Information Warfare on the Web in the Middle East

Total Page:16

File Type:pdf, Size:1020Kb

Information Warfare on the Web in the Middle East Source: Vice INFORMATION WARFARE ON THE WEB IN THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION 1 BRINGING WEB SCIENCE TO THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Created in 2002 at Beirut’s Saint-Joseph University Faculty of Humanities KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Digital Transformation of Middle Eastern Societies New paradigms – Arab Spring – Conflicts – ISIS KEEWARD KNOWLEDGE & EDUCATION The Call For a Science of the Web Berners-Lee Interdisciplinarity (The 2 magics) Mixed methods (Data + Social) New tools to understand the impact of the Web on Society From power laws to people (Social Machines) KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Web Science 2010 – Raleigh, NC. Susan Halford, Cathy Pope, Leslie Carr KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Understanding the web requires knowledge and expertise from the social and human sciences KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Computer science is only one vantage point KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Co-constitution of technology and society The Web impacts society and society impacts the Web KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Heterogeneous actors (ANT – Latour) Radical symmetry between humans and non-humans. “the bureaucrat in the standards agency is just as important as the servers at Google or HTTP”. KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Social and cultural construction of technology (SCOT) Ignoring particular functionalities, or developing alternative uses, and produce outcomes that may differ significantly from the original intentions for a given innovation. KEEWARD KNOWLEDGE & EDUCATION Consequences For Web Science Web Science must be the genuine intersection of discipline It cannot be allowed to be a sociology or a computer science of the web KEEWARD KNOWLEDGE & EDUCATION Consequences For Web Science Web Science must look both ways to see how the web is made by humans and how humans are made by the web. KEEWARD KNOWLEDGE & EDUCATION Consequences For Web Science Web Science must follow all the actors and trace the networks implicated in the web in the broadest sense and understand the effects of these networks. KEEWARD KNOWLEDGE & EDUCATION Consequences For Web Science Web Science must be a critical discipline. It must develop theoretical thinking and push towards critical, political social theory, to challenge the web and society. KEEWARD KNOWLEDGE & EDUCATION Consequences For Web Science Web Science must move beyond narrow epistemologies and methodologies to enable a science which can examine and explain both micro and macro phenomena. KEEWARD KNOWLEDGE & EDUCATION Web Science In the Arab Near East Context Against Prescriptive Language (Lawrence of E-Rabia – Burris 2000) Contextualization against New Orientalism (Anderson 2003) Myopia of Networks (Etling 2009) KEEWARD KNOWLEDGE & EDUCATION 2 INFORMATION WARFARE ON THE WEB KEEWARD KNOWLEDGE & EDUCATION Information Warfare A very large concept as old as war! Propaganda – Disinformation – Demoralization Manipulation – Deception – Denial of information PsyOps KEEWARD KNOWLEDGE & EDUCATION Information Warfare On the Web The Internet is a new battlefield Information Warfare is part of Cyberwarfare KEEWARD KNOWLEDGE & EDUCATION Information Warfare On the Web The Web is the Internet’s Information System Multiplier effect? Web as a collateral asset? KEEWARD KNOWLEDGE & EDUCATION Information Warfare On the Web Difference between attacks that target the Internet infrastructure and Information Warfare tactics and tools KEEWARD KNOWLEDGE & EDUCATION Researching Information Warfare On the Web Is Information Warfare always asymmetric? Where does it take place? What about the BTKP rule? Weapons of mass annoyance? KEEWARD KNOWLEDGE & EDUCATION Researching Information Warfare On the Web 1 – Objectives / Strategies? 2 – Types of attacks / Contents / Targets / Actions? 