<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:Information Operations &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/information-operations/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/information-operations/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Tue, 06 May 2025 10:42:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2026/05/cropped-GSR-Chrome-Logo-2026-1-32x32.png</url>
	<title>Topic:Information Operations &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/information-operations/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</title>
		<link>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/</link>
					<comments>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/#respond</comments>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Tue, 06 May 2025 12:11:01 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI investment]]></category>
		<category><![CDATA[AI supremacy]]></category>
		<category><![CDATA[AI technical competency.]]></category>
		<category><![CDATA[AI training]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Baidu]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese aggression]]></category>
		<category><![CDATA[data centers]]></category>
		<category><![CDATA[decision dominance]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[ERNIE model]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[gray zone conflict]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[joint force]]></category>
		<category><![CDATA[large language models]]></category>
		<category><![CDATA[malign information operations]]></category>
		<category><![CDATA[military affairs]]></category>
		<category><![CDATA[multidomain operations]]></category>
		<category><![CDATA[Nvidia chips]]></category>
		<category><![CDATA[open-source AI]]></category>
		<category><![CDATA[Project Maven]]></category>
		<category><![CDATA[psychological operations]]></category>
		<category><![CDATA[Qwen]]></category>
		<category><![CDATA[Spamouflage Dragon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30686</guid>

					<description><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance. Focusing on information operations is critical. Drones, for example, use artificial intelligence capabilities, as do defensive systems. However, conflict between near-peer adversaries [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance.</p>
<p>Focusing on information operations is critical. Drones, for example, <a href="https://medium.com/@adelstein/ai-powered-defense-how-cutting-edge-technology-is-revolutionizing-national-security-against-drones-1934a13123fa">use artificial intelligence capabilities</a>, as do defensive systems. However, conflict between near-peer adversaries and competitors is still unlikely <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/">as gray zone and hybrid conflict are the dominant avenues for competition</a>. With the information environment transcending all domains of warfare, artificial intelligence capabilities become the go-to capability to ensure and maintain information advantage.</p>
<p>China’s AI-enhanced information operations are becoming increasingly sophisticated. For example, the Chinese advanced persistent threat actor <a href="https://cyberscoop.com/tag/spamouflage-dragon/">Spamouflage Dragon</a> uses generative AI to create online personas to influence public opinion. China and its proxy companies seek to develop or compete for AI supremacy within the information environment.</p>
<p>Of course, China will use anything within its arsenal to shape strategic, operational, and tactical levels of war to its advantage, expand its influence, and create an ecosystem that is dependent on its technologies. For example, <a href="https://www.cnbc.com/2016/07/01/baidu--the-google-of-china--eyes-expansion-to-us-europe-ceo.html">Baidu, known as the “Google of China,</a>” invested billions into AI capabilities, creating the <a href="https://medium.com/ai-frontiers/baidu-goes-open-source-ernie-ai-model-to-be-released-by-june-2025-72a918897da4">proprietary ERNIE model</a>, which has been trained on billions of parameters, increasing the output’s quality and complexity.</p>
<p>However, China is also leveraging open-source AI models to shape the information environment. With the recent release of open-source <a href="https://www.thenationalnews.com/business/markets/2025/03/06/what-is-qwen-the-open-source-genai-model-from-alibaba-challenging-deepseek/">large language models such as DeepSeek and Qwen</a>, Chinese-linked subsidiaries, <a href="https://www.bloomberg.com/news/articles/2023-10-17/alibaba-tencent-join-funding-for-chinese-ai-high-flyer-baichuan">High-Flyer and Alibaba Group</a> created a way to expand their influence, revise history, and likely create a dependent ecosystem for target countries. Unlike the much more expensive ChatGPT, for which the more basic model is free, China’s investment in <a href="https://economictimes.indiatimes.com/tech/artificial-intelligence/alibaba-releases-ai-model-it-claims-surpasses-deepseek-v3/articleshow/117670287.cms?from=mdr">generative AI models is free</a> for the public and even surpasses <a href="https://www.sparkouttech.com/deepseek-vs-chatgpt/">ChatGPT’s in some respects</a>.</p>
