Terrorist Use of Information Operations

ABSTRACT

It is the authors’ contention that many terrorist organizations have a profound understanding of the information environment and have the ability to manipulate information to achieve their objectives, inherently viewing operations through an IO lens. To provide insight into how terrorist organizations use Information Operations, to exploit the information environment, the authors evaluate tactical and strategic examples of terrorist operations using an IO lens based on US Department of Defense (DoD) IO doctrine. This analysis illustrates that terrorists use IO, and that terrorist organizations are naturally linked to the information environment.


AUTHORS

Special Operations Command, United States Army

Norman E. Emery active duty officer in the United States Army. Recent graduate of the Defense Analysis program at the Naval Postgraduate School in Monterey, California. His thesis work focused on the application of information operations to terrorism.

Command and General Staff College, United States Army

Robert S. Earl is an active duty officer in the United States Army. Recent graduate of the Defense Analysis program at the Naval Postgraduate School in Monterey, California. His thesis work focused on the application of information operations to terrorism.

Associate Professor, Information Sciences Department, Naval Postgraduate School, Monterey, California

Raymond Buettner is a retired naval officer and is now an Associate Professor in the Information Sciences Department at the Naval Postgraduate School, Monterey.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com