Knowledge (XXG)

Information Operations (United States)

Source 📝

2788:
fundamental to effective PSYOP and IO. This is particularly important in the early stages of an operation given the time it takes to develop, design, produce, distribute, disseminate, and evaluate PSYOP products and actions. All PSYOP are conducted under the authority of interagency-coordinated and OSD approved PSYOP programs. The PSYOP program approval process at the national level requires time for sufficient coordination and resolution of issues; hence, JFCs should begin PSYOP planning as early as possible to ensure the execution of PSYOP in support of operations. A JFC must have an approved PSYOP program, execution authority, and delegation of product approval authority before PSYOP execution can begin. JFCs should request PSYOP planners immediately during the initial crisis stages to ensure the JFC has plenty of lead time to obtain the proper authority to execute PSYOP. PSYOP assets may be of particular value to the JFC in pre-/post-combat operations when other means of influence are restrained or not authorized. PSYOP must be coordinated with CI, MILDEC, and OPSEC to ensure deconfliction and control, CI operations are not compromised, and that all capabilities within IO are coordinated to achieve the objectives established in planning. There must be close cooperation and coordination between PSYOP and PA staffs in order to maintain credibility with their respective audiences, which is the purpose of the IO cell. PSYOP efforts are most effective when personnel with a thorough understanding of the language and culture of the TA are included in the review of PSYOP materials and messages. As the information environment evolves, the dissemination of PSYOP products is expanding from traditional print and broadcast to more sophisticated use of the Internet, facsimile messaging, text messaging, and other emerging media. The effectiveness of PSYOP is enhanced by the synchronization and coordination of the core, supporting, and related capabilities of IO; particularly
2837:
forces' mission. MILDEC and OPSEC are complementary activities – MILDEC seeks to encourage incorrect analysis, causing the adversary to arrive at specific false deductions, while OPSEC seeks to deny real information to an adversary, and prevent correct deduction of friendly plans. To be effective, a MILDEC operation must be susceptible to adversary collection systems and "seen" as credible to the enemy commander and staff. A plausible approach to MILDEC planning is to employ a friendly course of action (COA) that can be executed by friendly forces and that adversary intelligence can verify. However, MILDEC planners must not fall into the trap of ascribing to the adversary particular attitudes, values, and reactions that "mirror image" likely friendly actions in the same situation, i.e., assuming that the adversary will respond or act in a particular manner based on how we would respond. There are always competing priorities for the resources required for deception and the resources required for the real operation. For this reason, the deception plan should be developed concurrently with the real plan, starting with the commander's and staff's initial estimate, to ensure proper resourcing of both. To encourage incorrect analysis by the adversary, it is usually more efficient and effective to provide a false purpose for real activity than to create false activity. OPSEC of the deception plan is at least as important as OPSEC of the real plan, since compromise of the deception may expose the real plan. This requirement for close hold planning while ensuring detailed coordination is the greatest challenge to MILDEC planners. On joint staffs, MILDEC planning and oversight responsibility is normally organized as a staff deception element in the operations directorate of a joint staff (J-3).
2689:(EMS) while protecting friendly freedom of action in that spectrum. Expanding reliance on the EMS for informational purposes increases both the potential and the challenges of EW in IO. The increasing prevalence of wireless telephone and computer usage extends both the utility and threat of EW, offering opportunities to exploit an adversary's electronic vulnerabilities and a requirement to identify and protect our own from similar exploitation. As the use of the EMS has become universal in military operations, so has EW become involved in IO. All of the core, supporting, and related IO capabilities can either directly use EW or indirectly benefit from EW. In order to coordinate and deconflict EW, and more broadly all military usage of the EMS, an Electronic Warfare Coordination Cell (EWCC) may be established to reside with the component commander most appropriate to the operation. In addition, all joint operations require a joint restricted frequency list (JRFL). This list specifies protected, guarded, and taboo frequencies that should not normally be disrupted without prior coordination and planning, either because of friendly use or friendly exploitation. This is maintained and promulgated by the communications system directorate of a joint staff (J-6) in coordination with J-3 and the joint commander's electronic warfare staff (or EWCC, if delegated). 3715:"There must be a fundamental change of culture in how ISAF approaches operations. StratCom should not be a separate Line of Operation, but rather an integral and fully embedded part of policy development, planning processes, and the execution of operations. Analyzing and maximizing StratCom effects must be central to the formulation of schemes of maneuver and during the execution of operations. In order to affect this paradigm shift, ISAF HQ must synchronize all stratCom stakeholders. Implicit in this change of culture is the clear recognition that modern strategic communication is about credible dialogue, not a monologue where we design our systems and resources to deliver messages to target audiences in the most effective manner. This is now a population centric campaign and no effort should be spared to ensure that the Afghan people are part of the conversation. Receiving, understanding, and amending behavior as a result of messages received from audiences can be an effective method of gaining genuine trust and credibility. This would improve the likelihood of the population accepting ISAF messages and changing their behavior as a result." 3258:
communications tool used to broadcast information where radio ownership exceeds 80 percent. The United States military operates approximately 100 RIABs and hire local Afghan DJs in Afghanistan to broadcast information and host call-in shows. The United States Army employed RIAB systems to broadcast anti-Taliban and anti-Al Qaeda messages and countered Taliban propaganda by pushing onto Taliban frequencies in Paktia Province. One advantage of employing RIAB systems is the ability to broadcast vital information immediately to a large audience in the event of a crisis. One Afghan DJ has 50,000 listeners. Nawa District Governor Abdul Manaf uses the local RIAB station to conduct weekly call-in shows and believes the RIAB system is one of his best communication tools to inform a large audience. In Afghanistan's Paktika province, which has a literacy rate of two percent, an estimated 92 percent of the residents listen to the radio every day. Radio programs transmitted using RIAB systems provide beneficial information to Afghan farmers in remote areas. In the isolated, mountainous Wazi Kwah district of
3393:"Terrorists employ all the IO capabilities of U.S. military doctrine, including the five core capabilities of PSYOP, military deception, EW, CNO, and OPSEC, and the supporting and related capabilities. They use IO to support both offensive operations (acts of terrorism) and defensive operations (e.g., protecting their hiding places). They use IO strategically in support of broad objectives. While terrorists do not speak and write of "IO", they demonstrate an understanding of the value and methods of IO capabilities. Terrorists appear to be particularly adept at PSYOP, PA, counterpropaganda, and certain forms of OPSEC and deception, driven by their desire to simultaneously reach desired audiences and hide from their enemies. They recognize the value of various media, including the Internet, and exploit it to support their cause. Terrorists and their supporters have a CNO capability, with CNA manifesting itself as "electronic jihad" rather than as acts of terror." 647: 456: 418: 398: 3712:"In , the most important targets of influence are not enemy commanders, but individuals and groups, both local and international, whose cooperation is vital to the mission's success. Granted, joint and Army IO doctrine publications do not ignore these targets – PSYOP and counterpropaganda can be designed to influence them. But it is notable that the activities most directly aimed at influencing local and international audiences – functions such as public affairs, civil affairs, CMOs, and defense support to public diplomacy – are treated only as 'related activities' in IO doctrine, if they are mentioned at all" 2875:
capabilities that exploit new opportunities and vulnerabilities, such as EW and CNO, OPSEC is essential to ensure friendly capabilities are not compromised. The process of identifying essential elements of friendly information and taking measures to mask them from disclosure to adversaries is only one part of a defense-in-depth approach to securing friendly information. To be effective, other types of security must complement OPSEC. Examples of other types of security include physical security, IA programs, computer network defense (CND), and personnel programs that screen personnel and limit authorized access.