<p>There is a debate about how China’s proxy state companies were able to create these advanced models without US-based critical components. China allegedly <a href="https://www.csis.org/analysis/deepseek-huawei-export-controls-and-future-us-china-ai-race">did not have access to the advanced critical Nvidia chips</a> for which most AI models are dependent. China seems to have created generative models just as suitable or even better than that of ChatGPT, but allegedly at a <a href="https://www.techpolicy.press/closing-the-loopholes-options-for-the-trump-administration-to-strengthen-ai-chip-export-controls/">fraction of the cost and free of charge to the public</a>. The US limited Nvidia chip exports to China, a market predicted to top <a href="https://www.forbes.com/sites/martineparis/2024/07/26/ai-to-drive-1-trillion-in-global-chip-sales-by-2030-as-nvidia-leads/">$1 trillion in revenue within a decade</a>. Still, the accusation is that the Chinese subsidiary leased or bought the more advanced <a href="https://www.business-standard.com/technology/tech-news/us-trade-rules-breached-singapore-detains-three-in-nvidia-gpu-crackdown-125030400651_1.html">Nvidia chips from Singapore, circumventing restrictions</a>, and used <a href="https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data">ChatGPT to train its model</a>.</p>
<p>Regardless of how China secured these critical technologies, the cat is indeed out of the bag. China has shown that it has the capability to develop new and emerging AI technologies. From the capabilities already built, it now has a baseline to create even more capabilities to develop its own AI chip ecosystem. With such capabilities, China will become more active within the information environment with the help of AI capabilities, and its motives are far from benevolent.</p>
<p>Why is the Chinese model free? China has several motives, but it is likely in hopes that data and information across the globe are the price tag for using the model while lessening a dependency on Western technologies and <a href="https://www.weforum.org/stories/2025/01/transforming-industries-with-ai-lessons-from-china/#:~:text=China's%20trajectory%20in%20AI%20is,for%20AI%20innovation%20by%202030.">becoming a global leader in AI by 2030</a>. Whatever data is obtained by the United States is icing on the cake. The West is not the primary target audience. Both models have servers in Singapore and China, where information is likely subject to Chinese laws, and terms and conditions are meaningless.</p>
<p>The Chinese will use AI technologies to gain an advantage in the information environment and seek to expand influence by creating an ecosystem for which other countries are dependent on their models. The incentive is to give countries this technology to foster dependency. The idea is similar to China’s debt-trap diplomacy—<a href="https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative">the Belt and Road Initiative</a>. While ChatGPT’s basic model is free, China seeks to develop better models at a cheaper price to serve as leverage over countries that cannot afford the higher-end US-based models.</p>
<p>The United States is taking the right approach to maintaining its information advantage through AI development and investment. The <a href="https://www.reuters.com/technology/artificial-intelligence/behind-500-billion-ai-data-center-plan-us-startups-jockey-with-tech-giants-2025-01-23/">billions pouring into creating AI data centers</a> will play an important role in ensuring the United States has the edge in AI.</p>
<p>These data centers remain critical for identifying and countering any malign information operations against the United States, its partners, and its allies. When Iran attempted to influence the 2024 presidential election using the generative model GPT, <a href="https://openai.com/index/disrupting-deceptive-uses-of-AI-by-covert-influence-operations/">OpenAI detected and shut it down</a>. Without this expansive investment in AI data centers that keep information within the letter of US law and oversight, these interventions would be out of reach, and information operations may be even more challenging to detect.</p>
<p>However, this approach is insufficient without incorporating artificial Intelligence into all aspects of military operations. The DoD uses artificial intelligence within some branches, but given the expansive nature of AI, this is not enough. AI is expected to touch nearly all aspects of military operations, especially information operations, and may not have time to wait for its major AI initiative, <a href="https://interestingengineering.com/military/project-maven-the-epicenter-of-us-ai-military-efforts">Project Maven</a>, to fully develop.</p>
