Quantcast
Channel: Information operations – To Inform is to Influence
Viewing all 5256 articles
Browse latest View live

A Presidential Campaign, but No Presidential or National Narrative | Strategic Narratives

$
0
0

November 3, 2012

A Presidential Campaign, but No Presidential or National Narrative

By Amy Zalman

A presidential campaign is an exercise in storytelling. Each candidate is always seeking to tell the most compelling story of the nation, one that both reflects who we think we are and projects into the future the kind of nation we’d like to be. The very occasion of campaign, with its promise of renewal, should be a strong backdrop for the symbols, themes, images and practices that tie past and future of a nation together.This year, both Romney and Obama have struggled to find their foothold in a narrative that works. As the near tie in popularity makes clear, neither has a mandate, and neither has told a story with a powerful sense of forward momentum.

via A Presidential Campaign, but No Presidential or National Narrative | Strategic Narratives.


Filed under: Information operations

China Hacks Into Twitter and Censors it Ahead of Chinese Communist Election

$
0
0
Censorship

Censorship (Photo credit: IsaacMao)

This is unadulterated censorship, without a sugar coating.  While the title implies the Chinese government is doing this, there is no proof.  The problem is ‘if it walks like a duck, quacks like a duck and looks like a duck, it’s probably China’.  Oops, I meant it’s probably a duck.

Cyber War: China Hacks Into Twitter and Censors it Ahead of Chinese Communist Election

by Rebecca McCartney

Cyber War China Hacks Into Twitter and Censors it Ahead of Chinese Communist Election

On Thursday in China, 2270 delegates gathered for the 18th Chinese Communist Party National Congress in Bejing’s imposing Great Hall of the People to decide the party’s next political leadership. In what can only be described as another incident of intrusive censorship, many commentators of this once-in-a-decade event reported that their Twitter accounts had been hacked while others experienced problems with their internet connection.

Early this morning, Twitter sent out e-mails to an unknown number of users warning that their accounts “may have been compromised by a website or service not associated with Twitter.” While many of these individuals are known to have been on the Chinese mainland, others outside of China are also believed to have received the message. One Twitter user reported knowing four French users that got the message. It is a very worrying international concern that “someone” is trying to control the conversation about the congress.

Affected users include Tsinghua University professor Patrick Chovanec, the China Media Project , Christina Larson, Mara Hvistendahl, OffbeatChina, amongst other journalists and analysts; all of which are notable voices within the China-related Twitter-verse.

Read the rest at Cyber War: China Hacks Into Twitter and Censors it Ahead of Chinese Communist Election.


Filed under: Information operations Tagged: Beijing, China, China Media Project, Communist China, Great Hall of the People, Patrick Chovanec, Tsinghua University, Twitter

As cyberwarfare heats up, allies turn to U.S. companies for expertise – The Washington Post

$
0
0

As cyberwarfare heats up, allies turn to U.S. companies for expertise

Ellen Nakashima

Published: November 22

In the spring of 2010, a sheik in the government of Qatar began talks with the U.S. consulting company Booz Allen Hamilton about developing a plan to build a cyber-operations center. He feared Iran’s growing ability to attack its regional foes in cyberspace and wanted Qatar to have the means to respond.

Several months later, officials from Booz Allen and partner firms met at the company’s sprawling Tysons Corner campus to review the proposed plan. They were scheduled to take it to Doha, the capital of the wealthy Persian Gulf state.

That was when J. Michael McConnell, a senior vice president at Booz Allen and former director of national intelligence in the George W. Bush administration, learned that Qatar wanted U.S. personnel at the keyboards of its proposed cyber-center, potentially to carry out attacks on regional adversaries.

“Are we talking about actually conducting these operations?” McConnell asked, according to several people at the meeting. When someone said that was the idea, McConnell uttered two words: “Hold it.”

via As cyberwarfare heats up, allies turn to U.S. companies for expertise – The Washington Post.


Filed under: Information operations

Indian Village Bans Unmarried Women And Girls From Using Mobile Phones | Techdirt

$
0
0

Indian Village Bans Unmarried Women And Girls From Using Mobile Phones

from the sexist,-moi? dept

http://www.techdirt.com/blog/wireless/articles/20121205/08294221238/indian-village-bans-unmarried-women-girls-using-mobile-phones.shtml

It’s fairly widely accepted that the key digital device in the future will be the mobile phone, not the desktop computer that has had such an impact on Western society for the last few decades. That’s partly a question of cost — if devices are to reach even the poorest in emerging economies, they must be very cheap. But there are also other factors, such as the mobile phone’s small size and portability; its rugged design and ability to cope with intermittent power supplies; and the built-in Net connectivity that more or less comes as standard.

But not everyone is delighted at the prospect of this powerful technology becoming pervasive. Here, for instance, is a depressing tale from India:

A village council in the state of Bihar this week prohibited unmarried women and girls from using mobile phones, saying that they promote extramarital affairs and unsanctioned marriages and erode the moral fabric of society. Married women will be allowed to use them only indoors and in the presence of a relative.

Well, perhaps mobile phones have indeed contributed to affairs, but logic dictates that there was probably a man at the other end of the conversation, and it’s quite likely he was using a mobile phone too: why not ban all unmarried men and boys from using them, and only allow married ones to make calls under supervision of their relatives? The answer, of course, is that this is not about “eroding the moral fabric of society”, but about power, and in particular the erosion of traditional male power in the village:

Many villagers, male and female, attended a village meeting Sunday about the ban, and most favored it, particularly older people, Mr. Alam said. He presided over the meeting. The panchayat [unelected council], which is made up entirely of men, also barred women from bathing outdoors, at water pumps or in ponds or canals.

Moreover:

The village’s top elected official, Shamina Khatoon, a woman, was not invited to the panchayat’s meeting on Sunday.

