Terrorist Use of Information Operations
ABSTRACT
It is the authors’ contention that many terrorist organizations have a profound understanding of the information environment and have the ability to manipulate information to achieve their objectives, inherently viewing operations through an IO lens. To provide insight into how terrorist organizations use Information Operations, to exploit the information environment, the authors evaluate tactical and strategic examples of terrorist operations using an IO lens based on US Department of Defense (DoD) IO doctrine. This analysis illustrates that terrorists use IO, and that terrorist organizations are naturally linked to the information environment.
AUTHORS
Special Operations Command, United States Army
Norman E. Emery active duty officer in the United States Army. Recent graduate of the Defense Analysis program at the Naval Postgraduate School in Monterey, California. His thesis work focused on the application of information operations to terrorism.
Command and General Staff College, United States Army
Robert S. Earl is an active duty officer in the United States Army. Recent graduate of the Defense Analysis program at the Naval Postgraduate School in Monterey, California. His thesis work focused on the application of information operations to terrorism.
Associate Professor, Information Sciences Department, Naval Postgraduate School, Monterey, California
Raymond Buettner is a retired naval officer and is now an Associate Professor in the Information Sciences Department at the Naval Postgraduate School, Monterey.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive