Proposed Basic Estimate on Psychological Warfare O.S.S. Aug

Total Page:16

File Type:pdf, Size:1020Kb

Proposed Basic Estimate on Psychological Warfare O.S.S. Aug /.,_,.I. _,A .. l(,. PROPOSE.D BASIC ESTIMATE ON I :1 'I I PSYCHOLOGICAL WARFARE I I "' I 0. s. s. I ----"'·--~--- -:·- --- DECLASSIFIED AuthorityAJAll)i~3:> , SECRET 1.- 0 , S • EJ • 1/5 Augm,t 28, 19 ~2 ON P~3YCHOLOGIC.AL ,,rAHFARE l! i !1 ::0 .g a Cl. C: @ aCl. 3 5' (D C :::, -- -- Q;- ~ 3 ~ A statement of the present psychological warfare situation is given, including an indication of the incentive, the objectives, and the formulation of the mit3sion. The means avaliable and oppor-ied necessary to a basic er3tirnate on psycho­ logical warfare arc0 reviewed. This review corrnists of a con- sideration of the general political, economic, psychological and informational factors involved and o.f the specific factors revealed in the anD1yfiis of this history, pre,rnnt policios, agencies and operations of the psyehological war.faro program of the Unit,:3d ,StateB, Germany, Italy, and Japan. The capabilitiet3 of Germany, Italy, and Japan in this sphere of warfare are analysed in the light of the sit­ uation vrhich confront,i& them and the: effects they desire. Various courses of action for the United States are pre::rnnted and analysed for their suitabilit~r, foJ.13ibility and acceptability for setting up an effectivo psychological war- fare organization. One course of action is chos(m for inunediate consider­ ation, and recommendations ar"a made 1.H:i to measures that should be undertaken to put this cour,rn of action into e.f.fect. ;u (D "Cl 8. C @ 0.. 0 "'3 5' BASIC ESTIMATE ON PSYCHOLOGICAL WARFARE (D ...,.,..___,_..-l"I'~••-·"--""""---.. ,,,~........... .....,,..,,___. __ ~~ C ::, Q. CONTEN'.lB ~ _... "'.._- ...-~ 3j CD 0.. ES TABLISHl\/lENT OF '.l:HE BASIS FOR SOLU'l'ION OF THE PROBrnM A. SUITABILITY . (1)-Sunimary of the present psychological warfare s:Ltuat.ion (2l Recognition of incentive (3 Assigned objectives (4 Formulation of the mission B FEASIBILITY AND ACCEPTABILITY 'lnsurvey-of.the --;;M;··-;~j_lable and opposed (a) General factors (b) Specific factors 1, The United States 2~ 'Ihe Axis---Germany 3. The A:x:is--Italy 4. 1he A:x:is-~Japan (2) Survey of theatres for psychological warfare (.3) Conclus:tons a1:1 to relative effectiveness· IIa. CAPABILITIES OF '.rHE E:NEMY--GIGRMA.NY IIb 0 CAPABILITIES OF 'l'.l-IE ENEMY ..... ITALY Ile, CAPABILI1l'IES OF 'TIIE ENEMY--JAI¾N III. DETERMINATION OJ!' SUITA.Brn, FEASIBLE .1-~ND ACCEP'rABLE COURSES OF AC '.l'ION B ~ §JIBVEY. OF.J!OUHSJ~S •• OJi' ....AC'JJ,QN CT APJ:J.,1.Q~J'IQJLQJL.l~e..LEQR SUI'l:A.BI:J'.:.I'.J;X., .. Ii'EASifilJ:l'.ll AND_,.,....,,, ...AOOEPTABILI1X .._..... .. ,..... .... ,_ .. ,,,,..._.,,,., __ .....,_,._, . .,,, .. D. 1J;S, '.I'ING I-Di; 'I;AJ;NlW COURSES OF 1.Q.T)OJl ANALYSIS~-,........................... ___OF ....,.____ BETAINED - oounsE OF. .ACTION ~=·~ ;:o (D 'O 8. C iii 0. [ 5' IV. R:!~COMl\1IDNDNl7IONE.1 (D C ::, ,, Q. H 1\.NNEX u,~ =ii (D 0. .i\NNi;::)( B IT,\LI/,N PSYCI-IOLOGIC,\L '.'L:J1,F;,R~ itGENCIE:S ,,rm OPER,\.TIONS i\.NNSX C J.\P,\NT.£S:::: PSYCHOLOGICAL "'',,RF;Ju,~ ,i.GEtJCL~S ,\ND OViI:R1(['IONS ;\NNEX D A. SURV.;EY OF THI~ lNEMY 1 S PROBL3M B, }i;NEl\J!Y C.'.PABILITIES ANN:;~x E ( IT /,LY.) I.. SURVEY OF TILL ENEMY 1 S PROBLEM B. }i!NEMY C,.P i;,BILIT IES 1\NNEX F ( J /tP i,N) :\. SURVEY OF' TH;:D ENEM;[' S PROBLEM. B. ENEMY Ci.:,.Pi\BILI'rIES APPENDIX 'l'O 1\NNIDX F -..... ,\SViWT,S OF J.\.P1\Nli~SE f'.ROPAG,\ND/, '110 /JlGHIC/, SI!CY'!ING LACI{ OF INSIGHT INTO ,JlrERIC,\N RiI:1i.CTIONS. CHARTS 2. EXI~3'I'ING OitG./LNIZ//CIOJ>J OF AClE.N.CIEi3 CONCERNED ?1IrrH PSYCHOLOGIC,\L '.J/JlF/,m~ - UNI'rli:D S'I';,T}~S 3 • PO,S,'3IBLE ORG/,NIZ,'tTIOl\T FOR PffYCHOLOGlCi\L ~'li\RF ltR:;;; ( CORRESPONDING TO S.iLCOl\fD COlffWl'.; OF ;\CT ION) I+, PRINCIPAL PSYCHOLOGIC:JJ T'J/tHF;m;,; ;\G:;:;:;NCI3S--JAP,\N 5. PRINCIP :iL P,SYCHOLOGICAL ~'11',RF',\Ri~ 1°·.GENCr;,;s--IT J\LY ;o (D u a0. C 0 (D a0. BASIC ESTlM!.TE ON PSYCHOLOC\ICL.L WLRFLHE cl 5' 11 (D C i1 ::, ,,,I Q. I' en I' en'" ~ 11 (D 0. -0 (D I Q. en ( J.) §.tmll.TtsJ.XY pf,_, the_J2re sent .J?J312holor,ical .J:y§rf are .. .