Which is pretty strange, since she is both the top official in the village and a woman, and so might be expected to offer a useful perspective on the proposal.

Other comments from the New York Times article indicate that Indian officials are investigating the matter, which at least offers some hope that the ban will be rescinded. Whatever happens, this incident confirms that one of the best ways of empowering women and weakening the grip of patriarchal power is to help them acquire them mobiles cheaply. Moore’s Law and mobile companies eager to sell phones and contracts to anyone, whatever their gender, will make sure that happens whether the village elders like it or not.

via Indian Village Bans Unmarried Women And Girls From Using Mobile Phones | Techdirt.


Filed under: Information operations

Announcing an IO, SC, PD and Cyber Community Calendar

$
0
0

After an exhaustive search, I recognize there is no ‘community’ calendar for IO, SC, PD or Cyber, so I’m taking the lead.  Thank you to Bob King for the inspiration and the kick in my seat.

I’m standing up a community calendar for the IO, SC, PD and Cyber Communities since nobody has seen the need in recent times.  I choose to ignore the memo from OSD PA about SC, I’m driving on after reading Rosa Brooks’ article. Hopefully this calendar will become the “go to” site for deciding which events you will attend in this resource constrained environment.

Here is the URL: http://toinformistoinfluence.com/io-cyber-sc-pd-community-calendar/ You can also find it at the top, right corner of the homepage at http://ToInformIsToInfluence.com

Now I need your assistance.  Please circulate this request far and wide for input.

Please send me as much information about events in our communities, then Bob King and I will be putting a database together, as well as a front end.  In the meantime I will be handjamming it onto a text page…  I recognize some events do not ‘finalize’ until the last few months, but please send me as much information as you may as soon as possible.  If dates change, let us know.  If the event is cancelled, let us know.

Please include:

  • Name of event with URL
  • Date(s)
  • Host
  • POC info
  • Venue name
  • Address

Here is the address where the calendar is located!  It’s a community resource. http://toinformistoinfluence.com/io-cyber-sc-pd-community-calendar/

Any suggestions?  Feel free to send them to me.


Filed under: Information operations

Book Lecture with James Farwell: Persuasion and Power: The Art of Strategic Communication « Culture and Security

$
0
0

Book Lecture with James Farwell: Persuasion and Power: The Art of Strategic Communication

by cultureandsecurity

You are cordially invited to a special lecture with author 

James P. Farwell

as he discusses his new book
Persuasion and Power: The Art of Strategic Communication 

Monday, January 14
4:30 PM

The Institute of World Politics
1521 16th Street NW
Washington, DC 20036
Parking map

Please click here to register.

This event is co-sponsored by the Center for Culture and Security.

The publisher’s description follows. 

Now more than ever, in the arenas of national security, diplomacy, and military operations, effective communication strategy is of paramount importance. A 24/7 television, radio, and Internet news cycle paired with an explosion in social media demands it.

According to James P. Farwell, a former political consultant, the US government’s approach to strategic communication has been misguided. Persausion and Power stands apart for its critical evaluation of the concepts, doctrines, and activities that the US Department of Defense and Department of State employ for the art of strategic communication including psychological operations, military information support operations, propaganda, and public diplomacy. Farwell stresses that words, deeds, actions, and symbols may qualify as strategic communication and aim to mold or shape public opinion to influence behavior in order to attain specific objectives, advance interests, or-viewed from a military perspective-satisfy or create conditions that produce a desired end-state. He contends that a message that is true, consistent, and persuasive is more powerful than any deception.

Persuasion and Power is a book about communication strategy, and how figures from Julius Caesar to Barack Obama, Napoleon to Hugo Chavez, Martin Luther to Margaret Thatcher have used it to influence the outcomes of crises, conflicts, politics and diplomacy across different cultures and societies. This insightful volume will help communications, policymakers, and students understand when, where, and how they can apply the principles of communication strategy to advance national security interests.

About the Author

James P. Farwell is a defense consultant who advises the US Department of Defense and the US Special Operations Command on a range of global initiatives and actions, including strategic communication. He is also a senior research fellow in strategic studies at the Canada Centre for Global Security Studies in the Munk School of Global Affairs at the University of Toronto. He is the author of The Pakistan Cauldron: Conspiracy, Assassination, and Instability.

 

via Book Lecture with James Farwell: Persuasion and Power: The Art of Strategic Communication « Culture and Security.


Filed under: Information operations Tagged: Psychological warfare, Strategic Communication, United States

Is An Information Campaign possible?

$
0
0
English: Location of Benghazi within Libya.

Benghazi, Libya. (Photo credit: Wikipedia)

I read a friend’s note to me today and I realized that I am free to speak from my heart, whereas those currently in the government, especially in or working for the military are constrained to work within the confines of their published doctrine and it is very difficult, if not impossible, to evolve quickly.  Politicians realize that perception is everything, the military is only beginning to understand and internalize this lesson.  There is an aversion to the use of military force by some in government, perhaps we’re looking at things the wrong way.

As a former enlisted Special Forces soldier, later an infantry officer, then a military intelligence officer, then working in Information Operations at a variety of levels and jobs, I have a unique background and, therefore, perspective.  I am not restricted to quote line and verse from current doctrine, I see it as my job to stretch the limits and, therefore, offer a possible future.  This is what I shared with some friends today.  I was advised to contact Chuck de Caro and discuss this with him, which I will.  Here is what I shared with them:  <begin>

Setting: a possible future scenario where military leaders recognize that every action, every word and every piece of information that the official US government releases is perceived by foreigners collectively and has a profound effect on the perception by foreign audiences, from the grassroots to the leadership at all levels, not only in a country, but regionally and globally.  There is no such thing as a plan with only tactical implications when the smallest event may have global impact. In Special Forces, a twelve man team is deployed to a foreign country, knowing full well what they do may have strategic, even global repercussions.  Every governmentally released piece of information should conform with an overall information strategy and plan.  To do otherwise portrays a dysfunctional picture, such as what we saw after a terrorist attack against a US facility in Benghazi, Libya on September 11, 2012.