436: 3036:(FBM) submarine force and as a backup communications link for the USAF manned strategic bomber and intercontinental ballistic missile forces. To ensure survivability, TACAMO operated as a solo platform, well away from and not interacting with other major naval forces such as sea-based aircraft carrier strike groups and their carrier air wings or land-based maritime patrol aircraft Operated by Fleet Air Reconnaissance Squadron THREE (VQ-3) and Fleet Air Reconnaissance Squadron FOUR (VQ-4), the EC-130Q was eventually replaced by the U.S. Navy's current TACAMO platform, the 269: 378: 2636: 2695:. DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles (UAVs) or robots operated by adversaries. 2752: 569: 2841:
their efforts. This requires a high degree of coordination with all elements of friendly forces' activities in the information environment as well as with physical activities. Each of the core, supporting, and related capabilities has a part to play in the development of successful MILDEC and in maintaining its credibility over time. While PA should not be involved in the provision of false information, it must be aware of the intent and purpose of MILDEC in order not to inadvertently compromise it.
2827: 2776: 3540:"...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." (p. 9–10) 3262:, a RIAB system supplies the only source of outside news. Afghan National Army commanders use the RIAB to communicate to villagers and elders and provide thoughts to the community. Afghans can use information distributed by the United States military such as how to react to an approaching military convoy or purpose or use of U.S.-sponsored agriculture programs. For general news, Afghans can also use other information outlets such as the 3543:"International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p. 41–42) 596: 2978:, and military communications bands. Missions are flown at the maximum altitudes possible to ensure optimum propagation patterns. The EC-130J flies during either day or night scenarios with equal success, and is air-refuelable. A typical mission consists of a single-ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel. The Commando Solo is operated exclusively by the 2656: 3420:
destruction of numerous NATO armoured vehicles and the deaths of scores of Western or Afghan security forces, with NATO quickly countering in its own Twitter feeds. The Taliban also employ a sophisticated network of spokesmen to distribute messages and even have their own mobile radio broadcast service, which frequently moves location to avoid the threat of retaliatory airstrikes by NATO warplanes."
34: 526: 347: 179: 2768: 95: 2866: 3106:, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet. According to the 5622: 3628: 3344: 3250: 226:. Though these examples fall within the capabilities associated with information operations, they were applied in specific circumstances for particular missions and not de-conflicted or synchronized for maximum effect. Because of their discrete applications, information operations was not fully exercised during the war as it is known today. 3389:"Terrorists are adept at integrating their physical acts of violence with IO. They make audio and video recordings of the incidents for distribution over the Internet and on television. Their violence becomes theater, staged for its psychological impact, and replayed over and over again in the media as IO." 3708:
the previous year. Hastings' article "The Run Away General" ultimately led to McChrystal's firing by President Obama. Media reports stated that the Holmes' IO unit was subjected to a retaliatory campaign when it resisted the order to influence the targets, including a subsequent reprimand against Lt.
