Information Operations (United States)

Last updated

Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to [1] Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems. [1]

Contents

History of Information Operations in the U.S. Military

U.S. Army leaflet targeting the 45th North Korean Division Us-psyop-leaflet-korea.png
U.S. Army leaflet targeting the 45th North Korean Division

The modern U.S. military can trace its use of information operations back to World War 2 when the Army activated the 23rd Headquarters Special Troops, known as the "Ghost Army", on January 20, 1944. This secretive unit was responsible for executing 22 large-scale military deceptions in Europe using techniques such as inflatable vehicles, false radio transmissions, loud-speaker sound effects, and phone generals. [2] Specific operations the 23rd was noted for having success was D-Day and Operation Viersen. Today the 23rd, has been attributed as saving the lives of 15,000 to 30,000 American service members. [3] In the Pacific, the Navy successfully conducted its first electronic warfare activities later in the war when TBM Avenger aircraft were fitted with receivers and rudimentary jammers to locate and jam Japanese air search radars. [4]

Despite the success of the 23rd, deception was never used in a significant way in Korean War, [5] however psychological warfare was routinely conducted by the Eighth Army, predominantly in the form of airborne leaflets, including a weekly "news" leaflet dropped on communist forces, but also included radio and loudspeaker broadcasts. [6] [7] During the war forces under United Nations Command used electronic jamming, much like the Navy at the end of World War 2, against radar on radar-directed anti-aircraft guns, particularly during Operation Strangle. [8] Though these examples fall within the capabilities associated with information operations, they were applied in specific circumstances for particular missions and not de-conflicted or synchronized for maximum effect. Because of their discrete applications, information operations was not fully exercised during the war as it is known today.

Much the same as in the Korean War, deception was also disregarded as a practice during the Vietnam War. [5]

In the mid-1990s, the U.S. Department of Defense began characterizing doctrine known as Command and Control Warfare (C2W) which was described as a strategy to attack the decision-making, or command and control (C2) capabilities of an adversary while protecting the decision-making capabilities of friendly forces. [9] It focused on a robust targeting system and defined five core capabilities, called pillars, it leverages: operations security, military deception, psychological operations, electronic warfare, and physical destruction. [10]

On December 9, 1996, the Deputy Secretary of Defense, John P. White approved the Department of Defense release of a then Secret Directive S-3600.1 that codified the concept of Information Operations. [11] This directive mandated the U.S. Armed Services to develop their own doctrine, training, and equipment, to execute information operations. [11]

Shortly after the release of DODD S-3600.1, the U.S. Army stood up the Land Information Warfare Activity/Information Dominance Center (LIWA/IDC), which would eventually transition into the 1st Information Operations Command (Land), and established the Information Operations functional area in April 1999 to specially train and assign commissioned officers to plan and conduct IO. [12]

During this time, the Army National Guard began to engage in developing their own information operations capabilities, establishing ad hoc information operations field support teams (FSTs), and vulnerability assessments teams (VATs), coordinated with the LIWA/IDC. National Guard units from Washington, Iowa, Vermont, and Texas were part of this early development.

Information Operations (IO)

Comes from JP 3-13 (Joint Publication) and pertains to Information Operations (Info Ops) in the United States. IO Integration into Joint Operations - Notional.jpg
Comes from JP 3-13 (Joint Publication) and pertains to Information Operations (Info Ops) in the United States.

Information Operations is considered an umbrella term to describe the coordination activities required to plan, synchronize, and assess operations, activities, and investments typically related to the non-lethal capabilities of psychological operations, cyberspace operations, civil-military operations, public affairs, operations security, and military deception. Operational U.S. military units at the flag-officer level typically have an Information Operations directorate known as the G-39 (for Army or Marine headquarters) or J-39 (for joint headquarters), for example, following the ConStaff system. These directorates typically have an array of personnel from information operations generalists, intelligence analysts, psychological operations specialists, and cyber and electronic warfare officers. Different headquarters have included civil affairs, space and cyberspace operations within the directorate while others have organized them under separate directorates within the staff.

In recent years, the U.S. military has stood up unique task forces solely focused on information operations, such as the U.S. Pacific Fleet's Fleet Information Warfare Command Pacific. [13]

U.S. Military Information Operations

U.S. Department of Defense Information Operations

JIOWC Emblem Jiowc.jpg
JIOWC Emblem

The Joint Information Operations Warfare Center (JIOWC) was created by the U.S. Strategic Command (USSTRATCOM) sometime around 2004 or 2005 at Lackland Air Force Base, Texas, with the intent of coordinating and executing U.S. information operations at the strategic level. [14] On September 12, 2011, by executive order, the JIOWC was chartered as a Chairman's Controlled Activity aligned under the Joint Staff. [15] The JIOWC falls within the Joint Staff Operations Directorate (J3), through the Deputy Director Global Operations, J39 (DDGO).

