Secret Intelligence Service
Seminar Discussion
.
Information Space Activity
Information Operations
.
.
(C-I)(C-III)(C-IV)
Harrogate. 11 01 2018 – continually updated, last 20 06 2019
.
Secret Intelligence Service
(C-I) UNIT. SEMINARS
Chart (I) (in note form) for how we understand Offensive Information Operations – for Seminar 15 09 2018. Harrogate
CHART : FUNDAMENTALS OF STRATEGIC LEVEL
OFFENSIVE INFORMATION OPERATIONS
Conducted by the service, functional
component, or single-service force
commander
Objective – To deny, disrupt, destroy, or
otherwise control an adversary’s
use of information and information
systems. Examples :
Disintegrate Integrated Air
Defense System
Degrade and/or Destroy
Tactical Command and
Control
TACTICAL LEVEL
Conducted (or delegated) by the
combatant commander
Involves the use of military forces.
Objective – seek to engage adversary
or potential adversary
Examples :
Expose Adversary’s Deception
Isolate enemy and/or
military commanders from
forces
OPERATIONAL LEVEL
PERCEPTION MANAGEMENT ACTIONS
PRINCIPLES OF OFFENSIVE INFORMATION OPERATIONS
Ultimate target is human decision-making processes
Greatest impact in peace or at the initial stages of a crisis
Information Operation objectives must be clearly established and linked to National Objectives
Selection and employment of a specific offensive capability must be appropriate
Offensive Information Operations may be the main or supporting effort, or a phase
Must be thoroughly integrated with all other aspects of the campaign / operation
Psychological Operations (Psyop)
Operations Security
Military Deception
Electronic Warfare
Physical Attack / Destruction
Computer Network Attack
CAPABILITIES
Public Affairs
Civil Affairs
SUPPORTING FUNCTIONS
Planned in coordination with other
agencies / organisations
Objective – seek to engage adversary
or potential adversary to deter
crisis and end hostilities. Examples :
Deter War
Disrupt WMD R&D Programme
Affect Infrastructure
Support Peace Operations
Protect Global System
.
Secret Intelligence Service
(C-I) UNIT.
Chart (I) (in note form) for how we understand Offensive Information Operations – for Seminar 15 09 2018. Harrogate
CHART : FUNDAMENTALS OF STRATEGIC LEVEL
OFFENSIVE INFORMATION OPERATIONS
.
UNIT
.
Secret Intelligence Service
(C-I) UNIT
Definitions on hand. RE; Seminar 15 09 2018.
Harrogate
GLOBAL INFORMATION INFRASTRUCTURE :
Worldwide interconnection of communications networks, computers, databases, and consumer electronics.
NATIONAL INFORMATION INFRASTRUCTURE :
Similar to and operating within the Global Infrastructure, does embody the Governmental and Civilian Information
Infrastructures.
DEFENCE INFORMATION INFRASTRUCTURE :
Embedded within the National Information Infrastructure and operating within the Global Information Infrastructure, is the primary means that are used to inter-connect mission support, Command and Control, and intelligence computers, and includes strategic, operational, and tactical and commercial communications systems.
.
The information space; space appears empty while staring into it, but very obviously to think that way is epic miscalculation. Importantly, what does the information space present? What is assumed of the content of the information space, and last but not least; (i) in what ways does the information space dictate the response, and (ii) in what ways does the information space dictate proactive measures?
Without referring to any reference material, I suggest we brainstorm and see where it takes us. Take notes and we can compile something later. Obviously in certain respects we might be askew, but it doesn’t matter. This is the point of the exercise – to think about something and compare our thoughts with requisite doctrine.
Notes from session.
INFORMATION SPACE ACTIVITY – INFORMATION OPERATIONS
One way of looking at this is that the source of external threats to security is comprised of the information warfare concepts being developed by a number of foreign countries aimed to impact on the information spheres of other countries; so to disrupt the normal functioning of information and telecommunications systems, security and information resources and to obtain unauthorised access to them.
The fast development of various information systems, Internet-like computer networks and electronic mass media has led at the turn of the Millennium to the creation of the new global information space. Along with the land, sea, air and outer space, the information space has been extensively used for a wide range of military tasks in the armies of the most developed countries.
Due to the fact that information and communications systems are vulnerable to radio-electronic, software and hardware impacts, once emerged and nowadays increasingly omnipresent, information weapons have cross-border effects. >>The role of the information warfare has sharply increased. << We must all agree.
It is vitally important to counter information warfare aggressive acts; one way is to improve techniques and methods of strategic and operational deception, intelligence and electronic warfare, methods and means of active information and psychological operations counter measures. Besides, since recently computers have been widely used in command and control and weapons control systems, that’s why the list of threats is now supplemented with the task to protect the information infrastructure against various types of computer attacks.
Armed conflicts of the last decade, as well as troops and staff operational training can prove that currently is developed a solid system designed to effectively deter, prevent and resolve armed conflicts in the information space.
The concept stipulates basic global information space principles, rules and confidence building measures used to meet defense and security challenges.
Some basic terms and definitions
The concept assumes the following terms and definitions :
Military conflict in the information space is a form of interstate or intrastate conflicts with the use of information weapons.
The current concept uses the following terms and definitions :
Military conflict in the information space is a form of inter-state or intra-state conflicts with the use of information weapons.
Armed Forces cyberspace activities imply the use of military information resources to solve defence and security problems.
Information security of the Armed Forces is the security of the information resources of the Armed Forces against the attack using the information weapons.
Information War is the confrontation between two or more states in the information space with the purpose of inflicting damage to information systems, processes and resources, critical and other structures, undermining the political, economic and social systems, a massive psychological manipulation of the population to destabilise the state and society, as well as coercion of the state to take decisions for the benefit of the opposing force.
Information infrastructure is a combination of technical tools and systems of formation, creation, transformation, transmission, usage and storage of information.
Information weapons are comprised of information technologies, means and methods used to conduct the information warfare.
Information space includes a scope of activities associated with the formation, creation, transformation, transmission, usage, storage of information which influences the individual and community awareness, information infrastructure and information itself.
Information resources make up the information infrastructure, as well as information itself and information flows.
Crisis situation is a stage of conflict escalation characterised by the use of military force to resolve it.
International information security is a state of international relations which excludes the violation of global stability and buildup of a security threat to nations and the international community in the information space.
Information security management system is an element of the national security system intended for the implementation of state policy in the sphere of information security.
NORMS
The activity of the Armed Forces in the information space is based on a multitude of principles such as the rule of law, priority, complexity, interaction, cooperation, innovation.
VALIDITY
Respect for the rule of law principle requires that the Armed Forces in their actions in the information space rigorously follow the norms and principles of the current U.K. legislation and universally recognised norms and principles of the international law.
As for the international law, the Armed Forces with respect to the peculiarities of military activity in the global information space are guided by the following rules and principles :
respect for autononomy /sovereignty
non-interference in the internal affairs of other states
non-use of force or threat of force
right to the individual or collective self-defence
In addition, the Armed Forces follow the international humanitarian law (limiting the indiscriminate use of the information weapons; establishing a special protection for the information objects that are potentially harmful sources of man-made disasters; prohibiting treacherous methods of information warfare).
PRECEDENCE
The respect for the principle of priority requires that the Armed Forces in the course of their activities in the information space seek as a matter of priority to collect relevant and reliable information on the threats, to rapidly process it, profoundly analyse it and to come up with protective measures in good time. All this as a whole creates favourable conditions for the effective command and control needed to keep up the morale of personnel.
In the conditions of the information warfare, adopting strategies to protect information resources will allow avoiding the disorientation of military command structures, disruption, irreparable destruction of logistic and transport infrastructure elements, psychological dislocation of personnel and non-combatants in a war zone. At the same time, the need for adoption of such measures on a priority basis in the current context is due to but not limited to the fact that hundreds of millions of people (whole countries and continents) are involved in a single global information space formed by the Internet, electronic mass media and mobile communication systems.
INVOLVEDNESS
Compliance with the principle of complexity requires that the Armed in their activity in the information space use all available assets to effectively address the challenges they face.
In general, operations in the information space are comprised of the staff and field intelligence efforts, operational deception, electronic warfare, communications, code and automated, information work of HQs, as well as protection of friendly information systems against electronic, cyber and other threats.
The information space activity, on the one hand, is a coherent integrated system in which each component performs its tasks in specific ways and methods, and, on the other hand, on being integrated in such a system it enhances the capabilities of the entire system to achieve the goals of the Armed Forces.
Commanders and staffs at all levels are directly involved in the organisation of the information space activity in peacetime, in wartime, in the preparation and execution phases of operations – warfare.
Each of these command structures, with regard to their functions and authority, plans the subordinate troop activities linked by a single concept of action in the information space.
INTERFACE
Respect for the principle of interaction requires that the Ministry of Defence coordinates its activity in the information space with the other requisite authorities.
COLLABORATION
In order to observe cooperation principles it is necessary to coordinate efforts with friendly states and international organisations.
The main purpose of the global cooperation development is to establish an international legal regime that will also regulate cyberspace military activities of countries in terms of the international law.
As for the cooperation development purposes at the regional level, they include :
establishing effective cooperation systems for detection, warning and combating hostile IT acts seen as a threat to peace and security
regulating and settling disputes and conflicts connected with adverse utilisation of telecommunications and information technologies
confidence building in the sphere of cross-border information systems and global cyberspace security
ADVANCEMENT
In order to observe innovation principles it is necessary for the Armed Forces to exploit the cutting edge cyberspace technologies, means and methods as well as highly skilled personnel.
That’s why the scientific and production potential of the leading U.K. innovation centres can be applied to design and produce such means and technologies and the designing should be carried out in the framework of national and departmental programs and R&D.
The information space specialist training is conducted in military institutes – higher education.
In addition, specialists graduated from other educational institutions could be involved in the resolution of cyberspace security problems.
PROCEDURES
The Armed Forces observe a set of information space conflict deterrence, prevention and settlement rules.
The military policy is aimed at preventing an arms race, deterrence and prevention of military conflicts.
CONTAINMENT AND AVOIDANCE OF MILITARY CONFLICTS
The Armed Forces in their practical activities are guided by the following information space conflict deterrence, prevention and settlement rules. They are:
(I) To develop the Armed Forces information security system designed for cyberspace military conflict prevention and settlement.
(II) To maintain information space (cyberspace) security forces and means in constant readiness to repulse military and political attacks in the information space.
(III) To establish a first-priority cooperation, to develop cooperation on the basis of mutual interest in international cyberspace security strengthening in accordance with the UN Charter provisions and other norms of the international law.
(IV) To strive for concluding an international cyberspace security treaty under the auspices of UN, an agreement that will extend generally accepted norms (rules) and principles of the international law to the cyberspace.
(V) To provide for early detection of potential military conflicts in the cyberspace and unmask masterminds, instigators and accomplices thereof.
(VI) To identify conflict causes and escalation factors and to exercise control over these factors for the sake of preventing emergency situations.
(VII) To take high priority measures to counteract conflict escalation (isolation or intensification) and its transition to a state that increases considerably the cost of its settlement.
(VIII) To prevent conflict spillover to related spheres of international relations because it may result in additional expenditures and efforts.
(IX) To neutralise conflict causes with the aim of channeling the conflicting parties’ interaction to constructive cooperation.
(X) To explain conflict causes and its background to the world community impartially, publicly and in proper time. Shaping a required public opinion implies appropriate orientation and mobilisation, and makes it possible to create in the global information space a climate that will restrict escalation options on the part of its masterminds.
CONFLICT RESOLUTION
The U.K. considers legitimate the use of the Armed Forces and other troops to repulse aggression against it and (or) her allies, to maintain (restore) peace by the decision of the UN Security Council and other structures of collective security, and to protect its citizens outside its territory in accordance with the generally recognised principles and norms of the international law and international law.
The Armed Forces are guided by the following rules of military conflict settlement in the cyberspace:
(I) Cyberspace conflict settlement shall be carried out in the first place by means of negotiation, conciliation, addressing to the UN Security Council or regional agencies or agreements, or by other peaceful means.
(II) In case of tension aggravation, to exclude the extension of a conflict to an extremely destructive forms of confrontation, especially those capable of destabilising the international atmosphere and inciting a crisis.
(III) In case of the conflict escalation in the information space and its extension to the critical phase, to invoke a right for individual or collective self-defence using any ways and means that do not run counter to the standards and principles of the international law.
(IV) In the interest of individual and collective self-defence, to define the needed potential of retaliatory actions on the basis of national democratic procedures with respect to legitimate security concerns of other states and need for the international information security and stability.
(V) In the interest of individual and collective self-defence, to deploy needed information security assets on the territory of foreign states in pursuance of the freewill agreements and international law.
(VI) During the conflict, to inform at all times the domestic and foreign mass media regarding the development of situation and to promote conflict de-escalation and consolidation of results with regard to the public opinion.
ASSURANCE MEASURES
The Armed Forces will favor confidence-building measures in the area of the information space military applications. In particular, such measures may include :
Exchange of national information space security concepts.
Intensive exchange of information on crises and threats in the information space, on measures taken with a view of their settlement and counteraction. Consultations on the information space issues that can invoke concern of the parties, and cooperation in military conflict management.
SUPPOSITION
In the current context, the defensive capacity depends to a large extent on the Armed Forces effectiveness in the information space, and in many ways, it is shaped by their abilities of inhibiting, preventing and settling conflicts that may arise in the information space.
The Armed Forces plan to manage defense and security missions on the basis of the main information space principles and rules and confidence-building measures stated in this concept.
Under this concept, the Armed Forces will strive for the maximum exploitation of the information space potential in order to strengthen the defensive capacity of this country, to contain and prevent military conflicts, to develop military cooperation and shape an international information security system for the sake of the world community.
.