Combat operations are now a subset of a national information strategy and campaign.  A show of force sends a message.  Before one bullet is launched, before one bomb is dropped, the information impact of these actions are judged.

When combat operations are launched, physical destruction is held to a minimum, so that negative information effects are minimized. This is not to say force on force combat is any less violent and no deaths will occur, but it is a last resort.  Distasteful, if you will.

It is also important that US citizens enjoy their freedom of speech and their unique ability to voice their own opinions. This portrays a vibrant democracy and further aids to combat oppressive governments.

</end>

About this last paragraph, this is a source of frustration for me, personally.  I believe this is, perhaps, an overly altruistic statement.  But this is the strategy that the BBG and the US Department of State embrace.  According to a good friend, Manufacturing Consent: The Political Economy of the Mass Media, by Edward S. Herman and Noam Chomsky, disproves this theory.  I have asked, in multiple forums, “why” the US believes that broadcasting the news sways foreign audiences.  According to the seniors in charge of performing these tasks, foreign audiences can differentiate between news and propaganda and prefer objective news.

What do you think?


Filed under: Information operations Tagged: Benghazi, Edward S. Herman, Libya, Noam Chomsky, politics, Special forces, United States, Warfare and Conflict

Pentagon Abandons Strategic Communication? | The Public Diplomacy Council

$
0
0

Pentagon Abandons Strategic Communication?

Author: Brian Carlson

Tuesday, December 18th 2012

http://www.publicdiplomacycouncil.org/commentaries/12-18-12/pentagon-abandons-strategic-communication

A couple of public diplomacy colleagues have asked me what we should think of the Pentagon memo issued earlier this month, the one that seems to say Strategic Communication is out. Over. Finished.

“What did you say?”

Does this mean the end of MIST teams at embassies? No more military websites targeting foreign audiences? Is it the end of a fat foreign media analysis landing on your desk every morning? No more social and cultural adaptation training for troops deploying?

Probably not.

First of all, Defense policy pronouncements and Pentagon doctrine dumps do not suddenly appear in the form of a unilateral memo from the Assistant Secretary of Defense for Public Affairs.

As the eagle-eyed Rosa Brooks (herself a veteran of the E-Ring concurrence wars) pointed out in Foreign Policy, this particular memo was cleared by no one in DOD before being slipped to a friendly journalist. That’s a good way to get some attention, but it is not the way DOD makes policy.

I enjoyed Rosa’s candor when we were together in the Flournoy OSD/P years. As she pithily put it in her Foreign Policy article, “What we have here isn’t a DOD-wide policy change — it’s just a badly drafted memo explaining that OSD’s Public Affairs shop is changing its terminology and internal structure because it finds strategic communication confusing.”

Now, there is no question that many public diplomacy professionals think the military’s involvement in strategic communication – and other information arts that closely resemble public diplomacy – has gone too far. Congressional staffers have repeatedly asked, “Why are you (the military) doing this?” Many State officers suspect the military is treading on the diplomats’ turf. And, to be sure, there are many military officers who fervently wish State and other USG agencies would act much more aggressively to counter the extremist message among vulnerable populations, so soldiers, sailors, airmen and Marines would not have to.

Since 2001, the U.S. military has become increasingly aware that America will not win the “war on terror,” or the “war of ideas,” or anything else – with bullets. Whether it is Petraeus with his counter -insurgency (COIN) doctrine, Admiral Stavirdis with his “We’re All In This Together” approach at SOUTHCOM (and now EUCOM), or General Stanley McChrystal’s much over-subscribed “Leadership” graduate-level seminar at Yale, America’s military top officers have been rethinking how we go about the the matter of “prevailing” in the kinds of struggles America will face in the 21st century.

At the National War College and throughout the DOD schoolhouse, promotable majors, captains and lieutenant colonels are the strongest proponents of strategic communication. Their Iraq and Afghanistan experiences have taught them – over and over again – that we do not succeed in these environments unless we engage with empathy, work to understand the host nation society, and focus our attention on the “information end state” we intend to leave behind when it’s all over.

P. J. Crowley, a military communicator with a brief State Department career, explained strategic communication thusly in his blog: “The word strategic communicates importance, something directly related to a vital interest or a core function. The evolution of the concept of strategic communication within the military a decade or so ago reflected the emergence of a 24/7 global media environment, the interconnected world of the Internet, traditional media, satellite television and now social media and citizen journalists. In this world, governments communicate with each other and with broader society. People communicate vertically and horizontally and have access to more and better quality information than ever before.”

Despite George Little’s memo to the combatant commanders, strategic communication – or at least the need for it – will not go away. The effort across the U.S. Government to synchronize our words and our deeds, to improve our ability to communicate consistently through our actions as well as our declarations, will not end.

The military can’t see themselves doing “public diplomacy” – that’s for diplomats. Public affairs is too passive and reactive for what the warfighter has in mind. Information operations (IO) might be closer to the mark, and Military Information Support Operations (MISO) is a defined subset of IO.

What many senior military officers are asking for is a national communication strategy, combined with Administration leadership, which results in broad, consistent and coherent interagency coordination of America’s engagement with foreign audiences.

I doubt that OSD/PA’s phrase “communication synchronization” will long endure. I mean, how do you make a clever bumper sticker out of that?

Author: Brian Carlson

via Pentagon Abandons Strategic Communication? | The Public Diplomacy Council.