<p>Some military scholars have called something like this a <a href="https://www.csis.org/analysis/real-revolution-military-affairs">revolution in military affairs</a>, but perhaps, given the impact of war, it could be classified as such. <a href="https://nationalinterest.org/feature/nothing-new-why-revolution-military-affairs-same-old-one-77266">The concept is somewhat antiquated and outdated without some context</a>, but it remains the best way to describe what should take place within the DoD. The foundation is already in place through the conceptual framework of multidomain operations.</p>
<p>Artificial capabilities are widely available through graphical user interfaces in deployable, ready-to-use form, such as ChatGPT or even internal <a href="https://www.army.mil/article/283601/enhancing_military_operational_effectiveness_through_the_integration_of_camo_and_nipr_gpt">large language models</a>. The joint force should use these capabilities to the broadest extent possible. If anything, artificial intelligence, including large language models, will make joint and combined forces more lethal and accurate as they counter Chinese efforts within the information environment.</p>
<p>The DoD must adopt incentives for service members to understand the capabilities of AI and incorporate them in all training environments. These incentives can include bonuses for taking AI-driven courses. The DoD can also increase awareness and accessibility of AI courses on its education platforms which now have a paucity of artificial intelligence courses.</p>
<p>The DoD must also improve the training environment. With proprietary or off-the-shelf software, the DoD can incorporate AI offensive and defensive platforms within all training and mission-critical tasks. Even simply assisting with identifying generative outputs, e.g., deepfakes, will counter Chinese influence within the information environment, especially during hybrid conflict. Furthermore, military doctrine should recognize the importance of AI, especially information operations, with an emphasis on psychological operations.</p>
<p>While AI investment is critical to countering Chinese influence within the information environment, the only way to truly embrace multidomain operations is to ensure service members have the AI technical competency necessary to maneuver within the information environment deterring Chinese aggression.</p>
<p><em>US Army Lieutenant Colonel Matthew J. Fecteau is a PhD researcher at King’s College London studying how artificial Intelligence will impact conflict. He can be reached at matthew.fecteau.alumni@armywarcollege.edu.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/Chinas-AI-Driven-Information-Operations-are-Here.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="288" height="80" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 288px) 100vw, 288px" /></a></p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Self-Deterrence, Narrative Control, and Nuclear Deterrence: The Case of Israel</title>
		<link>https://globalsecurityreview.com/self-deterrence-narrative-control-and-nuclear-deterrence-the-case-of-israel/</link>
					<comments>https://globalsecurityreview.com/self-deterrence-narrative-control-and-nuclear-deterrence-the-case-of-israel/#comments</comments>
		
		<dc:creator><![CDATA[Aaron Holland]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 13:20:58 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[information dominance]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[misinformation]]></category>
		<category><![CDATA[mistrust]]></category>
		<category><![CDATA[narrative control]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear posture]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[propaganda]]></category>
		<category><![CDATA[self-deterrence]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=27259</guid>

					<description><![CDATA[<p> The theory of self-deterrence has emerged as a pivotal factor in shaping the behavior of nuclear-armed states. At the heart of this concept lies the intricate interplay between reputational concerns, precedents of nuclear use, and the credibility of nuclear deterrence. When leaders are self-deterred from employing nuclear weapons due to the fear of tarnishing their [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/self-deterrence-narrative-control-and-nuclear-deterrence-the-case-of-israel/">Self-Deterrence, Narrative Control, and Nuclear Deterrence: The Case of Israel</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong> </strong>The theory of <a href="https://www.tvpaul.com/wp-content/uploads/2010/11/Self-Deterrence-Article-PDF.pdf">self-deterrence</a> has emerged as a pivotal factor in shaping the behavior of nuclear-armed states. At the heart of this concept lies the intricate interplay between reputational concerns, precedents of nuclear use, and the credibility of nuclear deterrence. When leaders are self-deterred from employing nuclear weapons due to the fear of tarnishing their international standing or setting dangerous precedents, the credibility of their nuclear deterrent is called into question.</p>