Sketch Board
>>>> Organisation of scientific work and engineering support of innovative research and development in the sphere of defence >>>>
>>>> Monitoring and analysis of international science and development in order to prevent occurrence of such means which can represent a threat to the national security >>>>
>>>> Taking advantage of national scientific resources and scientific potential of foreign states for the benefit of national defence capability >>>>
>>>> Setting the stage for competition in the promotion and usage of scientific ideas and development >>>>
>>>> Organisation of financing of forward-looking (innovative) research and projects for the benefit of defence >>>>
Creation of a think tank of ideas, innovations and forward-looking technologies and their development which can be utilised to ensure the security of the nation >>>>
>>> Organisation of monitoring and training of potential staff in the sphere of innovations and technologies >>>>
.
.
Secret Intelligence Service
(C-I) Unit
London
07 07 2018
Topic: Information Warfare and Deception in Military Doctrine
Information warfare is primarily a construct of a war mindset. However, the development of information operations from it has meant that the concepts have been transferred from military to civilian affairs. The contemporary involvement between the media, the military, and the media in the contemporary world of the ‘War on Terrorism’ has meant the distinction between war and peace is difficult to make. However, the application of deception in the military context is described herein, but it must be added that the dividing line is blurred.
Of course, deception has been an attribute of humans throughout history. Its informal use in war also has a history as long as war itself. However, only in the twentieth century with its formal use by governments and the military did the development of its theoretical base begin. The Soviet
Union used Maskirovka to great effect during the Cold War and was first to develop it as an integrated part of normal diplomatic and military procedure. It also became a formal part of doctrine in Western militaries in that late twentieth century.
One can define deception as: Those measures designed to mislead the enemy by manipulation, distortion, or falsification of evidence to induce the enemy to react in manner prejudicial to their interests. However, here is a fuller definition :
Military deception is defined as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations,
thereby causing the adversary to take specific actions that will contribute to the accomplishment of the friendly mission.
One can refer to ‘influence operations’ as being one of the four major components of the information environment (network warfare operations, electronic warfare operations and integrated control enablers are the others). The components of ‘influence operations’ are; psychological operations, military deception, operations security, counter-intelligence, public affairs, and counter-propaganda. All of these activities have one aim: to influence the mind and behaviour of the adversary in ways beneficial. As such, all involve deception to a greater or lesser degree. This is in contrast to a decade earlier where the emphasis was on technology and its use.
The objective of deception is to be used with the other tactics to gain ‘information superiority’ where this is defined as the state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. It is attempting to get the adversary to believe what the ‘deceiver’ wants them to believe for the advantage of the ‘deceiver’ and the disadvantage of the deceived. It is truly using information as a weapon. Information superiority is the raison d’être of information warfare.
Secret Intelligence Service
(C-I) Unit
London
07 07 2018
Topic: Information Warfare and Deception in Military Doctrine
.
Secret Intelligence Service
(C-I) Unit
London
08 07 2018
INFORMATION WAR. CONTINUED
……… the United Kingdom, within and beyond the military, it can be said, is far more dependent than are others on information systems. Thus we are more vulnerable to hacker-war and cyber-war. Our culture may be spreading overseas, but that success makes it harder for us
to speak to other cultures in their own language.
With information war, our embracing of so many disparate activities, few generalisations cover the entire field. However, certain themes recur:
One side’s information systems may be better (more powerful, robust, and reliable) than another. Yet, information dominance is not like for example, naval dominance where one side’s fleet can keep the other bottled up (although information dominance can support dominance in specific physical media). With rare exceptions (e.g., jamming, competition for media share), information is not a zero-sum enterprise. Mastery of information war does not preclude an adversary from doing exactly the same. We cannot suppress its progress.
Information war is extremely difficult to conduct without precise and reliable knowledge of the other side’s structure or system, that is; from how news and information media influence its decisions, to the bureaucratic structure of command, to a nation’s communications infrastructure, and even to the details of their information systems’ software………
Secret Intelligence Service
(C-I) Unit
London
08 07 2018
INFORMATION WAR. CONTINUED
.
Secret Intelligence Service
(C-I) Unit
Seminar. Harrogate. 10 07 2018
Topic : OFFENSIVE INFORMATION OPERATIONS
Recap / notes – Offensive information operations; mass disruption and / or mass protection with potential economic and social consequences accused by some to be on the order of those caused by chemical, biological, and even nuclear weapons of mass destruction. (Yes, no, it depends…?)
Because of the uncertainty of consequences and the potential impact of information operations on civilian populations, policy and strategy must be carefully developed to govern the use of information operations technologies – technologies that may even provide capabilities before
consequences are understood and policies for their use are fully developed.
Information Warfare Policy and Strategy
The technical methods of information warfare are the means at the bottom of a classical hierarchy that leads from the
ends (objectives) of national security policy. The hierarchy proceeds from the policy to an implementing strategy, then
to operational doctrine (procedures) and a structure (organisation) that applies at the final tactical level the technical operations of information war. The hierarchy flows
down the security policy, with each successive layer in the hierarchy implementing the security objectives of the policy.
Policy then, is the authoritative articulation of the position of the nation, defining our interests (the objects being secured), the security objectives for those interests, and our intent and willingness to apply resources to protect those interests. The
interests to be secured and the means of security are defined by policy. The policy may be publicly declared or held private, and the written format must be concise and clear to permit the implementing strategy to be traceable to
the policy.
Any security policy addressing the potential of information warfare has to consider the following premises:
National interest
The national information infrastructure – the object of the information security policy, is a complex structure comprised of public (military and non-military) and private elements. This infrastructure includes the information, processes, and structure, all of which may be attacked. The structure, contents, owners, and security responsibilities must be defined to clearly identify the object being protected.
New vulnerabilities
Past security due to geographic and political positions no longer apply to information threats, in which geography and political advantages are eliminated. New vulnerabilities and threats must be assessed because traditional defences may not be applicable.
Security objective
The desired levels of information security must be defined in terms of integrity, authenticity, confidentiality, non-repudiation, and availability.
Intent and willingness
We must define intent to use information operations and willingness to apply those weapons. Questions that must be answered include the following :
What actions against the nation will constitute sufficient justification to launch information strikes?
What levels of information operations are within the remit? What falls outside it?
What scales of operations are allowable, and what levels of direct and collateral damage resulting from information strikes are permissible?
How do info ops reinforce conventional operations?
What are the objectives of information strikes?
What are the stages of offensive information escalation, and how are information operations to be used to de-escalate crises?
Authority………………
Continued
Secret Intelligence Service
(C-I) Unit
Seminar. Harrogate. 10 07 2018
Topic : OFFENSIVE INFORMATION OPERATIONS
.
Secret Intelligence Service
(C-I) UNIT. London
Chart for Discussion 14 07 2018. Harrogate
.
DEFINING FUTURE INFORMATION OPERATION FUNCTIONS
INFORMATION OPERATIONS – THE FUTURE
.
Perception Operations
Method : >MESSAGE<
.
Functions :
Deception
Psychological Operations
Civil Affairs
Public Affairs
Counter-propaganda
Counter-deception
.
Network or Cyber Operations
Method : >MEDIA<
.
Functions :
Computer Network Attack
Computer Network Defense
Electronic Warfare
.
INFORMATION SUPPORT FUNCTIONS
Physical Security
Operations Security
Information Assurance
.
INTELLIGENCE SUPPORT FUNCTIONS
Counter-Intelligence
Computer Network Exploitation
.
SUPPORTING
OPERATIONS
Physical Destruction
.
Secret Intelligence Service
(C-I) UNIT. London
Chart for Discussion 14 07 2018. Harrogate
.
DEFINING FUTURE INFORMATION OPERATION FUNCTIONS
INFORMATION OPERATIONS – THE FUTURE
.
Secret Intelligence Service
(C-I) Unit
Seminar. 17 07 2018. Harrogate
TOPIC : INFORMATION WAR AND SOCIAL MEDIA (I)
It is rather obvious that in today’s networked environment, social media has emerged as an additional / vital tool, but mapping the social media terrain has arguably proven to be extremely difficult.
Four factors have complicated the task of analysing social media and these factors reside within a whole range of endeavours whose task it is so to do, be that task of intelligence, industrial, commercial/marketing and other….. :
The multifarious nature of data :
The easy, low-cost access to social media platforms has yielded countless numbers of platforms and users who are easily able to share text, photo, video, audio, and other forms of data.
The sheer volume of information :
Social media conveniently aggregates common interests across broad demographic and geographic spectrum, multiplying both network configurations and opportunities to create and share data.
The speed of exchange :
Cloud technologies and the applications that use them have accelerated the frequency of incoming data that needs to be processed, thereby multiplying the number of short message service – SMS messages to the nth. extent, Facebook status updates, credit card swipes, and so on that are being transmitted during each second of every day.
The truthfulness of the reporting :
The ease whereby users can create and alter data has lowered the quality and validity of data, as well as its usefulness, unless the data can be effectively verified for timeliness, accuracy, and completeness.
Above these challenges resides the requirement to fully realise the potential of this (social media) terrain. (Note the emphasis on; ‘to fully realise’).
What do I mean? I mean accepting and embracing the idea that social media is a means to generate conversations.
It is the ability to translate conversations into results that can assist and even define the potential power of social media in information operations.
.
pushing message to the audience < > pulling the audience to the message
one-way messaging < > interactive conversation
attention as the end point < >attraction as the end point
awkward to measure results < > real-time metrics
rigid protocols for engagement < > adaptive response to inputs
continued
.
Secret Intelligence Service
(C-I) Unit
Seminar. 17 07 2018. Harrogate
TOPIC : INFORMATION WAR AND SOCIAL MEDIA
.
Secret Intelligence Service
(C-I) Unit
London
Introductory and brief notes (I). from Seminar ‘Information and Social Media’. Harrogate
You are aware of what a conversation actually is: it is an informal exchange involving two people or a small group of people. During a conversation, information and insights are shared and, in certain instances, the perspective of the participants becomes changed.
During each exchange, you should consider what you are hearing and formulate plans to respond. In effect, to decide what you plan to say as you hear what others are saying.
If the objective is to convince participants of something, it is generally best to prepare persuasive arguments in advance including counter – arguments so that challenges can be identified quickly and addressed decisively.
When caught off guard (without this preparation) – during a conversation it is not so easy to respond quickly or appropriately. But the reverse is also true. If the direction of the conversation is anticipated, and you can plan a few steps ahead, it is easier to decide what to do to ensure each argument is conveyed accurately and in a timely manner.
This same approach can be used in social media for information operations. You create a conversation where you can sense what is being said, assess how you should reply, and then do so in a way that accurately represents our core Mind War message. Reference to the ‘OODA Loop’.
>>Act >> Observe >> Decide >> Orient >> Act >> Observe >>……….
Secret Intelligence Service
(C-I) Unit
London
Introductory and brief notes (I). from Seminar ‘Information and Social Media’. Harrogate.
.
Secret Intelligence Service
(C-I) Unit. London
Introductory and brief notes (II). from Seminar ‘Information and Social Media’. Harrogate.
Okey dokey, so then, our thinking about what a conversation is helps set the context for understanding, in addition reinforcing the significant issue faced in terms of exploiting social media, which is; response time. Sustained conversations allow us to remain within our adversary’s OODA loop by taking away their target audience. In a person-to-person conversation, there is time to think things through. Whereas on social media engagement occurs at internet speed and performing the various steps of an OODA loop at this speed, and in a way that addresses the challenges of variety, volume, velocity, and truth, > does require a new engagement model. <
> Data science and advanced analytics < has changed the situation by providing the means for applying powerful analytic tools to the combined areas of structured, semi-structured, and unstructured data – that comprise social media.
Essentially, data science and advance analytics integrate the huge array of available data into the OODA loop and reduce the time required for each phase of the OODA loop, thus accelerating the difficult stages of > observe, orient, and decide. <
With the arrival of skill sets such as machine learning and deep structured learning’, the time required for human in the loop decision support can be reduced to almost zero, thus allowing us to move through the OODA loop at internet speed.
Targeted messaging, rapid engagement, and adaptive response are not unique to information operations, as I said. Commercial / marketing organisations have over the past few years reshaped their business models and analytics
techniques so to address these very issues.
Question : Are we learning from the private sector / advertising and marketing organisations ? Specifically with a view to understanding how they (commercial organisations) are using social media to promote their brands, identify and reach targeted audiences, and expand their influence and reach in the marketplace – in effect, creating a conversation with the customer?
Suggestion : Whatever insights gained by this bordering field of endeavour can only help transform information operations in the face of rapidly changing networking technologies and social media.
Additional insights and effects can be gained when our allies provide their regional expertise to assist in shaping and participating in local conversations.
Multination-ally (?), our allies do have their own particular cultural understanding and approach to information operations, tailored for specific targets in ways that may not be employed by us. Allied activities that complement our approach can enhance the quality of both the
planning and execution of social media-based information operations and thus improve the effect of our particular remit operation – though not confined to.
Our understanding of this very quickly evolving social media terrain, combined with our capabilities in data science and analytics, is helping us to maintain an advantage by creating and disseminating content that is rapidly shared
and does produce meaningful effects, capabilities if you like that enable us to deliver insight to other decision makers too at internet speeds, thus providing faster, more effective OODA loop capabilities.
These technologies also enable us to be more preemptive in using social media, so to promote our information operation objectives and allow to measure their effect.
Overall then, a more comprehensive social media understanding provides the United Kingdom with a strategic and tactical edge, within our remit (and beyond) – the broad realm of international affairs.
Secret Intelligence Service
(C-I) Unit. London
Introductory and brief notes (II). from Seminar ‘Information and Social Media’. Harrogate. U.K.
.
Secret Intelligence Service
(C-I) Unit. London
Introductory and brief notes (No. III). from Seminar ‘Information War and Social Media’. Harrogate.