3606:
reportedly received a coded email message that read: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering." The faculties referred to the four targets (twin
3562:
A police search of a British, al-Qaeda member's home, uncovered what is now called "The al-Qaeda Training Manual", a techniques instruction book on deception, forgery, "blending in", hiding places, and the use of covers to blend into the terrorist area of operation (usually cities with large civilian
194:", on January 20, 1944. This secretive unit was responsible for executing 22 large-scale military deceptions in Europe using techniques such as inflatable vehicles, false radio transmissions, loud-speaker sound effects, and phone generals. Specific operations the 23rd was noted for having success was 3553:
By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff
285:
system. These directorates typically have an array of personnel from information operations generalists, intelligence analysts, psychological operations specialists, and cyber and electronic warfare officers. Different headquarters have included civil affairs, space and cyberspace operations within
3581:
The Internet is the main resource to spread propaganda with al-Aqaeda and other terrorist groups. "According to Bruce Hoffman, before it was taken down, al-Qaeda's website Alneda.com emphasized three themes: 1)the West is implacably hostile to Islam, 2) the only way to address this threat and the
3577:
Terrorist PSYOP differs from American PSYOP in one two major areas. First, US PSYOP targets foreign adversaries and information is coordinated with many other agencies and screened before it is published. Second, while PSYOP by US and coalition forces is "designed to bring an end to violence and
2874:
OPSEC as an IO Core Capability. OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions. In particular, OPSEC complements MILDEC by denying an adversary information required to both assess a real plan and to disprove a deception plan. For those IO
2840:
MILDEC as an IO Core Capability. MILDEC is fundamental to successful IO. It exploits the adversary's information systems, processes, and capabilities. MILDEC relies upon understanding how the adversary commander and supporting staff think and plan and how both use information management to support
2717:
CNO as an IO Core Capability. The increasing reliance of unsophisticated militaries and terrorist groups on computers and computer networks to pass information to C2 forces reinforces the importance of CNO in IO plans and activities. As the capability of computers and the range of their employment
2836:
MILDEC is described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly
2830:
Simulated OH-58C Kiowa helicopter and simulated fuel blivets during a deception operation on 10 November 1990 carried out by the XVIII Airborne Corps Deception Cell. This simulated forward arming and refueling point (FARP) at TL 139512 in the Eastern Province of Saudi Arabia was approximately 45
2787:
PSYOP has a central role in the achievement of IO objectives in support of the JFC. In today's information environment even PSYOP conducted at the tactical level can have strategic effects. Therefore, PSYOP has an approval process that must be understood and the necessity for timely decisions is
236:
In the mid-1990s, the U.S. Department of Defense began characterizing doctrine known as Command and Control Warfare (C2W) which was described as a strategy to attack the decision-making, or command and control (C2) capabilities of an adversary while protecting the decision-making capabilities of
3410:
As for CND, terrorists are aware of keeping data secure and websites running because they use the Internet. Hamas and Hizballaha have had to defend their websites from Israeli hackers who in the past have defaced them. The methods they use include access controls, encryption, authentication,
2844:
A message targeted to exploit a fissure between a key member of the adversary's leadership who has a contentious relationship with another key decision maker is an example. That message could cause internal strife resulting in the adversary foregoing an intended course of action and adopting a
2666:
Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly
4902: 276:
Information Operations is considered an umbrella term to describe the coordination activities required to plan, synchronize, and assess operations, activities, and investments typically related to the non-lethal capabilities of psychological operations, cyberspace operations, civil-military
3419:
with NATO forces in the country, distributing anti-government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014. A day rarely passes without a Taliban spokesman using Twitter to claim the
614:
Many U.S. Air Force units have redesignated between Information Operations, Cyberspace Operations, and Intelligence. For example, the 39th IO Sqdn's official website identifies itself as a subordinate organization of the 688th Information Operations Wing, however the Wing's official website
3257:
Radio is the dominant information tool to reach wide audiences in isolated, mountainous regions. The US military has deployed RIABs throughout Afghanistan in order to communicate with the residents. Due to a 70 percent illiteracy rate and lack of education in Afghanistan, radio is a vital
259:
During this time, the Army National Guard began to engage in developing their own information operations capabilities, establishing ad hoc information operations field support teams (FSTs), and vulnerability assessments teams (VATs), coordinated with the LIWA/IDC. National Guard units from
2887:, or upload photos, which can lead to the enemy knowing troop movements and locations. With this information, setting up ambush and wreaking havoc on US and support personnel becomes much easier. Geo-tagging features of cellular phones especially, may cause this type of breach in OPSEC. 3597:
All terrorists practice a high level of OPSEC since their need to be secret is how they can be successful. Whether it is the al-Qaeda training manual, online magazines targeted for the world, or the training of youth in Jihad camps, OPSEC is one of the first priorities for terrorists.
248:
approved the Department of Defense release of a then Secret Directive S-3600.1 that codified the concept of Information Operations. This directive mandated the U.S. Armed Services to develop their own doctrine, training, and equipment, to execute information operations.
3284:--The SOMS-B is a ground-based HMMWV mounted radio and television broadcast system. Like the EC-130C/J it can broadcast on AM, FM, SW and VHF television frequencies. The SOMS-B also has the capability to produce programming or radio and television broadcasts 4421: 2718:
broadens, new vulnerabilities and opportunities will continue to develop. This offers both opportunities to attack and exploit an adversary's computer system weaknesses and a requirement to identify and protect our own from similar attack or exploitation.
2878:
What occurs, often, is that data is either leaked, stolen, or hacked online and the enemy has access to and can decipher what that information may say. This is especially true for defensive operational security. US servicemen and servicewomen may have
2799:
Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and
372:, units division-sized or larger have an IO staff directorate, known as the G-39, responsible for the integration of information operations capabilities. These directorates are often augmented by IO Field Support Teams from the following Army IO units: 3270:
because RIAB systems are controlled by the US military. Special Operations first employed RIAB systems in Afghanistan in 2005 which improved their ability to supply information to and communicate with the local population in their areas of operation.
3402:
There are many examples of CNA and are generally done in support of other operations. Terrorists have integrated cyber attacks into their thinking, strategies, and operations as an extremely cost-effective way to harm the US and other adversaries.
3406:
The same can be said for CNE, which is about penetrating computer networks before actually attacking them. Gaining access to specific networks is seen to be as part of the CNA process for terrorists (they do not distinguish between the two).
170:(OPSEC), in concert with specified supporting and related capabilities, to Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems. 3601:
Secure communications are big as well. The 11 September hijackers, for example, accessed anonymous Hotmail and Yahoo! accounts from computers at Kinko's and at a public library. Messages are also coded. Three weeks before the attacks,
237:
friendly forces. It focused on a robust targeting system and defined five core capabilities, called pillars, it leverages: operations security, military deception, psychological operations, electronic warfare, and physical destruction.
198:
and Operation Viersen. Today the 23rd, has been attributed as saving the lives of 15,000 to 30,000 American service members. In the Pacific, the Navy successfully conducted its first electronic warfare activities later in the war when
5506: 3923: 3484:
on 5 February 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web with links to
3423:
The Taliban HAVE to rely on CNO and integrate it into their IO campaign as it is the most cost-effective method of disrupting Western forces. This is a prime example of how CNO is used in conjunction with PSYOP to achieve their
2725:
Computer network defense (CND). Actions are taken through the use of computer networks to protect, monitor, analyze, detect and respond to unauthorized activity within the Department of Defense information systems and computer
3320:
from 1985 to 1993 and was re-launched in January 2002. RFA produces a variety of cultural, political, and informational programs that are transmitted to listeners via shortwave, satellite and AM and FM signals provided by the
3950: 3578:
save lives, terrorist PSYOP is frequently directed toward promoting violence and threatening civilian populations with death and destruction. Suicide bombers are portrayed as martyrs rather than killers of innocent people."