<p>Consider the following scenario: a nuclear-armed state faces a significant threat to its security but refrains from resorting to nuclear weapons use out of concern for reputational damage and the global perception that the country is no longer a responsible nuclear stakeholder. While this decision may seem prudent from a moral and ethical standpoint, it inadvertently undermines the credibility of the state’s nuclear force. Its adversaries may perceive this reluctance to employ nuclear weapons as a sign of weakness, emboldening them to act with impunity—disregarding the state’s nuclear deterrent.</p>
<p><strong>The Crucial Role of Narrative Control</strong></p>
<p>The crux of the matter lies in <a href="https://nielsbohrmann.com/control-the-narrative/">narrative control</a>. In a world where <a href="https://www.jstor.org/stable/j.ctvc77bx3">perception</a> is often more potent than reality, the ability to shape public opinion and control the narrative surrounding nuclear capabilities is of paramount importance. Leaders must project strength, resolve, and a willingness to employ nuclear weapons. This is necessary for instilling fear and uncertainty in the minds of adversaries.</p>
<p>Achieving narrative control is no easy feat. In the age of social media and instantaneous communication, <a href="https://www.rand.org/pubs/monograph_reports/MR661.html">information warfare</a> is the new battleground for shaping public opinion. States contend with an onslaught of propaganda, misinformation, and alternative narratives, making it increasingly challenging to maintain a coherent and convincing message.<strong> </strong></p>
<p><strong>Israel’s Narrative Struggles</strong><strong> </strong></p>
<p>The case of <a href="https://www.cnn.com/middleeast/live-news/israel-hamas-war-gaza-news-02-07-24/index.html">Israel’s war with Hamas</a> serves as a poignant example of the perils posed by <a href="https://www.theguardian.com/commentisfree/2023/dec/21/israel-losing-war-against-hamas-netanyahu-idf">losing the narrative war</a>. Israel is being painted as the <a href="https://www.amnesty.org/en/latest/news/2022/02/israels-apartheid-against-palestinians-a-cruel-system-of-domination-and-a-crime-against-humanity/">oppressor</a> by large swaths of the <a href="https://globalaffairs.org/bluemarble/see-how-32-countries-moved-away-us-and-israel-latest-un-cease-fire-vote">international community</a>, even though Hamas initiated the war with their <a href="https://www.csis.org/analysis/hamass-october-7-attack-visualizing-data">October 7, 2023</a>, attack. Despite possessing a formidable nuclear arsenal and clear escalation dominance in the region, <a href="https://www.nti.org/countries/israel/">Israel</a> was utterly incapable of deterring conflict with Hamas. In fact, Hamas <a href="https://www.newstatesman.com/world/middle-east/2023/10/israeli-deterrence-hamas-gaza">never believed Israel will use [its?] nuclear arsenal</a> in a Gaza conflict. The Israelis have also failed to deter further escalation of aggression from Hezbollah and other Iranian proxies.</p>
<p>Admittedly, nuclear weapons were never intended to deter all forms of aggression. It is possible that past Israeli strikes on Iraqi and Syrian nuclear facilities are serving as a deterrent to Iran going nuclear because they fear an actual Israeli nuclear strike. This is speculation but serves to highlight the challenge of deterrence.</p>
<p>Israel has struggled to gain international acceptance and legitimacy for its action in Gaza with the <a href="https://news.un.org/en/story/2023/12/1144717">United Nations condemning Israel</a>, calling for a cease-fire, and even lending legitimacy to claims of genocide. This is a claim that prominent political scientists <a href="https://www.aljazeera.com/program/the-bottom-line/2023/12/16/john-mearsheimer-israel-is-choosing-apartheid-or-ethnic-cleansing">John Mearsheimer</a> and <a href="https://www.youtube.com/watch?v=I_Sh-ERypMA">Norman Finkelstein</a> supported in the past weeks. The prominent commentator and former judge, <a href="https://www.youtube.com/watch?v=HFb8Av76Gug">Andrew Napolitano</a>, also asserts that Israel has lost the public relations war.</p>
<p>Ultimately, the psychological impact of narrative victory empowers non-nuclear entities to resist traditional deterrence strategies. Adversaries, fueled by a sense of righteousness and global support, become more resilient to the deterrent effect of escalation dominance and nuclear superiority.</p>
<p>This resilience poses a significant challenge to the US and Israel, who find themselves contending with <a href="https://www.chathamhouse.org/2024/01/houthis-wont-back-down-after-us-and-uk-strikes-yemen">adversaries undeterred</a> by their joint military superiority in the region. Even irrational decisions, in a quantitative sense, do not strike fear in adversaries that believe they dominate public support and will obtain divine vindication and retribution in their cause.</p>
