Difference between revisions of "Information Operation"

From Wikispooks
Jump to navigation Jump to search
(-)
(import from cyberwar)
 
(One intermediate revision by the same user not shown)
Line 8: Line 8:
 
|sourcewatch=https://www.sourcewatch.org/index.php/Information_operations
 
|sourcewatch=https://www.sourcewatch.org/index.php/Information_operations
 
}}
 
}}
'''Information operations''', also known as '''influence operations''' or '''IO''', are campaigns in the field of and '''information warfare''', dedicated to obtaining a decisive advantage in the information environment,<ref>https://globalsecurityreview.com/understanding-information-operations-information-warfare/ saved at [http://web.archive.org/web/20201127144051/https://globalsecurityreview.com/understanding-information-operations-information-warfare/ Archive.org]</ref> which includes [[social media]]. It includes the collection of tactical information about an adversary as well as the dissemination of [[propaganda]] in pursuit of a competitive advantage over an opponent.<ref>https://www.rand.org/topics/information-operations.html</ref>
+
'''Information operations''', also known as '''influence operations''' or '''IO''', are campaigns in the field of and '''information warfare''', dedicated to obtaining a decisive advantage in the information environment,<ref>https://globalsecurityreview.com/understanding-information-operations-information-warfare/ saved at [http://web.archive.org/web/20201127144051/https://globalsecurityreview.com/understanding-information-operations-information-warfare/ Archive.org]</ref> which includes [[social media]]. Part of it is the collection of information about an adversary, then the dissemination of [[propaganda]] in pursuit of a competitive advantage over the opponent.<ref>https://www.rand.org/topics/information-operations.html</ref>
 +
 
 +
Information operations can and are directed against domestic audiences as well.<ref>https://wikispooks.com/wiki/Integrity_Initiative</ref><ref>https://nsarchive2.gwu.edu/NSAEBB/NSAEBB177/index.htm</ref><ref>https://www.rebelnews.com/ezra_levant_show_september_27_2021</ref><ref>https://nationalpost.com/news/national/defence-watch/military-leaders-saw-pandemic-as-unique-opportunity-to-test-propaganda-techniques-on-canadians-forces-report-says/wcm/22733c97-39f0-4ba4-8a26-478af5e215f3</ref><ref>https://www.semanticscholar.org/paper/Overcoming-Information-Operations-Legal-Limitations-Elstad/aa20e36539711634a2979c20e457b46e1382eb4b</ref>
  
Information operations can be directed against domestic audiences as well.<ref>https://wikispooks.com/wiki/Integrity_Initiative</ref><ref>https://nsarchive2.gwu.edu/NSAEBB/NSAEBB177/index.htm</ref><ref>https://www.rebelnews.com/ezra_levant_show_september_27_2021</ref><ref>https://nationalpost.com/news/national/defence-watch/military-leaders-saw-pandemic-as-unique-opportunity-to-test-propaganda-techniques-on-canadians-forces-report-says/wcm/22733c97-39f0-4ba4-8a26-478af5e215f3</ref><ref>https://www.semanticscholar.org/paper/Overcoming-Information-Operations-Legal-Limitations-Elstad/aa20e36539711634a2979c20e457b46e1382eb4b</ref>
 
 
{{SMWQ
 
{{SMWQ
 
|text=In the battle of perception management, where the enemy is clearly using the media to help manage perceptions of the general public, our job is not perception management but to counter the enemy's perception management,
 
|text=In the battle of perception management, where the enemy is clearly using the media to help manage perceptions of the general public, our job is not perception management but to counter the enemy's perception management,
Line 18: Line 19:
 
|source_details=https://www.nytimes.com/2004/12/13/politics/pentagon-weighs-use-of-deception-in-a-broad-arena.html - https://www.sourcewatch.org/index.php/Information_Operations_Roadmap
 
|source_details=https://www.nytimes.com/2004/12/13/politics/pentagon-weighs-use-of-deception-in-a-broad-arena.html - https://www.sourcewatch.org/index.php/Information_Operations_Roadmap
 
}}
 
}}
 +
 +
==Astroturf==
 +
[[Astroturfing]] is a method that can be used to make belief that there exists support for one idea or another, when in actuality that support is simulated by the use of [[sock puppet]] accounts on a massive scale. "[[AI]] technology" can be employed.
  