U.S. Army Information Operations

56th TIOG Change of Command Ceremony at JBLM, WA on May 7, 2017. 56th-tiog-guidon.jpg
56th TIOG Change of Command Ceremony at JBLM, WA on May 7, 2017.

U.S. Army Combined Army Center includes the U.S. Army Information Operations Proponent (USAIOP) whose mission is to executes Total Army Force Modernization responsibilities across the DOTMLPF-P to meet the Army's requirement for Information Operations. [16]

In the United States Army, units division-sized or larger have an IO staff directorate, known as the G-39, responsible for the integration of information operations capabilities. These directorates are often augmented by IO Field Support Teams from the following Army IO units:

Information Operations Qualification

In the Army, only commissioned officers are formally qualified in the Information Operations functional area, known as FA30. Officers can qualified through one of two courses:

  • IO Qualification Course (IOQC) - a 12-week, 480-hour resident course taught at the Combined Army Center, Fort Leavenworth, KS. [17]
  • IO Qualification Course - Reserve Component (IOQC-RC) - a two-phase course taught by the National Guard Information Operations School, 3-124th Information Operations (IO) Battalion, Vermont Army National Guard. Phase one consists of 415 hours of study consisting of 20 four-hour synchronous class periods held weekly. Phase 2 is a 15-day resident exercise held at the Regional Readiness Training Center collocated with Norwich University in Northfield, Vermont. [18]

Most Army commissioned officers, warrant officers, and noncomissioned officers have the option of earning the P4 Information Operations Additional Skill Identifier (ASI) by attending one of two 10-day courses:

  • Tactical Information Operations Planners Course (TIOPC) [19]
  • Army Information Operations Planners Course (AIOPC)

U.S. Navy & Marine Corps Information Operations

Navy Information Dominance Warfare Insignia IDCWarfareInsignia.jpg
Navy Information Dominance Warfare Insignia

In the United States Navy, information operations are often supervised by a Navy Information Operations Command (NIOC), for example in the United States Tenth Fleet which has several NIOCs.

In the United States Marine Corps, the proponent for information operations is the Marine Corps Information Operations Center (MCIOC) at Marine Corps Base Quantico, Virginia.

U.S. Air Force Information Operations

Air Force Information Operations Badge US Air Force Information Operations Badge.png
Air Force Information Operations Badge

The United States Air Force bases its Information Operations doctrine from Air Force Doctrinal Publication (AFDP) 3–13, Information in Air Force Operations. [20]

Air Force officers can serve as Information Operations Officers, Air Force Specialty Code (AFSC) 14FX, after completing the Information Operations Professional Course (IOPC). [21]

U.S. Air Force Information Operations Units:

Many U.S. Air Force units have redesignated between Information Operations, Cyberspace Operations, and Intelligence. For example, the 39th IO Sqdn's official website identifies itself as a subordinate organization of the 688th Information Operations Wing, however the Wing's official website identifies itself as a Cyberspace Operations unit. [22] [23]

Electronic Warfare (EW)

U.S. Military personnel assigned to the 4th Psychological Operations Group, 193rd Special Operations Wing, Pennsylvania Air National Guard (PA ANG) broadcast television and radio programming Interior of an EC-130J Commando Solo Mar 2003.jpg
U.S. Military personnel assigned to the 4th Psychological Operations Group, 193rd Special Operations Wing, Pennsylvania Air National Guard (PA ANG) broadcast television and radio programming
EC-130J Commando Solo EC-130J Commando Solo.JPG
EC-130J Commando Solo

Computer Network Operations (CNO)

Psychological Operations (PSYOP)

Soldiers from the U.S. Army's 350th Tactical Psychological Operations, 10th Mountain Division, drop leaflets over a village near Hawijah in Kirkuk province, Iraq, on 6 March 2008. UH-60 PSYOP Leaflet Drop, near Hawijah, Iraq 06 March 2008.jpg
Soldiers from the U.S. Army's 350th Tactical Psychological Operations, 10th Mountain Division, drop leaflets over a village near Hawijah in Kirkuk province, Iraq, on 6 March 2008.
U.S. Army PSYOP Force structure PSYOP Structure.JPG
U.S. Army PSYOP Force structure
NATO leaflet in Libya Libya 2011 NATO PSYOP Leaflet.jpg
NATO leaflet in Libya

Military Deception (MILDEC)

Simulated OH-58C Kiowa helicopter and simulated fuel blivets during a deception operation on 10 November 1990 carried out by the XVIII Airborne Corps Deception Cell. This simulated forward arming and refueling point (FARP) at TL 139512 in the Eastern Province of Saudi Arabia was approximately 45 kilometers northwest of An Nuariya. Dummy-Kiowa-Saudi-Arabia-19901110.jpg
Simulated OH-58C Kiowa helicopter and simulated fuel blivets during a deception operation on 10 November 1990 carried out by the XVIII Airborne Corps Deception Cell. This simulated forward arming and refueling point (FARP) at TL 139512 in the Eastern Province of Saudi Arabia was approximately 45 kilometers northwest of An Nuariya.