Filed under: Information operations Tagged: Afghanistan, Brian Carlson, Pentagon, public diplomacy, Rosa Brooks, Stanley McChrystal, State Department, United States Department of Defense

Confessions of a Strategic Communicator – By Rosa Brooks | Foreign Policy

$
0
0
Rosa Brooks

Rosa Brooks (Photo credit: Wikipedia)

BY ROSA BROOKS | DECEMBER 6, 2012

I must have sinned egregiously during a past life, because when I arrived at the Pentagon in spring 2009, I was handed responsibility for the can of worms known as “strategic communication.” I was a newly minted political appointee in the Office of the Secretary of Defense’s policy shop and no one, including myself, knew quite what I was supposed be doing with my time. But my résumé included a four-year stint as an opinion columnist for the Los Angeles Times. This apparently qualified me as a “communications” expert, so strategic communication policy was deemed an appropriate addition to my murky portfolio.

It should go without saying that in and of itself, writing an opinion column reflects no qualifications beyond the having of opinions. I started my job at the Pentagon with plenty of opinions — many half-baked — but a mind blissfully free of expertise relating to “communications,” strategic or otherwise. Opinionated ignorance is the hallmark of a happy political appointee, however, so I plunged resolutely into my new assignment.

For the better part of the 27 months that followed, I spent much of my time trying to figure out whether strategic communication was an idea whose time had come, or a non-idea whose time should come to a rapid end. (Readers with an interest but with limited attention spans can even look at the highly unofficial illustrated history of DOD strategic communication I put together in late 2009.)

If you believe what you read in the media, the Pentagon recently opted for the second view. “The Pentagon is banishing the term ‘strategic communication,’” trumpeted USA Today on Tuesday, “putting an end to an initiative that had promised to streamline the military’s messaging but instead led to bureaucratic bloat and confusion.” This, the paper reports, is the upshot of “a memo obtained by USA TODAY.”

Confessions of a Strategic Communicator – By Rosa Brooks | Foreign Policy.

Read the whole thing, well worth the time. Please excuse my tardiness in posting this.


Filed under: Information operations, Strategic Communication Tagged: Foreign Policy, Los Angeles Times, Office of the Secretary of Defense, Pentagon, Rosa Brooks, Strategic Communication, United States, USA Today

The Effectiveness of US Military Information Operations in Afghanistan 2001-2010: Why RAND missed the point

$
0
0
English: US Army map of Afghanistan -- circa 2...

SF in Afghanistan – 2001 (Photo credit: Wikipedia)

Authors: Major General (Ret’d) Andrew Mackay, Commander Steve Tatham PhD, Dr Lee Rowland

Abstract:  This paper challenges the findings of a 2012 RAND study into US Information Operations (IO) in Afghanistan. Whilst agreeing with RAND that if the overall IO mission in Afghanistan is defined as convincing most residents of contested areas to side decisively with the Afghan Government and its foreign allies against the Taliban insurgency then the US mission has failed, it fundamentally disagrees with RAND’s conclusions and subsequent recommendations. As operations in Afghanistan draw to an end and critical eyes retrospectively examine the 13 year long mission it is vital that IO is not discredited; the paper finds its original intent laudable but argues its application has been very poor, based upon outdated and failed models of communication, an absence of intelligent customers and an over-reliance upon marketing and PR techniques which were never designed for conflictual societies.

http://www.da.mod.uk/publications/library/central-asian-series/20121214_Whyrandmissedthepoint_U_1202a.pdf/view

I am pleased to see two good friends publishing this paper.   Steve Tatham and Lee Rowland have been instrumental in making British methodology the best in the world. My thanks to Steve for pushing the link to me.


Filed under: Information operations

Dirty Jokes and the Boy Scouts

$
0
0
English: Uniform of the Boy Scouts of America ...

Boy Scout in 1974. (Photo credit: Wikipedia)

Here I sit, brokenhearted.  
Tried to poop but only passed gas. 

It doesn’t sound right, that joke? If you’re in China, Russia or Outer Carjackistan (my favorite mythical country), chances are you’re never going to get that joke.  If you really want to know the joke, leave me a comment and I’ll reply with the pure, unedited joke.

I learned that joke many years ago.  I believe I read it on the walls of an outhouse when I was in the Boy Scouts.  If you’re not American, perhaps you aren’t familiar with the Boy Scouts, a la Baden Powell.  I actually had the pleasure of reading about the American Boy Scouts when I was traveling in another country and they were likened to an introductory course for entry into the military.  I had to laugh, because that is so out of character for the Boy Scouts.

The Boy Scouts of America, or the BSA, is this great program teaching self-reliance, how to be a responsible person who can help others, how to be at home in the forests, how to camp with tents and campfires, how to save the environment, how to hike and how to be comfortable around the water.  I learned to swim very well, I learned to canoe, I learned basic survival skills, first aid, all sorts of things.   I went on countless camping trips, to Philmont Scout Ranch in Cimarron, New Mexico, to a National Scout Jamboree, spent many weekends at the Daniel Boone Homestead, became an Eagle Scout and became as comfortable in the woods as I was in the gym or the classroom.  My confidence in life soared through the roof.  I also became what I consider a good person.  One of the most vile comments made to me in recent years was that I was too much of a Boy Scout, that I was too altruistic.  I knew, at the moment it was said, that it was meant as an insult. I chose to accept it as a compliment, but I also chose to terminate that friendship.

