U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Information Operations and Counterterrorism

NCJ Number
196877
Journal
Jane's Intelligence Review Volume: 14 Issue: 9 Dated: September 2002 Pages: 50-53
Author(s)
Kevin A. O'Brien; Izhar Lev
Editor(s)
Christopher C. Aaron
Date Published
September 2002
Length
4 pages
Annotation
This article examines the role and tactics of information operations and its effectiveness in counterterrorist operations.
Abstract
Information operations (IO), as defined by the United States Department of Defense, are actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks. This is done while leveraging and defending your own information. Terrorists use the resources available in the information society to plan and organize, finance and communicate, and ensure command and control over real-world operations. The role of IO in counterterrorism is discussed through the identification of three principle categories or disciplines of offensive IO, attacks on infrastructure, deception, and psychological operations. Regarding IO tactics for counterterrorism, transnational terrorist organizations (TTOs) have little in the way of information infrastructure to attack, so cyber-based IO is seldom applicable to counterterrorism operations. However, psychological IO is the most fundamental in counterterrorism. Psychological warfare operations (psyops) are associated with pure military efforts where the aim is to manipulate feeling and emotions and reduce the legitimacy of terror in the source population. Since both TTOs and counterterrorism operators use the same media for psyops and counter-psyops it has been recommended that the Internet be incorporated into psyops as an information technology medium. The Internet can be used to augment many of the elements necessary to TTOs. So, counterterrorism must turn these same capabilities against the TTOs and their supporters. Future developments in cyber methods for counterterrorism will include enhanced ciphering and decryption, and counterintelligence and counterpropaganda operations for anti-fundraising purposes. There is the need to use both traditional and cyber IO in order to destroy the terrorist infrastructures and support bases.