330:, with the intent of coordinating and executing U.S. information operations at the strategic level. On September 12, 2011, by executive order, the JIOWC was chartered as a Chairman's Controlled Activity aligned under the 2916:(ABCCC) was based on a basic C-130E platform and provided tactical airborne command post capabilities to air commanders and ground commanders in low air threat environments. This EC-130E ABCCC has since been retired. 2729:
Computer network exploitation (CNE). Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or
4794: 4779: 4723: 2721:
Computer network attack (CNA). Actions are taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks
508:
Most Army commissioned officers, warrant officers, and noncomissioned officers have the option of earning the P4 Information Operations Additional Skill Identifier (ASI) by attending one of two 10-day courses:
492:. Phase one consists of 415 hours of study consisting of 20 four-hour synchronous class periods held weekly. Phase 2 is a 15-day resident exercise held at the Regional Readiness Training Center collocated with 3535:
to prepare and execute the 11 September 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development, published in April 2006 makes the following statements:
3175:
operators can see. Suter 2 lets them take control of the enemy's networks and direct their sensors. Suter 3, tested in Summer 2006, enables the invasion of links to time-critical targets such as battlefield
2667:
unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services. EW includes three major
3550:
Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images."
252:
Shortly after the release of DODD S-3600.1, the U.S. Army stood up the Land Information Warfare Activity/Information Dominance Center (LIWA/IDC), which would eventually transition into the
488:
IO Qualification Course - Reserve Component (IOQC-RC) - a two-phase course taught by the National Guard Information Operations School, 3-124th Information Operations (IO) Battalion,
5427: 4727: 150:
is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of
4925: 481:
In the Army, only commissioned officers are formally qualified in the Information Operations functional area, known as FA30. Officers can qualified through one of two courses:
4791: 4776: 2685:
EW supports information operations by using offensive and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial use of the
281:
level typically have an Information Operations directorate known as the G-39 (for Army or Marine headquarters) or J-39 (for joint headquarters), for example, following the
5019: 2931:
psychological operations (PSYOPS) aircraft. This aircraft also employed a C-130E airframe, but was modified by using the mission electronic equipment from the retired
3514:
had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The
4696: 5062: 4812: 5444: 5748: 5532: 4649: 3830: 315: 112: 5561: 5284: 5156: 3531:
published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via
5088: 4612: 3909: 2821: 440: 361:
includes the U.S. Army Information Operations Proponent (USAIOP) whose mission is to executes Total Army Force Modernization responsibilities across the
3554:
a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media.
4842: 646: 256:, and established the Information Operations functional area in April 1999 to specially train and assign commissioned officers to plan and conduct IO. 402: 382: 253: 5042: 4447: 3325:. RFA's mission is "to promote and sustain democratic values and institutions in Afghanistan by disseminating news, factual information and ideas". 3007: 2959: 2740: 1570: 455: 417: 397: 2746: 1997: 358: 218:, including a weekly "news" leaflet dropped on communist forces, but also included radio and loudspeaker broadcasts. During the war forces under 5431: 5363:
Bruce Hoffman, "Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment," Studies in Conflict & Terrorism, 26:429-442, 2003.
5718:, Presentation (PDF slides) to the Bantle – Institute for National Security and Counterterrorism (INSCT) Symposium, Syracuse University (2006). 5117: 222:
used electronic jamming, much like the Navy at the end of World War 2, against radar on radar-directed anti-aircraft guns, particularly during
4223: 4787: 3463: 5684: 5644: 5598: 3775: 2991: 599: 5003: 4626: 4036: 5458: 2353: 538: 4929: 4846: 3815: 3495:
operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site
3029: 2803: 2640: 2548: 2326: 941: 43: 5704: 5699: 5670: 3679: 3470:
to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with
3322: 2002: 134: 76: 4983: 3709:
Col. Holmes. Army investigators ultimately determined Holme's claims of illegal psychological operations were "not substantiated."
3081:
software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered
4568: 4473: 3003: 2999: 2080: 580:
bases its Information Operations doctrine from Air Force Doctrinal Publication (AFDP) 3–13, Information in Air Force Operations.
5491:
Rajiv Chandrasekaran, Military to investigate claim that psy-ops team was used to influence U.S. senators, Wash. Post (Feb. 24,
2063: 435: 5178: 5016: 4954: 3825: 3309: 2987: 2648: 2425: 1850: 695: 223: 485:
IO Qualification Course (IOQC) - a 12-week, 480-hour resident course taught at the Combined Army Center, Fort Leavenworth, KS.
307: 5753: 5602: 3780: 3682:
staff, communicated alleged use of illegal PSYOP on visiting U.S. dignitaries, claiming such orders originated from Lt. Gen.
3675: 2189: 4580: 3976: 4246: 3877: 3701: 3086: 2644: 2606: 2053: 5302: 407: 289:
In recent years, the U.S. military has stood up unique task forces solely focused on information operations, such as the
116: 105: 5492: 2983: 2543: 1007: 268: 5443:
Major Garrett, Key Senator Calls Psyops Charges Serious, but He Denies Feeling Manipulated, National Journal (Feb. 20,
3638: 3354: 377: 3735: 2705: 2635: 2553: 1740: 1542: 1413: 951: 489: 241: 215: 211: 155: 54: 5733: 5652: 5648: 5632: 3694:, government ministers, and European diplomats. Holmes' disclosure resulted in several news articles, most notably a 5250: 4700: 4394: 3411:
firewalls, intrusion detection, anti-viral tools, audits, security management, and security awareness and training.
5101: 3765: 3501: 2017: 553: 549: 5484: 5689: 3820: 3563:
populations). The philosophy the MILDEC is for the concealment of activities rather than misleading adversaries.
2793: 2789: 2127: 1635: 984: 858: 712: 542: 5538: 3312:
broadcast services. It broadcasts 12 hours daily as part of a 24-hour stream of programming in conjunction with
2751: 568: 277:
operations, public affairs, operations security, and military deception. Operational U.S. military units at the
47: 3840: 3519: 3137: 3132: 2686: 2578: 2445: 1992: 1685: 1503: 1351: 584: 159: 5715: 5710:
Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism
272:
Comes from JP 3-13 (Joint Publication) and pertains to Information Operations (Info Ops) in the United States.