<p><strong>Reclaiming the Narrative Initiative</strong></p>
<p>As a result, Israel finds itself caught in a precarious position, where its nuclear deterrent is weakened by perceptions of ambiguity, mistrust, and self-deterrence. Its adversaries are emboldened by this perceived weakness coupled with global support for their struggles. They may be more inclined to continue challenging Israel’s security interests, knowing that the costs of nuclear escalation are mitigated by doubts surrounding Israel’s willingness to employ nuclear weapons in conflict. This is a challenge with maintaining a <a href="https://www.armscontrol.org/act/2010-11/wrestling-nuclear-opacity">nuclear posture of opacity</a>.</p>
<p>To regain the narrative initiative, Israel must invest in <a href="https://hbr.org/2016/03/how-to-build-a-strategic-narrative">strategic narrative</a> crafting. Emphasizing shared values with allies, just causes, and a commitment to peace can reshape perceptions and counteract the narrative of oppression. Israel wants to be seen as a liberator and defender, not as the oppressor or the extension of an <a href="https://www.theguardian.com/us-news/2023/nov/30/americas-undying-empire-why-the-decline-of-us-power-has-been-greatly-exaggerated">American empire</a>. Israel has much work to do to change their current international reputation and reclaim the moral high ground. Strengthening international alliances and engaging in diplomatic efforts in the Middle East are essential and a good place to start. This is not to say Israel is not engaging in such efforts. They certainly are, but to little effect.</p>
<p>By influencing global narratives, Israel can garner support for their actions and create a more balanced perception of the current conflict. Launching targeted public diplomacy campaigns can bridge the gap between military actions and public understanding. Providing transparent and compelling narratives about strategic objectives can counter misinformation and build domestic and international support. Additionally, recognizing the power of cultural and ideological narratives is crucial. Israel should continue to tap into historical narratives that showcase their commitment to democracy, freedom, and human rights, countering portrayals that paint them as aggressors and oppressors.</p>
<p><strong>Conclusion</strong></p>
<p>The nexus of self-deterrence, narrative control, and nuclear deterrence is of utmost importance in the contemporary strategic environment. As states grapple with the complexities of nuclear strategy, the ability to shape public perception and maintain credibility is essential for maintaining peace and stability. Failure to do so risks undermining the very foundations of global security, with potentially catastrophic consequences for all nations involved. Only by mastering the art of narrative control can states hope to navigate the treacherous waters of nuclear politics and ensure the continued survival of the international order.</p>
<p><em>Aaron Holland is an Analyst at the National Institute for Deterrence Studies. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/02/The-Crucial-Role-of-EscalationThe-Crucial-Role-of-Escalation-Dominance-and-Narrative-Control-in-Nuclear-Deterrence-Dominance-and-Narrative-Control-in-Nuclear-Deterrence.pdf"><img decoding="async" class="alignnone wp-image-26665 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png" alt="Get this publication" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/self-deterrence-narrative-control-and-nuclear-deterrence-the-case-of-israel/">Self-Deterrence, Narrative Control, and Nuclear Deterrence: The Case of Israel</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/self-deterrence-narrative-control-and-nuclear-deterrence-the-case-of-israel/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Information Operations &#038; Information Warfare</title>
		<link>https://globalsecurityreview.com/understanding-information-operations-information-warfare/</link>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Wed, 22 Jun 2022 15:44:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9644</guid>

					<description><![CDATA[<p>This article was originally published on January 7, 2019. The concept of information operations (IO) has entered into our everyday lexicon without a precise definition. Any stated definition of information operations is relative to the context. IO remains a complex subject, and the field is evolving. This article hopes to provide greater insight and clarity [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/understanding-information-operations-information-warfare/">Understanding Information Operations &#038; Information Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on January 7, 2019.</em></p>
