Small Wars Journal

information warfare

The Advent of the “Digital Mercenaries”

Sat, 03/30/2019 - 3:08am
Modern day “condottieri”, a new type of modern “soldiers of fortune”, is emerging center stage. Namely, the ascent of a new breed, one that could be best described as “digital mercenaries”. The advent of these new professionals is of no less importance than their “traditional” counterparts who provide muscle and boots on the ground in distant and difficult environments.

About the Author(s)

The Myths of Traditional Warfare: How Our Peer and Near-Peer Adversaries Plan to Fight Using Irregular Warfare

Thu, 03/28/2019 - 5:59am
The belief that peer/near-peer/VEO competitors and adversaries will only fight us via traditional warfare, man to man, tank to tank, ship to ship, and plane to plane, are missing the historical and present day reality that these designated threats are currently competing and prevailing over us via Irregular Warfare activities in the competition space, and doing so quite successfully.

About the Author(s)

Primer: Terrorist Usage of Twitter and Social Media SWJED Thu, 03/28/2019 - 3:56am
"As terror groups such as ISIS gain more experience using social media platforms, the structure of posts and the methods used to promote the posts are becoming similar to the strategies a business would use to promote a product on those platforms. Although, the groups can’t directly mimic a business. They generally are blocked from using straightforward promotion tools put in place by the platform, such as advertisements or paid promotions. Groups like ISIS also tend to violate the terms of service for the social media platforms they are using. Much like the battle between cyber attacks and cyber security, terrorist organizations are continually adapting to circumvent detection and removal by the platforms they are using."

Operationalizing OSINT Full-Spectrum Military Operations

Mon, 01/14/2019 - 12:15am
United States Soldiers, Privates and Generals, deserve access to unbiased, unredacted phenomenological reporting from the battlefield. In no way does this diminish the value, skills, and cognitive ability of the G2 or of national agencies. Rather, this capability is a much needed and as of yet, unmined treasure of data on the enemy, neutrals, and friendlies. DoD should place this tool in the hands of every leader from COCOM to fire team NCO.

About the Author(s)

Information Overmatch: How Information Dominance Will Win Our Nation’s Wars SWJED Sun, 01/13/2019 - 12:10am
The advent of the Internet and the global interconnection of data has generated a path to oust combat overmatch as ‘the’ game changer. Instead, information dominance will be the characteristic that will win future wars. The organization that has the most relevant, timely, and actionable information will be victorious in battle, even against a combat overmatch force. Instead of seeking combat overmatch in our future investment strategies, we should be seeking a strategy that gives us Information Overmatch.

As If We Need Another Crisis…

Tue, 11/06/2018 - 12:02pm
Some would consider it incredulous to believe that thoughts could possibly be the cause of so much pain and grief in the world. Disappointingly, they are not trying hard enough to solve the problem and fail to recognize that the history of the world is indeed a history of thoughts, shaped by ideas before it is even shaped by events.

About the Author(s)

How Do We Win Information Warfare in Afghanistan?

Thu, 11/01/2018 - 1:35pm
When General Abdul Raziq, the Provincial Police Chief of Kandahar Province, was assassinated the effective physiological warfare carried out by the Taliban and their backers in Pakistan prevented a moment in which all Afghans, government officials and the civil populace alike, could have united in their sorrow and grief over losing two national heroes. Instead, people quickly overlooked the damning brutality of the attack, giving credence to the counter claim, and with it, their implicit support to the Taliban.

About the Author(s)

Applying Recent Lessons from Climate Change Communication to Counter-ISIS Strategic Communication

Wed, 10/17/2018 - 11:20am
Once we accept the fundamentally communicative purpose of terrorism, it becomes clear that strategic communication should be the preeminent tool in the counter-terrorism toolbox. The trouble is, the U.S.-led approach to counter-ISIS strategic communication is hamstrung by reliance on a flawed paradigm that I call narrative jamming. The good news is that there is a potential solution and it comes from an unlikely place: recent research on climate change communication.

About the Author(s)

Shaping Perceptions: Processes, Advantages, and Limitations of Information Operations

Sun, 08/26/2018 - 12:51am
Recent and extensive developments in technology, media, communications, and culture – such as the advent of social media, 24-hour news coverage, and smart devices – allow populaces to closely monitor domestic and foreign affairs. This “ability to share information in near real time,” is an asset to the Nation and its military. However, these advances have also facilitated the convergence of new vulnerabilities to individual and international security, as seen with the rise of computer hacking over the past decade, as well as with Russia’s attempts to influence the 2016 U.S. presidential election.

About the Author(s)