Operations Security (OPSEC)

Someone Talked Someone talked.jpg
Someone Talked

Equipment methods and tactics

EW

EC-130

The EC-130E Airborne Battlefield Command and Control Center (ABCCC) was based on a basic C-130E platform and provided tactical airborne command post capabilities to air commanders and ground commanders in low air threat environments. This EC-130E ABCCC has since been retired.

The EC-130E Commando Solo was an earlier version of a United States Air Force and Air National Guard psychological operations (PSYOPS) aircraft. This aircraft also employed a C-130E airframe, but was modified by using the mission electronic equipment from the retired EC-121S Coronet Solo aircraft. This airframe served during the first Gulf War (Operation Desert Storm), the second Gulf War (Operation Iraqi Freedom) and in Operation Enduring Freedom. The EC-130E was eventually replaced by the EC-130J Commando Solo and was retired in 2006.

The EC-130J Commando Solo is a modified C-130J Hercules used to conduct psychological operations (PSYOP) and civil affairs broadcast missions in the standard AM, FM, HF, TV, and military communications bands. Missions are flown at the maximum altitudes possible to ensure optimum propagation patterns. The EC-130J flies during either day or night scenarios with equal success, and is air-refuelable. A typical mission consists of a single-ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel. The Commando Solo is operated exclusively by the Air National Guard, specifically the 193d Special Operations Wing (193 SOW), a unit of the Pennsylvania Air National Guard operationally gained by the Air Force Special Operations Command (AFSOC). The 193 AOW is based at the Harrisburg Air National Guard Base (former Olmstead AFB) at Harrisburg International Airport in Middletown, Pennsylvania.

The United States Navy's EC-130Q Hercules TACAMO ("Take Charge and Move Out") aircraft was a land-based naval aviation platform that served as a SIOP strategic communications link aircraft for the U.S. Navy's Fleet Ballistic Missile (FBM) submarine force and as a backup communications link for the USAF manned strategic bomber and intercontinental ballistic missile forces. To ensure survivability, TACAMO operated as a solo platform, well away from and not interacting with other major naval forces such as sea-based aircraft carrier strike groups and their carrier air wings or land-based maritime patrol aircraft Operated by Fleet Air Reconnaissance Squadron THREE (VQ-3) and Fleet Air Reconnaissance Squadron FOUR (VQ-4), the EC-130Q was eventually replaced by the U.S. Navy's current TACAMO platform, the Boeing 707-based E-6 Mercury.

Computer network operations

Stuxnet

Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment. While it is not the first time that hackers have targeted industrial systems, [32] it is the first discovered malware that spies on and subverts industrial systems, [33] and the first to include a programmable logic controller (PLC) rootkit. [34] [35]

In May 2011, the PBS program Need To Know cited a statement by Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet. [36] According to the British Daily Telegraph , a showreel that was played at a retirement party for the head of the Israel Defense Forces (IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational successes as the IDF chief of staff. [37]

Suter

Suter is a military computer program developed by BAE Systems that attacks computer networks and communications systems belonging to an enemy. Development of the program has been managed by Big Safari, a secret unit of the United States Air Force. It is specialised to interfere with the computers of integrated air defence systems. [38] [ dead link ] Suter was integrated into US unmanned aircraft by L-3 Communications. [39]

Three generations of Suter have been developed. Suter 1 allows its operators to monitor what enemy radar operators can see. Suter 2 lets them take control of the enemy's networks and direct their sensors. Suter 3, tested in Summer 2006, enables the invasion of links to time-critical targets such as battlefield ballistic missile launchers or mobile surface-to-air missile launchers.

The program has been tested with aircraft such as the EC-130, RC-135, and F-16CJ. [38] It has been used in Iraq and Afghanistan since 2006. [40] [41]

U.S. Air Force officials have speculated that a technology similar to Suter was used by the Israeli Air Force to thwart Syrian radars and sneak into their airspace undetected in Operation Orchard on 6 September 2007. The evasion of air defence radar was otherwise unlikely because the F-15s and F-16s used by the IAF were not equipped with stealth technology. [39] [40]

Psychological Operations Capabilities

Radio in a Box

United States Psychological Operations PSYOPpics.JPG
United States Psychological Operations