4850: 3805: 3740: 3157: 3033: 2924: 2668: 2531: 2513: 2269: 1828: 1750: 1695: 1293: 956: 577: 323: 3683: 3456: 3181: 3078: 2756: 2398: 2373: 2095: 2007: 1880: 1755: 1356: 1333: 779: 678: 319: 219: 203:
aircraft were fitted with receivers and rudimentary jammers to locate and jam Japanese air search radars.
5426:
William Levesque, Officer says he refused 'illegal' order in Afghanistan, St. Petersburg Times (Feb. 25,
5039: 4076: 4671: 4193: 3845: 3770: 3730: 3116: 1987: 1920: 1873: 1527: 1490: 1453: 1371: 1323: 1207: 1017: 825: 734: 552:, the proponent for information operations is the Marine Corps Information Operations Center (MCIOC) at 331: 3589:
has found, "Children are being taught to hate Jews and Westerners, and to take up arms against them ".
3471: 4749: 3546:"The threat posed by steganography has been documented in numerous intelligence reports." (p. 42) 2826: 4529: 4499: 3785: 3196: 2967: 2378: 2280: 2137: 2132: 1950: 1915: 1650: 1470: 1328: 1264: 1118: 1088: 685: 445: 5114: 3810: 3506: 3171:
Three generations of Suter have been developed. Suter 1 allows its operators to monitor what enemy
3111: 2932: 2860: 2229: 2214: 2090: 1977: 1955: 1930: 1890: 1800: 1610: 1515: 1465: 1232: 1222: 1187: 979: 969: 739: 663: 497: 200: 167: 20: 3800: 3760: 3705: 3527: 3500:". Other media worldwide cited these rumors many times, especially after the terrorist attack of 3467: 3165: 3161: 3152:
and communications systems belonging to an enemy. Development of the program has been managed by
3098: 3018: 2979: 2928: 2815: 2630: 2563: 2418: 2338: 2259: 2204: 2179: 2100: 2046: 2012: 1943: 1860: 1770: 1675: 1620: 1510: 1475: 1428: 1303: 1274: 1227: 1165: 1140: 974: 788: 707: 534: 493: 467: 411: 369: 290: 163: 151: 3123:, included references to Stuxnet as one of his operational successes as the IDF chief of staff. 3028:("Take Charge and Move Out") aircraft was a land-based naval aviation platform that served as a 2775: 286:
the directorate while others have organized them under separate directorates within the staff.
4606: 4344: 4084: 3903: 3835: 3790: 3585:
Terrorists also like to use the Internet to recruit and persuade children to their cause. As
3582:
only language the West understands is the logic of violence, and 3) jihad is the only option"
3522:, who in 2004 was fired after allegations emerged that he had fabricated stories and sources. 3219: 3211: 3177: 3071: 2599: 2508: 2455: 2358: 2348: 2343: 2313: 2296: 2291: 2264: 2209: 1910: 1900: 1895: 1885: 1805: 1795: 1790: 1765: 1735: 1625: 1595: 1590: 1580: 1575: 1565: 1480: 1433: 1403: 1242: 1035: 1012: 946: 4559:
JCS, JP 3-58, Joint Doctrine for Military Deception (Washington, DC: GPO, 31 May 1996), v-vi.
3700:
article titled, "Another Runaway General: Army Deploys Psy-Ops on U.S. Senators" authored by
2947:. The EC-130E was eventually replaced by the EC-130J Commando Solo and was retired in 2006. 5534:
The Decisive Weapon: A Brigade Combat Team Commander's Perspective on Information Operations
4876: 3725: 3313: 3259: 3210:
U.S. Air Force officials have speculated that a technology similar to Suter was used by the
3149: 3141: 2944: 2711: 2573: 2538: 2470: 2363: 2301: 2194: 2122: 2115: 1972: 1905: 1855: 1845: 1720: 1640: 1600: 1585: 1552: 1537: 1408: 1393: 1346: 1254: 1212: 1155: 1150: 1108: 931: 908: 815: 744: 673: 656: 449: 391: 282: 229:
Much the same as in the Korean War, deception was also disregarded as a practice during the
5459:"Obama Publishes Account of Firing Gen. McChrystal On the Same Day McChrystal Briefs Biden" 4958: 595: 5121: 5046: 5023: 4987: 4798: 4783: 4268: 3611: 3586: 3572: 3416: 2963: 2955: 2907: 2659: 2383: 2368: 2286: 2242: 2184: 1840: 1835: 1725: 1715: 1630: 1605: 1547: 1388: 1318: 1308: 1247: 1160: 1145: 1068: 1040: 840: 820: 668: 335: 5716:
Seeking Symmetry in Fourth Generation Warfare: Information Operations in the War of Ideas
5507:"Lt. Gen. Caldwell cleared of allegations he ordered psy-ops team to influence lawmakers" 5483:
Phil Stewart, U.S. Probes if Senators Targeted by Afghan Psy-Ops Unit, Reuters (Feb. 24,
3222:
on 6 September 2007. The evasion of air defence radar was otherwise unlikely because the
5124:"A Report to the Center for International Media Assistance", :e27 "Retrieved 2011-10-14" 4980: 4763: 4369: 5271: 4319: 3850: 3755: 3244: 3120: 3107: 2971: 2568: 2558: 2306: 1730: 1690: 1668: 1655: 1645: 1615: 1532: 1485: 1288: 1279: 1170: 1123: 1103: 1093: 1063: 1030: 918: 875: 830: 702: 635: 603: 178: 2655: 5742: 5721: 5694: 5186: 4269:"The Unified Command Plan and Combatant Commands: Background and Issues for Congress" 3696: 3510:
reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in
3442: 3436: 3308:
Radio Aazadi, formerly known as Radio Free Afghanistan (RFA) is the Afghan branch of
3067: 2940: 2405: 2393: 2249: 2169: 2085: 2068: 1925: 1780: 1760: 1443: 1438: 1418: 1398: 1313: 1284: 1259: 1135: 1113: 1098: 1073: 913: 835: 798: 793: 690: 587:(AFSC) 14FX, after completing the Information Operations Professional Course (IOPC). 245: 5709: 4792:"Cracking the code: Defending against the superweapons of the 21st century cyberwar" 4790:
in Washington DC, reported by C-Span and contained in the PBS program Need to Know (
4169: 3462: 5727:
Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet
3750: 3603: 3011: 2592: 2518: 2498: 2493: 2388: 2333: 1967: 1962: 1785: 1700: 1448: 1182: 1083: 880: 784: 387: 278: 58: 5430:.); Army to Investigate Rolling Stone's Psy-Ops Report, Atlantic Monthly (Feb. 24 5272:
Federal Plan for Cyber Security and Information Assurance Research and Development
5113:
The Pentagon, Information Operations, and International Media Development (2010).
