Information Environment

Putin’s Jedi Mind Trick in Ukraine: How Truth Decay Shapes the Operational Environment

Putin’s Jedi Mind Trick in Ukraine: How Truth Decay Shapes the Operational Environment

Moscow’s falsehoods justifying imperial aggression and war crimes have penetrated cultural and geographic boundaries. It is only a matter of time before other authoritarian powers adopt similar tactics to excuse similar actions. To address this challenge, the United States and its allies should come to view truth decay as a multi-domain mechanism for shaping the operational environment to accommodate military aggression – a non-kinetic means to a kinetic end.

Artificial Intelligence and the Manufacturing of Reality

Artificial Intelligence and the Manufacturing of Reality

Humans are and have always been vulnerable to being tricked, provoked, conditioned, deceived, or otherwise manipulated. Since at least the 1960s, the Soviet military and subsequent Russian organizations recognized opportunities for exploiting this vulnerability. That is why the Soviets developed a formal research program—called reflexive control theory—to model how one could manipulate targets’ perceptions of reality…While the Russians weaponized reflexive control theory, Madison Avenue used similar logic to evoke emotion—and sell products to American consumers…The contemporary information environment and modern tools, including artificial intelligence, could slash the transaction costs of such manipulation.

The Evolution of Disinformation: How Public Opinion Became Proxy

The Evolution of Disinformation: How Public Opinion Became Proxy

Western governments and corporations will seek ways to counter mounting threats related to disinformation, but they cannot eradicate its existence, nor can they dictate how information is processed by its consumers. The fight against disinformation is a generational struggle that will only be won through education and long-term cultural shifts related to the manner in which populations seek, consume, and validate information.

A Different Kind of Truth: #Reviewing LikeWar

A Different Kind of Truth: #Reviewing LikeWar

Despite its shortcomings, this captivating book has far-reaching implications for our future and an urgent message for national security leaders and elected officials. America in 2019 is a place where the value of agreed-upon truth holds fading relevance. Claims on Twitter that have long been conclusively defeated by objective research are often met with the respect generally accustomed to scientific principles. Spending a few hours poking around social media, one may find the Orwellian idea that two plus two can be made to equal five if enough people believe it. This embrace of deceit serves as a present danger for not only the United States but for the world.

Myth Versus Lethality: Losing the Plot in the Information War

Myth Versus Lethality: Losing the Plot in the Information War

Former Defense Secretary and retired General James Mattis is said to have told Marines in Iraq that the most important six inches on the battlefield were between their ears. He was referring to the need for calm under fire. Today, his warning is appropriate for everyone, everywhere, because the United States is in an information war—and it is losing.

Defense and Self-Defense in the Information Age: Collaborative Strategy and Collective Vision

Defense and Self-Defense in the Information Age: Collaborative Strategy and Collective Vision

The United States needs a unifying information strategy. America’s adversaries gain political and military advantages every day the U.S. goes without clear priorities in the current information war. To succeed, American military leaders and political scientists emphasize prioritizing the use of resources. The prioritization of these resources requires a comprehensive strategy.

Terrorism and Just War: A Comparative Analysis of Western and Islamic Precepts

Terrorism and Just War: A Comparative Analysis of Western and Islamic Precepts

Understanding Western precepts of Just War Theory, analogous concepts within Islamic jurisprudence, and analyzing militant Islamic movement actions against them may offer strategists and policymakers philosophical means from which to attack the legitimacy of militant Islamic movements and thereby weaken their critical popular support.

Information-Centric Operations: Airpower Strategy for the 21st Century

Information-Centric Operations: Airpower Strategy for the 21st Century

Effects-Based Operations was the last overarching airpower strategy embraced by the USAF, but its influence has waned over the last decade, and no airpower theory has taken its place. This has had very real consequences; Airmen have come to believe airpower exists simply to support ground operations, as opposed to a mechanism to deter, shape, and win conflicts. The USAF is desperately in need of an overarching airpower strategy to explain to itself, and the joint and coalition community, what airpower is capable of, and how it will be employed in current and future conflicts across the realm of military operations.

