Terrorist approach to information operations

Download
Author
Emery, Norman E.
Earl, Robert S.
Date
2003-06Advisor
Denning, Dorothy
Buettner, Raymond
Metadata
Show full item recordAbstract
This thesis provides insight into how terrorist organizations exploit the information environment to achieve their objectives. The study establishes an analytical IO framework, by integrating US military doctrine with a fundamental approach to IO theory. The framework proves useful in examining the IO tools terrorists have assembled and how they implement them to influence their target audiences. The thesis shows that terrorists are, indeed, naturally linked to the information environment by their nature and strategy. Generally speaking, all terrorists employ IO tactically to enhance their operations. However, many organizations have a profound understanding of the information environment and also have the ability to manipulate information to achieve their objectives. Since, terrorist organizations are militarily weaker than the states they face and cannot rely on physical attacks to accomplish their goals, they must adopt an information strategy to achieve their objectives. This thesis emphasizes three primary conclusions: first terrorist conduct violent attacks in the physical environment to enable operations in the information environment. Second, terrorist integrate offensive and defensive IO to survive and appear legitimate to potential supporters and to the state. Finally, terrorists intentionally target four different audiences: opposing, uncommitted, sympathetic, and active to influence their perceptions.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Maintaining Interoperability in a Target-Rich Environment
Ng, Mei Ling Venessa (Monterey, California. Naval Postgraduate School, 2012-09);Achieving interoperability in a net-centric environment is fundamental to maximizing the potential of information sharing and effective use of resources in military operations. With the increasing reliance on unmanned ... -
Information security requirements for a coalition wide area network
McGovern, Susan C. (Monterey, California. Naval Postgraduate School, 2001-06);To achieve information superiority in a coalition environment the U. S. has to seamlessly integrate coalition members, both NATO and Non-NATO, into its command and control processes along all echelons of military operations. ... -
Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol
Haakensen, Thomas J. (Monterey, California: Naval Postgraduate School, 2017-06);A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to ...