5075: 4294: 4140:
COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE
4112:
COMMAND & CONTROL WARFARE: PUTTING ANOTHER TOOL IN THE WAR-FIGHTER'S DATA BASE
525: 206:
Despite the success of the 23rd, deception was never used in a significant way in
3478:
Rumors about terrorists using steganography started first in the daily newspaper
3459:" technique, a sender could get messages out and cover their tracks all at once. 5134: 3687: 3452: 3317: 3303: 3204: 3145: 3103: 3041: 2503: 2254: 2219: 2058: 1745: 1710: 1423: 1366: 1269: 1053: 774: 769: 230: 187: 5589: 5313: 4138: 4110: 4006: 2848: 346: 4587: 3691: 3610:
The list of methods goes on and on and is very similar to the methods used in
3223: 3153: 3037: 2975: 2767: 2460: 2430: 2152: 1521: 463: 425: 207: 191: 4088: 186:
The modern U.S. military can trace its use of information operations back to
3884: 3745: 3480: 2865: 2450: 2274: 2224: 2174: 2164: 2159: 2024: 1815: 1810: 1775: 1217: 903: 870: 759: 190:
when the Army activated the 23rd Headquarters Special Troops, known as the "
4530:"Joint Publication 3-53 : Doctrine for Joint Psychological Operations" 3455:, the notion of junk e-mail takes on a whole new light. Coupled with the " 3447:
When one considers that messages could be encrypted steganographically in
3085:
that spies on and subverts industrial systems, and the first to include a
260:
Washington, Iowa, Vermont, and Texas were part of this early development.
5115:
The Pentagon, Information Operations, and International Media Development
4224:"Here's what the new information warfare command in the Pacific is doing" 3496: 3492: 2936: 2880: 2465: 2440: 2073: 1705: 1680: 1298: 853: 727: 557: 5405:
58 "Virtual Soldiers in a Holy War," Ha'aretz Daily, 16 September 2002.
3115:, a showreel that was played at a retirement party for the head of the 3090: 3082: 3075: 3063: 3058: 2755:
Soldiers from the U.S. Army's 350th Tactical Psychological Operations,
2475: 2435: 2199: 2033: 2029: 1376: 1361: 1237: 898: 893: 863: 802: 764: 607: 501: 362: 3249: 3532: 3192: 3188: 3025: 2760: 1982: 1383: 1200: 936: 4146:. Maxwell Air Force Base, Alabama: Air University Press. p. xiv 4118:. Maxwell Air Force Base, Alabama: Air University Press. p. xiv 5695:
U.S. Department of Defense Information Operations Related Documents
5685:
U.S. Army Information Operations Proponent (USIOP) Official Website
5651:
external links, and converting useful links where appropriate into
5285:"The New Issue of Technical Mujahid, a Training Manual for Jihadis" 5040:
Radio in a Box – Military Embraces Counterinsurgency in Afghanistan
5725: 3511: 3486: 3461: 3448: 3248: 3215: 3172: 3160:. It is specialised to interfere with the computers of integrated 2884: 2864: 2825: 2774: 2766: 2750: 2654: 2634: 1458: 994: 989: 567: 524: 429: 345: 327: 305: 267: 195: 177: 583:
Air Force officers can serve as Information Operations Officers,
5690:
U.S. Marine Corps Information Operations Center Official Website
3795: 3227: 3200: 754: 749: 351: 306: 210:, however psychological warfare was routinely conducted by the 5615: 5002:
Radio in a Box – Giving Afghanistans Their Own Voice! (2010).
3621: 3337: 3267: 3263: 627: 88: 27: 5396:
Brian Ross, "A Secret Language," ABCNEWS.com, 4 October 2001.
2962:(PSYOP) and civil affairs broadcast missions in the standard 2706:
Computer network operations § CNO in the Military Domain
338:, through the Deputy Director Global Operations, J39 (DDGO). 19:"Information Operations" redirects here. For other uses, see 5712:, Yale Information Society Project Conference Paper (2005). 5038:
Military Embraces Counterinsurgency in Afghanistan (2008).
3230:
used by the IAF were not equipped with stealth technology.
3032:
strategic communications link aircraft for the U.S. Navy's
365:
to meet the Army's requirement for Information Operations.
3951:"How the Ghost Army of WWII Used Art to Deceive the Nazis" 182:
U.S. Army leaflet targeting the 45th North Korean Division
4841:
David A. Fulghum; Michael A. Dornheim; William B. Scott.
4786:
speaking at the 10 December 2010 Washington Forum of the
3653: 3415:"The Taliban have in recent months waged an intensifying 3369: 2939:(Operation Desert Storm), the second Gulf War (Operation 4044:
North Dakota State University Libraries Official Website
3649: 3365: 5640: 5635:
may not follow Knowledge (XXG)'s policies or guidelines
3645: 3518:
articles were written by veteran foreign correspondent
3361: 2914:
EC-130E Airborne Battlefield Command and Control Center
513:
Tactical Information Operations Planners Course (TIOPC)
5146:
DOCUMENT CALLED IO IN OEF AND IF -saved in your folder
5100:
Radio-in-a-Box: Afghanistan's New Warrior-DJs (2011).
4764:"Stuxnet worm hits Iran nuclear plant staff computers" 3704:
who recently earned fame for his reporting on General
3187:
The program has been tested with aircraft such as the
174:
History of Information Operations in the U.S. Military
5251:"Taliban website hacked as Afghan cyber war heats up" 5004:
Radio in a Box – Giving Afghanistans Their Own Voice!