§itua·~.1&,:n. '"en ii; ~ 0. I :11 (a) The Axis countries, particuJ.arly Germany and Japan, 0 '' I,, s·0: (Cl ji en are effectively using organized pr:,ychological warfare 8, lj 5' (D 1., to demoralize z and mislead their eriem:i.es :i.n the '"g- ::, .I Em•opean, Near Eastern, North Lfrican, Far Eastern, ~ I and 1Jfostern Hemisphere theatres of war~ and in )> 0::,- i!I the countx·ies which they dominate~ especially <' 1, i ffi ;1 Europe and the Far Easti · 1; 2., to win the support of neutrals by propagandizing myths of invincibility, Crermany 1s 11 Now Order in Em•ope11 , Japan's 11 Greater E1:1r1t Lsia", ' , 3 411 to maintain the morale of the:l.r own armed forces and civilian populat:l.ons. confined its psychological wa:r.f;p,re chiefly to a les,s formnlized attempt to convince th0l peoples of neutral and occupled. countries of the certainty of a United Nations vieto:ry and to w:i.n their sympathy :for its I war and post.. wo.r aims~. Thero is little integration .I of jJ;~i present psychological warfare activities and little effort to gear them into tho strategy and tactics o:f miJ.:t tary opera tio:ns • - 3 - SECRET 1. subversive se1~vices engaged in sabotage, rumor- ~~-----·spre-ad-ing-_,--bt"-ir:,&P-Y,-8--tG ' ___ ___ _ ~-- 2'. combat psychological warfare services directly at­ tached to the armed .forces., which act under the theatre commander and are exemplified by the German Propaganda Companies. (c) intelligence services enga1;ed in accumulating informa­ tion by research and espionage on fundamental social ideological and leadership vulnerabiJ..iti(oS of enomy populations and on the current attitudes and morale of civilian and military groups, in addition to the usual mi1itary, naval, pol:i:Lical, and economic information. (4) Formulation of the mission To make analyses on which are based recommendations with respect to the proper functioning of ptiychological war­ fare waged by the United States, in order to assist in the attainment of tho objectives of tho ,Joint United States Chiefs of Staff. B. FEASIBILITY AND ACCEPTABILITY ----.. ~~-------.. --~ ... (1) ~~~~ ..,~<:: moans avni1able ~£12.:?E.~2 (a) General facto:rs 1. Poli.tical factors Available Flexibility of a democratic Nimblmi.r~ss of policy provided by tho structure contralization and absolute control in a total:i.tar:i.an state A~liances based upon mutual aim and effort rather than 'rhe absolute cl.nd complete polHical upon opportunism. power of the ·totalitarian regimes. SECRE'r 2. Economics factors Resources and industrial and Resources, and industrial and transportation facilities of the transpor·\,a;tion----fae-i-1-:i:-Mee-ei'--tho United Nations. Axis and their occupied and satcll:i.te countries. Capacity, organization, and mobilization of industry in the Earlior achievement by the total­ United Statos. itarian states of a total and absolute economy. 3• Psychological factors (expanded in detail later) Greater solf-rc,liance engendel:'Gd Development of M.gh morale by in a democracy. totalitarian indoctrination and mi1itary success., and its Enthusiasm and dependability of maintenance by absolute political free and voluntary support for power. our war offort. Long pre-war period of training Prestige of the United States in and discipline_..., social and material things and the hope of economic as well as military. peoples abroad for assistance to come. Absolute control o.f the State over all channels of influence United States reputatfon in many upon the thoughts, opinions, and parts of the world for disinter­ actions of the people. estedness. The impetus derived from the 'I; ' I The spirit of protest and revolt revolutionary origin of the Axis I among the peoples oppressed by movements I: the Axis, I 4. Information and counter-information measures Potential development of agencies Total and absolute control of for the collection and analysis all sources and all dissemination of information. of information, Early and extensive development of a wide variety of intelli­ gence agencies, particularly in Germany and Japan. Early and elaborate development of espionage systems. (2916) l i I I DECLASSIFIED-~=,_ / Authority~~3 i ! I ;:o (D SECRJ~T u ... 5 ... 8. C iii 0. [ SC (D C :::, _______J_--11.nit.ed States Q. ~- (D a. History of psychological warfare in the United 0."" St':?c tes--~-------M- Psychological warfare of the:'J modern sort appeared in the first World War. American activities were organized as follows: i. General propaganda. This was carried on, in ___ ..,,_. ... --··- both the domestic and foreign fioJ.ds, by the ..,.._...