SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Equity Dilemmas for Psychological
Operations and Public Information in
  Military Information Operations
             Captain Jeff Malone
Future Land Warfare Branch – Army Headquarters
            Department of Defence

Information and Technology: The Double Edged Sword Conference
                  Canberra – 19 February 2001
This presentation is
 UNCLASSIFIED
Caveats
 The views contained herein are those of the author
  and should not be construed as representing the
  official position of the Department of Defence or
  the Australian Defence Force
 The presentation represents AN Australian view,
  not THE Australian view
Scope of Presentation
   ADF Approach to Information Operations
   Psychological Operations and Public Information
   Implications of the Information Revolution
   The Way Forward?
   Conclusion
ADF Approach to Information
       Operations
Information Operations

 The coordination of information related
  activities to produce a tailored effect in
  those factors which influence the decision
  making and actions of a target audience and
  to protect and enhance our own decision
  making and action capability
INFORMATION
                              OPERATIONS

 Offensive                    Defensive                 Information
Information                  Information                Operations
Operations                   Operations                   Support


   Computer Network Attack      Counterintelligence        Civil Affairs
   Deception                    Electronic Protection      Intelligence Support
   Destruction                  Information Assurance      PUBLIC
   Electronic Attack            OPERATIONS                 AFFAIRS
   PSYCHOLOGICAL                SECURITY
   OPERATIONS
IO and Warfare
            Decision Superiority


             Knowledge Edge



Offensive
                                Information Superiority
   IO

                    C2 Structures and                                   C2 Structures and
                    decision processes                                  decision processes         Offensive
                                                                                                      IO
           Human and           C4ISREW        Offensive        Human and           C4ISREW
        Intellectual Capital   Capabilities                 Intellectual Capital   Capabilities
                                                 IO
                  Defensive IO                                        Defensive IO
                                                Offensive
Offensive                                                                                         Offensive
                                                   IO
   IO                Our “System”                              Opponent “System”                     IO
Key Characteristics of
      Information Operations (1)
 IO is NOT just about computers
    But computers and computer related activities

     ARE becoming increasingly important
     • Computer Network Attack (CNA)
     • Information Assurance (IA)
     • Computer Network Defence (CND)
Key Characteristics of
      Information Operations (2)
 IO is the INTEGRATED employment of
  information-related activities to achieve an effect
 They can be:
    Offensive/Shaping or Defensive

    Active or Passive

    Proactive or Reactive

 This requires centralised COORDINATION and
  DECONFLICTION of activities
Key Characteristics of
        Information Operations (3)
 Effective IO must be a NATIONAL effort
   Activities  will cross departmental/agency
    boundaries - Whole of Government approach
   Activities will cross public/private boundaries -

    Whole of Nation approach
PSYOP and Public Information -
 The Traditional Relationship
Psychological Operations
 “Planned psychological activities in peace
  and war directed to enemy, friendly and
  neutral audiences to order to influence
  attitudes and behaviour affecting the
  achievement of political and military
  objectives”
Public Information
 “Information which is released or published
  for the primary purpose of keeping the
  public fully informed, thereby gaining their
  understanding and support”
Functional and Geographical
    Responsibilities for PI and PSYOP
                                                  Audiences within the
                                                   Area of Operations
                                                 Psychological Operations
                                                    Public Information
                                                        (Defence)
International Audiences
   Public Information
        (DFAT)




                          Australian Audiences
                            Public Information
                          (Defence/Government)
PSYOP vs Public Information
     Criteria               PSYOP                  Public Information


Source Disclosure True source may not be      True source must be disclosed
                  disclosed

Truthfulness      May involve the use of      Must not involve the use of
                  falsehood                   falsehood

Dissemination     Disseminated method chosen Dissemination method largely
Means             by sponsor                 chosen by media outlet
Implication of the Information
 Revolution for PSYOP and
 Public Information activities
Outcomes of the Information
Revolution that affect PSYOP and PI
   Pervasiveness of the global electronic media
   Lack of control over communication means
   New methods of media dissemination
   Convergence of dissemination means
   Digital manipulation
       Morphing of Digital Images
       Hacking/Alteration of web pages
Implications for PSYOP and PI
 Western audiences are increasingly accessible to
  adversary propaganda campaigns
 „Softwar‟ increasingly the tool of choice for
  asymmetric adversaries
 The conduct of PSYOP and PI activities in
  support of military objectives by Western states
  is increasingly complex
 Convergence of media dissemination means
  implies convergence of PSYOP/PI with other
  elements of IO (in particular, IA)
Ways Forward?
Better integrate
              PSYOP and PI
 Emulate US International Public
  Information (IPI) concept
     Standing arrangement between Whitehouse,
      State Department and Defense Department
     Detailed in PDD-68 dated early 1999
     Coordinates dissemination of external messages
      and counter-propaganda activities
     Problem: where does coordination stop and
      spin-doctoring begin?
 Currently under consideration
Better Integrate PSYOP/PI
       with Other IO Activities
 Need a national approach to IO
 Would integrate IPI type activities with
  other national IO activities
     Particularly IA and defence of the NII
     Requires standing arrangements that cross
      current portfolio/agency boundaries
     Implies a need for adjustment in Australian
      national security arrangements
 Currently under consideration
Conclusion
Conclusion
 Information Revolution has potential to greatly
  enhance the effect of PSYOP and PI activities,
  but…
 Makes the conduct of PSYOP/PI more challenging
 Has increased the vulnerability of Western
  audiences and states to external influence
 Difficulties can be addressed, but will require
  adjustments to Australian national security
  architecture
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

