Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas

URL: <seeking-symmetry.info>

See also GISP Information Warfare Program.

Published proceedings:

K. A. Taipale, Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas, in Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas (INSCT-Bantle, forthcoming 2008).

Related Powerpoint Presentation:

Kim Taipale, "Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas," presentated at the Bantle - Institute for National Security and Counterterrorism (INSCT) Symposium: "Challenges in the Struggle Against Violent Extremism: Winning the War of Ideas" at Syracuse University, March 29-30, 2006.

DOWNLOAD: [presentation slides] (415 KB PDF)

Related recent article:

K. A. Taipale, Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet, Nat'l Strategy F. Rev., Vol. XVI (Summer 2007).

Other related material:

K. A. Taipale, "Deconstructing Information Warfare," presented to the Committee on Policy Consequences and Legal/Ethical Implications of Offensive Information Warfare, The National Academies, Washington, DC (Oct. 30, 2006) [download presentation slides] (240 KB PDF)

K. A. Taipale, "Information as Warfare: Disrupting Terrorist Networks" presented at the Yale Information Society Project, "Global Flow of Information" Conference, Yale Law School (Apr. 1-3, 2005). [abstract]

Other publications.

Related reference material:

National Security Council Strategy:

National Strategy for Combating Terrorism (2006)
National Security Strategy of the United States (2006)
9/11 Five Years Later: Successes and Challenges (2006)

Information Doctrine:

Information Operations Roadmap (DOD 2003) (HTML) Information Operations (JP 3-13 2006) (JEL)
Joint Doctrine for Electronic Warfare (JP 3-51) (2003)
Joint Doctrine for PSYOPS (JP 3-53 2003) (JEL)
Joint Doctrine for Public Affairs (JP 3-61 2005) (JEL)
Joint Doctrine for Civil Affairs (JP 3-57.1 2003) (JEL)
Joint Doctrine for Military Deception (JP 3-13.4) (2006)
Quadrennial Defense Review (2006) (QDR)

DoD S-3600.1, Information Operations (IO) (1996)
DoD 5240.1-R, Procedures Governing the Activities of DOD Intelligence Components that Affect United
States Persons (1982)
DoD 8500.1, Information Assurance (2002)
DoD O-8530.1, Computer Network Defense (CND) (2001)
CJCS 3210.01A, Joint Information Operations Policy (1998)
CJCS 6510.01D, Information Assurance (IA) and Computer Network Defense (CND) (2004)

USAF Policy Doc. 10-7 Information Operations (2006)

Fourth Generation Warfare:

William S. Lind, et al., The Changing Face of War: Into the Fourth Generation, The Marine Corps Gazette (Oct. 1989)

Maj. Gen. G.A. Berezkin, et al. Lessons From the War in Iraq, Military Thought (May 2003)

Unrestricted Warfare, by Qiao Liang and Wang Xiangsui (Beijing: PLA Lit. and Arts. Publ. House, 1999)

Donald H. Rumsfeld, Speech to the Council on Foreign Relations (Feb. 17, 2006)

Counterinsurgency Doctrine:

Small Wars Manual (SWM) (Marine Corps, USN 1940)
Military Operations Other that War (MOOTW) (JP 3-07 1995) (JEL)
Joint Tactics, Techniques, and Procedures for Foreign Internal Defense (FID) (JP 3-07.1 1996, 2004) (JEL)
Counterinsurgency Operations (FMI 3-07.22 2004)
U.S. Army Special Operations Forces Field Manual (FM 3-05 Sep. 20, 2006)
"Counterinsurgency," U.S. Army Field Manual 3-24, December 15, 2006 (12.9 MB PDF)

Iraqi Insurgency:

Electronic Propaganda of the Iraqi Insurgency (NCCI 2005)
In Their Own Words: Reading the Iraqi Insurgency (ICG 2006)

Al Qa'ida:

Does Our CT Strategy Match the Threat? (Hoffman RAND 2005)
Harmony and Disharmony (CTC West Point 2006)
Stealing Al-Qa’ida’s Playbook (CTC West Point 2006)

Osama Bin Laden, Declaration of War against Americans Occupying the Land of the Two Holy Places (1996)

Osama Bin Laden, et al., Jihad Against the Jews and Crusaders, World Islamic Front Statement (1998).