 
=="Cyberwarfare"==
 
=="Cyberwarfare"==
 
IO has strong overlap with [["Cyberwarfare"]].
 
IO has strong overlap with [["Cyberwarfare"]].
 +
 +
==US military definition==
 +
IO is defined by the [[US military]] as “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” This could mean among other things: spreading of false information, impersonation, denying network access ([[Internet]]/local) and destruction of hardware. The former two more are in the range of IO, the later two in the range of cyber attacks/war.<ref>https://www.mitre.org/sites/default/files/publications/characterizing-effects-cyber-adversary-13-4173.pdf saved at [http://web.archive.org/web/20191008024954/https://www.mitre.org/sites/default/files/publications/characterizing-effects-cyber-adversary-13-4173.pdf Archive.org]</ref> In other words, "IO can be performed in any domain, including cyberspace. An airplane dropping leaflets with a message aimed to influence an audience is conducting IO ([[Psyop|psychological ops]]) without using cyberspace. Similarly, operations in cyberspace are not limited to IO. Manipulating an enemy airport computer system to disable the fuel pumps is a cyberspace operation, but not an example of IO".<ref>https://apps.dtic.mil/dtic/tr/fulltext/u2/a503117.pdf</ref>
  
 
{{SMWDocs}}
 
{{SMWDocs}}
 
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}

Latest revision as of 01:06, 31 January 2022

Concept.png Information Operation 
(Deception,  Fraud,  Propaganda,  Statecraft,  Information warfareSourcewatchRdf-entity.pngRdf-icon.png
TypeIdea
Interest of• Michael A. Aquino
• Association of Old Crows
• George Eliason
• Joel Harding
• The 77th Brigade

Information operations, also known as influence operations or IO, are campaigns in the field of and information warfare, dedicated to obtaining a decisive advantage in the information environment,[1] which includes social media. Part of it is the collection of information about an adversary, then the dissemination of propaganda in pursuit of a competitive advantage over the opponent.[2]

Information operations can and are directed against domestic audiences as well.[3][4][5][6][7]

“In the battle of perception management, where the enemy is clearly using the media to help manage perceptions of the general public, our job is not perception management but to counter the enemy's perception management,”
Lawrence Di Rita (December 2004)  [8]

Astroturf

Astroturfing is a method that can be used to make belief that there exists support for one idea or another, when in actuality that support is simulated by the use of sock puppet accounts on a massive scale. "AI technology" can be employed.

"Cyberwarfare"

IO has strong overlap with "Cyberwarfare".

US military definition

IO is defined by the US military as “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” This could mean among other things: spreading of false information, impersonation, denying network access (Internet/local) and destruction of hardware. The former two more are in the range of IO, the later two in the range of cyber attacks/war.[9] In other words, "IO can be performed in any domain, including cyberspace. An airplane dropping leaflets with a message aimed to influence an audience is conducting IO (psychological ops) without using cyberspace. Similarly, operations in cyberspace are not limited to IO. Manipulating an enemy airport computer system to disable the fuel pumps is a cyberspace operation, but not an example of IO".[10]


 

An example

Page nameDescription
Forged 2022 Rand reportA forged paper paper allegedly produced by the Rand corporation.

 

Related Quotation

PageQuoteAuthor
Robert Steele“This may strike your listeners as way out, but we actually believe that there is a colony on Mars. It is populated by children who were kidnapped and sent into space on a 20 year ride so that once they get to Mars they have no alternative but to be slaves on the Mars colony.”Robert Steele

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:Integrity Initiative Budget for the 12 months ending 31 March 2019Budget and activity plan2 November 2018Integrity InitiativeBudget outlining how Integrity Initiative is going to control the information space, and influence policy-makers, specialists and media.
Document:The Integrity Initiative Guide to Countering Russian Disinformationanalysis2 November 2018Integrity InitiativeA guide to Russian disinformation, an ideological prep guide for dedicated II operatives
Document:The Network of Networksanalysis30 May 18 JLChris DonnellyA handbook for Integrity Initiative activities, including starting clusters
File:MindWar.pdfpaper1980Paul E. Vallely
Michael A. Aquino
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References