3 – Actors (Groups, Armies, Businesses, Individuals) KEEWARD KNOWLEDGE & EDUCATION Researching Information Warfare On the Web Observation – Identification – Measure Measuring Digital Wars: Learning from the experience of peace research and arms control. Giacomello (2003). KEEWARD KNOWLEDGE & EDUCATION Researching Information Warfare On the Web Observation KEEWARD KNOWLEDGE & EDUCATION 1 - Observation • Define Context – Official Places, reference sources, players, historical background, virtual borders, strategic assets, obvious targets, etc. • Identifying sources – Specialized websites and forums – Official declarations and claims – Incidents / Media Reports – Influencers, gatekeepers, communities KEEWARD KNOWLEDGE & EDUCATION 2 - Identification • Existence of the action – Identifying traces • Qualitative (Reference of action. Ex: Hashtag) – Permanent tracking • Quantitative (Distortions in usage) – Regular data extraction and analysis – Availability of technology by attacker – Damage done (Observed or reported) KEEWARD KNOWLEDGE & EDUCATION 3 - Evaluation • Storage / Coding / Analysis – Descriptors – Attacker / Target – Type of attack – Type of content – Damage – Strategic objectives – Regrouping KEEWARD KNOWLEDGE & EDUCATION 3 CONTEXTS KEEWARD KNOWLEDGE & EDUCATION Context 1 2006 War Lebanon 30 days of asymmetric warfare between the State of Israel and the Lebanese Islamic Resistance (Best Poster – ACM Web Science 2011 - Koblenz) KEEWARD KNOWLEDGE & EDUCATION Context 1 2006 War Lebanon Megaphone software (Giyus.org) Web Pages defacement (Al Manar TV) PsyOps / Deceptive contents (Satellite photos) Denunciation Websites (All4Lebanon) KEEWARD KNOWLEDGE & EDUCATION Context 1 2006 War Lebanon No official strategy - Innovation Individual initiatives – Hackers Units Limited impact - Symbolism KEEWARD KNOWLEDGE & EDUCATION Context 2 2011 Civil War in Syria Information warfare in Syria The Web between Liberation and Repression KEEWARD KNOWLEDGE & EDUCATION Context 2 2011 Civil War in Syria Repression strategy follows uprising in Egypt and Tunisia First official Electronic Army (SEA) – 122 defacement attacks Fake accounts on social media (Honey pots) – 1200 arrests KEEWARD KNOWLEDGE & EDUCATION Context 3 2012 The Gaza War Information Warfare on the Web as an official military strategy KEEWARD KNOWLEDGE & EDUCATION Context 3 2012 The Gaza War Emerging actors (Al-Qassam Cyber Fighters - Anonymous) Official strategy to win the IWW (Legitimization - Hasbara) Citizen Journalism KEEWARD KNOWLEDGE & EDUCATION Context 3 2014 ISIS Global Information Operations Strategy by a terrorist organization (Best Poster – ACM Web Science 2015 - Oxford) KEEWARD KNOWLEDGE & EDUCATION Context 3 2014 ISIS Building audience and support (Al Hayat Media Center) Framing politico-military actions (Live tweeting) Marketing the Caliphate (Differentiation) KEEWARD KNOWLEDGE & EDUCATION Context 3 2014 ISIS Building audience and support (Al Hayat Media Center) Framing politico-military actions (Live tweeting) Marketing the Caliphate (Differentiation) KEEWARD KNOWLEDGE & EDUCATION At last, Some numbers! 4 contexts studied in 6 years Around 2500 attacks (6 groups) 67 different sources KEEWARD KNOWLEDGE & EDUCATION 1 - Volumes Denial of Lebanon War Denial of Syria information Propaganda information 9% 11% 4% Disinformation Propaganda 18% Deception 21% 21% Disinformation 8% Deception 49% Demoralization Manipulation 5% 36% Demoralization Manipulation 10% 8% Gaza Denial of Isis information Denial of 4% information 15% Propaganda Deception 18% 17% Propaganda Deception 44% 21% Manipulation Disinformation 14% 26% Demoralization Manipulation Demoralization Disinformation 8% 15% 5% 13% KEEWARD KNOWLEDGE & EDUCATION 1 – Example of sources: Hackmageddon KEEWARD KNOWLEDGE & EDUCATION 1 – Example of sources: Opennet.org (SEA) KEEWARD KNOWLEDGE & EDUCATION 2 – We just scratched the surface! • Very complex research • Exploratory • Understanding the context is essential – Few sources – References are difficult to evaluate – Hard to get first hand information • On actions and intentions • On actors • Need to create new tools for observation KEEWARD KNOWLEDGE & EDUCATION Thank you • Webscience.blogs.usj.edu.lb • [email protected] KEEWARD KNOWLEDGE & EDUCATION .