To look at information operations another way, which is always good, Richard Szafranski, in; “A Theory of Information Warfare: Preparing for 2020,”
(Airpower Journal – USA), likewise asserts that the information weapon affects the information target, but he wants to focus more on the ‘adversary’s mind’ as a whole. >> He advocates the theory that the target system of information warfare can include every element in the epistemology of an adversary. <<
Epistemology refers to the entire organisation, structure methods, and validity of knowledge. I know you knew all about that already, but anyway, it (epistemology) means everything a human organism – that is, an individual or a group holds to be true or real, no matter whether what is held as true or real was acquired as knowledge or as a belief.
In Richard Szafranski’s hypothesis, which incidentally I do like, the culmination of skill (he uses the odd word ‘acme’) is to employ the information weapon so to cause the adversary to choose not to fight (or compete) by exercising reflexsive influence, almost para-sympathetic control, over products of the adversary’s neo-cortex. Thus, the ideal promoter of using information as a weapon champions the aim of such weapons so as to influence an adversary’s will and capacity to make war (or compete). In addition, with information as the weapon, its target, in the simplest sense, is also information. A more esoteric definition of the target is the adversary’s mind or cognitive and technical abilities to use information.
The explicitly stated and oftentimes implicitly assumed weapon’s effect is predictable error. Specifically, the use of the information weapon will allow us to predict how an adversary will stumble in judgment, decisions, and actions.
Think about this because the ‘adversary’ is open to interpretation. That being, can cover a gamut of ‘out there’ individuals, groups and or nations
Secret Intelligence Service
(C-I) Unit. London
Introductory and brief notes (No. III). from Seminar ‘Information War and Social Media’. Harrogate.
.
SEMINAR NOTES – HARROGATE
.
SO, WHAT IS INFORMATION?
This question is elementary, but pivotal. It is impossible to discuss information warfare meaningfully without rigorously defining the central concept: information.
Information derives from phenomena. Phenomena, observable facts or events, are everything that happens around us. Phenomena must be perceived and interpreted to become information. Information, then, is the result of two things: perceived phenomena (data) and the instructions required to interpret that data and give it meaning.
This distinction is important, and easily encompassed by a familiar paradox: If a house falls, but no one was
around to hear it, did it make a noise? The falling house caused pressure waves in the atmosphere, a phenomenon. Noise, the information denoting a falling house, occurs when someone’s ear detects the pressure waves, creating data, and the brain’s instructions manipulate that data into the sound recognisable as a falling house. Within that person’s context, there is no falling house until the person hears (or sees) it.
Phenomena become information through observation and analysis. Therefore, information is an abstraction of phenomena. Information is the result of our perceptions and interpretations, regardless of the means. As falling houses make clear, to define information requires only two characteristics :
Information: data and instructions
Note that the definition for information is absolutely distinct from technology. However, what we can do with information, and how fast we can do it, is very dependent on technology. Technology dramatically enhances our observational means, expands and concentrates data storage, and accelerates instruction processing. We use the following term to encompass the technology-dependent elements associated with information:
Information Function: any activity involving the acquisition, transmission, storage, or transformation of
information.
For example, the system that tells a machine to stamp eighty hubcaps is performing an information function. The sheet metal press stamping those hubcaps is not.
.
WHAT ARE SOME MILITARY INFORMATION FUNCTIONS?
Quality information is the counter to the fog of war. As mentioned earlier, the commander with better information
holds a powerful advantage over an adversary. Military operations make special demands on information functions in seeking to give the commander an information advantage.
Surveillance and reconnaissance are our powers of observation. Intelligence and weather analysis are the bases for orienting observations. We use those bases to command and control operations, execute and monitor in directing the conflict. Precision navigation enhances mission performance.
Together, these are the kinds of military information functions that enhance all military operations. one One uses the term military information functions to describe force enhancing information functions.
Military Information Function : any information function supporting and enhancing the employment of military
forces.
This definition serves to delineate militarily important information functions from the total universe of information functions.
.
AGAIN : WHAT IS INFORMATION WARFARE?
At the grand strategy level, nations seek to acquire, exploit, and protect information in support of their
objectives. This exploitation and protection can occur in the economic, political, or military arenas. Knowledge of the adversary’s information is a means to enhance our own capabilities, degrade or counteract adversary capabilities, and protect our own assets, including our own information. This is not new of course. The struggle to discover and exploit information began the first time one group of people tried to gain advantage over another.
Information warfare consists of targeting the enemy’s information and information functions, while protecting our own, with the intent of degrading an enemy’s will or capability to fight. Drawing on the definitions of information and information functions, we define information warfare as :
> Information Warfare : any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against those actions; and exploiting our own military information functions <
This definition is the basis for the following assertions :
Information warfare is any attack against an information function, regardless of the means. Bombing a telephone switching facility is information warfare. So is destroying the switching facility’s software.
Information warfare is any action to protect our information functions, regardless of the means. Hardening and defending the switching facility against air attack is information warfare. So is using an anti-virus programme to protect the facility’s software.
Information warfare is a means, not an end, in precisely the same manner that air warfare is a means, not an
end. We may use information warfare as a means to conduct strategic attack and prohibition, for example, just as we may use air warfare to conduct strategic attack and prohibition.
Militaries have always tried to gain or affect the information required for an adversary to effectively employ
forces. Past strategies typically relied on measures such as feints and deception to influence decisions by
affecting the decision maker’s perceptions. Because these strategies influenced information through the
perception process, they attacked the enemy’s information indirectly. That is, for deception to be effective, the enemy had to do three things :
(I) observe the deception
(II) analyse the deception as reality
(III) act upon the deception according to the deceiver’s goals
However, modern means of performing information functions give information added vulnerability: direct access and manipulation. Modern technology now permits an adversary to change or create information without relying on observation and interpretation. Here is a short list of modem information system characteristics creating this vulnerability: concentrated storage, access speed, widespread information transmission, and the increased capacity for information systems to direct actions autonomously. Intelligent security measures can reduce, but not eliminate, this vulnerability; their absence makes it glaring.
Militaries are not inclined to trust their success to the fortunes of war. So we must direct our information warfare efforts to more than just targeting an adversary’s information: we must also defend our own information, and all its operations.
.
SO, WHAT COMPRISES INFORMATION WARFARE?
Recalling the definition, information warfare consists of activities that deny, exploit, corrupt, destroy, or protect information. Traditional means of conducting information warfare include psychological operations, electronic warfare, military deception, physical attack, and various security measures.
Psychological Operations use information to affect the enemy’s reasoning.
Electronic Warfare denies accurate information to the enemy.
Military Deception misleads the enemy about our capabilities or intentions.
Physical Destruction can do information warfare by affecting information system elements through the
conversion of stored energy to destructive power. The means of physical attack range from conventional
bombs to electromagnetic pulse weapons.
Security Measures seek to keep the adversary from learning about our military capabilities and intentions.
The Information Age has provided new and practical means to deny, exploit, corrupt, or destroy information, as well as the vulnerabilities to make those attacks possible.
Information Attack: directly corrupting information without visibly changing the physical entity within
which it resides.
Information attack, constrained by the definition of information, is limited to directly altering data or instructions.
It is, therefore, just another means of conducting information warfare, one whose immediate effects do not
include visible changes to the entity within which the information resides. That is to say, after being subjected to information attack, an information function is indistinguishable from its original state except through inspecting its data or instructions.
.
SO, HOW IS INFORMATION ATTACK DIFFERENT?
As previously described, there are two ways to influence the adversary’s information functions :
indirectly
directly
Indirect information warfare affects information by creating phenomena, which the adversary will perceive,
interpret, and act upon. Military deception, physical attack achieved their ends indirectly. For example, the goal of deception is to cause the adversary to make incorrect decisions; deception does this by creating an apparent reality. Generally, this entails creating phenomena for the enemy to observer Success, however, depends on several conditional events : the adversary actually observes the phenomenon, thereby turning it into data; analyses it into the desired information; and acts upon the information in the desired manner.
Direct information warfare affects information through altering its components without relying on the adversary’s powers of perception or interpretation. Information attack acts directly upon the adversary’s information. Since nearly all modem information functions are themselves controlled by information, information attack may be directed against most information functions.
Direct information warfare, the point of information attack, acts on the adversary’s information without relying on the adversary’s collection, analysis, or decision functions. It can short circuit the OODA loop through creating observations and skewing orientation, or decapitate it by imposing decisions and causing actions.
A short illustration will serve to demonstrate the difference between indirect and direct information warfare
applications:
Our goal, using military deception, is to make the adversary think there is a wing of combat aircraft where, in fact, there is none, and act on that information in a manner benefiting our operations.
Indirect information warfare: Using military deception, we could construct fake runways and parking areas, and generate enough other activities to present a convincing image. We rely on the adversary to observe the pseudo combat operation and interpret it as real (as opposed to detecting the fake). Only then does it become the information we want the adversary to have.
Direct information warfare: Conversely, if we use information attack to create the pseudo combat wing in the
adversary’s store of information, the result-deception-is precisely the same. But the means to that result, never mind the resources, time, and uncertainty, are dramatically different.
.
WHAT IS THE OTHER EDGE OF THE INFORMATION WARFARE SWORD?
The defensive side of information warfare security measures aimed at protecting information-prevents an adversary from conducting successful information warfare against our information functions. In contrast, security measures encompass preventing, detecting, and subverting direct information actions on our information functions. Future security measures must evolve as information technology advances. Consequently, new-measures will likely take forms entirely different from today’s security measures, rooted as they are in previous security requirements. As the simple examples in this paper illustrate, we must avoid falling victim to profound, debilitating effects of direct information warfare.
.
In many respects, one can consider information as a realm, just as land, sea, air, and space are realms,
information has its own characteristics of motion, mass, and topography, just as air, space, sea, and land have
their own distinct characteristics. There are strong conceptual parallels between conceiving of air and
information as realms. Before the Wright brothers, air, while it obviously existed, was not a realm suitable for practical, widespread military operations. Similarly, information existed before the Information Age. But the Information Age changed the information realm’s characteristics so that widespread military operations within it became practical.
Information warfare, like air warfare, is the means defined by the environment to execute military missions.
There are three objectives of information warfare :
(I) to control the information realm so we can exploit it while protecting our own military information functions from enemy action
(II) to exploit control of information to employ information warfare against the enemy
(III) to enhance overall force effectiveness by fully developing military information functions.
The first objective of information warfare, to control the realm so we can exploit it while protecting our own
military information functions from enemy action, contributes significantly to controlling the combat environment.
Counter-information : actions dedicated to controlling the information realm.
Counter-information has both offensive and defensive aspects.
Offensive counter-information enables us to use the information realm and impedes the adversary’s use of the
realm. Typical means include physical attack, military deception, psychological operations, electronic warfare,
and information attack. Defensive counter-information includes both active and passive actions to protect
ourselves from the adversary’s information warfare actions. Defensive counter-information is accomplished, for
instance, through physical defense, physical security and counterintelligence.
Successful aerospace control enables us to use the air and space realms without suffering substantial losses,
and inflict substantial losses on the enemy’s use of those realms. Counter-information, working with counter-air
and counter-space, seeks to create such an environment.
The second objective of information warfare is to exploit our control of information. In air warfare’s force
application role, the missions of strategic attack, interdiction, and close air support exploit air control. Similarly, information warfare might also be used to achieve the same ends.
.
Information technology is already tightly woven with our military operations, providing heretofore unimaginable
amounts of information. Exploiting this information has provided us striking capabilities; relying on it inevitably
creates potentially crippling vulnerabilities. This, coupled with advances in the ability -to both locate and destroy command and control nodes makes command and control, more than ever, a lucrative target set. History has shown
successful militaries can achieve striking success through paralyzing the enemy’s ability to exercise command
and control.
.
COMMAND AND CONTROL ATTACK : any action against any element of the enemy’s command and control system.
The third objective of information warfare is to develop information functions to enhance total force
effectiveness. Previously I described military information functions as supporting the employment of military forces. I will include information operations under force enhancement. Some examples of information operations are : surveillance,
reconnaissance, command and control, communications, combat identification, intelligence, precision navigation,
and weather. The distinguishing characteristic of the information operations mission is that it deals primarily with information as both its resource and product.
.
WHAT IS THE RELATIONSHIP BETWEEN INFORMATION WARFARE AND COMMAND AND CONTROL WARFARE?
The focus of information warfare is any information function, whether it is command and control, a refinery’s control system, or a telephone switching station. Command and control represents only part of the gamut of military information functions.
Command and Control : the exercise of authority and direction by a properly designated commander over
assigned forces in the accomplishment of the mission. Command and control warfare only addresses activities directed against the adversary’s ability to direct the disposition and employment of forces, or those which protect the friendly commander’s ability to do so. As we have illustrated, information warfare not only attacks the command and control process, but it also attacks the enemy’s combat power itself. Conversely, by definition, command and control warfare is not associated with reducing or nullifying the ability or desire of combat units to execute their orders. Tactical psychological operations and electronic counter-measures self-protection hinder the ability of units to execute orders. But they in no way affect commanders’ ability to issue orders to those units, nor their ability to receive those orders.
Information warfare, and its attendant organising, training, and equipping issues, is essential to fully effective command and control warfare.
.
Counter information : controlling the information realm.
Command and Control Attack : any action against the enemy’s command and control system.
Information Operations : any action involving the acquisition, transmission, storage, or transformation of
information that enhances the employment of military forces.
Since WW I, airmen have had to control the air environment effectively to employ air power. What is
more, air and space superiority are virtually a sine qua non for employing ground and naval forces. Information is the next realm we must control to operate effectively and with the greatest economy of force.
At the outset we stated the competition for information is as old as human’s first conflict. It involves increasing and protecting our own store of information while limiting and penetrating the adversary’s. The recent explosion in information technologies is prompting the current discussion in and outside government on the topic of information warfare – targeting the enemy’s information functions, while protecting ours, with the intent of degrading his will or capability to fight.
For air force, controlling the combat environment is imperative. With the advances in information technology, air force must pursue information superiority just as they do air and space superiority. Only with these realms under our control can we effectively employ all our combat assets. Military information functions are essential to our combat operations, they are a tool for achieving campaign objectives. Targeting the adversary’s information functions keeps them from achieving theirs.