---""""""---Committee on Public Information- (the Creel Committee). It propagandized through press servicfJS, films, and pamphlets. It was the sole agency operating for th~~ United States in the neutral and allied countries. American propaganda in the last War was <3xtremely effectiv(~ in attaining immediate objectives and played no inconsiderable part in the final collapse of the Central Powers. Non-fulfilment of tho promises implic:Lt in Wilson 1 s fourteen points and repudiation by the American people of the League of Nations did, however, undermine public confidence in America among both enemy and allied peoples and have seriously hand:1.capped us to this day, (2916) I .---...:-.-- ..
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • The Psychological Impact of Child Soldiering
    Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • Information Warfare on the Web in the Middle East
    Source: Vice INFORMATION WARFARE ON THE WEB IN THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION 1 BRINGING WEB SCIENCE TO THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Created in 2002 at Beirut’s Saint-Joseph University Faculty of Humanities KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Digital Transformation of Middle Eastern Societies New paradigms – Arab Spring – Conflicts – ISIS KEEWARD KNOWLEDGE & EDUCATION The Call For a Science of the Web Berners-Lee Interdisciplinarity (The 2 magics) Mixed methods (Data + Social) New tools to understand the impact of the Web on Society From power laws to people (Social Machines) KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Web Science 2010 – Raleigh, NC. Susan Halford, Cathy Pope, Leslie Carr KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Understanding the web requires knowledge and expertise from the social and human sciences KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Computer science is only one vantage point KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Co-constitution of technology and society The Web impacts society and society impacts the Web KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Heterogeneous actors (ANT – Latour) Radical symmetry between humans and non-humans. “the bureaucrat in the standards agency is just as important as the servers at Google or HTTP”. KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Social and cultural
    [Show full text]
  • 1.Russian Information Weapons; 2.Baltic Department of Defense, Or the US Defenses (Estonia, Latvia, Lithuania) Against Government
    Sponsor: USEUCOM Contract No.: W56KGU-17-C-0010 Project No.: 0719S120 The views expressed in this document are those of the author Three Discussions of Russian Concepts: and do not reflect the official policy or position of MITRE, the 1.Russian Information Weapons; 2.Baltic Department of Defense, or the US Defenses (Estonia, Latvia, Lithuania) against government. Russian Propaganda; and 3.Russia’s Development of Non-Lethal Weapons Author: Timothy Thomas March 2020 Approved for Public Release: Distribution Unlimited. Case Numbers 20-0235; 20-0050; 20-0051; 19-3194; and 20-0145. ©2020 The MITRE Corporation. All rights reserved. McClean, VA 1 FOREWORD Russia has long been captivated by the power of information as a weapon, most notably in a historical sense using propaganda to influence and persuade audiences. With the onset of the information age, the concept’s development and application increased dramatically. The power of information-technologies when applied to weaponry increased the latter’s capabilities due to increased reconnaissance and precision applications. The power of social media was used to influence populations both at home and abroad. Both developments fit perfectly into Russia’s information warfare concept, whose two aspects are information-technical and information-psychological capabilities. Information’s universality, covertness, variety of software and hardware forms and implementation, efficiency of use when choosing a time and place of employment, and, finally, cost effectiveness make it a formidable commodity when assessed as weaponry. Russian efforts to define and use IWes are well documented. In the 1990s there were efforts to define information weapons (IWes) at the United Nations, efforts that failed.