Years later I was in the US Army and I was accepted into Special Forces testing and qualification.  I can say it now, because it was over 35 years ago, but I thought Special Forces testing, called the Qualification Course, was fun.   Here I was, alongside a whole slew of Vietnam Vets, who had been on patrol in the jungles of Vietnam, had met with and closed with the enemy and survived.  I was one of the few non-Vietnam vet soldiers.  …and I was comfortable in the woods, the jungles, the mountains and the swamps.  I could navigate using a map and compass and for me, once I looked at a map, looked at the terrain around me and used a compass to put myself in the right direction, it was like I had already been there.  I knew to expect a slight raise in the terrain on my right, encounter a stream in about ten kilometers, I’d box-navigate around a swamp, keep a hilltop to my right and so on.  Survival training was almost a pleasure.  Later I learned advanced radio communications skills and medical skills, again, only a slight improvement on what I learned in the boy scouts.  My Boy Scout background almost gave me an unfair advantage.

But the Boy Scouts did not teach me about warfare.  It didn’t teach me about passing covert communications or using encryption/decryption.  The BSA didn’t teach me about foreign weapons, how to make field expedient explosives, about jumping from an airplane with a parachute, weapons and explosives, about martial arts nor how to set up an ambush.  But somehow at least one foreigner seems to think that was the purpose of the Boy Scouts.

This past weekend two things happened that brought that lesson home.  One, the tailgate of an SUV was dropped on my head and I suffered a concussion.  I know a concussion results from my brain bouncing around inside my skull, causing it to swell.  I had the increased tinnitus, the blurred vision, the sprained neck (related but not directly tied to a concussion) and slight disorientation.   I posted my symptoms on Facebook and all my friends called me an idiot and told me to see a doctor (and I still love them as friends!).  But I have a distrust of doctors after a series of misdiagnoses where I made the call and the doctor made another, and on all those occasions I was right.  I suffered from their indifference, their arrogance and their lack of experience, in most cases.  In this case I knew how severe my concussion was and how to treat it.  The second thing was meeting my old Scoutmaster from Boy Scouts at a funeral in my hometown of Reading, PA.  The years faded away quickly as we talked and I made a promise to stop by and visit him in the future.  I realize how much he really taught me and how much he was a truly positive force in my life.

Today I was caught up in a discussion about Public Diplomacy and it hit me.  The United States is doing Information Operations, Public Diplomacy and Strategic Communication based on a gut feeling, not based on scientific study.  We ‘feel’ the way to influence leaders, the public and the seniors of another nation is by providing them information which leads to a change in attitude and, therefore, will cause them to support the United States or at least not stand in the way of what the US wants to do.

Then it occurred to me that this approach is like telling a dirty joke and not using the right words.  Using a behavioral approach to IO, SC and PD leads to behavioral change, where one initially determines the conditions under which a behavior will change.  By providing a job to Achmed, he will stop making bombs designed to kill Americans. The condition being he gets a job, resulting in a changed behavior: stopping the bombs.

Read this paper: http://www.da.mod.uk/publications/library/central-asian-series/20121214_Whyrandmissedthepoint_U_1202a.pdf/view

I could have stopped writing right there and left you, dear reader, with a very sloppy ending.  I haven’t written this blog in a while because illness, being way too busy and now a concussion have stopped my fingers from tickling the keyboard.  I hope you know I want so badly to tell a dirty joke.  So I’ll end this blog with a not so dirty joke:  A little boy went up to his father and asked, “Dad, where did my intelligence come from?” The father replied, “Well, son, you must have got it from your mother, cause I still have mine.”  In the immortal words of Mork: Humor, har, har.


Filed under: Information operations, Public Diplomacy, Strategic Communication

God help us all

$
0
0
Cyber

Cyber (Photo credit: GabrielNuñez)

First, an apology.  My concussion was a bit worse than I thought and mentally, at times, I still feel like I’m swimming in thick sludge.  I write this blog when I am inspired and this fog usually prevents me from giving a rat’s patootie about a lot of things.

Yesterday I was chatting with a friend as I was preparing to teach an IO class to first year students at the Institute of World Politics.   My friend works with J-7, Joint Staff and informed me that Joint Publication 3-13, Information Operations is being rewritten. What?  The last edition was just released on 27 November 2012 and was definitely moving in the right direction.  Why would anyone want to mess with success?

Then I was told it was being reworked along with Joint Pub 3-12, which I quickly looked up – it was Nuclear Operations.  Of course my friend corrected me, it is now known as Cyberspace Operations.  Ah…  this makes sense, but in a very scary way.

A few things.  When the definition of IO included the former five components (EW, CNO, MILDEC, OPSEC and PSYOP/MISO), anything ‘cyber’ was integrated into a larger information ‘campaign’.  Now JP 3-12 is about cyberspace operations and no longer a JP 3-13.x.  Additionally, Cyberspace is now a domain, along with Air, Land, Sea and Space.  Additionally, there has been at least one Service Component Commander of the US Cyber Command who has tried to organize Information Operations under Cyber, for whatever reason, turning the model for IO on its’ ear.  I do not want to say that ‘cyber’ is getting too big for its britches, but I see the projection of the effects of cyber operations as overly optimistic.

As much as I love discussing warfare in cyberspace, it will never win a war on its own.  If ever cyber launches a devastating attack on every single possible physical and virtual target, it is a strong negative possibility there will be a major loss of life, the effects on any economy will be marginal and temporary and the quality of life for the targeted group or country will not be significantly impacted.

My words:  Cyber is an enabler.  Please do not even bother asking me to define cyber because even my smartest friends with PhDs in the field all disagree on a simple definition.  Cyber consists of computers of all kinds, networks and all the crap that ties it all together, including storage and a bunch of wireless and wired connections, and so on.  Cyber allows processing to happen, communications between all the parts of all kinds of systems, and allows data to flow, information to be made, and so on.  If cyber suddenly ceases to exist we can still communicate information, albeit in a limited fashion, decisions will still be made, granted at a much slower and reduced rate, wars may still be fought, the economies will still exist, as will diplomatic efforts between countries. In other words, all the elements of national power will continue to exist.