.
RE : DEFINITIONS
Command and Control Attack : Any action against any element of the enemy’s command and control system.
Command and Control: The exercise of authority and direction by a properly designated commander over
assigned forces in the accomplishment of the mission.
Counter-information : Actions dedicated to controlling the information realm.
Defensive counter-information : Actions protecting our military information functions from the adversary.
Direct Information Warfare : Changing the adversary’s information without involving the intervening perceptive
and analytical functions.
Indirect Information Warfare : Changing the adversary’s information by creating phenomena that the adversary must then observe and analyse.
Information : Data and instructions.
Information Attack : Directly corrupting information without visibly changing the physical entity within which it resides.
Information Function : Any activity involving the acquisition, transmission, storage, or transformation of
information.
Information Operations : Any action involving the acquisition, transmission, storage, or transformation of
information that enhances the employment of military forces.
Information Warfare : Any action to deny, exploit, corrupt, or destroy the adversary’s information and its
functions; protecting ourselves against those actions and exploiting our own military information functions.
Military Information Function : Any information function supporting and enhancing the employment of military forces.
Offensive counter-information : Actions against the adversary’s information functions.
.
Secret Intelligence Service
(C-I) UNIT. London.
MY NOTES in brief for Seminar : DEFINING INFORMATION WEAPONRY. (Not confined to).
26 07 2018 Harrogate
Information operations conjures up a distinctive mental model composed of many elements that exist independently from other forms of warfare. One can list the following :
military deception
counter deception
operations security
electronic warfare (e-attack, protection, support)
information assurance **
physical destruction
psychological operations
counter-propaganda
counter-intelligence
computer network attack and defence
** Note : Information assurance refers to measures intended to protect and defend information and information systems by ensuring their availability, integrity, authenticity, confidentiality and non-repudiation (ability to confirm source of transmission and data). This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
If the goal is to produce a disparity in the adversary’s mind between reality and the perception of reality in order to disrupt the ability to exercise command and control, then information operations is really nothing new. Deception has been doing this for years. The methods are the same, but the means (sensors, satellites, etc.) are very different as well as the precision and speed of destruction involved.
However, information operations really is something new. Today, weaponry does more than just disrupt the ability to conduct command and control via deception or Psyop. Now weaponry can shut down the data processors of both weapons (computer chips) and the mind (neurons). There is more at stake than just deception.
In its purest form, attacks with electrons or leaflets or other means attack equipment and weaponry on the one hand, but also can attack the logic and decision-making ability on the other, That is, there is a huge psychological warfare component of information operations. (Note, there are
information operations against the brain on a daily basis across countries worldwide, especially in advertising and the mass media, where the goal is to influence or persuade).
Less deliberated is another form of an information operation against the brain that employs acoustics (low frequency waves) or ‘other devices’ so to shut down the normal processing of the brain, much like a laser tries to destroy computer chips. One might want to put these operations out of the information operations folder and into ‘non-lethal operations’. Most definitions of Psyop are all about the first, or soft, use of information operations; to influence the logic in someone else’s brain or to use counter-propaganda as an element of defensive Psyop.
Soft Psyop is not the same thing as is protecting the neurons in one’s brain from being fried by a non-lethal device. Data attacks a human’s logic in a soft information Psyop attack, and electronic or non-lethal streams of data attack neurons in the brain in a hard information Psyop attack. Lasers do the same to computer chips, but the latter is more easily identifiable with informaton operations (physical destruction).
What about mental damage / obliteration of the mind?
Well, data processors form the core element, the heart if you like, of sensors, satellites, and computers. Thus, computer network operations and computer network exploitation, or attacks on sensors or satellites, are in reality attacks against data processors. In similar fashion manner, psychological operations, deception, and even ‘non-lethal operations’ are directed against the data processor one refers to as the mind, the brain, the CNS, capacity for consciousness, call it what you like.
Psyop and deception have reached new levels of effectiveness, in that morphed images, and other virtual representations of reality now have the capacity to influence people just as leaflets and loudspeakers once did (not so long ago).
‘Non-lethal weaponry’, such as acoustics or ****** (omitted), low frequency waves – is capable of momentarily shutting down the brain altogether. ‘Non-lethals’ can be
described as’ soft influence means’ (leaflets, ‘soft attacks’) and / or incapacitating and even debilitating (hard attack) means.
‘Non-lethals’ are in a separate category for consideration.
People tend to ignore the fact that the mind has no defensive firewall (although any some would argue this, because to accept it is disturbing to them).
The emphasis on networks and pieces of equipment misses the most exposed computer / data-processor on the battlefield or indeed, anywhere – the human head. Psyop and military deception are the only elements of those accredited to information operations that are concerned with the human information security feature – logic.
A non-lethal substance is much more stealthy (some would accuse insidious) – it attempts to alter or destroy altogether the functioning of the brain’s neuronal structure, just as an electron stream or laser beam attacks the data-processor (computer chip).
One might underline the importance of the mind and its implications for future warfare scenarios.
One should (as we shall in due course) consider neural pharmacology more in seminar, and the new classes of pharmacologic agents available. These drugs mimic natural chemicals inside people, not only confined to behaviour-modifying and performance-enhancing characteristics. A future intelligence problem is going to be knowing what pharmacologic agents other people are unwittingly on? Question.
Thus the data processor, possessed by both equipment (computer chips) and humans (neurons), is the actual centre of gravity of future attacks. It might be soft attacks on logic or hard attacks on chips or neurons.
Many are neither accustomed to, nor do they put ‘non-lethals’ into the information operations paradigm as a result. Physical destruction appears to have a comfort level of acceptance, but total mental destruction does not. Interesting!
Further, the human is always the interface between the input and output of data processing. The mind must not only ward off deception and acoustic attacks made against it, it must also interpret what is downloaded from a computer or satellite, and what is acquired by counter-intelligence means (for example, via HUMINT, SIGINT operations, or developed via counter-propaganda operations). Equipment can produce false outputs that the human interface must process, analyse, and interpret. Once again, the focus is on a human’s ability to use proper logic so to arrive at the proper conclusion. The computer-operator or machine-mind interface is one of the centres of gravity that people seldom mention.
Efforts to link brains and computers could result in, enhanced perception and communications, and might make one smarter. Knocking out or manipulating the organiser and distributor of data, the data processor, is the focus of the paradigm. The data processor is the objective.
As a consequence, it would be more pertinent to place data-processor wars at the top of the hierarchy of the concept, and to position information as a sub-element, a means to influence the data processor.
Attacks on computers or the mind, whether electronic, laser, or ‘other’, are designed not to attack information but rather to disable, manipulate or destroy the data processor. In the case of a sensor, satellite, electronic warfare platform, or a computer, it is an attack on ones and zeros of computer-based language, or on the computer chip itself.
With regards to humans, requisite special light or low frequencies that induce photoelectric epilepsy, or other forms of debilitating ****** (omitted) that attack the actual functioning of a human’s data processor – the brain, are the areas of interest and we will expand on these more (ref; see website).
.
Secret Intelligence Service
(C-I) UNIT
Seminar : Harrogate. 26 07 2018
Topic : DEFINING INFORMATION WEAPONRY – DISCUSS
So, the term information war has helped describe one aspect of the unfolding revolution in military affairs 1990s – 2000, or thereabouts. Now however, technological developments are integrating the data processing capabilities of machines and the mind in ways not possible two decades ago or even one for that matter. As a result, the older information war paradigm may no longer be applicable, making other potential paradigms and terms worthy of our consideration. As the future becomes reality, it will be interesting to see if we use information war or an altogether new term to express a threat to the security of the United Kingdom, a category of warfare, a method of defence or influence, or leave the concept as a conceptual umbrella to cover a host of terms. Or, will we simply update information war theory, perhaps developing information / mind-machine concepts that complement information war…….
Information War : >> “open and declared armed hostile conflict by nations or states that utilise information or information-based systems and processes to attack our human or system processors.” <<
An odd question to consider, does information actually go to war against other information? If the answer is no (most would say yes), then it casts doubt on the idea of information war. Data or electron streams can be directed against one another to collide or interfere or influence movement, but they are not in open and declared armed conflict. Electrons might collide with other electrons, laser beams may try to destroy computer chips, and directed energy beams may try to destroy satellites. But this is not information war.
Perhaps it could be called beam confrontation, or electron stream conflict where computer chips and other data-processing elements are the objectives of attack. However, this is a contentious point but perhaps worthy of consideration.
There are several nations, such as the Russian Federation and the PRC who define other information-related issues. These include terms such as information weapons and information-psychological actions. There appears to be a long-term unwritten policy in military circles across NATO not to define an information weapon. Yet much of today’s weaponry is loaded with computer chips and other information technology, the cornerstones of the information age. The Russians define information weapons in great depth and specificity. They pose the question; how can one have an information war if one does not have information weapons? Can we have tank warfare without tanks? This term and others might, in addition, be worthy of future consideration.
One of the greatest strengths of any armed forces is its ability to learn (take) from other armed forces (for example, studying and then adapting the term operational art from Soviet theoreticians). Perhaps now is the time to examine/data-mine foreign information operations theory for some of the ideas that they are developing, and see if they are applicable to our own paradigm…..
Secret Intelligence Service
(C-I) UNIT
Seminar : Harrogate. 26 07 2018
Topic : DEFINING INFORMATION WEAPONRY – DISCUSS
.
Secret Intelligence Service
(C-I) UNIT
London
This is for discussion at the next seminar. I mean, this is the ideal situation mapped, but is it adhered to, or even plausible? If not plausible, what parts is it not, and why?
22 07 2018. Harrogate
.
THE LIMITATIONS OF MIND WAR (II)
Because of new technology and global media, there is an ever increasing overlap of information between public affairs and psychological operations.
The public affairs mission has shifted from delivering specific products (newspapers and radio / TV) to the processing of themes and complex manipulative messages. This refocus has made it crucial that public affairs, psychological operations, and public diplomacy, as well as other elements of information operations, be fully integrated and coordinated.
Public information, both domestic and international, has to be consistent on all levels so to preserve the credibility of each instrument. Although psychological operations, public affairs, and public diplomacy messages may intrinsically differ, >> it is very important that they do not contradict one another. <<
Secret Intelligence Service
(C-I) UNIT
London
This is for discussion at the next seminar. I mean, this is the ideal situation mapped, but is it adhered to, or even plausible? If not plausible, what parts is it not, and why?
22 07 2018. Harrogate
THE LIMITATIONS OF MIND WAR (II)
Secret Intelligence Service
(C-I) UNIT. London
21 07 2018
From our discussion : ON THE LIMITATIONS OF MIND WAR. (Harrogate)
As aforestated, psychological operations convey selected information to foreign audiences. A key mission is; serving as the voice of supported senior officers, political decision makers, other officers, forces, and civilian populations, as well as sources of external support – so to influence their emotions, motives, and objective reasoning, convey intent, and affect behaviour.
It is axiomatic therefore, that every theme and every objective reflect and support UK national policy, and thus informational programmes must be and are integrated into all international information programmes so to ensure consistent, complementary messages.
There is renewed fascination for employing coordinated information programmes (including military psychological operations), for three convincing reasons, and which are :
(I) There is a politically motivated effort to prevent escalation by a potential adversary toward violent / physical resolution of differences.
(II) Because of the internet and other communications technologies, it is almost impossible for governments to regulate the flow of information across borders, thus making target audiences more accessible to psyop messages.
(III) The growing world trend toward urbanisation, particularly in the third world, makes the use of overwhelmingly effective weapons on battlefields brimming with non-combatants far less than satisfactory. Besides, all these lessons have been learned and applied by potential enemies.
Secret Intelligence Service
(C-I) UNIT. London
21 07 2018
From our discussion : ON THE LIMITATIONS OF MIND WAR. (Harrogate)
.
25 07 2018
Notes from Discussion. Unit
.
Secret Intelligence Service
(C-I) UNIT. 12 09 2018. Harrogate
Seminar Topic (No.I) :
.
UNDERSTANDING CHINESE APPROACHES IN PSYCHOLOGICAL WARFARE
.
An Eastern definition of psychological warfare is as a kind of propaganda, as persuasion that utilises real force as its foundation. Accordingly such an approach can use political, economic, scientific, military, diplomatic, ideological or cultural factors so to change an opponent’s national will, or to influence and change an opponent’s belief in, attitude toward, or hostility toward a population, toward organisations, or toward military and government agencies.
One can stress the need for utilising power and intimidation as key psychological warfare tools. Regarding the importance of psychological warfare, there is a dictum; “You may not be interested in psychological warfare, but psychological warfare is interested in you.”
What do you think?
Psychological warfare is also the exploration and study of the psychological quality of the thinking practiced by a nation’s strategic leadership. To the Chinese, psychological quality includes the aspects of psychological attainments and psychological character. Psychological attainments primarily reflect the level at which a person grasps and understands psychology. Psychological character is the individual human aspect, primarily the psychological character that an individual has already formed or is developing; e.g., an individual’s intellect, temperament, disposition, emotions and will.
Such Eastern psychological attainments are developed through education in both dialectical materialism and historical materialism, and through the influence and enlightening effects of Eastern culture. This applies particularly to strategic thought, in which how one thinks is the key element and the most valuable quality.
In the end, the most important battles of modern psychological war will be fought over values. The superpowers, are indeed using armed force to impose value systems on other people, for example when politicians have used the idea that human rights are greater than sovereign rights.
After 50 years of Marxism, western culture has entered China. Foreign culture has constantly infiltrated China in the form of weapons and then at the mental and conceptual level. In particular, the value system of Western culture, with the idea of individualism at the core, a decadent lifestyle if you like, based upon materialism, and a concept of gain or benefit in interpersonal relations, has produced a profound effect on certain people’s values.