    [Show full text]
  • Terrorism - the Efinitd Ional Problem Alex Schmid
    Case Western Reserve Journal of International Law Volume 36 | Issue 2 2004 Terrorism - The efinitD ional Problem Alex Schmid Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Alex Schmid, Terrorism - The Definitional Problem, 36 Case W. Res. J. Int'l L. 375 (2004) Available at: https://scholarlycommons.law.case.edu/jil/vol36/iss2/8 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. TERRORISM - THE DEFINITIONAL PROBLEM* Alex Schmidt "Increasingly, questions are being raised about the problem of the definition of a terrorist. Let us be wise and focused about this: terrorism is terrorism.. What looks, smells and kills like terrorism is terrorism." - Sir Jeremy Greenstock, British Ambassador to the UnitedNations, in post September 11, 2001 speech' "It is not enough to declare war on what one deems terrorism without giving a precise and exact definition." - PresidentEmile Lahoud,Lebanon (2004)2 "An objective definition of terrorism is not only possible; it is also indispensable to any serious attempt to combat terrorism." - Boaz Ganor,Director of the InternationalPolicy Institutefor Counter- Terrorism3 * Presented at the War Crimes Research Symposium: "Terrorism on Trial" at Case Western Reserve University School of Law, sponsored by the Frederick K. Cox International Law Center, on Friday, Oct. 8, 2004. t The views and opinions expressed in this paper are solely those of the author and do not represent official positions of the United Nations which has not yet reached a consensus on the definition of terrorism.
    [Show full text]
  • Principles of Modern American Counterinsurgency
    Mastering Counterinsurgency: A Workshop Report By Stephen P. Cohen, Senior Fellow, The Brookings Institution and Shuja Nawaz, Director, South Asia Center, The Atlantic Council Brookings Counterinsurgency and Pakistan Paper Series The Brookings Institution and the Pakistan National Defence University, with support from the U.S. National Defense University and the Embassy of Pakistan, Washington, held a three-day workshop that explored American and Pakistani approaches to counterinsurgency (COIN) and low-intensity conflict (LIC) from March 10 to March 12, 2009. The workshop consisted of two days’ discussion, a visit to the Marine Corps Base Quantico for discussions with resident experts, and a visit to the Pentagon for briefings by American civilian and military officials. Subsequently, in early May, the Pakistan army launched its biggest-ever counterinsurgency operation in Swat, which is likely to have had significant consequences for the Northwest Frontier Province (NWFP), the army, and Pakistan itself. The workshop anticipated and addressed many dimensions of this operation, although no one present asserted that it was imminent. The surprisingly rapid developments in Pakistan were, in retrospect, the biggest “takeaway” from the conference, and they should make us humble when it comes to prediction. This report highlights some dimensions of the workshop’s exploration of COIN and LIC, and notes areas of agreement and disagreement among and between American and Pakistani participants. It represents our own views, and not necessarily those of sponsors and participants. The conference papers are available on the Brookings website.1 COIN or LIC? Americans and Pakistanis come to counterinsurgency and low-intensity conflict from different backgrounds and different experiences.
    [Show full text]
  • Cyber Influence Operations: an Overview and Comparative Analysis
    CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.
