Terrorist approach to information operations

Approved for public release; distribution is unlimited === This thesis provides insight into how terrorist organizations exploit the information environment to achieve their objectives. The study establishes an analytical IO framework, by integrating US military doctrine with a fundamental approach...

Full description

Bibliographic Details
Main Authors: Emery, Norman E., Earl, Robert S.
Other Authors: Denning, Dorothy
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/993
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-993
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-9932017-05-24T16:06:41Z Terrorist approach to information operations Emery, Norman E. Earl, Robert S. Denning, Dorothy Buettner, Raymond Defense Analysis Information warfare Terrorism Prevention Intelligence service Approved for public release; distribution is unlimited This thesis provides insight into how terrorist organizations exploit the information environment to achieve their objectives. The study establishes an analytical IO framework, by integrating US military doctrine with a fundamental approach to IO theory. The framework proves useful in examining the IO tools terrorists have assembled and how they implement them to influence their target audiences. The thesis shows that terrorists are, indeed, naturally linked to the information environment by their nature and strategy. Generally speaking, all terrorists employ IO tactically to enhance their operations. However, many organizations have a profound understanding of the information environment and also have the ability to manipulate information to achieve their objectives. Since, terrorist organizations are militarily weaker than the states they face and cannot rely on physical attacks to accomplish their goals, they must adopt an information strategy to achieve their objectives. This thesis emphasizes three primary conclusions: first terrorist conduct violent attacks in the physical environment to enable operations in the information environment. Second, terrorist integrate offensive and defensive IO to survive and appear legitimate to potential supporters and to the state. Finally, terrorists intentionally target four different audiences: opposing, uncommitted, sympathetic, and active to influence their perceptions. Major, United States Army 2012-03-14T17:30:11Z 2012-03-14T17:30:11Z 2003-06 Thesis http://hdl.handle.net/10945/993 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted. xi, 149 p. : ill. (chiefly col.) ; application/pdf Monterey, California. Naval Postgraduate School
collection NDLTD
format Others
sources NDLTD
topic Information warfare
Terrorism
Prevention
Intelligence service
spellingShingle Information warfare
Terrorism
Prevention
Intelligence service
Emery, Norman E.
Earl, Robert S.
Terrorist approach to information operations
description Approved for public release; distribution is unlimited === This thesis provides insight into how terrorist organizations exploit the information environment to achieve their objectives. The study establishes an analytical IO framework, by integrating US military doctrine with a fundamental approach to IO theory. The framework proves useful in examining the IO tools terrorists have assembled and how they implement them to influence their target audiences. The thesis shows that terrorists are, indeed, naturally linked to the information environment by their nature and strategy. Generally speaking, all terrorists employ IO tactically to enhance their operations. However, many organizations have a profound understanding of the information environment and also have the ability to manipulate information to achieve their objectives. Since, terrorist organizations are militarily weaker than the states they face and cannot rely on physical attacks to accomplish their goals, they must adopt an information strategy to achieve their objectives. This thesis emphasizes three primary conclusions: first terrorist conduct violent attacks in the physical environment to enable operations in the information environment. Second, terrorist integrate offensive and defensive IO to survive and appear legitimate to potential supporters and to the state. Finally, terrorists intentionally target four different audiences: opposing, uncommitted, sympathetic, and active to influence their perceptions. === Major, United States Army
author2 Denning, Dorothy
author_facet Denning, Dorothy
Emery, Norman E.
Earl, Robert S.
author Emery, Norman E.
Earl, Robert S.
author_sort Emery, Norman E.
title Terrorist approach to information operations
title_short Terrorist approach to information operations
title_full Terrorist approach to information operations
title_fullStr Terrorist approach to information operations
title_full_unstemmed Terrorist approach to information operations
title_sort terrorist approach to information operations
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/993
work_keys_str_mv AT emerynormane terroristapproachtoinformationoperations
AT earlroberts terroristapproachtoinformationoperations
_version_ 1718452507246592000