History of warfare
History of warfareHistory of warfare
History of warfare
Hamza Abbasi
 
Soft Power Vs Hard Power
Soft Power Vs Hard PowerSoft Power Vs Hard Power
Soft Power Vs Hard Power
edvill666
 
Chapter 5 5.3 allied resistance
Chapter 5   5.3 allied resistanceChapter 5   5.3 allied resistance
Chapter 5 5.3 allied resistance
Reuben Ong
 
Concept of strategy in ir
Concept of strategy in irConcept of strategy in ir
Concept of strategy in ir
jayanjali
 
Iraq War
Iraq WarIraq War
Iraq War
MrG
 

Was ist angesagt? (20)

Defence and Security
Defence and SecurityDefence and Security
Defence and Security
 
Korean war
Korean warKorean war
Korean war
 
Strategy by liddell hart
Strategy by liddell hartStrategy by liddell hart
Strategy by liddell hart
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Presentation on modern warfare techniques
Presentation on modern warfare techniquesPresentation on modern warfare techniques
Presentation on modern warfare techniques
 
Jfc fuller
Jfc fullerJfc fuller
Jfc fuller
 
Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1Introduction to strategic studies & key concepts 2013 1
Introduction to strategic studies & key concepts 2013 1
 
National power.......
National power.......National power.......
National power.......
 
Evolution of strategic thoughts
Evolution of strategic thoughtsEvolution of strategic thoughts
Evolution of strategic thoughts
 
Lecture 2 -Technology, Innovation and Great Power Competition
Lecture 2 -Technology, Innovation and Great Power CompetitionLecture 2 -Technology, Innovation and Great Power Competition
Lecture 2 -Technology, Innovation and Great Power Competition
 
History of warfare
History of warfareHistory of warfare
History of warfare
 
Soft power cultural studies post globalization
Soft power cultural studies post globalizationSoft power cultural studies post globalization
Soft power cultural studies post globalization
 
Soft Power Vs Hard Power
Soft Power Vs Hard PowerSoft Power Vs Hard Power
Soft Power Vs Hard Power
 
Chapter 5 5.3 allied resistance
Chapter 5   5.3 allied resistanceChapter 5   5.3 allied resistance
Chapter 5 5.3 allied resistance
 
Realist theories of global politics
Realist theories of global politicsRealist theories of global politics
Realist theories of global politics
 
Concept of strategy in ir
Concept of strategy in irConcept of strategy in ir
Concept of strategy in ir
 
Lesson #8 post cold war era
Lesson #8 post cold war eraLesson #8 post cold war era
Lesson #8 post cold war era
 
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
 
Iraq War
Iraq WarIraq War
Iraq War
 
Five paradoxes of soft power in a post globalization era
Five paradoxes of soft power in a post globalization eraFive paradoxes of soft power in a post globalization era
Five paradoxes of soft power in a post globalization era
 

Andere mochten auch

Andere mochten auch (8)

Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations Workforce
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian Perspective
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence Force
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian Perspective
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network Operations
 

Ähnlich wie Equity Dilemmas for Psychological Operations and Public Information in Military Information Operations

OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
loganta
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
atrantham
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentation
svito
 
IS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_FinalIS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_Final
David Cass
 
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Source Conference
 

Ähnlich wie Equity Dilemmas for Psychological Operations and Public Information in Military Information Operations (20)

Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)
 
Faster and more united?
Faster and more united?Faster and more united?
Faster and more united?
 
AFCOM - Information Security State of the Union
AFCOM - Information Security State of the UnionAFCOM - Information Security State of the Union
AFCOM - Information Security State of the Union
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 
Pl filera levante_ pietro leo
Pl filera levante_ pietro leoPl filera levante_ pietro leo
Pl filera levante_ pietro leo
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
WANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language ProblemWANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language Problem
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
Information Strategies
Information StrategiesInformation Strategies
Information Strategies
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentation
 
GI2010 symposium-ws1.2 longhorn (checklist questionaire)
GI2010 symposium-ws1.2 longhorn (checklist questionaire)GI2010 symposium-ws1.2 longhorn (checklist questionaire)
GI2010 symposium-ws1.2 longhorn (checklist questionaire)
 
IS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_FinalIS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_Final
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
Pio And Emergency Work
Pio And Emergency WorkPio And Emergency Work
Pio And Emergency Work
 
Ares Pio And Emergency Work
Ares Pio And Emergency WorkAres Pio And Emergency Work
Ares Pio And Emergency Work
 
Pietro leo - Active Intelligence
Pietro leo - Active IntelligencePietro leo - Active Intelligence
Pietro leo - Active Intelligence
 
