Psychotronic Warfare

Psychotronic Warfare

NT WA JOI RFA R R O E F S T E U R T D I N E E S C OCCASIONAL PAPER VOL - XII NO-3 / JUN 2018 Lt Gen Sunit Kumar, AVSM (Retd) served as CYBER-ALIKE DG IS (Army HQ) from 2011 to 2014 before NON his superannuation. An alumnus of DSSC, HC and NDC, he served in various staff, command TRADITIONAL and instructional appointments in the Army. WARS Some of the important assignments were Sr Staff Officer (Ops) in UNOSOM-2, Director in Military Operations (MO) Directorate and Directing Staff (DS) in Higher Command (HC) Wing, Army War College, Mhow. He is currently perusing PhD in ‘Cyber Warfare – Challenges and Options for India’s Defence’. “The victorious strategist only determination rather than societal seeks battle after the victory has evolution, to information mobility, been won, whereas he who is tailoring or exploitation rather than raw destined to defeat first fights and brawn power and weapon lethality, and afterwards looks for victory”. to perception, or call it virtuality rather than widespread familiarity, or apparent -Sun Tzu reality. Introduction Cyber warfare is fallout of cyber Cyber domain is expanding in frontage, power, a subset of information or what depth and altitude, more so in techno- Chinese term as informationization diversity and network-density with the warfare and of intimate kinship to emphasis shifting to technological “Network Centric”, “Sub Rosa”, 2 CENJOWS “No contact”, “Unrestricted”, as “the battle to win the narrative”, “Electromagnetic Spectrum”, “memetic” wherein perception is as important “scalar”, “Cognitive”, “psychological”, to success as the actual event. For and “Psychotronic” Warfare; besides terrorists and hacktivist, the Internet many, indeed many, emerging variants, and mass media have become forums crossbreeds, and hybrids of the so-called for achieving their strategic and political irregular, or non-traditional warfare. aims. Shrewd, amongst them, lay stress on the significance of integrating combat The technology of virtual battle activities into a coherent strategic arena has turned up bit-by-bit and communications programme. critically, but the consequences, thereof, have surfaced at an enormous Radical groups are not the only and revolutionary scale and, that too, ones who understand the importance imperceptibly. The security and warfare of dominating the media message. “It paradigms, though unique, are transiting could be state” synchronising military operations with a media offensive”. The ad nauseam — technologically complex battle of the narrative involve a thorough in conduct, and demanding nano- understanding of the enemy and how second responses. Therefore, the policy he attempts to influence the perceptions perspective and action plan must follow not only of his followers, but the global the maxim, “Prevent or Repent”. community at large. History is witness The article covers major other non to the deeds that involve deception, traditional wars of like genre that have convoluted endeavours to spin events, caught the imagination of the soldiers morph visuals, and spread outright lies. and scholars. The modus operandi, that Formless and deadly, the exploiters they suggest, is challenging, exigent and of the cyber culture are roguish avant- out-of-the-box, some even, according to garde - unconventional, aggressive, the grapevine, unethical and offensive. and their activities often forbidden The War of Narratives by the laws of war (jus in bello). Their targets include minorities and deprived Modern wars are no more fought in sections of society, disenchanted youth, “physical” syndrome of bare bones and people living below poverty line. and guts in the battlefield. The The modus operandi embrace vicious new, nonetheless myriad ways, are cant, rumour-mongering, and inciting astounding - some highly dexterous communal rioting. and sophisticated others contextually mundane, yet consequential and far The greatest security crisis that reaching. The battleground is the media we face to-clay is that inflicted by media and the Americans refer to the hostilities mainstream in general, “social” in CENJOWS 3 particular and some privileged persona English language to denote secrecy or in responsible positions who use confidentiality. Sub rosa activities have communally surcharged expressions become a byword for covert operations, and references like, “Islamic-terrorism”, usually by security services. The phrase “Jihadi-terrorism”, “Hindu-terrorism”, with its allusions has been adopted by “Saffron-terrorism” besides, resorting to the Canadian, American and British defamatory accounts about the armed special forces, inter alia intelligence forces that tell on their morale. and security outfits of other countries. The debates on the TV, more so In the ancient India, the epics and other in Parliament, are battles of narrative, literature incorporate expressions such fought between the proponents and as gupta (secret) and agyat (unknown), opponents on weighty national issues, defining yudha (war) in the milieu, who do not wish to listen to