Small Wars Journal

information operations

Cyber-Realpolitik: US Foreign Policy and a Fragmented International System

Tue, 08/06/2019 - 11:04am
Cyber-realpolitik or cyber-realism is an anarchic international system that is fragmented beyond the multiplicity of a multipolar distribution of state power. Nation-states are increasingly finding governance difficult as technology is propagated into the internet of things (IoT), and innovations in artificial intelligence (AI) and blockchain technology. The power to disrupt and appeal to public impulses are redistributed to tech companies and their executives, developers, coders, technicians, and computer engineers.

About the Author(s)

Iran’s Focus: Cyberwarfare and Retaliation on the West

Mon, 08/05/2019 - 11:53am
With Iran’s insatiable appetite for nuclear independence and cyber warfare retaliatory strikes against the West, the imposed sanctions have resulted in increased socio-economic unrest at a time where greater individual access to technology and communication devices by individuals may result in further regional destabilization.

About the Author(s)

Withering Influence in National Security

Mon, 07/15/2019 - 1:23am
This essay is meant to demonstrate that a unified influence activity achieves the greatest efficiency necessary to challenge the persistent efforts of our traditional adversaries, to seize initiate in the information domain, to exploit opportunities with emerging methods and technologies. Political Warfare by our adversaries are present in common rhetoric: “Russian Election Meddling, Islamiphobic, Chinese Hacking”. This language can be found in any newspaper and blog on a daily basis across the US, across political boundaries.

About the Author(s)

Unintended Consequences of the Message Surrounding US Withdrawal from Afghanistan and Syria

Sat, 07/06/2019 - 5:12pm
This study determines what trends, if any, may be associated with the announcements of US troop withdrawals in both Syria and Afghanistan on December 19 and 20, respectively. It examines the extent to which linkages exist between the unintended consequences and the announcement of the US military’s withdrawal by examining activities and commentary associated with the Taliban, the SDF, and the Daesh.

About the Author(s)

Weaponization of Metaphors in Russian Propaganda: Sexual Violence, as State Sovereignty Violation SWJED Wed, 06/26/2019 - 1:01am
The deployment of these “cognitive munitions” in the current “hot” stage of political warfare confrontation between Russia and the West should serve as a stark reminder that multiple “defusing” initiatives should be actively developed and implemented, aiming at raising the cognitive protection levels at military and civilian institutions alike.

Control the Information Environment Narrative…or the Threat Will

Fri, 06/21/2019 - 9:33am
Strategic competitors like Russia and China are using old technologies in new ways while also employing new advanced technology to fight their enemies in all domains (space, cyber, air, sea, and land). This required the U.S. Army to evolve and adapt the way it wants to fight by publishing “Multi-Domain Operations (MDO) 2028” as the cornerstone for the Joint force to militarily compete, penetrate, dis-integrate, and exploit future adversaries. While air, land, and sea domains have been prevalent since World War II, the relative new-comers of Cyber and Space are still establishing their doctrinal foundation in modern warfare.

About the Author(s)

The Advent of the “Digital Mercenaries”

Sat, 03/30/2019 - 3:08am
Modern day “condottieri”, a new type of modern “soldiers of fortune”, is emerging center stage. Namely, the ascent of a new breed, one that could be best described as “digital mercenaries”. The advent of these new professionals is of no less importance than their “traditional” counterparts who provide muscle and boots on the ground in distant and difficult environments.

About the Author(s)

Primer: Terrorist Usage of Twitter and Social Media SWJED Thu, 03/28/2019 - 3:56am
"As terror groups such as ISIS gain more experience using social media platforms, the structure of posts and the methods used to promote the posts are becoming similar to the strategies a business would use to promote a product on those platforms. Although, the groups can’t directly mimic a business. They generally are blocked from using straightforward promotion tools put in place by the platform, such as advertisements or paid promotions. Groups like ISIS also tend to violate the terms of service for the social media platforms they are using. Much like the battle between cyber attacks and cyber security, terrorist organizations are continually adapting to circumvent detection and removal by the platforms they are using."
Power Competition: The Struggle for Cooperation SWJED Sun, 03/17/2019 - 1:06am
The 2018 National Defense Strategy states that China is a strategic competitor and the United States must restore its competitive advantage in the international arena. However, power competition is more complicated now compared to the Cold War Era. Today, states are hyper-connected through technology and economic cooperation which increases complexity for projecting power. A good example is China’s use of economic power through its Belt and Road Initiative to expand its regional influence all over Euro-Asia.

Operationalizing OSINT Full-Spectrum Military Operations

Mon, 01/14/2019 - 12:15am
United States Soldiers, Privates and Generals, deserve access to unbiased, unredacted phenomenological reporting from the battlefield. In no way does this diminish the value, skills, and cognitive ability of the G2 or of national agencies. Rather, this capability is a much needed and as of yet, unmined treasure of data on the enemy, neutrals, and friendlies. DoD should place this tool in the hands of every leader from COCOM to fire team NCO.

About the Author(s)