Radio is the dominant information tool to reach wide audiences in isolated, mountainous regions. The US military has deployed RIABs throughout Afghanistan in order to communicate with the residents. Due to a 70 percent illiteracy rate and lack of education in Afghanistan, radio is a vital communications tool used to broadcast information where radio ownership exceeds 80 percent. [42] [43] The United States military operates approximately 100 RIABs and hire local Afghan DJs in Afghanistan to broadcast information and host call-in shows. [44] The United States Army employed RIAB systems to broadcast anti-Taliban and anti-Al Qaeda messages and countered Taliban propaganda by pushing onto Taliban frequencies in Paktia Province. [45] [46] One advantage of employing RIAB systems is the ability to broadcast vital information immediately to a large audience in the event of a crisis. [44] One Afghan DJ has 50,000 listeners. [47] Nawa District Governor Abdul Manaf uses the local RIAB station to conduct weekly call-in shows and believes the RIAB system is one of his best communication tools to inform a large audience. [48] In Afghanistan's Paktika province, which has a literacy rate of two percent, an estimated 92 percent of the residents listen to the radio every day. [46] [47] Radio programs transmitted using RIAB systems provide beneficial information to Afghan farmers in remote areas. [42] In the isolated, mountainous Wazi Kwah district of Paktika Province, a RIAB system supplies the only source of outside news. [49] Afghan National Army commanders use the RIAB to communicate to villagers and elders and provide thoughts to the community. [50] Afghans can use information distributed by the United States military such as how to react to an approaching military convoy or purpose or use of U.S.-sponsored agriculture programs. For general news, Afghans can also use other information outlets such as the BBC or VOA because RIAB systems are controlled by the US military. [51] Special Operations first employed RIAB systems in Afghanistan in 2005 which improved their ability to supply information to and communicate with the local population in their areas of operation. [52]

B (SOMS-B)

  • Special Operation Media Systems – B (SOMS-B)

--The SOMS-B is a ground-based HMMWV mounted radio and television broadcast system. Like the EC-130C/J it can broadcast on AM, FM, SW and VHF television frequencies. The SOMS-B also has the capability to produce programming or radio and television broadcasts [53] [54]

Other/Integrated

Radio

Radio Azadi

Radio Aazadi, formerly known as Radio Free Afghanistan (RFA) is the Afghan branch of Radio Free Europe / Radio Liberty's (RFE/RL) broadcast services. It broadcasts 12 hours daily as part of a 24-hour stream of programming in conjunction with Voice of America (VOA). RFA first aired in Afghanistan from 1985 to 1993 and was re-launched in January 2002. RFA produces a variety of cultural, political, and informational programs that are transmitted to listeners via shortwave, satellite and AM and FM signals provided by the International Broadcasting Bureau. RFA's mission is "to promote and sustain democratic values and institutions in Afghanistan by disseminating news, factual information and ideas". [55]

Adversarial IO

Terrorists (IO from US Perspective)

"Terrorists are adept at integrating their physical acts of violence with IO. They make audio and video recordings of the incidents for distribution over the Internet and on television. Their violence becomes theater, staged for its psychological impact, and replayed over and over again in the media as IO." [56]

Computer network operations

There are many examples of CNA and are generally done in support of other operations. Terrorists have integrated cyber attacks into their thinking, strategies, and operations as an extremely cost-effective way to harm the US and other adversaries. [58]

The same can be said for CNE, which is about penetrating computer networks before actually attacking them. Gaining access to specific networks is seen to be as part of the CNA process for terrorists (they do not distinguish between the two). [58]

As for CND, terrorists are aware of keeping data secure and websites running because they use the Internet. Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them. The methods they use include access controls, encryption, authentication, firewalls, intrusion detection, anti-viral tools, audits, security management, and security awareness and training. [58]

Steganography

When one considers that messages could be encrypted steganographically in email messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light. Coupled with the "chaffing and winnowing" technique, a sender could get messages out and cover their tracks all at once.

An example showing how terrorists may use forum avatars to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with mozaiq using "vaxjo" as password. Avatar for terrorist.png
An example showing how terrorists may use forum avatars to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with mozaiq using "växjö" as password.

Rumors about terrorists using steganography started first in the daily newspaper USA Today on 5 February 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web with links to jihad". A citation from the article: "Lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com ". Other media worldwide cited these rumors many times, especially after the terrorist attack of 9/11, without ever showing proof. The Italian newspaper Corriere della Sera reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The USA Today articles were written by veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations emerged that he had fabricated stories and sources.

In October 2001, The New York Times published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the 11 September 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development, [60] published in April 2006 makes the following statements:

  • "...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." (p. 9–10)
  • "International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p. 41–42)
  • "The threat posed by steganography has been documented in numerous intelligence reports." (p. 42)

Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images." [61]

By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media.