The main point of this discussion is about information and my main concern is that cyber cannot rise in importance or have any authority over any part of information operations, nor can it exist separately.  Perhaps the point I am trying to make is not clear, and for that I apologize and blame it on my recent concussion.

As we develop new weapons and ways to wage war, from airplanes to nuclear weapons to information warfare to warfare in cyberspace, smart people have stood up and proclaimed that war as we knew it may now well be over.   This new thing will stop future war.  Sorry, my friends, war will be with us for many more generations.  We may not recognize future warfare, it may not exist by today’s definitions, but someone will always try to suppress, oppress or just plain kill people with whom they do not like or agree with.  God help us all to evolve and stop it before we kill us all. God help us all.


Filed under: Cyber warfare, cyberwar, Information operations Tagged: Cyberspace, information warfare, institute of world politics, Pentagon, United States, United States Cyber Command, United States Department of Defense, Washington Post

Lawfare › Denial is now a river in China

$
0
0

By Paul Rosenzweig

Saturday, February 23, 2013 at 4:34 PM

The old joke goes: “What’s denial?” Answer: “A river in Egypt.” Apparently it now flows through China too. Here’s a taste from Global Times:

The absurd allegation that a Chinese military unit is behind cyber attacks against the US government and firms continues to ferment. The US has staged a performance so beautifully planned that the Chinese are finding it hard to grasp Washington’s real purpose.

If that reflects Chinese official reaction this is going to be one hard problem to solve.

via Lawfare › Denial is now a river in China.


Filed under: Information operations

Will China Retaliate?

$
0
0
People's Republic of China

People’s Republic of China (Photo credit: Wikipedia)

I received an interesting phone call today, from a well respected authority in the ‘cyber’ field. Apparently the Intelligence and Cyber Communities are spinning up, thinking that China is about to launch retaliatory cyber attacks in response to the Mandiant report.

I couldn’t help but voice my disbelief.  China has nothing to gain and everything to lose by launching attacks in cyberspace, therefore I do not believe they will respond by launching electrons downrange at US targets as a response to a commercial (but well advertised and covered) report. Sure, China received a bloody nose in the process and lost face (which is a major factor in China), but what would they have to gain by launching electrons, such as code, at US targets?  They might take down a few web pages, but that accomplishes nothing, it gives them no advantage.   They might launch reports which blame the US for launching the vast majority of cyber-attacks in the world, but as I’ve been saying for years, that’s because we have the most compromised servers. They might close a few sites down with a DDOS attack, but as we have seen often, that is a temporary effect.  Sprearphishing?  That’s not an attack but it is useful to get into a company’s system.  I could go on and on, but China would gain little they do not already have and would only succeed in further smearing their reputation.

No. China, the PLA and all the cyber minions UNDER GOVERNMENT CONTROL will not attack the US.  There are no positives in attacking the US and cooler minds will prevail.

But who might?  Cyber punks, script kiddies, immature, knee-jerk actors and wanna-bes. Otherwise, future cyber soldiers in training using emotion as their motivation.   They’ll launch at WhiteHouse.gov, military.com, Mandiant.com and other convenient targets, I’m sure CyberCommand, DHS.gov and others connected with ‘cyber’ in the US will get hit…  but life will go on.  The good news is that if they do this, their IP addresses may now be stored for analysis.  So thank you, cyber punks, for letting us know who you are.   This makes the intelligence community’s job a little easier in the future.


Filed under: China, Information operations Tagged: China, Cyberwarfare, IP address, People's Liberation Army, PLA, United States, United States Cyber Command, Warfare and Conflict

BBC News – US hackers attacked military websites, says China’s defence ministry

$
0
0
A Chinese tanker soldier with the People's Lib...

A Chinese tanker soldier with the People’s Liberation Army (Photo credit: Wikipedia)

Oh, yes.  Republic of China, thank you for following my script.

BBC News – US hackers attacked military websites, says China’s defence ministry.

Hackers from the US have repeatedly launched attacks on two Chinese military websites, including that of the Defence Ministry, officials say.

The sites were subject to about 144,000 hacking attacks each month last year, two thirds of which came from the US, according to China’s defence ministry.

The issue of cyber hacking has strained relations between the two countries.

Earlier this month a US cyber security firm said a secretive Chinese military unit was behind “prolific hacking”.

Mandiant said that Unit 61398 was believed to have “systematically stolen hundreds of terabytes of data” from at least 141 organisations around the world.

The White House has said that it has taken its concerns about cyber-theft to the highest levels of China’s government. China denied the allegations, saying it was also the victim of cyber attacks.

The US is yet to respond to these latest allegations from China.

Attacks ‘increased’

“The Defence Ministry and China Military Online websites have faced a serious threat from hacking attacks since they were established,” defence ministry spokesman Geng Yansheng is quoted by Reuters news agency as saying at a monthly press conference.

He added that the number of attacks on these sites had steadily increased over the years.

An analysis of the IP addresses involved showed that officials had ascertained that attacks from the US accounted for 62.9 percent of the attacks made on these two website in 2012, according to Mr Geng.

He also said that reported US plans to expand its cyber warfare capabilities were unlikely to foster international collaboration.

“We hope that the U.S. side can explain and clarify this,” he said.

It is believed to be the first time that Chinese officials have provided such details about alleged US-based attacks on their own systems.

However, Beijing has been accused by several governments, foreign companies and organisations of carrying out extensive cyber espionage for many years, seeking to gather information and to control China’s image.

In late January, the New York Times said that hackers from China had “persistently” infiltrated the paper over the previous four months, saying the attacks had coincided with its reports into the wealth of the family of Chinese Premier Wen Jiabao.

At the time China’s foreign ministry dismissed those accusations as “groundless”.

via BBC News – US hackers attacked military websites, says China’s defence ministry.