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
 

Kürzlich hochgeladen

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 

Kürzlich hochgeladen (20)

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 

Equity Dilemmas for Psychological Operations and Public Information in Military Information Operations

  • 1. Equity Dilemmas for Psychological Operations and Public Information in Military Information Operations Captain Jeff Malone Future Land Warfare Branch – Army Headquarters Department of Defence Information and Technology: The Double Edged Sword Conference Canberra – 19 February 2001
  • 2. This presentation is UNCLASSIFIED
  • 3. Caveats  The views contained herein are those of the author and should not be construed as representing the official position of the Department of Defence or the Australian Defence Force  The presentation represents AN Australian view, not THE Australian view
  • 4. Scope of Presentation  ADF Approach to Information Operations  Psychological Operations and Public Information  Implications of the Information Revolution  The Way Forward?  Conclusion
  • 5. ADF Approach to Information Operations
  • 6. Information Operations  The coordination of information related activities to produce a tailored effect in those factors which influence the decision making and actions of a target audience and to protect and enhance our own decision making and action capability
  • 7. INFORMATION OPERATIONS Offensive Defensive Information Information Information Operations Operations Operations Support Computer Network Attack Counterintelligence Civil Affairs Deception Electronic Protection Intelligence Support Destruction Information Assurance PUBLIC Electronic Attack OPERATIONS AFFAIRS PSYCHOLOGICAL SECURITY OPERATIONS
  • 8. IO and Warfare Decision Superiority Knowledge Edge Offensive Information Superiority IO C2 Structures and C2 Structures and decision processes decision processes Offensive IO Human and C4ISREW Offensive Human and C4ISREW Intellectual Capital Capabilities Intellectual Capital Capabilities IO Defensive IO Defensive IO Offensive Offensive Offensive IO IO Our “System” Opponent “System” IO
  • 9. Key Characteristics of Information Operations (1)  IO is NOT just about computers  But computers and computer related activities ARE becoming increasingly important • Computer Network Attack (CNA) • Information Assurance (IA) • Computer Network Defence (CND)
  • 10. Key Characteristics of Information Operations (2)  IO is the INTEGRATED employment of information-related activities to achieve an effect  They can be:  Offensive/Shaping or Defensive  Active or Passive  Proactive or Reactive  This requires centralised COORDINATION and DECONFLICTION of activities
  • 11. Key Characteristics of Information Operations (3)  Effective IO must be a NATIONAL effort  Activities will cross departmental/agency boundaries - Whole of Government approach  Activities will cross public/private boundaries - Whole of Nation approach
  • 12. PSYOP and Public Information - The Traditional Relationship
  • 13. Psychological Operations  “Planned psychological activities in peace and war directed to enemy, friendly and neutral audiences to order to influence attitudes and behaviour affecting the achievement of political and military objectives”
  • 14. Public Information  “Information which is released or published for the primary purpose of keeping the public fully informed, thereby gaining their understanding and support”
  • 15. Functional and Geographical Responsibilities for PI and PSYOP Audiences within the Area of Operations Psychological Operations Public Information (Defence) International Audiences Public Information (DFAT) Australian Audiences Public Information (Defence/Government)
  • 16. PSYOP vs Public Information Criteria PSYOP Public Information Source Disclosure True source may not be True source must be disclosed disclosed Truthfulness May involve the use of Must not involve the use of falsehood falsehood Dissemination Disseminated method chosen Dissemination method largely Means by sponsor chosen by media outlet
  • 17. Implication of the Information Revolution for PSYOP and Public Information activities
  • 18. Outcomes of the Information Revolution that affect PSYOP and PI  Pervasiveness of the global electronic media  Lack of control over communication means  New methods of media dissemination  Convergence of dissemination means  Digital manipulation  Morphing of Digital Images  Hacking/Alteration of web pages
  • 19. Implications for PSYOP and PI  Western audiences are increasingly accessible to adversary propaganda campaigns  „Softwar‟ increasingly the tool of choice for asymmetric adversaries  The conduct of PSYOP and PI activities in support of military objectives by Western states is increasingly complex  Convergence of media dissemination means implies convergence of PSYOP/PI with other elements of IO (in particular, IA)
  • 21. Better integrate PSYOP and PI  Emulate US International Public Information (IPI) concept  Standing arrangement between Whitehouse, State Department and Defense Department  Detailed in PDD-68 dated early 1999  Coordinates dissemination of external messages and counter-propaganda activities  Problem: where does coordination stop and spin-doctoring begin?  Currently under consideration
  • 22. Better Integrate PSYOP/PI with Other IO Activities  Need a national approach to IO  Would integrate IPI type activities with other national IO activities  Particularly IA and defence of the NII  Requires standing arrangements that cross current portfolio/agency boundaries  Implies a need for adjustment in Australian national security arrangements  Currently under consideration
  • 24. Conclusion  Information Revolution has potential to greatly enhance the effect of PSYOP and PI activities, but…  Makes the conduct of PSYOP/PI more challenging  Has increased the vulnerability of Western audiences and states to external influence  Difficulties can be addressed, but will require adjustments to Australian national security architecture