each other. identical to sub rosa. They treat it as a forum to exhibit their Martin C Libicki has written a psyche, borne of engrained memes - seminal and provoking paper under the trumpeting differences on issues that RAND label, titled, “Sub Rosa Cyber are vital and critical by arguments that War” in which he writes, “Cyberspace are trivial and irrational. Oft repeated offers the prospect of sub rosa warfare, clichés of faith and opinion certitudes are in which neither side acknowledges that loud-mouthed. They reveal a growing discourse of politicking between those they are in conflict with one another or in power and those in opposition, with even that one side has been attacked media anchors playing the moderator - at all. This is possible for two reasons: even subjective broker. Logic is hacked first, because the battle damage from by the virus of mind, carrying baggage some types of cyber attack may not be of the past - regional, communal and globally visible, and second, because castist too. attribution can be very difficult. Warfare of narratives is beset by The reason that both sides may viewing history as a series of certitudes keep matters sub rosa is to maintain that forecloses awkward conclusions freedom of actions, on the theory and lessons drawn. Like the present, that public visibility may complicate there is no single reality that defines the negotiations and lead to escalation. past or models the future - a point to Nevertheless, sub rosa warfare has consider the next time we temperate or its dangers, notably a lack of the kind face a contemporary battlefield of scrutiny that may promote actions, Sub Rosa Cyber Warfare which cannot bear the light of day, and the overconfident assumption that no Sub rosa is a Latin phrase that third party is aware of what is going on means “under the rose”, It is used in between the hackers of both sides”. 4 CENJOWS Memetic Warfare memeplex is sanskar, more pertinent to There is a chapter in Sky is the the collective. This could be an attribute Limit: Signals in Operation Pawan of an “elusive mind” Or an “enlightened entitled “Memetic Warfare”. It narrates one,” The two are mutually exclusive, the unparallel exploits of the LTTE in the the former an anti thesis of the latter, the memetic warfare paradigm described satvik guna. Fact remains that many as information warfare plus. Whereas cyber powers and non-state terrorists, information warfare is concerned with ethno religious and anti-social entities interception and manipulation of data are spending a lot of money on and data processors in electromagnetic psychotronic, cognitive and memetic and cyber domains, memetic warfare warfare, much of which is hush-hush. extends it to the virtual and cognitive Scalar Warfare domains. “To get a basic understanding of Meine is an information pellet, scalar waves is to have the positive and pattern or phenotype held in an prolific imagination suddenly run wild so individual’s memory, which is capable as all the implications and possibilities of being passed on, replicated and regarding warfare fall into place. One propagated to another individual’s realises with a certain horror that the mind, impacting as mindset. Although world has totally changed, and that there the expression is neutral, more often are some very fearsome possibilities. meme is taken to be a virus of mind, a The power for these weapons comes tamsik guna. Meme warfare is a content from the time domain, longitudinal EM warfare, a psychological warfare, a waves in the vacuum of empty space cultural warfare, in totality the gyan - the power is tremendous and mind- yudh, or the knowledge warfare much boggling.” Scalar electromagnetic beyond the pale of information or waves are “finer than gamma rays or knowledge warfare, the terms that have X rays and only one hundred millionth widely become popular. Strong memes of a square centimetre in width. They are the cutting edge of cultural evolution belong to the subtle gravitational field - they change minds, alter behaviour, and are also known as granitic waves. shift paradigms and transform societies. Uniquely, they flow in multiple directions The best way to explain memetics at right angles off vector electromagnetic is to suggest that the brain is hardware, waves, as an untapped energy source mind is software and meme is the data called ‘potentials’”. stored in it. It may be processed or Beardon suggests, “The ordinary unprocessed, integrity-imbued or virus EM waves that we have known about, inflicted. Meme is guna, whereas are called transverse EM waves, ) CENJOWS 5 to distinguish them from the new The envelop, so created, can chase the longitudinal EM waves. These scalar target. In the exploitative stratum, the waves do not actually exist in our weaponry induces hypnotic mind control “material” world, but exist only in the over a whole population; or even reads vacuum of empty space, or the time anyone’s mind on the planet remotely. domain. This vacuum of space exists Chaoplexic Warfare all through everything.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us