Terrorist approach to information operations

dc.contributor.advisorDenning, Dorothy
dc.contributor.advisorBuettner, Raymond
dc.contributor.authorEmery, Norman E.
dc.contributor.authorEarl, Robert S.
dc.contributor.departmentDefense Analysis (DA)
dc.date.accessioned2012-03-14T17:30:11Z
dc.date.available2012-03-14T17:30:11Z
dc.date.issued2003-06
dc.description.abstractThis thesis provides insight into how terrorist organizations exploit the information environment to achieve their objectives. The study establishes an analytical IO framework, by integrating US military doctrine with a fundamental approach to IO theory. The framework proves useful in examining the IO tools terrorists have assembled and how they implement them to influence their target audiences. The thesis shows that terrorists are, indeed, naturally linked to the information environment by their nature and strategy. Generally speaking, all terrorists employ IO tactically to enhance their operations. However, many organizations have a profound understanding of the information environment and also have the ability to manipulate information to achieve their objectives. Since, terrorist organizations are militarily weaker than the states they face and cannot rely on physical attacks to accomplish their goals, they must adopt an information strategy to achieve their objectives. This thesis emphasizes three primary conclusions: first terrorist conduct violent attacks in the physical environment to enable operations in the information environment. Second, terrorist integrate offensive and defensive IO to survive and appear legitimate to potential supporters and to the state. Finally, terrorists intentionally target four different audiences: opposing, uncommitted, sympathetic, and active to influence their perceptions.en_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.
dc.description.serviceMajor, United States Armyen_US
dc.description.urihttp://archive.org/details/terroristpproach10945993
dc.format.extentxi, 149 p. : ill. (chiefly col.) ;en_US
dc.identifier.urihttps://hdl.handle.net/10945/993
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.lcshInformation warfareen_US
dc.subject.lcshTerrorismen_US
dc.subject.lcshPreventionen_US
dc.subject.lcshIntelligence serviceen_US
dc.titleTerrorist approach to information operationsen_US
dc.typeThesisen_US
dspace.entity.typePublication
etd.thesisdegree.disciplineDefense Analysisen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.nameM.S. in Defense Analysisen_US
etd.verifiednoen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
03Jun_Earl.pdf
Size:
1.23 MB
Format:
Adobe Portable Document Format
Collections