Looking at it from a slightly different perspective; psychological warfare theory is a field of study that serves both as the point of intersection and as the boundary line between psychology and the study of strategy and tactics. In psychological warfare theory therefore has a psychological foundation as well as an ideological/theoretical foundation. The latter foundation is determined by national characteristics, but the former foundation is more constant. Psychological warfare strategy is a psychological embodiment of the orientation of a country’s national and military strategies.
One can define psychological warfare as a multi-level activity employed at the strategic, operational and tactical levels. The targets of psychological warfare is national will, the state of social awareness, cultural traditions, a nation’s economic pulse, an opponent’s public sentiment, the tendencies of popular will, military morale, and the opponent’s various social groups, classes and strata.
Because of the increased use of information technology, the number of people who are subjected to psychological war is greater than ever before.
The increase in psychological warfare targets requires the development of a kind of people’s war defence mentality – – focusing on values and defining a system of values as a system of psychological tendencies used so to discriminate between good and bad. A system of values also provides the basis by which a person recognises the correct way of thinking and acting. The highest strategic objective in psychological warfare is thus achieved by changing a country’s fundamental social concepts and its society’s sense of values.
In this regard, the West uses a system of values (democracy, freedom, human rights and so on) in a long-term attack on socialist countries. The West used the ideas of democracy and human rights to undermine the communist party in the USSR, and intends to use the same rationale for interfering in China’s internal affairs. The strategy is to attack political, moral, social and cultural values in target countries.
A key aspect of conducting psychological warfare is to understand the psychological characteristics of an opponent’s strategic leadership and to conduct psychological attacks against them.
The differences in Eastern and Western minds; so to highlight East/West variances both in the characteristics and in the laws of psychological warfare – differences in environment, cultural traditions, political systems, economic strength, national defence capability and national spiritual belief has lead to a great distinction in various nations in subjective cognition, ideological basis, principles of applications and structure of organisation of psychological warfare.
Even though China is a socialist country, the Marxist theory of war provides the theoretical basis for Chinese psychological warfare and gives Chinese psychological warfare its ‘advanced, moral, open and unified nature’.
Marxist theory regarding proletarian strategy and tactics was one of Mao Zedong’s weapons during the Chinese revolution. And even though psychological warfare is characterised by active defence, China’s approach emphasises psychological attacks and the use of stratagems, particularly the use of deception activities.
Marxist theory opposes peaceful evolution, which is the basic Western tactic for subverting socialist countries. Peaceful evolution is the process that caused the disintegration of the USSR, and the Chinese are determined that peaceful evolution will not take place in China.
Mao Zedong developed a theory and a complete set of tactics designed to counter the Western strategy.
In ‘On Defense in Modern Psychological Warfare,’ author Li, Wang emphasises that China must take the initiative in psychological warfare defence because psychological security is now an important aspect of national security. Information and psychological factors are now political and diplomatic weapons, and their power cannot be ignored. Psychological warfare requires a low investment; it involves low risk; and it is highly effective. The greater the amount of information that is available to a population, the more room there will be for psychological warfare. Any corner into which information can spread can become a battlefield for psychological warfare. China will establish the strategic idea of an active psychological warfare defence. Active defence including the tempering of minds of the Chinese people by inoculation, thus allowing the population to come into contact with other ideas and, through education and guidance, allowing them to see what is wrong with those ideas. This approach allows people to develop psychological immunity.
Opening their minds up to other ideas is not the same as cutting them loose. The main form of psychological warfare will be competing for public opinion. To be able to seize public opinion, China has developed its own independent information and media power, guiding public opinion, and the conducting of public opinion propaganda. The demand for information is a universal psychological need. Passive psychological defence cannot suffice. With initiative and offense China has taken the strategic initiative with regard to public opinion.
Propaganda prepared in advance, to include material designed to counter the attacks to be made against the initial release of propaganda.
The importance of attaining media superiority and of controlling the negative effects of media coverage :
Media control is one of the front lines in psychological wars. News broadcasts and computer technology allow people to watch a battle in progress, as they would watch a sporting event. An event that might have been known to only a few people in the past can now be witnessed by millions. Such access to information affects public sentiment and morale. China accuses the West of fulfilling its hegemonic wishes by manipulating public opinion, by attaining media superiority, and by guiding people’s psychological tendencies.
Yet all Chinese approaches are what the Chinese are proud to claim elsewhere as their heritage; i.e,; ‘Focus on Psychological War Against the Background of Grand Strategy,’ intimidation being a key strategy that can be used to influence both public opinion and the media. In fact, psychological war and intimidation are so difficult to tell apart that they are almost twins. Intimidation is both a strategy and a method. Now the use of nonviolent intimidation, which includes alliances, media manipulation, economic sanctions, financial attack, information isolation and network attacks, have increased manifold.
The U.S. according to the Chinese uses its advantage of power as the foundation of psychological war, employing arms displays, arms sales, and military exercises as intimidation.
In response, China has implemented its own intimidation psychological war plan that includes Chinese threat forces and mechanisms, and intimidation psychological war strategy.
China has developed an elite and effective military intimidation force, fully applying all kinds of nonmilitary intimidation methods, establish a psychological intimidation mechanism that has strategic maneuvering at its core, and organising and applying all kinds of psychological intimidation factors, thus developing the greatest psychological intimidation effect. Intimidation established on the foundation of power; because without power,intimidation is hollow.
Strategy
Strategy is fundamental, and mapping out a strategy is the most traditional Chinese characteristic of psychological warfare. Mapping out the strategy is followed by attacking an opponent’s alliances, attacking their army, and attacking their cities — in that order. The best strategy is to attack the enemy’s mind, leaving them unable to plan. Strategy can create psychological misperceptions that will cause one side to remain unprepared. The prepared side can then win without fighting. In a more narrow sense, the use of strategy may be seen in demonstrations and feints that surprise the enemy by hitting them where they are unprepared.
Major differences between China and the West :
Regarding the strategic starting points and the orientation of psychological warfare. By strategic starting points, the is meant psychological warfare’s nature, objectives and factors for victory. China looks at psychological warfare as a method of spreading truth and justice, of trying to win people’s minds and of exposing an enemy’s plot to confuse, corrupt or penetrate China’s mental space. The West according to the Chinese, views psychological warfare as a way of promoting its hegemonic strategy, designed to create turmoil and division within other countries. (Obviously many might disagree.)
Regarding the orientation of China’s psychological warfare strategy, one can list two strategic orientations : offensive and defensive. The orientations differ in their roles, in their employment, and in the structure of their deployment. China will continue to combine offence with defence, and use offence for defence (so to shift from passive to active modes and expand room for maneuver).
From this perspective,demonstrations and shows of force are the basic strategic methods of conducting psychological operations. Demonstrations were used in ancient times, as detailed in the ‘Thirty Six Stratagems of War,’ a collection of Chinese proverbs and instructions for winning at war. A demonstration is an attack that exploits strengths and weaknesses, and its objective is to take the enemy by surprise. One may exploit strengths and weaknesses by appearing to be strong when one is weak, or by appearng to be weak when one is strong.
In short, demonstrations are a way of getting friendly and enemy forces to interact psychologically. Demonstrations are also a form of deterrence, which is another psychological-warfare concept. Demonstrations establish credibility and fear, two of the three elements of deterrence theory (reliability is the third).
Strategy’s essence is thinking, and the quality of one’s thinking determines the quality of one’s strategy. Strategic thinking is a ‘big screen’, integrated method of thought, a bird’s-eye-view way of thinking. It is anticipatory, realistic and response oriented, and it is a kind of rational thinking.
Information technology
Information technology has made it possible for psychological warfare to become both a strategic resource and a method, and psychological specialists in China as in the West are exploiting many information era technologies. For example, future military attacks will be (are) combined with attacks on electronic technology, virtual reality can plant false information into an enemy’s command information system, creating gross mis-perceptions among commanders; and network intruders are able to penetrate terminals on the network, executing an all-directional psychological attack.
In the current era the vast development in information science, psychology, the science of broadcasting, and other sciences, and in particular the emergence of new and high technologies such as satellite communications, massively powerful computers, networking technology, and multimedia technology, provides a firm theoretical foundation and era specific tools for psychological warfare.
Networks are the most important aspect of the technological battle. Network psychological warfare is a topic in psychological warfare defence, but networks are the main psychological warfare battlefield both now and in the future.
Global networks provide more space in which to engage in propaganda. Network data can be put online in secrecy by almost anyone, it is difficult to verify who the providers of network data are and access to information is not subject to restrictions of time or place. Network attacks can throw a nation’s social, political and economic life into chaos, producing a shock effect on people’s minds and leading to political instability. In order to develop network defense, China has developed a ‘network sovereignty’, establishing laws for network activities and established information protection forces. Creating competent forces for information war and psychological warfare will thereby ensure China’s information security and psychological security.
Regarding the impact of information technology, one can list several futuristic (?) ideas for psychological warfare equipment. An intelligent / smart component was recently added to psychological warfare equipment. The intelligent / smart component includes computers used to guide the operating and sensing systems of UAVs. UAVs which can recognise targets, broadcast propaganda and ‘scatter leaflets’ before returning to their base. Such leaflets by the way combine visual, audio and speech elements.There has been developed a method of projecting holographic images high into the clouds. The projections produce a type of illusory psychological warfare by portraying for example, Islamic martyrs, who appear to speak to soldiers from the clouds.
In contemporary wars, the first targets to be attacked are targets with psychological value, such as television, broadcasting and all other communications venues. Destruction of these targets helps cause psychological passivity, panic and eventually, defeat. A good example; Russia underestimated the power of communications during its first war with Chechnya from 1994 – 96. The Chechens were able to exert a major psychological influence on the course and the outcome of the war by utilising the impact of instantaneous field reporting to TV stations. That reporting greatly affected public opinion.
Threats
The threats facing China, can be labeled as hard warfare(high-tech warfare) and soft warfare (psychological warfare designed to westernise or split the country). While the former is the most difficult, the latter could be accomplished in the context of a grand strategy in which psychological warfare plays an increasingly important role in safeguarding national security and in winning high-tech wars.Because psychological war can achieve the greatest number of political benefits and the greatest psychological influence while taking almost no risks, China believes that the U.S. is using a psychological warfare strategy, that of peaceful evolution to enhance the disintegration of socialist countries. As part of that strategy, the U.S. has developed a military force that possesses advanced weapons, and that the U.S. has carried out violent psychological threats toward socialist nations. According to the Chinese, the U.S. has used economics and trade to infiltrate socialist nations and has used personnel exchanges to carry out ideological and cultural psychological infiltration, thereby fostering an anti-socialist force.
According to the Chinese, U.S. psychological warfare undermined the USSR, and they see evidence of a similar threat to China – administrations having a clear strategic goal of containing China.
China is convinced that he U.S. is using religion to weaken the ideology of Marxism. Of course, the greatest psychological warfare threat is the threat of taking control of morale, the foundation stone for vic-tory. Thereare five tactics one can describe for China’s controlling morale:
With a powerful opponent, wait them out;
With an arrogant opponent, show them respect for a long time
With a firm opponent, entice and then seize them
With an evasive opponent, get close to them in front, make noise on his flanks, dig deep ditches and put up high ramparts, and make it hard for them to get provisions
With a weak opponent, make noise to frighten them, jolt them by breaking through, and if they come at you, then attack them, otherwise, fall back
The theory of psychological warfare has tremendous significance and value to China. Chinese theorists are developing (have developed) an updated ideology and strategy of psychological warfare, one that does focus on intimidation and on exploiting the differences between Eastern and Western mentalities. This more than implies that China has established a command structure for psychological warfare, as well as the creation special units that are attempting and succeeding in overcoming past Chinese inferiority in high-tech weapons.
Chinese theorists believe that because modern psychological warfare can help ensure stability and shape national security thinking, it is more applicable in peace than in war.
Chinese leaders have developed a psychological warfare system that integrates specialised and non-specialised personnel, and that emphasises China’s special characteristics.
China has established a psychological warfare coordination agency at the national level which provides guidance and coordination for national psychological warfare actions.
China has established a psychological warfare command agency, under the unified leadership of the Central Military Commission and the party committee.
China has established psychological warfare scientific research agencies of all kinds so to guide the work nationally and in the military.
China has established a specialised psychological warfare corps very effectively forming a consolidated and effective psychological attack force.
China has developed an ultra modernised basis for psychological-warfare material and technical equipment.
China has formed a people’s psychological warfare mentality by developing psychological-warfare education for the masses and for all commanders in the military.
Whatever China’s weaknesses were in the past, for example; in regard to equipment, materials and technical content, it has now develop an ultra-force that combines its mass-action strength with a specialised structure for psychological warfare.
China sees the U.S as its major psychological warfare threat, that the U.S. objective is to gain benefits from the Chinese consumer market and to maintain long-term politica and psychological pressure on China. The U.S. will accomplish that objective by attacking China’s national self-respect and by compelling China to do what the U.S.asks.
Chinese psychological acceptance of socialism depends on China’s comprehensive national strength and on the level of progress that the social system achieves in economic development and in socialist awakening. One cannot believe that the foreign moon is rounder than that of China, for this is defeatist psychology. Conviction in the correctness of one’s own system is what works, and that is what is required.
China is unlikely to waver from the main characteristics of its psychological-warfare doctrine, which is a strong
reliance on the use of war experience, deep cultural roots, the influence of Marxist materialist dialectics and the role of strategic deception.
China will continue using power projection as a means of achieving success in influencing the activities of foreign nations. The centralised leadership system will continue to exert control over the news, propaganda and public opinion.
Importantly, and it is contentious, Chinese theorists think strategically in a way that few foreigners do.
We must learn to predict Chinese psychological warfare strategy during the coming years.
(C-III)
Secret Intelligence Service
.
Secret Intelligence Service
Addendum : Chinese Approaches – Psychological Operations
In order to obtain a rich picture of who is under scrutiny it is necessary / advantageous to wander within the collective mind – how people consider where they are, or a representative part. From various sources, the following is taken direct from the mouths of people and at various places in the hierarchy as it presents. Obviously a useful source is via the media – CGTN, Xinhua, China Daily to name a few. But what people say, their reacting while not under any spotlight and getting to the point straight away is better, though it has to be said that much detail is omitted this way :
.