A Military Guide to Terrorism in the 21st Century (TRACDOC, DCSINT, HB No. 1, Version 3.0, Aug. 2005)

Books:

Networks and Netwars (Arquilla & Ronfeldt 2001)
ISBN:0833030302

The Pentagon’s New Map (Thomas Barnett 2004)
ISBN:0399151753

Terror in the Name of God (Stern 2003)
ISBN:006050532X

Inside Terrorism (Hoffman 1999)
ISBN:0231114680

Understanding Terror Networks (Sageman 2004)
ISBN:0812238087

About the Center for Advanced Studies:

The Center for Advanced Studies in Science and Technology Policy ("CAS") is a private, non-partisan research and advisory organization focused on information, technology and national security policy and related issues.

The Center seeks to inform and influence national and international policy- and decision-makers in both the public and private sectors by providing sound, objective analysis and advice, in particular by identifying and articulating issues that lie at the intersection of technologically enabled change and existing practice in policy, law, government, and industry.

In addition to its independent research activities and public engagements, the Center provides select advisory services to policy-makers in government and decision-makers in the private sector.

CAS Areas of Focus:

Information Policy: Global, national and domestic security policy, civil liberties (including privacy), cybersecurity and computer crime, telecommunications and spectrum, intellectual property, innovation and antitrust, internet and free speech. Information policy and free trade, globalization and global security, international jurisdiction, internet governance. Information management, institutional and organizational architecture, and business process engineering.

Enabling Technologies: Data aggregation, data integration, data fusion, data analysis, data mining, artificial intelligence, decision support, distributed networks, enterprise architecture, distributed computing, wireless communication, remote sensing, identification, authentication, network and computer security, biometrics, cryptography, rule-based processing, digital rights management, knowledge management.

Security Applications: Foreign intelligence, defense intelligence, counter-intelligence (CI), domestic intelligence, law enforcement, counter-terrorism, counter-insurgency, regulatory compliance, corporate and enterprise security, corporate intelligence, competitive intelligence, systems security, cybersecurity, information security, communication security, information assurance (IA), information warfare (IW), perception management, strategic influence, information operations (IO), psychological operations (PSYOPS), military deception, operations security (OPSEC), electronic warfare (EW), computer network operations (CNO), computer network attack (CNA), computer network defense (CND), netcentric strategy, environmental monitoring, international relations and global security.

Related Areas of Research Interest: Technology innovation and adoption, social change, knowledge-creation, deciscion-making, risk-analysis, risk-management, conflict resolution, deviation analysis, pedagogy, communications, media analysis, information economics, control theory, network theory, emergence, complexity, history of technology, and cultural history.

CAS Research Programs:

Global Information Society Project, a joint research effort of the Center and the World Policy Institute.

Program on Law Enforcement and National Security in the Information Age

Program on Information Warfare (Information Operations, Information Assurance and Operational Resilience)

Program on Telecommunications and Spectrum Policy

Program on Environment and Energy Policy

Program on Intellectual Property and Trade

Other research programs

Other Links:

ACADEMIC CENTERS AND INSTITUTIONS

The Brookings Institution - Terrorism

Center for Nonproliferation Studies: Nuclear Arms and Chemical and Biological Weapons Resource Page

Combating Terrorism Center at West Point

Global Terrorism Analysis (Jamestown Foundation)

Institute for National Security and Counterterrorism

The Jebsen Center for Counter Terrorism Studies

Journal of Homeland Security

Rand Corporation -- Terrorism and Homeland Security

SITE Institute (Search for Intl. Terrorist Entitites)

U.S. GOVERNMENT

Counterterrorism: Training and Resources for Law Enforcement

CIA Terrorism page

U.S. Department of State: Counterterrorism Office

INTERNATIONAL

NATO and Terrorism

International Relations and Security Network (ISN)

UN on Terrorism

INFORMATION WARFARE SITES

IWS - The Information Warfare Site
[www.iwar.org.uk]

The Information Warfare Monitor
[www.infowar-monitor.net]

Information Warfare, I-War, IW, C4I, Cyberwar
[www.psycom.net/iwar.1.html]

Federation of American Scientists - IW Resources
[www.fas.org/irp/wwwinfo.html]