4627:"Military Personnel Warned Against Geotagging Photos" 4295:"U.S. Army Information Operations Proponent (USAIOP)" 4057:"Psychological Warfare in Korea: An Interim Report". 115:. Please help to ensure that disputed statements are 5078:"U.S. Marine Corps Releases", "Retrieved 2011-11-10" 5061:
In Afghan Fight, U.S. Takes to the Airwaves (2010).
4928:. Aviation Week and Space Technology. Archived from 4903:"Why Syria's Air Defenses Failed to Detect Israelis" 4813:"Israel video shows Stuxnet as one of its successes" 3924:"Ghost Army: The Combat Con Artists of World War II" 3686:. Among the alleged targets were American Senators 3504:, without ever showing proof. The Italian newspaper 3164:. Suter was integrated into US unmanned aircraft by 5274:
National Science and Technology Council, April 2006
5137:"Special Warfare" 20 (5):e26 "Retrieved 2011-11-10" 5087:Local DJ celebrity to his Afghan listeners (2010). 5034: 5032: 4877:"Israel suspected of 'hacking' Syrian air defences" 3218:radars and sneak into their airspace undetected in 3070:discovered in June 2010. It initially spreads via 2651:(PA ANG) broadcast television and radio programming 615:identifies itself as a Cyberspace Operations unit. 537:, information operations are often supervised by a 521:
U.S. Navy & Marine Corps Information Operations
516:
Army Information Operations Planners Course (AIOPC)
5232: 5230: 5228: 4650:"Army: Facebook geotagging dangerous for soldiers" 4478:16th Air Force (Air Forces Cyber) Official Website 3678:, a member of the Army's 71st TIOG serving on the 5560:McChrystal, Gen. Stanley A. (21 September 2009). 5537:. Military Review. pp. 34–35. Archived from 5179:"Afghanistan – Radio Free Europe / Radio Liberty" 4750:"Last-minute paper: An indepth look into Stuxnet" 3981:Naval Air Force, U.S. Pacific Fleet Official Site 3977:"Electronic Attack Wing Pacific: Command History" 2935:aircraft. This airframe served during the first 302:U.S. Department of Defense Information Operations 5730:, 16 National Strategy F. Rev. 14 (Summer 2007). 3928:The National World War 2 Museum Official Website 4955:"Afghanistan's "radio war" | @pritheworld" 4949: 4947: 4896: 4894: 2759:, drop leaflets over a village near Hawijah in 5057: 5055: 4998: 4996: 4870: 4868: 4836: 4834: 4724:"Siemens: Stuxnet worm hit industrial systems" 4174:. Washington, D.C.: U.S. Department of Defense 3443:Steganography § Alleged use by terrorists 5102:Radio-in-a-Box: Afghanistan's New Warrior-DJs 4555: 4553: 3648:. Consider transferring direct quotations to 3364:. Consider transferring direct quotations to 2600: 590:U.S. Air Force Information Operations Units: 322:(USSTRATCOM) sometime around 2004 or 2005 at 8: 4699:. Siemens. 30 September 2010. Archived from 3310:Radio Free Europe / Radio Liberty's (RFE/RL) 3280:Special Operation Media Systems – B (SOMS-B) 5063:In Afghan Fight, U.S. Takes to the Airwaves 3831:Joint Information Operations Warfare Center 529:Navy Information Dominance Warfare Insignia 316:Joint Information Operations Warfare Center 293:Fleet Information Warfare Command Pacific. 5348: 5346: 5089:Local DJ celebrity to his Afghan listeners 4811:Williams, Christopher (15 February 2011). 4426:The Official Website of the U.S. Air Force 4194:"Chapter 2: Officer Classification System" 3466:An example showing how terrorists may use 2822:Category:World War II deception operations 2693:Domination of the Electromagnetic Spectrum 2607: 2593: 617: 460:152nd Theater Information Operations Group 441:151st Theater Information Operations Group 57:. Please do not remove this message until 5671:Learn how and when to remove this message 5015:Army radio connects with Afghans (2009). 4171:DODD S-3600.1 Information Operations (IO) 4168:Hutcherson, Norman B. (9 December 1996). 3872: 3870: 3868: 3866: 2845:position more favorable to our interests. 422:71st Theater Information Operations Group 403:56th Theater Information Operations Group 334:. The JIOWC falls within the Joint Staff 254:1st Information Operations Command (Land) 135:Learn how and when to remove this message 77:Learn how and when to remove this message 4926:"Technology Will Be Key to Iraq Buildup" 4163: 4161: 4137:Hutcherson, Norman B. (September 1994). 4109:Hutcherson, Norman B. (September 1994). 2741:Psychological Operations (United States) 2639:U.S. Military personnel assigned to the 1571:List of military strategies and concepts 350:56th TIOG Change of Command Ceremony at 111:Relevant discussion may be found on the 53:Relevant discussion may be found on the 5414: 5384: 5372: 5352: 5337: 5236: 5219: 5207: 5133:Breaking the Afghan Insurgency (2007). 3862: 2747:Military information support operations 625: 5588:Denning, Dorothy E. (18 August 2005). 4611:: CS1 maint: archived copy as title ( 4604: 4448:"39th Information Operations Squadron" 4000: 3998: 3908:: CS1 maint: archived copy as title ( 3901: 3253:United States Psychological Operations 2994:(AFSOC). The 193 AOW is based at the 572:Air Force Information Operations Badge 4788:Foundation for Defense of Democracies 4722:Robert McMillan (16 September 2010). 3955:Smithsonian Magazine Official Website 3639:too many or overly lengthy quotations 3355:too many or overly lengthy quotations 3234:Psychological Operations Capabilities 564:U.S. Air Force Information Operations 7: 5599:Defense Technical Information Center 5591:Information Operations and Terrorism 5511:The Washington Post Official Website 4924:David A. Fulghum (14 January 2007). 4905:. Aviation Week and Space Technology 4500:"DOD Information Operations Roadmap" 4370:"Tactical IO Planner Course (TIOPC)" 4222:Pomerleau, Mark (16 February 2023). 