Information Operations
27 Followers
Recent papers in Information Operations
The paper presents a generic model for designing re-configurable C4ISR systems. The paper recognizes that despite the detailed guidelines provided ,by the Department ,of Defense ,Architecture Framework (DODAF) for designing... more
The U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more... more
Ukraine’s civilians can provide crowdsourced geolocated target information to the Ukrainian Army. This has the effect of creating a more resilient targeting process but also implies that anyone with a smartphone may become a target of... more
This paper briefly describes the mathematics of a discontinuous Bayesian command decision model. The model uses the principle of minimisation of expected loss and is based on two basic elements: the uncertainty in the decision-makers’... more
In this paper, we consider cognitive maps as an additional tool for building a knowledge base of the DSS. Here we present the problem of choosing the optimal scenario of the impact between nodes in the cognitive maps based on of the... more
One goal of the NATO SAS-105 Symposium is to develop strategies to influence capabilities of military and civilian organizations in order to better harmonize ways to achieve desired strategic effects and outcomes. The paper describes how... more
This paper uses public diplomacy and strategic communication to describe an instrument of statecraft that embraces diplomacy, cultural diplomacy, international broadcasting, political communication, democracy building, and open military... more
Social media platforms such as Twitter pose new challenges for decision-makers in an international crisis. We examine Twitter's role during Iran's 2009 election crisis using a comparative analysis of Twitter investors, US State... more
– A system is described for applying hierarchical unsupervised neural networks (self organizing feature maps) to the intruder detection problem. Specific emphasis is given to the representation of time and the incremental development of a... more
Information Warfare (IW) is expected to play an increasingly dominant role in twenty first century conflict, wherein military superiority is a composite function of combat, electronic and information superiority. Various armies are... more
The modern armed forces use the electromagnetic field in a wide range for communication, weapon control, intelligence, navigation and force protection. The electronic devices used in these fields increase significantly the application... more
The potential for cyberwarfare is vast and is of concern to all nations, and national security defence. It appears that many countries are actively trying to protect their computer networks, whilst looking for ways that might bring down... more
This article describes and analyzes a little understood Afghan Taliban propaganda tool: chants or taranas. These melodic refrains effectively use historical narratives, symbology, and iconic portraits. The chants are engendered in... more
Much attention has been focused on the potential consequences of cyber attacks against critical infrastructure and the use of cyber weapons as an asymmetric equalizer. However, as a capability considered to be under the larger umbrella of... more
Robert Popp, Ph.D. Executive Vice President, Aptima, Boston, MA 01801 rpopp@aptima.com 781-935-3966 ... Stephen H. Kaisler, D.Sc. Senior Associate, SET Corporation, Arlington, VA 22203 skaisler@SETCorporation.com 571-218-4606 ... David... more