Psychological Warfare

Eight Conditions for the Success of Psychological Warfare (Part 1)

Abstract:

The question of what makes psychological warfare successful has never been addressed in a methodological, systematic, and clear manner in the existing PSYWAR literature. To identify these conditions, this study scanned the key works on psychological warfare, backed by sources in the fields of military history, strategy, psychology, and communication science. The conditions presented in this study are eight in total, ranging from the need for military victories to the targeted use of violence, from control of the information space to credibility. In the second part of this study, to illustrate the implementation of these conditions in a real military operation, the eight conditions are used to assess the performance of Russian online psychological operations against Ukraine and the Hamas online psychological campaign against Israel. Findings reveal how the model’s eight conditions explain the success/failure of these two psychological campaigns.

Predicting the Success of Psychological Warfare (Part 2): Testing the Model in Two Case Studies

Abstract:

The previous study (See Part 1), attempted to identify the conditions for the success or failure of psychological warfare, based on a systematic scan of the literature and sources in the fields of military history, strategy, psychology, and communication science. This scan resulted in eight predictors, ranging from the need for military victories to the targeted use of violence, from control of the information space to credibility. In the second part of this study, to illustrate the implementation of these conditions in a real military operation, the eight conditions are used to assess the performance of Russian online psychological operations against Ukraine and the Hamas online psychological campaign against Israel. The eight conditions model provides a good explanation of the differences in these two campaigns’ effectiveness.

Information Operations from an Asian Perspective: A Comparative Analysis

ABSTRACT

This article is a comparative study of the practice of state-sponsored influence activities in its various forms (namely propaganda, public diplomacy, psychological operations, public affairs, cyber warfare, electronic warfare and so on) in selected Asian countries (China, Taiwan, Thailand and Japan). It highlights the state of Asian development, differences in concepts, organization and application as compared to the Western models that today dominate discussions on information operations and influence activity.  By doing so, it provides alternative ways of approaching Information Operations (IO) that might contribute to the generation of challenges and solutions facing today’s policy makers. Finally, it will serve to broaden the body of knowledge in influence activities to include both Eastern and Western viewpoints. 

The Electronic Intifada: The Palestinian Online Resistance in the 2nd Intifada

ABSTRACT

This paper examines the utility of the Internet in the war of ideas in the Al-Aqsa Intifada in the period from 2000-2008. It tests the hypothesis that the internet is a ‘force-multiplier’ and ‘equalizer’ for the Palestinians to counter a more militarily superior State of Israel. The prognosis offered in this paper is that the empowering characteristics of the internet have transformed the Palestinian struggle into ‘asymmetric warfare’ akin to Mao’s ‘People’s War’ fought on cyberspace. Empirical findings largely confirmed the hypothesis, but with reservations about the ‘equalizer’ effect. The effectiveness of the Palestinian’s online resistance is attributable to their assimilation into the NGO/IO community and achieving traction with the news media. However, decades of Israeli influence on US media and audiences continue to present a significant barrier. 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com