symmetry on the Information Front Confronting Global Jihad on the Internet 16 National Strategy F Rev 14 Summer 2007 White House FAQ about the WoT Retrieved from https en wikipedia org w index php title Information Operations United States amp oldid 1217830617, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.