Filed under: China, Information operations Tagged: Beijing, China, IP address, New York Times, People's Liberation Army, Reuters, United States, Wen Jiabao

China has no cyber warfare troops: spokesman — Shanghai Daily |上海日报

$
0
0

Now this…  My head is reeling.

China has no cyber warfare troops: spokesman

Source: XINHUA | 2013-2-28 | ONLINE EDITION

http://www.shanghaidaily.com/article/article_xinhua.asp?id=128093

BEIJING, Feb. 28 (Xinhua) — A military spokesman said Thursday that China does not have any soldiers engaging in cyber warfare.

The inclusion of “blue teams” in Chinese military drills is done to enhance the country’s ability to safeguard cyber security and is not related to conducting cyber attacks, said Ministry of National Defense spokesman Geng Yansheng.

In recent years, many countries have been transforming their militaries as the pace of new military revolution is accelerating in the world, Geng said.

The People’s Liberation Army (PLA) is shouldering the dual responsibilities of mechanizing and informationizing the armed forces, he said.

The PLA is working extensively to upgrade its technological capabilities and improve its ability to maintain cyber security, Geng said.

“Compared with military capabilities around the world, however, there is still a gap,” he said.

via China has no cyber warfare troops: spokesman — Shanghai Daily | 上海日报 — English Window to China New.


Filed under: China, Information operations Tagged: Beijing, China, computer security, Cyberwarfare, Geng, People's Liberation Army, PLA, United States

Let’s Start a Dialogue on Propaganda

$
0
0

I’ve had a love affair with propaganda my whole life.  I grew up after World War II, during the Cold War, joined the Army and was stationed in West

English: Loose lips might sink ships -- a post...

English: Loose lips might sink ships — a poster advocating operational security. (Photo credit: Wikipedia)

Germany, opposite the Soviets and the East Germans, I was in Korea during Desert Shield and Desert Storm, then I wound up in DC doing IO ‘stuff’ at the Pentagon.  That was when I was introduced to Herb Romerstein, one of the world’s foremost experts on Soviet propaganda and disinformation. I had the honor of presenting Herb with the “IO Lifetime Achievement Award” in 2010, a much deserved award.  Herb’s archives will form the basis of tons of research material in the future.

After that I met Dr. Steven Luckert, a curator at the US Holocaust Memorial Museum in downtown Washington DC, in charge of the display on Nazi Propaganda in the downstairs display center.  If you have not seen this display, I absolutely recommend it.  The exhibit appears to be solely online here.  Dr. Dan Kuehl took all his classes to see the display, as did other IO professionals in the area of Washington DC.  The person guiding the tour gave a good description on how propaganda words, various techniques used and how truth supports the overall theme.

As I have grown up, my perspective on propaganda has also matured, as I hope yours does.  A good propaganda poster tells you a message, and then you should probably see the message inside the message, pointing to the big picture.  Nested inside the big picture are a number of themes, all meant to build upon a central theme.  During World War II many of the posters had Americans contributing food so that soldiers could eat, growing their own vegetable gardens so individuals wouldn’t take away food intended for soldiers, as well as “Loose Lips Sink Ships” posters, and so on.

Today I did a little experiment and put “propaganda” into the search box on Pinterest.  Oh my…  I was overwhelmed with pages and pages of examples, so I searched for ‘Boards” instead, not just individual propaganda posters.  Again I was overwhelmed, but at least now it was a bit more manageable.

The problem, I quickly determined, was everyone has a different definition of propaganda.  The late Phil Taylor, of the UK, was most likely the world’s foremost expert on propaganda but even his definition seemed to change, based on experience.

The history of the word propaganda started out innocently enough.  Edward Bernay’s book, Propaganda, was written in 1928, when propaganda was still a good word.  Joseph Goebbels later became the Nazi chief propagandist and forever changed how the word propaganda is perceived.  Today the word seems to be thrown around, forever a negative word but what falls within the definition is widely misunderstood.

As I flipped through the pages I realized how ‘Joe and Jane Citizen’ perceive propaganda, because there are few resources to teach them otherwise.  I saw commercial advertisements labeled as propaganda.  I saw editorial and political cartoons labeled propaganda, but then again, there is no reason not to label them as such.

There is no dialogue as to the meaning, use and misuse of the word propaganda.  Until we begin to discuss the word propaganda, we will use the word and have the word used against us correctly and incorrectly.  What sources do you use?

Here are a few of the ‘propaganda’ pages I found on Pinterest:


Filed under: Information operations

Website Showcasing News From Around the World Debuts Today

$
0
0

Website Showcasing News From Around the World Debuts TodayGND_square_final

March 18, 2013

http://www.globalnewsdashboard.com/#tab=latest/regions=all/entities=all/media=all/pagenumber=1

Washington, DC – Breaking international news gathered by one of the world’s most extensive networks of journalists can now be found in one place thanks to a new online initiative by the Broadcasting Board of Governors.

Today marks the launch of the BBG’s Global News Dashboard, which pulls together the English-language news from the more than 50 bureaus, production centers and offices supported by the agency’s staff journalists and more than 1500 stringers around the globe.

“This site showcases the depth and reach of the high-quality journalism that the BBG produces,” said Richard M. Lobo, director of the BBG’s International Broadcasting Bureau. “There are millions of English-speakers worldwide who get their news from the individual websites of our broadcasters. It makes sense to pool our resources and put them to work to serve our audiences even better.”

The new site’s English-language content will come from Voice of America, Radio Free Europe/Radio Liberty, and Radio Free Asia. Users who access stories will be directed to the original content on the sites of the three broadcasters. The Global News Dashboard also will include links to original content in Spanish of Radio/TV Martí and the Arabic-language online offerings of the Middle East Broadcasting Networks.