China’s national constitution – Its latest version was guided by the Western free marketeer, Deng Xiaoping, in 1982. It is a defiant, principled, anti-capitalist, anti-colonial and anti-imperial manifesto.
The flag of the People’s Republic of China has five gold stars on a red background. The solid red stands for communism stretching across the entire nation. The big gold star represents the CPC. The four smaller gold stars in the CPC’s orbit stand for the working class, the agrarian class, the small business class and the big business class. During the Mao Era, workers and farmers were favoured over the two entrepreneurial classes. After Mao, Deng and all subsequent leaders have promoted the last two classes back into China’s economy, along with heavy support for urban workers and rural folk, so to create the wealth needed for rich communism. The CPC has affinity its citizens’ entrepreneurial spirit, with the employment and economic activity it generates for the masses.
On the ground, every square centimetre of China is publicly owned. No one can own real estate, only private property. Every bank, insurance company, airline, railway, subway system, port, airport and all (toll) roads and highways belong to the people. All media, phone companies, water, gas, electricity and nuclear utilities are people-owned. Beijing dominates over 100 key sectors of the economy, including chemicals, maritime shipping, agricultural commodities, precious metals, auto and truck manufacturing, steel, mining, construction, aerospace and avionics. The list goes on and on. Public real estate and massive state participation in key industries are what Marxists refer to as controlling the means of production. Some of these state-owned enterprises have been put on the stock market. The maximum level of private stock ownership is only 30% and consolidated control of those shares is prevented.
While there are tens of thousands of village and county level SOEs that could be more efficient, from a Western capitalist’s standpoint, they are a bedrock of social and economic stability for the hundreds of millions of citizens who live outside the major metropolitan centres. Beijing is no fool. They are staying on the books, with tweaks, reforms and consolidation, so that Chinese society remains harmonious and overall, prosperous for the masses.
But the bigger the SOEs get, the more profitable and well run they become. Few Westerners know that China has the world’s largest bank (ICBC) and three more in the Top Ten; two of the five biggest petroleum concerns, the largest railway corporation and some of the world’s biggest airlines, steel, mining, auto manufacturers and so on. As far back as 2015, the ten largest people-owned Chinese businesses made +$200 billion combined after tax profits. These communist corporations are loaded with cash and they are on a buying spree around the world, ironically turning private, Western companies into publicly owned red businesses. Some of the deals are sector changing.
President Xi Jinping is making sure that Beijing and the 1.4 billion citizens of this country live up to the spirit and vision of China’s very inspiring national constitution, as well as the constitution of the Communist Party of China. This, in spite of the adoption of capitalist tools to expand the wealth of the country. He is the Western empire’s worst nightmare and just what the doctor ordered, after a generation of sociocultural westernisation.
As far as claims of widespread, massive corruption of state-party officials, if this were true to the depth that is suggested, one must ask how did China’s economy grow almost 7% per annum, 1949-1978 and nearly 10% per year, since then? If true, how has Beijing lifted a billion people out of poverty, created the largest and fastest growing middle class on the planet, not to mention recently, a new billionaire every week? If so, then why is Beijing, for the last 15 years and continues to do so, garnering +80% public satisfaction levels, in polls conducted by Western companies such as Gallup and Pew? It is the world’s most popular government among the world’s citizens.
China views (via counter-propaganda) the relentless reports in the Western media regarding massive corruption as being a classic strategy so to deflect attention away from the quote; ‘fetid, venal swamps of personal, moral and financial turpitude that is oozing out of almost every corporation and political institution in Washington, New York, London, Paris, Brussels.’
Of course there is corruption as there is everywhere that civilization has existed for the last 8,000 years. In China, hundreds of thousands of government and business folk are being punished, from fines, to loss of jobs, to hard prison time and for the most felonious, executions. One does not want to be a corporate or political criminal in China.
As far as attacking poverty, it went out of fashion during the West with the Reagan / Thatcher era, which rapidly spread over much of the world, except in communist countries, such as China, Cuba, North Korea and Eritrea, and later in Latin America. Each time Xi Jinping returns from a successful overseas diplomatic trip, he will invariably appear on national TV, CGTN, Xinhua, showing them visiting less developed areas of China and touting the socialist moral responsibility to redistribute the people’s wealth to bring the most unfortunate of the economy to an adequate level of respectability and productivity. Beijing has earmarked ¥400 billion (about $65 billion) to make it happen, before 2020.
Chinese government officials often refer to income inequality and the GINI index. That throughout the annals of history, no government can last long, if the wealth of a nation is not fairly shared by all. When China’s GINI index hit 0.45 in 2012 (it was about 0.15 during the Mao Era), Beijing was apoplectic and immediately began significant changes, with more progressive taxes, social benefits (rolling out universal health care and guaranteed retirement income) and people oriented infrastructure (rest homes, community centres, clinics, hospitals, low income housing). Xi Jinping referred to the GINI index during his address for the G-20 summit September 4-5, warning that the current global level of 0.70 and climbing, bodes ill for the human race. As poverty elimination, no other G-20 leader appears to mention the perils of a high GINI index, except Beijing.
>Westerners hear what they want to hear, when Beijing talks about structural reforms and supply side economics. They are deluded that it means privatising real estate and selling off all the SOEs to Goldman Sachs at fire sale prices. As long as the CPC is in power, this will never happen. Reforms and policy will remain within the communist framework.
Every CEO, the boards of directors, VPs, department and division managers in China’s SOEs are ardent members of the CPC and if they hope to keep their jobs, they have to run a tight ship, while remaining loyal to the national and Party constitutions. The vast majority have spent decades emerging through the ranks, beginning at village, then county, provincial, regional and finally national level business management. Xi Jinping and the vast majority of China’s upper level politicians came up the same way, but on the government side, not business. China views its managers as being far and away superior, since their first goal is to help Beijing maintain social stability and popular harmony. Profit is expected, but comes second. China views Western businesses (particularly in the US) as not having those kinds of weighty socio-economic responsibilities, rather and on the contraryt, their only goal is maximum profit and discarding of the human condition.
China’s banks are used to carry more bad debt than in the West. Throwing someone on the street for being late in their mortgage payments is a desperate move. Struggling small and medium sized businesses are not sold at bank auction just because they hit a rough patch. China’s people-owned banks work with their clients to avoid, as long as possible, the social disruption of a foreclosed family home or small business. It happens all the time, but only as a last resort.
>There are no slums in China. There is a huge, 300 million floating population that moves from city to city for low level jobs, as construction, restaurant and sanitation workers. They lead a hard life on the road, living in temporary quarters, doing manual labour and not being settled. They are gainfully employed, not starving, nor are they undernourished, like how China sees so many millions now in the West. There are a handful of beggars, mostly handicapped, but given the population of China’s cities, they are a zillionth of a percent. There are the now well-known 72 million Chinese who live in extreme poverty and who are targeted by Beijing to be lifted out of their current fate by 2020.
Westerners don’t like to hear it but China does not have the many social and economic cancers and terrible inequality like the West, because it is communist. Or, if it’s easier for Westerners to swallow, they can call it socialism with Chinese characteristics. China is working furiously to eliminate poverty in the coming years because it is communist.
.
Secret Intelligence Service
(C-I) UNIT. 12 09 2018. Harrogate
Seminar Topic (No. II) :
.
UNDERSTANDING CHINESE APPROACHES IN PSYCHOLOGICAL WARFARE
(II)
Mao Tse-tung instructed, “To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds.” Aspects of IW—PSYOP, Denial, and Deception—that China believes provides the greatest prospects for victory in a conflict. Not surprisingly, Sun Tzu is interwoven into this emerging theory. Targeting the enemy at all levels, that is, the ability to gather and assess information and then transmit orders, provides significant advantages. Targeting the enemy’s homeland defences and its citizens can potentially end a war before it even starts.
Is the extent of Chinese advances or intent regarding information warfare is difficult to ascertain given its still closed society?
China has demonstrated an intense fascination with information warfare. The potential advances in Chinese information warfare doctrine and capabilities have direct implications for U.K. national security. The ability of China to conduct information warfare against the UK during peacetime, confrontation, or conflict could pose severe challenges. Working from this premise, China’s approaches to information warfare must be fully understood. This made more germane, because of the secrecy surrounding China’s military programmes in general and the more than embryonic stage of development in information warfare.
We should increasingly explore Chinese perspectives of information warfare via a sampling of the open literature circulating in China. Thus to provide a preliminary assessment of Chinese writings and analysis.
Information warfare has emerged as a subject of great interest in Chinese discourse. The intense discussions and debates within China’s defence community show that Beijing has harnessed the political will to devote substantial resources to developing information warfare doctrines and capabilities. China’s potential ability to leverage the information revolution accompanied by its incalculably fast rise as a major power has one can say
China might succeed in becoming the global leader in information warfare.
China’s appreciation for the centrality of information as a tool of statecraft and military power has significant
implications. Given the tremendous advances in information technologies both in terms of the rate of
innovation and quality of improvements, China is well positioned to exploit this revolution. Just as China’s
rapid developments in nuclear weapons, ballistic missiles, AI, robotics, and space programmes,
the Chinese have similarly come to the forefront in information warfare. More importantly, China’s focus on information warfare presents a daunting challenge for NATO defence planners.
In recent years, the Chinese have demonstrated a voracious appetite for examining information warfare. Arguably, only the
U.K., United States and Russia rival China’s analytical work.
The ‘exotic’ concepts and capabilities of information warfare have captivated the imagination of Chinese futurists and military strategists.
Recap : At the core of information warfare is information. Information guides decision making in peacetime and during war at the strategic (a decision to declare war), operational (a decision to move a division of forces forward for an attack), or tactical (a decision to order an aircraft to engage) levels. These decisions in turn trigger action. The purpose of information warfare is to affect the adversary’s decision making process and associated actions to one’s own advantage. The outcome for the enemy can be wrong decisions, late decisions, or no decisions at all. This enables the attacker to control the opponent or, failing that, to prevent the adversary from carrying out a decision. To succeed in information warfare, one must achieve information superiority over the enemy.
Information superiority : the capability to collect, process, and disseminate an uninterrupted flow of information, while exploiting or denying an adversary’s ability to do the same.
Information superiority as we have said requires both offensive and defensive components.
Information superiority is simply understood as an imbalance in one’s favour in the information domain.
Recap : supports
Physical Attack/Destruction: The use of kinetic force, such as cruise missiles, to inflict damage on enemy systems or personnel sufficient to render them unusable. This type of information warfare can be used defensively to prevent the adversary from using offensive information warfare.
Electronic Warfare : The control of the electromagnetic spectrum to undermine the enemy’s electronic warfare capabilities through electromagnetic energy, directed energy, and anti-radiation weapons.
Computer Network Attack : The use of computers and telecommunications equipment to disrupt, deny, degrade, and destroy enemy computers, computer networks, and the information being transmitted.
Military Deception: The manipulation, distortion, and falsification of information to mislead or deceive the adversary’s military command, thereby forcing the enemy to act (or not act) to its own disadvantage.
Psychological Operations (PSYOP): The use of communications (such as propaganda) and actions intended to mislead to influence the perceptions, motives, and emotions of the enemy.
Operations Security : Security measures that prevent the enemy from collecting or analysing information that may be useful to it.
Past studies now out of date suggested that the differences between Chinese and NATO information warfare., NATO. tends to focus on the Computer network attack aspect of information warfare, while the Chinese take a more broad perspective, emphasising supports such as PSYOP, Denial, and Deception.”
Clearly, more data and continued observation of Chinese developments are required. Analysis nevertheless does highlight the potential utility of comparative analysis for better understanding Chinese thinking on IW.
What explains China’s intense interest in information warfare? At the broadest level, the Chinese have clearly realised the implications of the information revolution. First, China recognised the importance of technology and the growing power of information in the era of globalisation and interdependence.
Second, China aspired and still does to become the major political and economic player in a global community where information power retains a critical place in dictating interstate relations. Given that economic development remains China’s highest national priority, China’s integration into the information-based international economic system has in turn magnified the appeal of information.
Importantly the Chinese believe that, as China increases its comprehensive national power, the world will eventually shift from a unipolar to a multipolar stance, in which China will be leader.
In a hypothetical confrontation between China and NATO, information warfare provides Beijing with the capacity to reach directly into the UK and homeland.
The Chinese would attack vulnerable critical infrastructures in the so to influence and /or manipulate domestic public perceptions and, in turn, weaken political will to intervene or fight. This need to leverage weakness in order to defeat a superior foe, a central and still influential philosophy of Mao Zedong’s people’s war concept, has a very significant place among Chinese thinkers.
Many Chinese believe that information warfare is one of the few technological arenas where the contest for supremacy among the great powers remains undetermined. By exploiting and leading the information revolution, China can (and has) leapfrog generations of obsolescent technologies in order to surpass all others.
Chinese strategists has capitalised on the integrative powers of information technologies so to improve the performance of existing equipment without incurring prohibitive expenses.
While information processing power has accelerated, the costs per unit capacity have plummeted at an exponential rate.
This proposition holds true for specific items and capabilities. The costs of systems or architectures that support the war fighting end of the military force have risen exponentially relative to conventional military items. Even as the per-bit cost of data processing has fallen by significant factors the cost of command systems has risen so much that it is threatening to swallow up entire defense budgets. Given the issue of significantly rising costs, the dilemma is likely to become even more important in the future.
Similarly, the pace of Chinese development in information warfare has largely adhered to the costs of IW capabilities that Beijing has exploited, eg.,Reconnaissance satellites and the associated support systems, requiring very substantial and sustained financial commitments.
Past conflicts have highlighted the growing centrality of information warfare.
The high-tech weaponry (supported by sophisticated information systems) and the wholesale destruction of advanced weapons shocked and galvanized military leaderships not just in China.