Military deception

A police search of a British, al-Qaeda member's home, uncovered what is now called "The al-Qaeda Training Manual", a techniques instruction book on deception, forgery, "blending in", hiding places, and the use of covers to blend into the terrorist area of operation (usually cities with large civilian populations). [62] The philosophy the MILDEC is for the concealment of activities rather than misleading adversaries. [63]

PSYOP

Terrorist PSYOP differs from American PSYOP in one two major areas. First, US PSYOP targets foreign adversaries and information is coordinated with many other agencies and screened before it is published. Second, while PSYOP by US and coalition forces is "designed to bring an end to violence and save lives, terrorist PSYOP is frequently directed toward promoting violence and threatening civilian populations with death and destruction. Suicide bombers are portrayed as martyrs rather than killers of innocent people." [64]

The Internet is the main resource to spread propaganda with al-Aqaeda and other terrorist groups. "According to Bruce Hoffman, before it was taken down, al-Qaeda's website Alneda.com emphasized three themes: 1)the West is implacably hostile to Islam, 2) the only way to address this threat and the only language the West understands is the logic of violence, and 3) jihad is the only option" [64] [65]

Terrorists also like to use the Internet to recruit and persuade children to their cause. As Dorothy Denning has found, "Children are being taught to hate Jews and Westerners, and to take up arms against them [through cartoons and comic-book style web pages, bedtime stories, and computer games]". [66]

OPSEC

All terrorists practice a high level of OPSEC since their need to be secret is how they can be successful. Whether it is the al-Qaeda training manual, online magazines targeted for the world, or the training of youth in Jihad camps, OPSEC is one of the first priorities for terrorists. [67]

Secure communications are big as well. The 11 September hijackers, for example, accessed anonymous Hotmail and Yahoo! accounts from computers at Kinko's and at a public library. [68] Messages are also coded. Three weeks before the attacks, Mohamed Atta reportedly received a coded email message that read: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering." [69] The faculties referred to the four targets (twin towers, Pentagon, and Capitol). [70]

The list of methods goes on and on and is very similar to the methods used in organized crime around the world.

Criticism

See also

Related Research Articles

<span class="mw-page-title-main">Electromagnetic warfare</span> Combat involving electronics and directed energy

Electromagnetic warfare or electronic warfare (EW) is warfare involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy operations. The purpose of electromagnetic warfare is to deny the opponent the advantage of—and ensure friendly unimpeded access to—the EM spectrum. Electromagnetic warfare can be applied from air, sea, land, or space by crewed and uncrewed systems, and can target communication, radar, or other military and civilian assets.

<span class="mw-page-title-main">Information warfare</span> Battlespace use and management of information and communication technology

Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.

<span class="mw-page-title-main">Psychological warfare</span> Information operations to assist military objectives

Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and Minds", and propaganda. The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".

<span class="mw-page-title-main">Lockheed EC-130</span> 1975 electronic warfare aircraft series by Lockheed

The Lockheed Martin EC-130 series comprises several slightly different versions of the Lockheed C-130 Hercules that have been and continue to be operated by the U.S. Air Force and, until the 1990s, the U.S. Navy.

<span class="mw-page-title-main">United States Army Special Operations Command</span> Army component of the U.S. Special Operations Command

The United States Army Special Operations Command (Airborne) (USASOC ( YOO-sə-sok)) is the command charged with overseeing the various special operations forces of the United States Army. Headquartered at Fort Liberty, North Carolina, it is the largest component of the United States Special Operations Command. It is an Army Service Component Command. Its mission is to organize, train, educate, man, equip, fund, administer, mobilize, deploy and sustain Army special operations forces to successfully conduct worldwide special operations.

<span class="mw-page-title-main">United States Army Civil Affairs and Psychological Operations Command</span> Functional command of the U.S. Army Reserve Command

The United States Army Civil Affairs and Psychological Operations Command (Airborne), USACAPOC(A), or CAPOC was founded in 1985 and is headquartered at Fort Liberty, North Carolina. USACAPOC(A) is composed mostly of U.S. Army Reserve Soldiers in units throughout the United States. The size of the Command is nearly 13,500 Soldiers, which is 76% of the Department of Defense's Civil Affairs forces and 63% of Psychological Operations forces. The current Commanding General is Major General Isaac Johnson Jr., who assumed command in August 2022.

A restricted line officer is a designator given to a United States Navy and Navy Reserve line officer who is not eligible for Command at Sea. There are many different types and communities, including Engineering Duty Officers, Aerospace Engineering Duty Officers, Aerospace Maintenance Duty Officers, Naval Intelligence Officers, Cryptologic Warfare Officers, Information Operations Officers, Foreign Area Officers, Public Affairs Officers, Naval Oceanographers, Information Professionals, and Human Resources.

15 Psychological Operations Group was a tri-service, or "purple", military unit formerly parented by 1 Military Intelligence Brigade but from April 2014, part of the Security Assistance Group within the British Army's Force Troops Command. Since April 2015, it has been subsumed into 77th Brigade within 6th Division.

The Information Operations Roadmap is a document commissioned by the Pentagon in 2003 and declassified in January 2006. The document was personally approved by former Secretary of Defense Donald Rumsfeld, and describes the United States Military's approach to Information operations, with an emphasis on the Internet.