A Perpetual Conflict of Ideas?

A Perpetual Conflict of Ideas?

Traditional warfare has long used information and technology to gain a competitive advantage over opponents. The shift is that more of these activities are now occurring in a place visible to the public –– online –– and is now being directed at civilians. As the ever-growing volume of literature on this topic illustrates, we are currently observing the great value in sustained disinformation campaigns. The low cost and high effectiveness of these non-military measures combined with few counter-measures as well as strong drivers of change (such as automation) increasing their effectiveness, indicate their use will continue to increase. This has significant implications for policy makers, analysts, and defence personnel.

Nine Links in the Chain: The Weaponized Narrative, Sun Tzu, and the Essence of War

Nine Links in the Chain: The Weaponized Narrative, Sun Tzu, and the Essence of War

Weaponizing a narrative resembles weaponizing a disease in several ways. One similarity is that neither is kinetic, yet both can have immense effects. Both are dangerous and chaotic, but are less dangerous to the faction prepared for the risks—or with less to lose. Like viruses, narratives can combine to create overwhelming effects, and can appear and propagate with unnerving rapidity. Unlike viruses, though, the narrative is so inexpensive that almost anyone can weaponize and deploy it. Also unlike viruses, the weaponized narrative targets our minds.

Speed, Volume, and Ubiquity: Forget Information Operations & Focus on the Information Environment

Speed, Volume, and Ubiquity: Forget Information Operations & Focus on the Information Environment

We should encourage those not familiar with information operations to see it as a vital component of planning in an information environment that is much more important to military planning and operations with each passing day. Focus on capabilities does more to confuse than enlighten, and simple alternatives are available.

Information Operations Countermeasures to Anti-Access/Area Denial

Information Operations Countermeasures to Anti-Access/Area Denial

The good news about China’s anti-access/area denial actions in the South China Sea and beyond may be that in apparently selecting a hybrid strategy, China has chosen to operate in the Phase 0/Gray Zone/Shaping area, thus avoiding activity that generates an overt military response. That said, the strategy involves brinksmanship, so proper use of information operations is critical to communicate intentions and avoid miscommunications leading to miscalculations and overt military conflict. Information operations can also cloud Chinese calculations to make preemptive strikes less appealing and more fraught with risk.

How Russia Weaponized Social Media in Crimea

How Russia Weaponized Social Media in Crimea

Russia showed the world the effectiveness of social media as a weapon system in the cyber domain. By leveraging the population against one another, it successfully took ground from another sovereign nation without the employment of massed conventional forces. Future conflicts will involve civilian populations as connected, or more connected, as those in Crimea, and the employment of social media will be essential to shaping the narrative of U.S. Army operations. As the Russian government proved, through proper timing, messaging, and population targeting, social media has the potential to manipulate the outcome of a conflict and win a complex engagement.

An Extended Discussion on an Important Question: What is Information Operations?

An Extended Discussion on an Important Question: What is Information Operations?

While we do not expect to settle the debate over what information operations is, we do hope to contribute valuable insights to the discussion by building awareness and empathy in their partner’s roles and methods, allowing readers to draw their own conclusions about information operations and how they might employ them for the benefit of their own organizations.

Information Warfare isn’t Russian – It’s American as Apple Pie

Information Warfare isn’t Russian – It’s American as Apple Pie

Looking to Putin’s intelligence apparatus is not to witness the genesis of political information warfare. In fact, the United States was birthed in a stew of information, misinformation, disinformation, and propaganda projected by competing entities both internally and externally. Thus, instead of looking at the apparent success of Russian intelligence in the recent election as the perfected form of information warfare, it is worth considering colonial and revolutionary America to appreciate the historical precedent and perspective.

Making Old Things New Again: Strategy, the Information Environment, and National Security

Making Old Things New Again: Strategy, the Information Environment, and National Security

Developing the depth and flexibility of mind and understanding to work effectively within the information environment, in addition to the operational environment, is challenging. However, given the systemic changes in virtually every field of human activity during the new century, and the threats they may pose to our country’s security and prosperity, this is a challenge we must accept.