Interestingly, many Chinese have tried to express their views by applying or comparing Sun Tzu’s Art of War to IW. These efforts to adopt information warfare by finding new expression in strategic tradition has had profound influences on how the Chinese have approached information warfare.
The new military revolution worldwide is a prominent feature of the international security situation. It involves such fields as military thinking, military strategy, operational doctrine, military organisation, and arms development.
There has been an overall qualitative leap in the military field of all countries, the possession by the military forces of high-quality personnel, integrated systems, high-level training and education, intelligent / smart arms, scientific organisation, and creative military doctrines.
Information technology revolution has been the core and foundation of military revolution, because information and knowledge have changed the previous practice of measuring military strength by simply counting the number of armoured divisions, air force wings, and aircraft carrier battle groups. Currently one must take into account some invisible forces, such as computing capabilities, communications capacity, and system reliability.
Information technology / data is an indispensable means for better command and communication. Combat between opposing forces is, firstly, between capabilities in gathering, processing, and analysing data.
The ability to decide and to act faster and better than the enemy, a central concept of U.K. information superiority is a prominent aspect of 21st century conflict. In future wars, weapons systems and military units will be increasingly information-intensified.
Information war is a product of the current era and which to a great extent utilises information technology and information ordnance in battle – a networkising of the conflict / battle space, and a new model for a complete contest of time and space. At its core is the fight to control the information battle space, and thereby influence and /or decide victory or obliteration
Consider also information warfare is combat operations within a technological battlespace environment in which both sides use technology / information means, equipment, and / or systems in a rivalry over the power to obtain, control, and use information.
Information warfare is a combat aimed at seizing the battlespace initiative; with digitised units as its essential combat force; the seizure, the control, and the use of information as the main substance, and an array of smart weapons and systems as its major means.
The aim of information warfare in the Chinese literature is information dominance
Chinese information warfare seeks to disrupt the enemy’s decision making process by interfering with an adversary’s ability to obtain, process, transmit, and use information. The paralysis of the opponent’s information system and decision making cycle would, consequently, destroy the adversary’s will to resist or fight on. information warfare would attack an enemy’s command and control systems in order to confuse and / or blind enemy forces.
Chinese approaches broaden IW further. An effective information attack would completely disrupt an adversary’s military operations and therefore preclude the need for a direct military confrontation.
The Chinese have not lost sight of the need to field a kinetic weapons force in tandem with command and control warfare. The winning force enters the battle after already winning the battle. The goal that confrontation of command pursues is to win in strategy, because only by doing so can one win a war and / or prevent a war.
In other words, the side that wins in the struggle for battlefield command determines the outcome of wars.
Information dominance offers the potential to overawe an adversary into surrendering, hence negating the need for physical engagement. This type of psychological intimidation through IW, aimed at scaring the enemy into dropping their swords is deeply entrenched within Sun Tzu’s philosophy. Strategic advantage is a central feature of the Art of War, connoting the release of latent energy – physical and psychological, in order to glide the forces of circumstances to victory.
Consider; In waging information warfare, that the best combat method is to attack by strategy, to obstruct or upset the adversary’s decision making procedure, so as to make the enemy unable to adopt coordinated actions.
>> The main objective of information warfare is to hit the enemy’s cognitive system as well as information system.
In terms of the actual application of force, the salient feature of IW is that high-precision, high-speed, over-the-horizon attacks become its basic fire application pattern and that the non-stylised vital point-styled structural destruction will replace the traditional-stylised conflicts.
An attacker can circumvent the enemy’s solid works they long laboured for and, by way of surgical removal and digital acupoint pressure (selective attacks), launch precision raids to destroy the adversary’s war resources and shatter the will to resist.
Consider; The ability of information warfare can be to seek out and destroy the enemy’s vital points in much more vivid terms.
Information intensified combat methods are like a Chinese fighter with a knowledge of vital body points who can bring an opponent to his/her knees with a minimum of movement. Paralyzing the enemy by attacking the weak link as if hitting his/her acupuncture point in combat. This is suggestive that the Chinese believe a successful attack against vital points would cripple an adversary and negate the need to engage in further combat.
The Chinese have centred on the strategy of disrupting the command and control capabilities of an adversary. Often it is presumed that locating and then successfully attacking an adversary’s centres of gravity is achievable. Interestingly, this concept of crippling the opponent’s ability to act or gain initiative in the battlespace by targeting information systems parallels the notion of ‘information dominance’, which overlays traditional kinetic weaponry as a ‘force multiplier’ (jargon).
Beyond the broad strategies that the Chinese have developed, strategists have also distilled very specific conclusions on how information warfare would be applied in the future
As we have already determined, the Chinese divide information warfareinto two broad categories of offensive and defensive capabilities. In the offense, information warfare seeks to attack directly the enemy’s information systems. This includes the physical destruction and suppression of the enemy’s information operations, such as jamming, weakening, or shutting down the adversary’s command and control.
Chinese systems would be subject to attack as well. Indeed, one can concur that enhancing resistance to interference and heightening defence against physical attacks are critical requirements for Chinese IW.
Defending one’s own platforms and ensuring the normal functioning of command and control have become equally important compared to the offence.
Chinese strategy – both the offensive and defensive elements of information warfare require a robust and effective command and control system. IW and any other type of warfare depend on command and control as the architecture and central nervous system.
One major objective of command and control is to obtain timely information, to understand the enemy and ourselves, and to achieve clarity about our situation with great determination.
As stated hitherto, command and control warfare also seeks to destroy an adversary’s ability to acquire, transmit, process, and use information while protecting one’s own systems in order to achieve information superiority. Command and control systems would coordinate precision strikes and electronic warfare by locating, tracking, attacking, and assessing the damage to enemy targets.
An effective command and control capability requiring a wide range of aimed at increasing the reliability of remote sensing and reconnaissance systems and so on. The 21st century has delivered the use of high-resolution photography in surveillance satellites, combined air-ground early warning systems for guided missiles, infrared detection systems, deep strike surveillance and control planes, and much use of unmanned reconnaissance vehicles (list not exhaustive).
The specific tools of offensive and defensive information warfare include:
(I) physical destruction
(II) dominance of the electromagnetic spectrum
(III) computer network warfare
(IV) psychological manipulation
The following are four main aspects of information warfare :
Precision Strike Warfare. The Chinese envision hard weapons that would physically destroy the enemy’s headquarters, command posts, and command and control facilities. Smart, stealthy, and over-the-horizon weapons would perform precise and clean, deep strikes. The delivery systems include guided and smart bombs, guided artillery shells, smart cruise missiles, and anti-radiation missiles. Sound waves, electric waves, visible light, infrared waves, lasers, and gases would guide the weapon’s sensors and so on.
Electronic Warfare. The Chinese concur that the contest for the electromagnetic spectrum to gain battlefield initiative is a crucial phase of warfare. The objective is to dominate the spectrum while denying the adversary effective use of electronic equipment. For the offence, utilising electronic jamming, electronic deception, directed-energy weapons, and electromagnetic pulse weapons. Hardening of facilities, dispersion, counter-measures, and physical retaliation would constitute the defence.
Computer Network Warfare
The Chinese cover a wide range of technologies and capabilities in computer warfare. Networked computers would digitise / including ‘smartise’ the battlefield, increase the transparency of the battlefield to commanders, and provide real-time data. Computer warfare can manifest itself in more exotic forms such as cyber and hacker wars. Virtual warfare is a means to deceive enemy forces with simulated false commands.
Virtual simulations prepare Chinese forces prior to actual combat.
Psychological Warfare and Deception :
This involves the transmission of information or misinformation to influence the intended audiences’ emotions, mode of thinking, and ultimately their behaviour. Aimed at both the military and public as the audience, psychological warfare exerts pressure and weakens the adversary’s will to carry on. The primary tools include media propaganda (television, www. etc.), leaflet distribution, e-mail, and other forms of communication.
The Chinese have developed and perfected certain technologies, particularly in the areas of remote sensing and reconnaissance – the military utility of photo-electronics. These include the display of clearer imagery; increase in information transmission speed; higher storage densities; miniaturised photo-electronic devices and systems; and the fusion of microwave technologies with photo-electronics.
Remember that the Chinese have airborne and space-based synthetic aperture radar. The system would be used to detect enemy dispositions and to assess battle damage to enemy forces.
Military mapping; remote sensing and navigation satellites; multi-resolution, three-dimensional digitised imagery; and all-weather, real-time reconnaissance capabilities, and so on.
Remote sensing and reconnaissance has been a central component of command and control.
The notion of winning without fighting through superior knowledge is highly appealing as a theoretical concept.
Consider also the tendency to describe information warfare within the vacuum of theory consequently having the effect of exaggerating the power of knowledge.
.
Brief Notes on the Battle-space (Number ONE)
Symmetrical combat, though undeniably important, may become less significant with asymmetrical combat and counter-asymmetrical defence mechanisms being the
issue.
Information superiority is the ability to; collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same.
>> Information alone is insignificant unless we can translate the information into both knowledge and decisions – decisions that enable our personnel to operate precisely, maneuver with freedom, and disable an adversary through sheer speed and essence of uncertainty. <<
Within an asymmetrical structure, it becomes clear that information enables the other functional areas, affording positional advantage and the ability to employ decisive combat power that will compel an adversary to react from a position of disadvantage, or relinquish.
Intended to operate as part of a joint, combined, or multi-national formation ranging from peacekeeping to actual physical war thus providing the U.K. with an array of deployable, agile, versatile, lethal, survivable, and sustainable formations, which are inexpensive and capable of rapidly undoing conditions of human suffering and unwaveringly resolving conflicts.
The underlying premise is to transport decisive land power to a war zone so to prevent or exclude combat. Should combat be necessary, the force would engage with precision fires and maneuvering so to win decisively.
Via these roles and responsibilities, the British Armed Forces’ contribution remains one focused on fighting and winning.
Secret Intelligence Service
(C-IV) Unit
London
14 09 2018
Brief Notes on the Battle-space (Number ONE)
.
Secret Intelligence Service
(C-I) UNIT. London
27 09 2018
The short extract is from an ongoing discussion taking place in various locations and contexts in the United Kingdom, some formal, others not so formal.
(C-I) FIRST : What you have to be aware of is proffering an answer and post mortem proffering reasons for the answer that contain convoluted certainties. It’s a common thing to do because such factors as where one is perceiving an issue from flowers reasoning with a multiplicity of factors born in that origin – the extent to which someone is doing this needs to be taken into consideration. The origin can be a nation state, a micro-culture within and / or individual. It sounds simple, over generalised, but the crux of the matter is that the polarities and the complexities wherein people interact with each other should make for unpredictability as far as perceived answers or outcomes are concerned but often by virtue of how answers are introduced, they do not. Of course, there are those who make a case for not doing this, but when you listen to them, their side taking for example, it ranges from a subtle veneer to being obvious. It’s not necessarily obvious to the person concerned, the owner of the supposed answer.
In a situation where the members are very different, these differences manifest by virtue of what they think, believe, say and behave, we are presented with an enormously difficult task in resolution of conflicts. Sensibly, the ‘resolution’ might only be a palliative, one operative for a short period of time.
Take the growth of radicalism which is a world-wide phenomenon., one whose polarity and magnitude is both in a state of flux because of differences of the members within it, this does not mean to say there not emerging characteristics, the ones we see and react to, because there certainly are. The point being that you have to be careful with ideas which in their formulation claim to scoop up all of the factors, they don’t because they can’t.
SECOND : ‘The Reliability of Information’ (Think about what is being offered, what you consider worth using, what not and what the reasons are for each category. Note the language used to describe) :
Possible – conceivable, could, may, might, perhaps…..
Almost certain – virtually certain, all but certain, highly probable, highly likely, odds (or chances) overwhelming…..
Probable – likely, we believe, we estimate…..
50-50 – chances about even, chances a little better (or less)
than even, improbable, unlikely
Probably not – we believe that . . .not, we estimate that . . not
we doubt, doubtful…..
Almost certainly not – virtually impossible, almost impossible,
some slight chance, highly doubtful….
Secret Intelligence Service
(C-I) UNIT. London
.209 2018
Secret Intelligence Service
(C-I) Unit. London
22 09 2018
INFORMATION SECURITY AND NATIONAL SECURITY
Information security problems create dilemmas; procedures, and concepts as computer warfare, information warfare, information opposition, information weapons, and information terrorism. One way of viewing this and a useful one is that we are referring to ‘opposition in information space.’
Information security problems have created a social security issue in the information sense, by virtue of the interests of social subjects being ‘affected’ by information technologies. This refers to technologies that monitor and regulate the information interaction of people (monitoring phones, correspondence, the Internet, creating data bases on people from bank and sales transactions, and so on – we address this elsewhere), and the technologies that can shape public awareness (mass media technologies, psychotropic weapons, network technologies permitting access to various negative information such as pornography, and computer games that can shape a child’s personality – we cover this elsewhere too).
Thus, there are three main ways that information security impacts U.K. national security (indeed, that of any nation) :
(I) The security of vital state information resources and information systems, counters to which are being actively developed in the U.K. and by countries all over the world.
(II) The predominance of the information approach as the emerging primary scientific method of solving national security problems.
(III) Information can have an impact on a nation or on a person’s social awareness by manipulation of reality or fact, which in turn can have a significant impact on a state’s national security decision-makers.
Secret Intelligence Service
(C-I) Unit. London
22 09 2018
.
The short extract is from an ongoing discussion taking place in various locations and contexts in the United Kingdom, some formal, others not so formal.
(C-I) FIRST : What you have to be aware of is proffering an answer and post mortem proffering reasons for the answer that contain convoluted certainties. It’s a common thing to do because such factors as where one is perceiving an issue from flowers reasoning with a multiplicity of factors born in that origin – the extent to which someone is doing this needs to be taken into consideration. The origin can be a nation state, a micro-culture within and / or individual. It sounds simple, over-generalised, but the crux of the matter is that the polarities and the complexities wherein people interact with each other should make for unpredictability as far as perceived answers or outcomes are concerned but often by virtue of how answers are introduced, they do not. Of course, there are those who make a case for not doing this, but when you listen to them, their side taking for example, it ranges from a subtle veneer to being obvious. It’s not necessarily obvious to the person concerned, the owner of the supposed answer.