<h2>The concept of information operations (IO) has entered into our everyday lexicon without a precise definition.</h2>
<p>Any stated definition of information operations is relative to the context. IO remains a complex subject, and the field is evolving. This article hopes to provide greater insight and clarity into the definition of IO, and also identify existing and potential shortfalls.</p>
<p>Regardless of context, information operations maintain some nearly-universally-agreed-upon characteristics. An information operation is a campaign that is dedicated to obtaining a decisive advantage in the information environment. Some conflate IO with mere cyber or influence operations, but these are one of many capabilities that IO practitioners—both civilian and military—use to gain an edge in the information environment.</p>
<p>This messaging effort has multiple components to ensure the desired effects are delivered in the most advantageous way possible—sometimes using influence and other times the intention is solely to send a direct, clear, and concise message. Take, for example, a scenario involving displaced persons. The influencing elements are sending out pamphlets intended to induce the displaced persons to return home, but civil liaison elements are building permanent structures that will incentivize displaced individuals to remain. It is the IO practitioner’s job to de-conflict this disjointed message. An IO practitioner should be working in tandem with other capabilities to shape the information environment.</p>
<h3>The Russian interference in the 2016 presidential election was a strategic use of IO.</h3>
<p>The Russian government sought to both influence the U.S. presidential election, and undermine the Democratic systems. State-sponsored Russian actors hacked into Democratic National Committee servers and gained access to a key Democratic advisor’s emails. These hackers than used third-party intermediaries to release derogatory or potentially damaging information through WikiLeaks. Furthermore, Russian actors focused on psychological operations disseminated propaganda and disinformation via social media. An IO practitioner would, typically, be the one that coordinated this effort.</p>
<p>However, the definition of IO can change based on the context in which the term is used. According to a Congressional Research Service (CRS) report from 2018, a government entity, IO is sometimes conflated with Information Warfare (IW). <u><a href="https://fas.org/sgp/crs/natsec/R45142.pdf">The report says</a></u> that “Information warfare takes place at the strategic level, while information operations (IO) involve using various information-related capabilities to implement the strategy.” However, unlike IO, IW is not defined in any contemporary U.S. military doctrine, nor does the U.S. military doctrine specify IW “takes place at the strategic level.” Surprisingly, no recent U.S. Government publication specifies there is a distinction between IO and IW; the U.S. Government should clarify the difference—if one exists.</p>
<h3>The U.S. military has its own distinct view of information operations.</h3>
<p>The <u><a href="http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf">2016 U.S. military doctrine</a></u> defines IO as “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” Per this doctrine, IO is focused on coordination and synchronization “during military operations.” IO is absent real deliverables, it relies on other capabilities to deliver effects. As previously stated, influence and cyber operations are just two of many information-related capabilities.</p>
<p>The more antiquated IO <u><a href="http://www.c4i.org/jp3_13.pdf">doctrine</a></u> distinguished between information warfare and information operations. In a military <u><a href="http://archive.defense.gov/news/newsarticle.aspx?id=41611">publication from 1999</a></u>, IO is defined as “…actions taken to affect adversary information and information systems while defending one&#8217;s own information and information systems.” The publication addresses IW as “Information warfare (IW) is IO conducted during time of crisis or conflict (including war) to achieve or promote specific objectives over a specific adversary or adversaries.” While these definitions appear to be out-of-date, they provide substantially greater clarity and understandability than contemporary military doctrine (IW was removed from military doctrine in 2006).</p>
<p>In the private sector, the definition differs from the military with actual deliverables. <u><a href="https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdf">Facebook Security</a></u> defines “as actions were taken by organized actors (governments or non-state actors) to distort domestic or foreign political sentiment, most frequently to achieve a strategic and/or geopolitical outcome.” Facebook’s definition appears to conflate IO with mere influencing instead of producing a specific desired effect.</p>