Before development of the Dashboard, people interested in the work of the BBG would have to visit the websites of five separate broadcasters. This tool, built on the Pangea content management system developed by RFE/RL and used by the majority of BBG’s broadcasters to power their websites, makes that search easier.

“It’s such a simple tool, but it will have a resounding effect,” said Robert Bole, director of BBG’s Office of Digital and Design Innovation. “Bringing all these sources of information together makes a powerful statement about this agency and the way we do business. We’re so much greater than just the sum of our parts.”

The Global News Dashboard can be found at http://www.globalnewsdashboard.com.

via Website Showcasing News From Around the World Debuts Today.


Filed under: Information operations Tagged: Broadcasting Board of Governors, English language, International Broadcasting Bureau, Middle East, Radio Free Asia, Radio Free Europe/Radio Liberty, Voice of America, Washington

OPSEC: Here’s a Reminder Not To Tell Your Foreign Lover U.S. Nuke Secrets

$
0
0

By Spencer Ackerman

03.19.13

via http://www.wired.com/dangerroom/2013/03/girlfriend-nuke/?utm_source=rss&utm_medium=rss&utm_campaign=heres-a-reminder-not-to-tell-your-foreign-lover-u-s-nuke-secrets

Things that don’t make for appropriate pillow talk: Titan intercontinental ballistic missiles. Photo: Jurvetson/Flickr

There once was a military contractor who met a great woman at a professional conference. Before long, he was so taken with her that he told her secrets about America’s deadliest weapons. You don’t want to be that guy.

According to an affidavit from an FBI counterintelligence agent, Benjamin Pierce Bishop, a contractor for the U.S. Pacific Command, was that guy. The U.S. Attorney in Hawaii announced charges of communicating classified national defense information to a person not entitled to receive such information against Bishop on Tuesday, shortly after he was arrested.

Bishop is innocent until proven guilty in a court of law. And the affidavit of FBI Special Agent Scott Freeman stops short of accusing Bishop’s unnamed paramour, a Chinese national, of being an outright spy. (In other words, if the government suspects her of being a Chinese Anna Chapman, it’s yet to charge her with espionage.) But it alleges that Bishop chatted openly with her about U.S. nuclear systems and “war plans,” and as their affair wore on, she had him checking on what the United States knew about sensitive Chinese naval systems.

Bishop allegedly met the woman identified only as Person 1, a “27-year-old female citizen of the People’s Republic of China” in the United States on a student visa, at a defense conference. By June 2011, the two had begun a relationship. So far, so unremarkable. But by June 2012, Bishop supposedly e-mailed Person 1 classified information on “existing war plans, information regarding nuclear weapons, and relations with international partners.” Unbeknownst to Bishop, he was or would soon be under physical and electronic surveillance.

The surveillance trap caught much more than just that one e-mail. Bishop is accused of blabbing to Person 1 about “planned deployment of U.S. strategic nuclear systems”; “the ability of the U.S. to detect low and medium range ballistic missiles of foreign governments”; and, on multiple occasions, “the deployment of U.S. early warning radar systems in the Pacific rim.”

Person 1 allegedly used Bishop as her intern. While saying that she didn’t want him telling her any secrets, she queried him on what Western powers “know about about the operation of a particular naval asset of the People’s Republic of China.” The FBI affidavit accuses Bishop of “misrepresenting” his credentials to an active-duty officer in order to get classified answers to his lover’s question.

Again, these are all accusations, not proof, and the coming months will reveal if the Justice Department’s real target is Person 1 and suspected persistent Chinese espionage. But whether Bishop is acquitted, convicted or pleads out, he’s now a glaring cautionary tale. The defense world might be incestuous, but pillow talk about classified information will ruin your life.

via Here’s a Reminder Not To Tell Your Foreign Lover U.S. Nuke Secrets | Danger Room | Wired.com.


Filed under: Information operations, OPSEC Tagged: Anna Chapman, Bishop, China, Federal Bureau of Investigation, Scott Freeman, Spencer Ackerman, United States, United States Pacific Command

A Superficial Death of Soft Power: It’s another Made-Up Term. | Hidden Harmonies China Blog

$
0
0

A Superficial Death of Soft Power: It’s another Made-Up Term.

March 18th, 2013

By Black Pheonix

One might as well call it “the Pink Powdery Pixie Dust of Hippie Magic,” because it is really quite a made-up concept that doesn’t make sense relative to its own applications.

Joseph Nye first defined and popularized the notion of “soft power” as the ability to attract and influence others. But somewhere down the path of popularity, such a general idea became shrouded in numbers and PR. Now, it is no longer enough to merely “attract”, no longer enough to be “soft”. ”Power” and “Influence twisted the essence of the notion until “soft power” became a plan of attack, like a soft drink overloaded with caffeine and sugar and double spiked with rum and turned into a 12 hour Energy Drink.

Mr. Nye may have defined “soft power”, but he certainly did not create it. He merely sought to coin a word and define what he thinks was missing from Western traditional exercise of “hard power”. But that means, Mr. Nye may himself be wrong in what he perceived, and he cannot give all the answers.

Worst of all, it is now being used to PR against China to prove rhetorically silly media lines like “China doesn’t have Soft Power Afterall.” Well, I don’t think any one can say China has lost that Pixie Dust of Magic, because I don’t think China ever claimed that it had it in the first place!

What Mr. Nye (and the followers of his “soft power” theory) is encountering, is the denial of the limitation of their own theory. That being, they can’t explain why the data in China’s case don’t fit their model, and yet they still insist that their theory must be correct.

Read more here.

via A Superficial Death of Soft Power: It’s another Made-Up Term. | Hidden Harmonies China Blog.


Filed under: Information operations Tagged: Asia, Business, China, Hard power, Joseph Nye, Nye, Soft power, United States
Viewing all 5256 articles
Browse latest View live




Latest Images