In a situation where the members are very different, these differences manifest by virtue of what they think, believe, say and behave, we are presented with an enormously difficult task in resolution of conflicts. Sensibly, the ‘resolution’ might only be a palliative, one operative for a short period of time.
Take the growth of radicalism which is a world-wide phenomenon., one whose polarity and magnitude is both in a state of flux because of differences of the members within it, this does not mean to say there not emerging characteristics, the ones we see and react to, because there certainly are. The point being that you have to be careful with ideas which in their formulation claim to scoop up all of the factors, they don’t because they can’t.
SECOND : ‘The Reliability of Information’ (Think about what is being offered, what you consider worth using, what not and what the reasons are for each category. Note the language used to describe) :
Possible – conceivable, could, may, might, perhaps…..
Almost certain – virtually certain, all but certain, highly probable, highly likely, odds (or chances) overwhelming…..
Probable – likely, we believe, we estimate…..
50-50 – chances about even, chances a little better (or less)
than even, improbable, unlikely
Probably not – we believe that . . .not, we estimate that . . not
we doubt, doubtful…..
Almost certainly not – virtually impossible, almost impossible,
some slight chance, highly doubtful….
Secret Intelligence Service
(C-I) UNIT. London
.
ADDENDUM : An Elementary Way of Introduction
INFORMATION
This question is somewhat elementary, but pivotal. It is NOT possible to discuss information warfare meaningfully without rigorously defining the central concept : INFORMATION.
Information derives from phenomena. Phenomena, observable facts or events, are everything that happens around us. Phenomena must be perceived and interpreted to become information. Information, then, is the result of two facets :
perceived phenomena (data)
the instructions required to interpret that data and give it meaning.
This distinction is important, and easily encompassed by a familiar paradox : If a house falls, but no one was
around to hear it, did it make a noise? The falling house caused pressure waves in the atmosphere, a phenomenon. Noise, the information denoting a falling house, occurs when someone’s ear detects the pressure waves, creating data, and the brain’s instructions manipulate that data into the sound recognisable as a falling house. Within that person’s context, there is no falling house until the person hears (or sees) it.
Phenomena becomes information through observation and analysis. Therefore, information is an abstraction of phenomena. Information is the result of our perceptions and interpretations, regardless of the means. As falling houses make clear, to define information requires only two characteristics :
Information : data and instructions
Note that the definition for information is absolutely distinct from technology. However, what we can do with information, and how fast we can do it, is very dependent on technology. Technology dramatically enhances our observational means, expands and concentrates data storage, and accelerates instruction processing. See the following term that encompass the technology-dependent elements associated with information :
Information Function : any activity involving the acquisition, transmission, storage, or transformation of
information.
For example, the system that tells a machine to stamp sheet panels is performing an information function. The sheet metal press stamping those sheet panels is not.
Quality information is the counter to the fog of war. As mentioned earlier, the commander with better information holds a powerful advantage over an adversary. Military operations make special demands on information functions in seeking to give the commander an information advantage.
Surveillance and reconnaissance are our powers of observation. Intelligence and weather analysis are the bases for orienting observations. We use those bases to command and control
operations, execute and monitor in directing the conflict. Precision navigation enhances mission performance.
Together, these are the kinds of military information functions that enhance all military operations. one One uses the term military information functions to describe force enhancing information functions.
Military Information Function : any information function supporting and enhancing the employment of military forces.
This definition serves to delineate militarily important information functions from the total universe of information functions.
WHAT IS INFORMATION WARFARE?
At the grand strategy level, nations seek to acquire, exploit, and protect information in support of their
objectives. This exploitation and protection can occur in the economic, political, or military arenas. Knowledge of the adversary’s information is a means to enhance our own capabilities, degrade or counteract enemy capabilities, and protect our own assets, including our own information. This is not new of course. The struggle to discover and exploit information began the first time one group of people tried to gain advantage over another.
Information warfare consists of targeting the enemy’s information and information functions, while protecting our own, with the intent of degrading an enemy’s will or capability to fight. Drawing on the definitions of information and information functions, we define information warfare as:
Information Warfare : any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against those actions; and exploiting our own military information functions.
This definition is the basis for the following assertions:
Information warfare is any attack against an information function, regardless of the means. Bombing a telephone switching facility is information warfare. So is destroying the switching facility’s software.
Information warfare is any action to protect our information functions, regardless of the means. Hardening and defending the switching facility against air attack is information warfare. So is using an anti-virus programme to protect the facility’s software.
Information warfare is a means, not an end, in precisely the same manner that air warfare is a means, not an
end. We may use information warfare as a means to conduct strategic attack and prohibition, for example, just as we may use air warfare to conduct strategic attack and prohibition.
Militaries have always tried to gain or affect the information required for an adversary to effectively employ
forces. Past strategies typically relied on measures such as feints and deception to influence decisions by
affecting the decision maker’s perceptions. Because these strategies influenced information through the
perception process, they attacked the enemy’s information indirectly. That is, for deception to be effective, the enemy had to do three things :
to observe the deception
to analyse the deception as reality
to act upon the deception according to the deceiver’s goals
However, modern means of performing information functions give information added vulnerability: direct access and manipulation. Modern technology now permits an adversary to change or create information without relying on observation and interpretation. Here is a short list of modem information system characteristics creating this vulnerability: concentrated storage, access speed, widespread information transmission, and the increased capacity for information systems to direct actions autonomously. Intelligent security measures can reduce, but not eliminate, this vulnerability; their absence makes it glaring.
Militaries are not inclined to trust their success to the fortunes of war. So we must direct our information warfare efforts to more than just targeting an adversary’s information: we must also defend our own information, and all its operations.
WHAT COMPRISES INFORMATION WARFARE?
Recalling the definition, information warfare consists of activities that deny, exploit, corrupt, destroy, or protect information. Traditional means of conducting information warfare include psychological operations, electronic warfare, military deception, physical attack, and various security measures.
Psychological Operations use information to affect the enemy’s reasoning.
Electronic Warfare denies accurate information to the enemy.
Military Deception misleads the enemy about our capabilities or intentions.
Physical Destruction can do information warfare by affecting information system elements through the
conversion of stored energy to destructive power. The means of physical attack range from conventional
bombs to electromagnetic pulse weapons.
Security Measures seek to keep the adversary from learning about our military capabilities and intentions
The Information Age has provided new and practical means to deny, exploit, corrupt, or destroy information, as well as the vulnerabilities to make those attacks possible.
Information Attack : directly corrupting information without visibly changing the physical entity within
which it resides.
Information attack, constrained by the definition of information, is limited to directly altering data or instructions. It is, therefore, just another means of conducting information warfare, one whose immediate effects do not include visible changes to the entity within which the information resides. That is to say, after being subjected to information attack, an information function is indistinguishable from its original state except through inspecting its data or instructions.
HOW DOES INFORMATION ATTACK DIFFER?
As previously described and worth reiterating, there are two ways to influence the adversary’s information functions: indirectly and directly.
Indirect information warfare affects information by creating phenomena, which the adversary will perceive,
interpret, and act upon. Military deception, physical attack achieved their ends indirectly. For example, the goal of deception is to cause the adversary to make incorrect decisions;
deception does this by creating an apparent reality. Generally, this entails creating phenomena for the enemy to observer Success, however, depends on several conditional events: the adversary actually observes the
phenomenon, thereby turning it into data; analyzes it into the desired information; and acts upon the information in the desired manner.
Direct information warfare affects information through altering its components without relying on the adversary’s powers of perception or interpretation. Information attack acts directly upon the adversary’s information. Since almost all modem information functions are themselves controlled by information, information attack may be directed against most information functions.
Direct information warfare, the point of information attack, acts on the adversary’s information without relying on the adversary’s collection, analysis, or decision functions. It can short circuit the cycle through creating observations and skewing orientation, or decapitate it by imposing decisions and causing actions.
A short illustration will serve to demonstrate the difference between indirect and direct information warfare
applications:
Our goal, using military deception, is to make the adversary think there is a wing of combat aircraft where, in fact, there is none, and act on that information in a manner benefiting our operations.
Indirect information warfare: Using military deception, we could construct fake runways and parking areas, and generate enough other activities to present a convincing image. We rely on the adversary to observe the pseudo combat operation and interpret it as real (as opposed to detecting the fake). Only then does it become the information we want the adversary to have.
Direct information warfare: Conversely, if we use information attack to create the pseudo combat wing in the
adversary’s store of information, the result-deception-is precisely the same. But the means to that result, never mind the resources, time, and uncertainty, are dramatically different.
The defensive side of information warfare security measures aimed at protecting information-prevents an adversary from conducting successful information warfare against our information functions. In contrast, security measures encompass preventing, detecting, and subverting direct information actions on our information functions. Future security measures must evolve as information technology advances. Consequently, new-measures will likely take forms entirely different from today’s security measures, rooted as they are in previous security requirements. As the simple examples in this paper illustrate, we must avoid falling victim to profound, debilitating effects of direct information warfare.
Information warfare is the means defined by the environment to execute military missions.
TO REITERATE : There are three objectives of information warfare :
to control the information realm so we can exploit it while protecting our own military information functions from enemy action
to exploit control of information to employ information warfare against the enemy, and
to enhance overall force effectiveness by fully developing military information function.
The first objective of information warfare, to control the realm so we can exploit it while protecting our own
military information functions from enemy action, contributes significantly to controlling the combat environment.
Counterinformation : actions dedicated to controlling the information realm.
Counterinformation has both offensive and defensive aspects.
Offensive counterinformation enables us to use the information realm and impedes the adversary’s use of the
realm. Typical means include physical attack, military deception, psychological operations, electronic warfare, and information attack. Defensive counterinformation includes both active and passive actions to protect ourselves from the adversary’s information warfare actions. Defensive counterinformation is accomplished, for instance, through physical defense, physical security and counterintelligence.
>> Successful aerospace control << enables us to use the air and space realms without suffering substantial losses, and inflict substantial losses on the adversary’s use of those realms. Counterinformation, working with counterair and counterspace, seeks to create such an environment.
The second objective of information warfare is to exploit our control of information. In air warfare’s force
application role, the missions of strategic attack, interdiction, and close air support exploit air control. Similarly, information warfare might also be used to achieve the same ends.
Information functions offer a potential target for information warfare. For example : Early during a conflict was performed an offensive counterinformation mission by penetrating and characterising a refinery’s automated control system. In the process, was uncovered several vulnerable information dependencies, giving the means of affecting the refineries’ operations at a time of our choosing. Later in the conflict, combined with interdiction and ground maneuvers, was chosen to exploit one of the vulnerabilities. Thus disabling the adversary’s refineries. This, too, is a classic example of strategic attack.
.
Secret Intelligence Service
(C-I) Unit. London
05 11 2018
Knowledge can be understood as an attribute of a person and/or persons. Knowledge is a set of interacting mindsets about data activated by an event. Information is the set of data filtered by the person within the bounds of the knowledge held by that person (or group of persons); it establishes a link between cognition and data. thus, the defensive side of information warfare is concerned with the protection and integrity of data, people within the systems and the technological enablers that allow the creation and communication of information.
Information that favours the dominant party might be a subset of reality
or, in fact, purely an artificial reality.
>> Defensive information warfare’s main function is to prevent all attack methods from being successful, whilst offensive information warfare’s uses the same methods against an adversary / adversarial players. <<
By definition, information warfare has information and its use as a weapon as the core of its activities. As deception is about limiting access to and manipulation of information, it is a fundamental requirement for successful information warfare. This permeates all its levels: tactical, operational and strategic.
One can describe nations as being at different stages in the development of a networked / smart society. They proffer four stages: clan/tribal, institutional, market, and organisational networks. Developed nations such as the United Kingdom would fit into the latter category obviously – as much of the data storage and processing, and communications is achieved via electronic networks here, digital deception would (and does) take prime place.
In other less developed nations, other methods would take prominence. In developed and developing nations, the combination of mass-media and communication networks have provided a rich, if challenging, environment for information warfare and deception. Ironically, this information-rich environment makes deception both more and less achievable. The ambundance / pervasive nature of communications makes the dissemination of data much easier. Hence, people have access to various views.
However, the context with which this information is interpreted is primarily determined by the mass-media that is generally owned by small cartels of interests. It is in this paradoxical world that future ‘deceivers’
will have to work.
Secret Intelligence Service
(C-I) Unit. London
05 11 2018
.
Secret Intelligence Service
(C-I) Unit. Seminar
Harrogate. 20 06 2019
.
Agenda : We are referring to the creating of what can be described as a ‘universal algorithm’ for conducting continuous clandestine influence operations on a global scale. This activity never stops and of course it targets the United Kingdom, and has been doing so throughout peace, crisis and war.
The tactics used (against us) in order to gain influence and ultimately destabilise, include network-oriented structures that can operate on a premise of public activism, science, art, religious belief and / or extremist views.
After observing and collecting data on whatever fault lines are perceived (invented, exaggerated) within our society, these structures I just mentioned are employed so to attack the weak points via a cleverly orchestrated and synchronised assault, ideally and note; in our case unsuccessfully, overwhelming the nation’s capability to respond to crises.
Simultaneously and importantly, at the present time, the perpetrators are pushing narratives through local, global media and social on-line networks claiming that the only way to resolve ‘problems’ here is to replace the government with another one, most obviously with a direct foreign support.
Think about the most recent events.
Secret Intelligence Service
(C-I) Unit. Seminar
Harrogate. 20 06 2019
.
Seminar Discussion
Information Space Activity
Harrogate 11 01 2018 – Present
![]()
.
.
.
.
Adversitate. Custodi. Per Verum
/

.
MMXIX