G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR1925.1
来源IDRR-1925/1-A
Lessons from Others for Future U.S. Army Operations in and Through the Information Environment
Christopher Paul; Colin P. Clarke; Michael Schwille; Jakub P. Hlavka; Michael A. Brown; Steven Davenport; Isaac R. Porche III; Joel Harding
发表日期2018-06-07
出版年2018
语种英语
结论

Both State and Nonstate Actors Excelled in Multiple Capability Areas

  • Adversaries and potential adversaries excelled in the most capability areas, with China and Russia showing the largest number of strengths.
  • China, North Korea, Iran, and Russia all excelled in cyber operations and censorship and information control; these efforts were critical to disseminating messages and undermining conflicting information.
  • Nonstate actors were proficient in using physical effects, such as terrorist attacks, as part of their messaging, as well as promoting their messages on social media, influencing audiences, and using narrative to strengthen their messages.

Allies and Adversaries Are Guided by Several Common Concepts and Principles in the Information Environment

  • Effective allies, adversaries, and potential adversaries devoted a significant amount of attention to maintaining the support of their own populations and recognized the importance of high production values for messaging campaigns.
  • Effective adversaries and potential adversaries generously resourced their information-related capabilities relative to other efforts and gave information effects priority or prominence in their operations.
  • Across all cases, it was rare for information activities to be centralized or housed in a single organization, and few actors made an effort to carefully document their own operations. However, when these principles were followed, they proved effective.

Adversaries and Potential Adversaries Have Advantages in the Information Environment

  • Unconstrained by ethics, law, or policy, these actors can engage in practices that are effective but unacceptable under U.S. laws and values, including cyber aggression outside of declared hostilities, targeting domestic audiences, disseminating falsehoods or manipulating information, and censoring messages that undermine their objectives.
摘要

Harnessing the power of old and new technology, it is easier than ever for U.S. allies and adversaries to reach — and influence — vast and varied audiences to achieve their strategic goals. Modern conflicts are fought as much in the information environment as on the physical battlefield, and the line between these domains is dissolving. Less sophisticated state actors and even nonstate actors have acquired capabilities previously available only to the most advanced nations to use information power in support of their objectives. Adversaries of the United States and its allies do not operate under the same legal and ethical constraints and are free to engage in offensive cyberwarfare, disseminate propaganda, censor traditional and online media, and threaten their detractors. As it prioritizes investments in future capabilities, the U.S. Army stands to benefit from an examination of the evolution of allied and adversary information campaigns, as well as their successes, failures, and potential future directions. This comparative analysis of 12 case studies highlights the capability areas in which others excel to guide the Army in either adopting or countering these principles and practices. A companion volume, Lessons from Others for Future U.S. Army Operations in and Through the Information Environment: Case Studies, supports this comparative analysis with detailed assessments of the information-related activities and strategic goals of a range of allies, adversaries, and potential adversaries.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Summary and Overview of the Cases

  • Chapter Three

    Comparative Analysis: Common Themes in the Cases

  • Chapter Four

    Comparative Analysis: Distinctive Features of the Cases

  • Chapter Five

    Conclusions and Recommendations

主题Canada ; China ; Cyber Warfare ; Germany ; Illegal Drug Trade ; Information Operations ; Iran ; Israel ; North Atlantic Treaty Organization ; North Korea ; Psychological Warfare ; Russia ; Terrorist Organizations
URLhttps://www.rand.org/pubs/research_reports/RR1925z1.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/523557
推荐引用方式
GB/T 7714
Christopher Paul,Colin P. Clarke,Michael Schwille,et al. Lessons from Others for Future U.S. Army Operations in and Through the Information Environment. 2018.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR1925z1.pdf(984KB)智库出版物 限制开放CC BY-NC-SA浏览
x1528491951519.jpg.p(5KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Christopher Paul]的文章
[Colin P. Clarke]的文章
[Michael Schwille]的文章
百度学术
百度学术中相似的文章
[Christopher Paul]的文章
[Colin P. Clarke]的文章
[Michael Schwille]的文章
必应学术
必应学术中相似的文章
[Christopher Paul]的文章
[Colin P. Clarke]的文章
[Michael Schwille]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR1925z1.pdf
格式: Adobe PDF
文件名: x1528491951519.jpg.pagespeed.ic.PMtyhqVcAz.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。