    [Show full text]
  • Enablers of Hybrid Warfare: the Bulgarian Case
    Hadzhiev, B. (2020). Enablers of hybrid warfare: The Bulgarian case. Journal of Journal International Studies, 13(1), 28-43. doi:10.14254/2071-8330.2020/13-1/2 of International Studies © Foundation Enablers of hybrid warfare: of International Studies, 2020 The Bulgarian case © CSR, 2020 Papers Scientific Boyan Hadzhiev Department of International Relations, University of National and World Economy, Bulgaria [email protected] Abstract. Russian actions in the Crimea since 2014 have increased Central and Eastern Received: September, 2019 European countries concerns and strengthened their fears of becoming the next 1st Revision: target of hybrid attacks. The common understanding of hybrid war as such is January, 2020 usually related to the ambiguous boundaries between peace and war. But this view Accepted: February, 2020 is more about the reluctance of political leaders to recognize that hybrid warfare in its essence is a war with limited political aims carried out using a variety of DOI: military and non-military means. As in any war, the strategy of this warfare aims 10.14254/2071- to foster the sense of insecurity and uncertainty in the opponent. Disinformation, 8330. 2020/13-1/2 subversion, demoralization and division in society, political corruption, provocations and threats are some of the key tools that are being applied with different success in the hybrid warfare. The paper presents a theoretical model consisting of three groups of factors (socio-historical, governmental and international) that create an appropriate environment for conducting a hybrid warfare. Taken together, these prerequisites allow the assessment of the degree of vulnerability to hybrid threats. In Bulgaria, the ongoing debate about Russia's role is developing in the context of the alleged hybrid war that Moscow is conducting in the country.
    [Show full text]
  • SIEGE!! Introduction Demoralization
    SIEGE!! Introduction Castles were primarily structures of war and were built in strife ridden lands. Thus, it was almost inevitable that they would come under attack. Because castles were made with such massive defense fortifications, it was extremely hard to destroy them. Thus, the goal of a siege army was not to destroy a castle, but to penetrate it. However, this task was also extremely hard. Sieges often lasted for months and could even last for years! Castles were protected by at least two walls, and often a moat. The defender's only hope was that either a friendly army would come to help them, or that they could somehow defeat the attackers by themselves. Demoralization The most effective offensive weapon was hunger and demoralization. Besieging forces would attempt to completely surround a castle and cut it off from the outside world. No supplies were allowed in or messages sent out. The situation often got very grim inside the castle. Even though large quantities of supplies were stored inside, they sometimes ran out. Then the defenders were forced to eat anything they could get their hands on. This included rats, grass, dogs, and anything else semi-edible. Essentially, the offending army would attempt to starve and discourage the defenders to the point of surrender. There were many tactics used to accomplish this. They did anything they could to decrease the enemy's morale. Because the defenders depended on reinforcements or a direct attack by allies from another castle, the attacking army almost always embarked on a campaign of misinformation. They would shout that the besieged army's allies were defeated.
    [Show full text]
  • Psychological Operations Principles and Case Studies
    Psychological Operations Principles and Case Studies Editor Frank L. Goldstein, Col, USAF Co-editor Benjamin F. Findley, Jr., Col, USAFR Air University. Press Maxwell Air Force Base, Alabama September 1996 Library of Congress Cataloging-in-Publication Data Psychological operations : principles and case studies j editor, Frank L. Goldstein ; co-editor, Benjamin F. Findley. p. cm. At head of t.p. : AU Shield. "September 1996 ." 1. Psychological warfare-United States . 2. Psychological warfare-Case studies . 1. Goldstein, Frank L., 1945- . 11. Findley, Benjamin F. UB276.P82 1996 355 .3'434-dc20 96-22817 CIP ISBN 1-58566-016-7 Disclaimer This publication was produced in the Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts . The views expressed in this publication are those of the authors and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release . For Sale by the Superintendent of Documents US Government Printing Office Washington, DC 20402 Contents Essay Page DISCLAIMER -------------------- ii FOREWORD . Lx PREFACE ______________________ xi PART I Nature and Scope of Psychological Operations (PSYOP) Introduction . 3 1 Psychological Operations : An Introduction Col Frank L. Goldstein, USAF Col Daniel W. Jacobowitz, USAF, Retired 2 Strategic Concepts for Military Operations . , 17 Col Fred W. Walker, USAF, Retired 3 No More Tactical Information Detachments: US Military Psychological Operations in Transition . 25 Col Alfred H. Paddock, Jr., USA, Retired 4 Blending Military and Civilian PSYOP Paradigms .
    [Show full text]