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • The Psychological Impact of Child Soldiering
    Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • 1.Russian Information Weapons; 2.Baltic Department of Defense, Or the US Defenses (Estonia, Latvia, Lithuania) Against Government
    Sponsor: USEUCOM Contract No.: W56KGU-17-C-0010 Project No.: 0719S120 The views expressed in this document are those of the author Three Discussions of Russian Concepts: and do not reflect the official policy or position of MITRE, the 1.Russian Information Weapons; 2.Baltic Department of Defense, or the US Defenses (Estonia, Latvia, Lithuania) against government. Russian Propaganda; and 3.Russia’s Development of Non-Lethal Weapons Author: Timothy Thomas March 2020 Approved for Public Release: Distribution Unlimited. Case Numbers 20-0235; 20-0050; 20-0051; 19-3194; and 20-0145. ©2020 The MITRE Corporation. All rights reserved. McClean, VA 1 FOREWORD Russia has long been captivated by the power of information as a weapon, most notably in a historical sense using propaganda to influence and persuade audiences. With the onset of the information age, the concept’s development and application increased dramatically. The power of information-technologies when applied to weaponry increased the latter’s capabilities due to increased reconnaissance and precision applications. The power of social media was used to influence populations both at home and abroad. Both developments fit perfectly into Russia’s information warfare concept, whose two aspects are information-technical and information-psychological capabilities. Information’s universality, covertness, variety of software and hardware forms and implementation, efficiency of use when choosing a time and place of employment, and, finally, cost effectiveness make it a formidable commodity when assessed as weaponry. Russian efforts to define and use IWes are well documented. In the 1990s there were efforts to define information weapons (IWes) at the United Nations, efforts that failed.
    [Show full text]
  • Terrorism - the Efinitd Ional Problem Alex Schmid
    Case Western Reserve Journal of International Law Volume 36 | Issue 2 2004 Terrorism - The efinitD ional Problem Alex Schmid Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Alex Schmid, Terrorism - The Definitional Problem, 36 Case W. Res. J. Int'l L. 375 (2004) Available at: https://scholarlycommons.law.case.edu/jil/vol36/iss2/8 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. TERRORISM - THE DEFINITIONAL PROBLEM* Alex Schmidt "Increasingly, questions are being raised about the problem of the definition of a terrorist. Let us be wise and focused about this: terrorism is terrorism.. What looks, smells and kills like terrorism is terrorism." - Sir Jeremy Greenstock, British Ambassador to the UnitedNations, in post September 11, 2001 speech' "It is not enough to declare war on what one deems terrorism without giving a precise and exact definition." - PresidentEmile Lahoud,Lebanon (2004)2 "An objective definition of terrorism is not only possible; it is also indispensable to any serious attempt to combat terrorism." - Boaz Ganor,Director of the InternationalPolicy Institutefor Counter- Terrorism3 * Presented at the War Crimes Research Symposium: "Terrorism on Trial" at Case Western Reserve University School of Law, sponsored by the Frederick K. Cox International Law Center, on Friday, Oct. 8, 2004. t The views and opinions expressed in this paper are solely those of the author and do not represent official positions of the United Nations which has not yet reached a consensus on the definition of terrorism.
    [Show full text]
  • Principles of Modern American Counterinsurgency
    Mastering Counterinsurgency: A Workshop Report By Stephen P. Cohen, Senior Fellow, The Brookings Institution and Shuja Nawaz, Director, South Asia Center, The Atlantic Council Brookings Counterinsurgency and Pakistan Paper Series The Brookings Institution and the Pakistan National Defence University, with support from the U.S. National Defense University and the Embassy of Pakistan, Washington, held a three-day workshop that explored American and Pakistani approaches to counterinsurgency (COIN) and low-intensity conflict (LIC) from March 10 to March 12, 2009. The workshop consisted of two days’ discussion, a visit to the Marine Corps Base Quantico for discussions with resident experts, and a visit to the Pentagon for briefings by American civilian and military officials. Subsequently, in early May, the Pakistan army launched its biggest-ever counterinsurgency operation in Swat, which is likely to have had significant consequences for the Northwest Frontier Province (NWFP), the army, and Pakistan itself. The workshop anticipated and addressed many dimensions of this operation, although no one present asserted that it was imminent. The surprisingly rapid developments in Pakistan were, in retrospect, the biggest “takeaway” from the conference, and they should make us humble when it comes to prediction. This report highlights some dimensions of the workshop’s exploration of COIN and LIC, and notes areas of agreement and disagreement among and between American and Pakistani participants. It represents our own views, and not necessarily those of sponsors and participants. The conference papers are available on the Brookings website.1 COIN or LIC? Americans and Pakistanis come to counterinsurgency and low-intensity conflict from different backgrounds and different experiences.
    [Show full text]
  • Cyber Influence Operations: an Overview and Comparative Analysis
    CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.
