Whether during the Cold War or today, "free", open, liberal democratic societies are at an inherent disadvantage when it comes to the playing field and information flow. First, having access to information alone is not sufficient for the critical assessment of that information. Indeed, indoctrination through repetitive exposure to a particular point of view can be as harmful in that sense as complete lack of access. Nor does greater access to information by itself lead to greater security. Failure to identify and prioritize important and correct information can lead to devastating intelligence and policy failures.
There is still disagreement and outright confusion about what the IE is, why it matters, how to operate within it, and how to develop a terms and definitions relating to it. While terms and definitions comprise the primary focus of this article, it is most useful to discuss them in the context of interactions between information, competition, and strategy.
About the Author(s)
Complex warfare is high stakes competition in learning, and the United States is being out-thought and out-fought by China. Why is this so, and what can we do about it?
About the Author(s)
China is wielding strategies that envelop opponents with an all-effects all-domain approach to national power. These effects are neither precise nor pre-ordained because they occur in an uncertain information environment that encompasses behavior by all sensors – living, or artificial. Drawing from a rich tradition of hybrid stratagems and holistic information, China’s leaders use a variety of asymmetric approaches that exploit weaknesses in opponents’ strategies.
About the Author(s)
What Translation Troubles Can Tell Us About Russian Information Warfare SWJED Fri, 10/04/2019 - 5:06am
Moscow’s form of information warfare targeting the West has attracted significant international attention since 2014, especially through its reinvigorated military intelligence branch. Nonetheless, little research has focused on these campaigns’ apparent shortcomings.
Controlling Cognitive Domains SWJED Sat, 08/24/2019 - 3:52pm
What is now categorized as the “cognitive domain” includes areas of influence in all sectors of society. Cognitive domain(s) should not be restricted to influence and information operations, social engineering and ‘winning hearts and minds’ approaches, but expanded to include all areas where ideological attacks are possible.
Beyond Twitter: The Emergence of the Cyber-Presidency and Small Cyber Wars SWJED Sun, 07/14/2019 - 12:17am
When cyberwarfare is the top defensive policy for the Pentagon, including the protection of critical infrastructure from a catastrophic cyber-attack, the Commander-in-Chief should strategically avoid social media if at all possible.
Terrorism and Social Media (TASMConf): International Conference - 25-26 June 2019 - Swansea University, Wales, UK - Radical Islamist Focused Presentations OSINT Listing SWJED Tue, 07/02/2019 - 12:30am
The 2019 Terrorism and Social Media (TASM) conference took place on 25 and 26 June 2019 at Swansea University Bay Campus, Wales, United Kingdom. The conference was organized by Swansea University’s Hillary Rodham Clinton School of Law and its Cyber Threats Research Centre (CYTREC), with the support of the VOX-Pol Network of Excellence.
Weaponization of Metaphors in Russian Propaganda: Sexual Violence, as State Sovereignty Violation SWJED Wed, 06/26/2019 - 1:01am
The deployment of these “cognitive munitions” in the current “hot” stage of political warfare confrontation between Russia and the West should serve as a stark reminder that multiple “defusing” initiatives should be actively developed and implemented, aiming at raising the cognitive protection levels at military and civilian institutions alike.
Strategic competitors like Russia and China are using old technologies in new ways while also employing new advanced technology to fight their enemies in all domains (space, cyber, air, sea, and land). This required the U.S. Army to evolve and adapt the way it wants to fight by publishing “Multi-Domain Operations (MDO) 2028” as the cornerstone for the Joint force to militarily compete, penetrate, dis-integrate, and exploit future adversaries. While air, land, and sea domains have been prevalent since World War II, the relative new-comers of Cyber and Space are still establishing their doctrinal foundation in modern warfare.