<span class="mw-page-title-main">Naval Information Warfare Systems Command</span> One of the five "systems commands" of the United States Navy

The Naval Information Warfare Systems Command (NAVWAR), based in San Diego, California is one of six SYSCOM Echelon II organizations within the United States Navy and is the Navy's technical authority and acquisition command for C4ISR, business information technology and space systems. Echelon II means that the organization reports to someone who, in turn, reports directly to the Chief of Naval Operations on the military side. From a civilian perspective, NAVWAR reports to the Assistant Secretary of the Navy (RDA). The command was formerly known as Space and Naval Warfare Systems Command (SPAWAR) and was renamed in June 2019 to better align its identity with its mission.

<span class="mw-page-title-main">Psychological operations (United States)</span> Psychological operations within United States military and intelligence agencies

Psychological operations (PSYOP) are operations to convey selected information and indicators to audiences to influence their motives and objective reasoning, and ultimately the behavior of governments, organizations, groups, and large foreign powers.

<span class="mw-page-title-main">Command and control</span> Military exercise of authority by a commanding officer over assigned forces

Command and control is a "set of organizational and technical attributes and processes ... [that] employs human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or enterprise, according to a 2015 definition by military scientists Marius Vassiliou, David S. Alberts, and Jonathan R. Agre. The term often refers to a military system.

The Joint Information Operations Warfare Center (JIOWC) was created by the U.S. Strategic Command (USSTRATCOM) sometime around 2004 or 2005 at Lackland Air Force Base, Texas, with the intent of coordinating and executing U.S. information operations at the strategic level. On September 12, 2011, by executive order, the JIOWC was chartered as a Chairman's Controlled Activity aligned under the Joint Staff. The JIOWC falls within the Joint Staff Operations Directorate (J3), through the Deputy Director Global Operations, J39 (DDGO).

Computer network operations (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an ever-expanding network of computers and other electronic devices. Computer network operations are deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability.

<span class="mw-page-title-main">1st Information Operations Command (Land)</span> US Army Cyber Command unit

The 1st Information Operations Command (Land), formerly the Land Information Warfare Activity Information Dominance Center (LIWA/IDC), is an information operations unit under the operational control of U.S. Army Cyber Command (ARCYBER) and headquartered at Fort Belvoir, Virginia.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

<span class="mw-page-title-main">39th Information Operations Squadron</span> Military unit

The 39th Information Operations Squadron is an information operations and cyber Formal Training Unit, part of the 318th Cyberspace Operations Group.

According to JP 1-02, United States Department of Defense Dictionary of Military and Associated Terms, a military journalist is "A U.S. Service member or Department of Defense civilian employee providing photographic, print, radio, or television command information for military internal audiences. See also command information. "

<span class="mw-page-title-main">Radio in a box</span>

Radio-in-a-box (RIAB) is a portable, economical broadcasting system containing a laptop, mixer, CD/Cassette player, digital audio recorder, microphones and equipment needed to establish a radio station in remote or disaster locations.

<span class="mw-page-title-main">151st Theater Information Operations Group</span> Military unit

The 151st Theater Information Operations Group, or 151st TIOG, is an Information Operations formation of the United States Army Reserve, headquartered at Fort Totten, New York. Founded in 2009, the 151st TIOG is the only Theater Information Operations Group in the U.S. Army Reserve. It is composed mostly of Army Reserve Soldiers in two battalions based out of Parks Reserve Forces Training Area, Fort George G. Meade, and Fort Totten. The current commander is Colonel Jonathan Steinbach, who assumed command in July 2023.