    [Show full text]
  • Enablers of Hybrid Warfare: the Bulgarian Case
    Hadzhiev, B. (2020). Enablers of hybrid warfare: The Bulgarian case. Journal of Journal International Studies, 13(1), 28-43. doi:10.14254/2071-8330.2020/13-1/2 of International Studies © Foundation Enablers of hybrid warfare: of International Studies, 2020 The Bulgarian case © CSR, 2020 Papers Scientific Boyan Hadzhiev Department of International Relations, University of National and World Economy, Bulgaria [email protected] Abstract. Russian actions in the Crimea since 2014 have increased Central and Eastern Received: September, 2019 European countries concerns and strengthened their fears of becoming the next 1st Revision: target of hybrid attacks. The common understanding of hybrid war as such is January, 2020 usually related to the ambiguous boundaries between peace and war. But this view Accepted: February, 2020 is more about the reluctance of political leaders to recognize that hybrid warfare in its essence is a war with limited political aims carried out using a variety of DOI: military and non-military means. As in any war, the strategy of this warfare aims 10.14254/2071- to foster the sense of insecurity and uncertainty in the opponent. Disinformation, 8330. 2020/13-1/2 subversion, demoralization and division in society, political corruption, provocations and threats are some of the key tools that are being applied with different success in the hybrid warfare. The paper presents a theoretical model consisting of three groups of factors (socio-historical, governmental and international) that create an appropriate environment for conducting a hybrid warfare. Taken together, these prerequisites allow the assessment of the degree of vulnerability to hybrid threats. In Bulgaria, the ongoing debate about Russia's role is developing in the context of the alleged hybrid war that Moscow is conducting in the country.
    [Show full text]
  • SIEGE!! Introduction Demoralization
    SIEGE!! Introduction Castles were primarily structures of war and were built in strife ridden lands. Thus, it was almost inevitable that they would come under attack. Because castles were made with such massive defense fortifications, it was extremely hard to destroy them. Thus, the goal of a siege army was not to destroy a castle, but to penetrate it. However, this task was also extremely hard. Sieges often lasted for months and could even last for years! Castles were protected by at least two walls, and often a moat. The defender's only hope was that either a friendly army would come to help them, or that they could somehow defeat the attackers by themselves. Demoralization The most effective offensive weapon was hunger and demoralization. Besieging forces would attempt to completely surround a castle and cut it off from the outside world. No supplies were allowed in or messages sent out. The situation often got very grim inside the castle. Even though large quantities of supplies were stored inside, they sometimes ran out. Then the defenders were forced to eat anything they could get their hands on. This included rats, grass, dogs, and anything else semi-edible. Essentially, the offending army would attempt to starve and discourage the defenders to the point of surrender. There were many tactics used to accomplish this. They did anything they could to decrease the enemy's morale. Because the defenders depended on reinforcements or a direct attack by allies from another castle, the attacking army almost always embarked on a campaign of misinformation. They would shout that the besieged army's allies were defeated.
    [Show full text]
  • Psychological Operations Principles and Case Studies
    Psychological Operations Principles and Case Studies Editor Frank L. Goldstein, Col, USAF Co-editor Benjamin F. Findley, Jr., Col, USAFR Air University. Press Maxwell Air Force Base, Alabama September 1996 Library of Congress Cataloging-in-Publication Data Psychological operations : principles and case studies j editor, Frank L. Goldstein ; co-editor, Benjamin F. Findley. p. cm. At head of t.p. : AU Shield. "September 1996 ." 1. Psychological warfare-United States . 2. Psychological warfare-Case studies . 1. Goldstein, Frank L., 1945- . 11. Findley, Benjamin F. UB276.P82 1996 355 .3'434-dc20 96-22817 CIP ISBN 1-58566-016-7 Disclaimer This publication was produced in the Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts . The views expressed in this publication are those of the authors and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release . For Sale by the Superintendent of Documents US Government Printing Office Washington, DC 20402 Contents Essay Page DISCLAIMER -------------------- ii FOREWORD . Lx PREFACE ______________________ xi PART I Nature and Scope of Psychological Operations (PSYOP) Introduction . 3 1 Psychological Operations : An Introduction Col Frank L. Goldstein, USAF Col Daniel W. Jacobowitz, USAF, Retired 2 Strategic Concepts for Military Operations . , 17 Col Fred W. Walker, USAF, Retired 3 No More Tactical Information Detachments: US Military Psychological Operations in Transition . 25 Col Alfred H. Paddock, Jr., USA, Retired 4 Blending Military and Civilian PSYOP Paradigms .
    [Show full text]
  • Counterinsurgency and Its Implications for the Norwegian Special Operations Forces
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2008-06 Counterinsurgency and its implications for the Norwegian Special Operations Forces Hellesen, Petter. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/4131 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COUNTERINSURGENCY AND ITS IMPLICATIONS FOR THE NORWEGIAN SPECIAL OPERATIONS FORCES by Petter Hellesen June 2008 Thesis Advisor: Hy S. Rothstein Second Reader: Doug Borer Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2008 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Counterinsurgency and Its Implications for the Norwegian Special Operations Forces 6. AUTHOR(S) Hellesen, Petter 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9.
    [Show full text]