Psychological Operations

Rhizomatic Target Audiences of the Cyber Domain

Abstract:

Target Audience Analysis (TAA) is a process of finding suitable target audiences for psychological operations (PSYOPS). Typically, a TAA is a one-way process with some kind of a feedback system. The cyber domain presents a challenge to this type of sequential, linear process by refusing to stay still while the process is being executed, possibly leading to results from yesterday’s data in an environment that no longer exists today. 

Manipulating the Architecture of Cultural Control: A Conceptual Model for Strategic Influence Operations in North Korea

ABSTRACT

The deep structural and cultural changes taking place in North Korea provide an opportunity to conduct influence operations to shape that country’s culture and society, either to destabilize the government or to prepare the population for a regime change. This paper presents a conceptual model of how contradictions between top down, imposed culture and organic, indigenous culture can be exploited to destabilize the system, and eventually re-pattern the culture.  The process includes the following steps: identification of the cultural type; understanding relevant cultural forms; identification of vulnerable targets; evaluation of the information system; identification of effective elements of persuasion; mapping of the architecture of social control; and introduction of new “attractors” to damage or destroy the constituent cultural myths.

Automated Categorization of Profiles for Psychological Operations: An Analysis of Data and Text Mining Approaches

ABSTRACT

Influencing one’s adversary has always been an objective in warfare.  To date the majority of psychological influence operations have been geared toward the masses.  A tailored approach of individual targeting is preferred but requires unattainable resources.  This paper investigates whether state-of-the-art data and text mining tools can be used to automate the categorization/segmentation of individual profiles for psychological operations.  Five data and text mining software applications were tested and their results compared with those of a social psychologist.  Using statistical analysis, it was concluded that current data and text mining tools are not mature enough to produce results comparable with those produced by psychologists.

Backfires: White, Black and Grey

ABSTRACT

Sometimes the use of force can backfire on perpetrators, generating increased support for the opponent. Perpetrators may try to turn this process against their targets, by attributing their actions to the targets, as in black operations, or by using an ambiguous event as a pretext for action. These techniques can be understood as different uses of backfire dynamics, by analogy to white, black and grey propaganda. Various examples are used to illustrate this framework.

Shaping the ‘Information Space’

ABSTRACT

Perception Management is a key component of Information Operations. This article presents a taxonomy of Perception Management, which is seen as comprising five principal sub-elements: Public Affairs, Public Diplomacy, Psychological Operations, Deception, and Covert Action. While these are traditional activities, the author argues that they generally have not been employed well and in a synergistic fashion by the Western Powers since the Second World War. The article suggests an approach to foreign political-military challenges in terms of ‘Shaping the Information Space’ as an organising principle of policy and the application of power in the international arena. In order to undertake such an enterprise, the Allied nations require improved understanding of the psychology of adversaries and neutrals, as well as one’s own friends and allies.

NATO and Strategic PSYOPS: Policy Pariah or Growth Industry?

ABSTRACT

In the aftermath of 9/11, among many other changes to its defense establishment, the United States has undertaken a significant re-vamping of its strategic psychological operations (PSYOPS) structure and capabilities.xxxviii Similarly, NATO must now determine if it can adapt and face the realities of the modern security environment -- where current and potential threats to peace will confront NATO through asymmetric means rather than through the use of conventional military forces. Of particular interest in this study, are unconventional attempts to confront NATO via aggressive regional and international perception manipulation.

Becoming the Enemy…and How Not To: Strategic Communications and the Challenges of the War on Terror

ABSTRACT

This opinion piece argues that there are lessons to be learned from past applications of Psychological Operations and Information Operations for the current practice of Strategic Communications.  The Information War on Terror is going so badly that something must be done.  Already longer than World War Two, western strategic communication directed towards the Arab and Muslim world has failed because the military, while being quite good at tactical operational propaganda, is not by itself equipped to work at the strategic or political level.  This is because western militaries regard information as a support tool.  For Al Qaida and the Taliban it is the main weapon.

The Future Roles of Electronic Warfare in the Information Warfare Spectrum

ABSTRACT

As the concept of the battlefield changes and the focus shifts towards the dominance of the 'Info-sphere', the role of information and information systems becomes more prominent. As an ever-increasing proportion of the information and communications technology is becoming wireless, electronic warfare (EW) may find new roles and 'targets.' This paper will explore the future roles that EW could play as a discipline within the Information Warfare (IW) construct, and examines possible 'relationships' and influence EW will have on other functional areas of IW, by analysing technological trends in conflicts.

An Information Operations Roadmap for South Africa

ABSTRACT

The latest arms race can be considered to be information-based, revolving around Information Operations (IO). As with any developing concept, there are innovators, early adopters, and laggards. However, complexities in the constructs of IO result in a number of potential adopters struggling to implement their own brand of IO. A modified Capability Maturity Model is proposed and applied to the case of South Africa. Using guidance from previous studies and publicly available documentation, capability gaps for IO in South Africa are identified. Based on these gaps, a roadmap for developing IO capacity in South Africa is proposed.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com