References

  1. 1 2 3 4 "Archived copy" (PDF). Archived from the original (PDF) on 8 February 2015. Retrieved 4 April 2015.{{cite web}}: CS1 maint: archived copy as title (link)
  2. "Ghost Army: The Combat Con Artists of World War II". The National World War 2 Museum Official Website. The National World War 2 Museum. Retrieved 27 November 2023.
  3. Gormly, Kellie B. "How the Ghost Army of WWII Used Art to Deceive the Nazis". Smithsonian Magazine Official Website. Smithsonian Magazine. Retrieved 27 November 2023.
  4. "Electronic Attack Wing Pacific: Command History". Naval Air Force, U.S. Pacific Fleet Official Site. U.S. Navy. Retrieved 27 November 2023.
  5. 1 2 Meier, William A. "Deception: Here to Stay!" (PDF). Defense Technical Information Center. U.S. Naval War College. Retrieved 27 November 2023.
  6. Brauer, Albert C. "PSYCHOLOGICAL WARFARE KOREA 1951" (PDF). North Dakota State University Libraries Official Website. Georgetown University.
  7. "Psychological Warfare in Korea: An Interim Report". The Public Opinion Quarterly. 15 (1 (Spring 1951)): 66.
  8. "BATTLE OF KOREA: Deadly Flak". Time. 11 February 1952. ISSN   0040-781X . Retrieved 12 August 2021.
  9. Hutcherson, Norman B. (September 1994). COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE (PDF). Maxwell Air Force Base, Alabama: Air University Press. p. xiv. Retrieved 25 December 2023.
  10. Hutcherson, Norman B. (September 1994). COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE (PDF). Maxwell Air Force Base, Alabama: Air University Press. p. xiv. Retrieved 25 December 2023.
  11. 1 2 Hutcherson, Norman B. (9 December 1996). DODD S-3600.1 Information Operations (IO). Washington, D.C.: U.S. Department of Defense. Retrieved 25 December 2023.
  12. "Chapter 2: Officer Classification System" (PDF). U.S. Army Official Website. U.S. Army. Retrieved 25 December 2023.
  13. Pomerleau, Mark (16 February 2023). "Here's what the new information warfare command in the Pacific is doing". Defensescoop. Retrieved 5 December 2023.
  14. Ambinder, Marc (20 May 2010). "The Secret Pentagon Spy Ring". The Atlantic. Retrieved 24 January 2022.
  15. "The Unified Command Plan and Combatant Commands: Background and Issues for Congress". crsreports.congress.gov/. Congressional Research Service. Retrieved 5 December 2023.
  16. "U.S. Army Information Operations Proponent (USAIOP)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  17. "IO Qualification Course (IOQC)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  18. "IO Qualification Course (RC)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  19. "Tactical IO Planner Course (TIOPC)". U.S. Army Combined Arms Center. Retrieved 26 November 2023.
  20. Information In Air Force Operations (PDF). U.S. Air Force. 1 February 2023. Retrieved 26 November 2023.
  21. "Information Operations Officer". The Official Website of the U.S. Air Force. U.S. Air Force. Retrieved 26 November 2023.
  22. "39th Information Operations Squadron". Hurlbert Field Official Website. U.S. Air Force. Retrieved 26 November 2023.
  23. "688th Cyberspace Wing". 16th Air Force (Air Forces Cyber) Official Website. U.S. Air Force. Retrieved 26 November 2023.
  24. "DOD Information Operations Roadmap" (PDF). Gwu.edu. 30 October 2003. p. 61. Retrieved 20 May 2016.]
  25. "Joint Publication 3-53 : Doctrine for Joint Psychological Operations" (PDF). Gwu.edu. Retrieved 20 May 2016.
  26. 1 2 JCS, JP 3-58, Joint Doctrine for Military Deception (Washington, DC: GPO, 31 May 1996), v-vi.
  27. , p. 98
  28. "Archived copy" (PDF). Archived from the original (PDF) on 21 July 2013. Retrieved 4 April 2015.{{cite web}}: CS1 maint: archived copy as title (link)
  29. "Military Personnel Warned Against Geotagging Photos". RedOrbit Staff & Wire Reports. Retrieved 18 April 2012.
  30. Post, Global. "Army: Facebook geotagging dangerous for soldiers". Tucson Sentinel. Retrieved 18 April 2012.
  31. "OPSEC". Army Spouses Online Facebook. Retrieved 18 April 2012.
  32. "Building a Cyber Secure Plant". Siemens. 30 September 2010. Archived from the original on 21 April 2021. Retrieved 5 December 2010.
  33. Robert McMillan (16 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Archived from the original on 25 May 2012. Retrieved 16 September 2010.
  34. "Last-minute paper: An indepth look into Stuxnet". Virus Bulletin.
  35. "Stuxnet worm hits Iran nuclear plant staff computers". BBC News. 26 September 2010.
  36. Gary Samore speaking at the 10 December 2010 Washington Forum of the Foundation for Defense of Democracies in Washington DC, reported by C-Span and contained in the PBS program Need to Know ("Cracking the code: Defending against the superweapons of the 21st century cyberwar", 4 minutes into piece)
  37. Williams, Christopher (15 February 2011). "Israel video shows Stuxnet as one of its successes". The Daily Telegraph. London. Retrieved 14 February 2012.