<p>The nonprofit global policy think tank Rand Corporation <u><a href="https://www.rand.org/topics/information-operations.html">defines IO</a></u> as the following: “Information operations and warfare, also known as influence operations, includes the collection of tactical information about an adversary as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent.” This definition poses a number of challenges because—again—much like the private-sector Facebook definition, it is focused on “influence operations,” which are, in actuality, only part of a true IO campaign that is synchronizing and coordinating a range of influence, cyber, and psychological elements. RAND’s definition also conflates IW with IO. For its part, the CRS report attempts to distinguish IW from IO, something U.S. military doctrine fails to do.</p>
<h3>The absence of a clear definition could lead to a strategic disaster.</h3>
<p>Making things even more complicated is the fact that these nuanced definitions also face international interpretation, and the United States’ foreign competitors may define or conceptualize information operations differently. This means matching their capabilities that much more difficult, making any discussion over a strategic competitor’s (e.g. Russia) IO capabilities an apples-to-oranges comparison.</p>
<p>It is now more important than ever to develop a clear and concise understanding of information operations as a concept. Unfortunately, this paper may fall short because of the complexity and evolving nature of IO. In the short-term, the U.S. Government could re-adopt the out-of-date, yet more concise definitions for IO and IW.</p>
<p>Updating these definitions would ensure that IO is properly understood, conceptually and practically speaking. Until then, with each new IO definition, there will be a nuanced complexity that only serves to confuse rather than clarify the ever-changing nature of information operations.</p>
<hr />
<p><em>The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government.</em></p>
<p><a href="https://globalsecurityreview.com/understanding-information-operations-information-warfare/">Understanding Information Operations &#038; Information Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Iran&#8217;s Fragile Moments of Democracy May Not Survive the Propaganda Bots</title>
		<link>https://globalsecurityreview.com/iranian-democracy-disinformation-bots/</link>
		
		<dc:creator><![CDATA[Ali Arfa]]></dc:creator>
		<pubDate>Thu, 06 Jun 2019 15:56:55 +0000</pubDate>
				<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11636</guid>

					<description><![CDATA[<p>A day after Aljazeera published a piece on Mojahedin-e Khalq (MEK), whose Twitter users were targeting Iranian scholars, academics, and journalists in favor of dialogue between the U.S. and Iran, Iranian Foreign Minister Javad Zarif mentioned Jack Dorsey, founder of Twitter, in a tweet. Zarif sarcastically asked Dorsey if, instead of shutting down the accounts of real pro-regime [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/iranian-democracy-disinformation-bots/">Iran&#8217;s Fragile Moments of Democracy May Not Survive the Propaganda Bots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A day after <a href="https://www.aljazeera.com/programmes/listeningpost/2018/09/faking-online-debate-iran-180915121527882.html">Aljazeera published a piece</a> on Mojahedin-e Khalq (MEK), whose Twitter users were targeting Iranian scholars, academics, and journalists in favor of dialogue between the U.S. and Iran, Iranian Foreign Minister Javad Zarif mentioned Jack Dorsey, founder of Twitter, in a <a href="https://twitter.com/JZarif/status/1041287555600338944">tweet</a>. Zarif sarcastically asked Dorsey if, instead of shutting down the accounts of real pro-regime Iranians, he should purge the platform from the MEK bots that were trying to spread a “regime change” propaganda form their headquarters in Tirana, Albania. The incident signaled that the Iranian disinformation campaign, already claimed to be <a href="https://eu.usatoday.com/story/tech/news/2018/08/24/how-iran-targeted-u-s-facebook-youtube-and-twitter-liberal-memes/1079882002/">targeting the U.S. and some of its allies</a>, has now come home to roost.</p>
<p>Out of a population of 81 million, there are <a href="https://bit.ly/2E9Wxdv">at least 47 million active social media users</a> in Iran. Twitter, Instagram, and Telegram, which claims to have <a href="https://reut.rs/2xSILru">40 million users</a>, are also widely used in Iran. This high number of Iranian social media users and a lack of media literacy, provide a fertile ground for vast disinformation campaigns. Propaganda bots, known as “botnets” when working together, are normally used in such campaigns. They can masquerade as humans to amplify political messaging that suit specific agenda by liking, sharing, retweeting, and following genuine accounts. They can also be used to make <a href="https://medium.com/dfrlab/le-pens-small-online-army-c754058630f0">hashtags trend</a>, which improves the visibility of a political message.</p>