  38. 1 2 David A. Fulghum; Michael A. Dornheim; William B. Scott. "Black Surprises". Aviation Week and Space Technology . Retrieved 5 October 2007.
  39. 1 2 John Leyden (4 October 2007). "Israel suspected of 'hacking' Syrian air defences". The Register. Retrieved 5 October 2007.
  40. 1 2 David A. Fulghum (3 October 2007). "Why Syria's Air Defenses Failed to Detect Israelis". Aviation Week and Space Technology. Retrieved 5 October 2007.
  41. David A. Fulghum (14 January 2007). "Technology Will Be Key to Iraq Buildup". Aviation Week and Space Technology.
  42. 1 2 "Afghanistan's "radio war" | @pritheworld". Archived from the original on 15 April 2013. Retrieved 24 April 2012.
  43. Radio in a Box (2011). Radio in a Box Archived 25 April 2012 at the Wayback Machine "Retrieved 2011-14-10"
  44. 1 2 Radio in a Box – Giving Afghanistans Their Own Voice! (2010). Radio in a Box – Giving Afghanistans Their Own Voice! "Retrieved 2011-14-10"
  45. Army radio connects with Afghans (2009). Army radio connects with Afghans Archived 15 October 2009 at the Wayback Machine "Retrieved 2011-10-30"
  46. 1 2 Military Embraces Counterinsurgency in Afghanistan (2008). Radio in a Box – Military Embraces Counterinsurgency in Afghanistan Archived 2 March 2012 at the Wayback Machine "Retrieved 2011-11-11"
  47. 1 2 In Afghan Fight, U.S. Takes to the Airwaves (2010). In Afghan Fight, U.S. Takes to the Airwaves "Retrieved 2011-14-10"
  48. /The Busiest Man in Nawa (2011). The Busiest Man in Nawa "U.S. Marine Corps Releases", "Retrieved 2011-11-10"
  49. Local DJ celebrity to his Afghan listeners (2010). Local DJ celebrity to his Afghan listeners "Retrieved 2011-10-14"
  50. Radio-in-a-Box: Afghanistan's New Warrior-DJs (2011). Radio-in-a-Box: Afghanistan's New Warrior-DJs "Retrieved 2011-10-14"
  51. The Pentagon, Information Operations, and International Media Development (2010). The Pentagon, Information Operations, and International Media Development Archived 6 January 2011 at the Wayback Machine "A Report to the Center for International Media Assistance", :e27 "Retrieved 2011-10-14"
  52. Breaking the Afghan Insurgency (2007). Breaking the Afghan Insurgency "Special Warfare" 20 (5):e26 "Retrieved 2011-11-10"
  53. DOCUMENT CALLED IO IN OEF AND IF -saved in your folder
  54. "SOMS-B 2 MRBS Antenna System". Federal Business Opportunities. Retrieved 18 April 2012.
  55. "Afghanistan – Radio Free Europe / Radio Liberty". RadioFreeEurope/RadioLiberty. Archived from the original on 23 April 2012. Retrieved 24 April 2012.
  56. Denning (2005) , p. 6
  57. Denning (2005) , p. 20
  58. 1 2 3 Denning (2005) , p. 11
  59. Taylor, Rob (27 April 2012). "Taliban website hacked as Afghan cyber war heats up". Reuters US. Retrieved 27 April 2012.
  60. Federal Plan for Cyber Security and Information Assurance Research and Development National Science and Technology Council, April 2006
  61. "The New Issue of Technical Mujahid, a Training Manual for Jihadis". The Jamestown Foundation.
  62. "The Al Qaeda Manual" (PDF). Justice.gov. Retrieved 20 May 2016.
  63. Denning (2005) , p. 7
  64. 1 2 Denning (2005)
  65. Bruce Hoffman, "Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment," Studies in Conflict & Terrorism, 26:429-442, 2003.
  66. Denning (2005) , p. 5
  67. Denning (2005) , p. 12
  68. Brian Ross, "A Secret Language," ABCNEWS.com, 4 October 2001.
  69. 58 "Virtual Soldiers in a Holy War," Ha'aretz Daily, 16 September 2002.
  70. Denning (2005) , p. 13
  71. William Levesque, Officer says he refused 'illegal' order in Afghanistan, St. Petersburg Times (Feb. 25, 2011.); Army to Investigate Rolling Stone's Psy-Ops Report, Atlantic Monthly (Feb. 24 2011).
  72. Major Garrett, Key Senator Calls Psyops Charges Serious, but He Denies Feeling Manipulated, National Journal (Feb. 20, 2011).
  73. Stuart, Tessa. "Obama Publishes Account of Firing Gen. McChrystal On the Same Day McChrystal Briefs Biden". Rolling Stone Official Website. Rolling Stone. Retrieved 28 November 2023.
  74. Phil Stewart, U.S. Probes if Senators Targeted by Afghan Psy-Ops Unit, Reuters (Feb. 24, 2011); see also Rajiv Chandrasekaran, Military to investigate claim that psy-ops team was used to influence U.S. senators, Wash. Post (Feb. 24, 2011).
  75. Ukman, Jason. "Lt. Gen. Caldwell cleared of allegations he ordered psy-ops team to influence lawmakers". The Washington Post Official Website. Retrieved 28 November 2023.
  76. Baker, Ralph (2006). The Decisive Weapon: A Brigade Combat Team Commander's Perspective on Information Operations. Military Review. pp. 34–35. Archived from the original on 5 August 2011. Retrieved 26 April 2012.
  77. McChrystal, Gen. Stanley A. (21 September 2009). "COMISAF Initial Assessment". US Department of Defense. Retrieved 17 April 2012.

Bibliography