<p>As we approach the run-up to the Majles (parliament) and presidential elections in Iran, more hands from both pro-regime and opposition groups will be on keyboards to read, be read and possibly affect the result of the elections. For the Iranian people who are fighting for a transition from theocracy to democracy, disinformation campaigns—which are designed to sow confusion and reap chaos—are undoubtedly harmful; a look at Iran&#8217;s modern history reveals that turmoil has favored authoritarianism rather than democratic movements.</p>
<h3>Iranian Opposition Groups&#8217; Bot Toolkit</h3>
<p>Supposing these campaigns in Iran are inspired by the Russian Internet Research Agency (IRA) model that was used to polarize the U.S. public, it is not difficult to predict that there will be a focus on the societal cleavages that already exist among the Iranians and an effort to bold them through the twitter botnets’ traffic manipulations. The final goal would be to create as much distrust and chaos as possible; such that could finally lead to a “regime change.” The main target could be religious divide and ethnic minorities like Kurds, Baluch, and Turks. There could also be some Twitter campaigns designed to influence voters to boycott the elections with the main focus on delegitimizing both reformist and conservative parties in Iran. Furthermore, sensationalist, conspiratorial, and other forms of junk political news and disinformation could be spread among the voters across the political spectrum to dissuade them from voting.</p>
<p>The disinformation and fake news that have already <a href="http://www.khabaronline.ir/detail/480541/society/events">gained sizable audiences</a> in rural areas could also possibly be another target. Residents of these areas in Iran rarely use Twitter, but the content from the platform could quickly enter Telegram or Instagram and influence users on those platforms. Before and during the course of elections, these rural areas could turn into the epicenters of fake news and rumors that are amplified by bots. This, no matter how small the scope, could change the fate of a nation.</p>
<h3>The Islamic Republic’s Bot Arsenal</h3>
<p>The bots that are most probably handled by the Iranian cyber army or IRGC could be used to amplify any political message that is <a href="https://twitter.com/AmirpoorMehdi/status/1112472861069987842">on the agenda of the ruling forces</a>. They can be used to attack other candidates, harass them, or even spread rumors and fake news to smear their campaign.</p>
<p>Furthermore, in the event of uprisings before or during the elections, the regime in Tehran has its bot methods to fight back. These methods were tested and rehearsed during the nationwide protests of January 2018 to create distrust among the Iranian protestors. One of the tactics used is the creation of the bots whose task is to call the widely shared videos of the rallies fake and to discourage potential protestors from joining the crowds by creating a sense <a href="https://www.bbc.com/news/world-middle-east-42566083">that nothing is going on</a>. These bots were also used to guide the demonstrators to the wrong locations and to create an impression that the <a href="https://monitoring.bbc.co.uk/product/c200mbyv">protests were on a small scale.</a></p>
<h3>Democracy down</h3>
<p>Iran might not be the Switzerland of the Middle East, but has a unique political structure and activism with elections held every four years to choose the president and the members of the parliament. It is these elections that create democratic glimmers of hope for reform to which propaganda bots could be a significant setback. If in 2015 and due to Iranian public’s willingness to join the international community, the P5+1’s primary concern, was Iran’s nuclear activities, now, a non-nuclear but politically polarized Islamic Republic—radicalized by propaganda bot—could raise even more significant concerns.</p>
<p>Furious with Trump’s withdrawal from Joint Comprehensive Plan of Action (JCPOA) and disillusioned with Rouhani cabinet’s mismanagement and inability to deliver economic promises, many Iranians are now anything but moderate. Hardliners, armed to the teeth with twitter bots, will be taking full advantage of this situation to intensively spread their propaganda and rally their supporters for a landslide victory in the next round of elections. A déjà vu of another Ahmadinejad, with a bot army, long-range missiles, and possibly an urge to withdraw from International Atomic Energy Agency (IAEA), would then only be one round of election away from all of us. Whether Iran’s fragile moments of democracy can survive is a question that only time can answer.</p>
<p><a href="https://globalsecurityreview.com/iranian-democracy-disinformation-bots/">Iran&#8217;s Fragile Moments of Democracy May Not Survive the Propaganda Bots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