4014:Defense Technical Information Center 2992:Air Force Special Operations Command 600:39th Information Operations Squadron 477:Information Operations Qualification 297:U.S. Military Information Operations 4901:David A. Fulghum (3 October 2007). 4629:. RedOrbit Staff & Wire Reports 4396:Information In Air Force Operations 3334:Terrorists (IO from US Perspective) 2831:kilometers northwest of An Nuariya. 539:Navy Information Operations Command 5749:Information operations and warfare 5457:Stuart, Tessa (17 November 2020). 4847:Aviation Week and Space Technology 4037:"PSYCHOLOGICAL WARFARE KOREA 1951" 3816:Propaganda in the Mexican Drug War 2996:Harrisburg Air National Guard Base 2804:4th Psychological Operations Group 2641:4th Psychological Operations Group 383:1st Information Operations Command 14: 5605:from the original on 18 May 2015. 5074:/The Busiest Man in Nawa (2011). 4402:. U.S. Air Force. 1 February 2023 3930:. The National World War 2 Museum 3680:NATO Training Mission-Afghanistan 3489:". A citation from the article: " 3323:International Broadcasting Bureau 2700:Computer Network Operations (CNO) 5620: 5159:. Federal Business Opportunities 5017:Army radio connects with Afghans 4422:"Information Operations Officer" 4320:"IO Qualification Course (IOQC)" 4275:. Congressional Research Service 3626: 3607:towers, Pentagon, and Capitol). 3342: 3004:Harrisburg International Airport 2763:province, Iraq, on 6 March 2008. 2735:Psychological Operations (PSYOP) 2620:Information Related Capabilities 645: 594: 454: 434: 416: 396: 376: 342:U.S. Army Information Operations 93: 32: 5700:Operations Security (JP 3-13.3) 4726:. Computerworld. Archived from 4697:"Building a Cyber Secure Plant" 4452:Hurlbert Field Official Website 3826:The Institute of World Politics 2988:Pennsylvania Air National Guard 2785:PSYOP as an IO Core Capability. 2771:U.S. Army PSYOP Force structure 2680:Electronic warfare Support (ES) 2649:Pennsylvania Air National Guard 214:, predominantly in the form of 5705:Military Deception (JP 3-13.4) 5463:Rolling Stone Official Website 5157:"SOMS-B 2 MRBS Antenna System" 5135:Breaking the Afghan Insurgency 4875:John Leyden (4 October 2007). 4766:. BBC News. 26 September 2010. 4374:U.S. Army Combined Arms Center 4349:U.S. Army Combined Arms Center 4345:"IO Qualification Course (RC)" 4324:U.S. Army Combined Arms Center 4299:U.S. Army Combined Arms Center 4247:"The Secret Pentagon Spy Ring" 4245:Ambinder, Marc (20 May 2010). 4077:"BATTLE OF KOREA: Deadly Flak" 3781:Information Operations Roadmap 359:U.S. Army Combined Army Center 16:United States defense category 1: 5734:White House FAQ about the WoT 5249:Taylor, Rob (27 April 2012). 4509:. 30 October 2003. p. 61 3096:In May 2011, the PBS program 3087:programmable logic controller 2892:Equipment methods and tactics 2645:193rd Special Operations Wing 5562:"COMISAF Initial Assessment" 5183:RadioFreeEurope/RadioLiberty 4676:Army Spouses Online Facebook 4059:The Public Opinion Quarterly 2990:operationally gained by the 2984:193d Special Operations Wing 2923:was an earlier version of a 3736:Command and control warfare 3398:Computer network operations 3048:Computer network operations 2855:Operations Security (OPSEC) 2810:Military Deception (MILDEC) 2064:Military–industrial complex 1543:Operational manoeuvre group 541:(NIOC), for example in the 490:Vermont Army National Guard 336:Operations Directorate (J3) 318:(JIOWC) was created by the 264:Information Operations (IO) 242:Deputy Secretary of Defense 156:computer network operations 59:conditions to do so are met 5770: 5564:. US Department of Defense 4201:U.S. Army Official Website 4007:"Deception: Here to Stay!" 3766:Fifth Dimension Operations 3570: 3474:using "växjö" as password. 3440: 3434: 3301: 3242: 3130: 3056: 2905: 2858: 2819: 2813: 2744: 2738: 2709: 2703: 2677:Electronic Protection (EP) 2628: 554:Marine Corps Base Quantico 550:United States Marine Corps 18: 2986:(193 SOW), a unit of the 2794:civil-military operations 2128:Loss-of-strength gradient 985:Combat information center 545:which has several NIOCs. 543:United States Tenth Fleet 240:On December 9, 1996, the 5289:The Jamestown Foundation 4273:crsreports.congress.gov/ 4046:. Georgetown University. 4016:. U.S. Naval War College 3841:Psychological Operations 3646:summarize the quotations 3362:summarize the quotations 3133:Suter (computer program) 2960:psychological operations 2687:electromagnetic spectrum 2446:Military science fiction 1931:Technology and equipment 1352:List of military tactics 585:Air Force Specialty Code 408:Joint Base Lewis–McChord 160:psychological operations 5076:The Busiest Man in Nawa 5022:15 October 2009 at the 4979:Radio in a Box (2011). 4801:, 4 minutes into piece) 4474:"688th Cyberspace Wing" 3821:Military Public Affairs 3806:Network-centric warfare 3741:Communications security 3451:messages, particularly 3158:United States Air Force 3156:, a secret unit of the 3034:Fleet Ballistic Missile 2925:United States Air Force 2625:Electronic Warfare (EW) 2514:Wartime sexual violence 2270:Full-spectrum dominance 2081:Supply-chain management 578:United States Air Force 324:Lackland Air Force Base 5120:6 January 2011 at the 5104:"Retrieved 2011-10-14" 5091:"Retrieved 2011-10-14" 5065:"Retrieved 2011-14-10" 5049:"Retrieved 2011-11-11" 5026:"Retrieved 2011-10-30" 5006:"Retrieved 2011-14-10" 4990:"Retrieved 2011-14-10" 4065:(1 (Spring 1951)): 66. 3957:. Smithsonian Magazine 3776:Historical revisionism 3475: 3457:chaffing and winnowing 3314:Voice of America (VOA) 3254: 3199:. It has been used in 3182:surface-to-air missile 2870: 2832: 2780: 2772: 2764: 2757:10th Mountain Division 2674:Electronic Attack (EA) 2662: 2652: 2426:Awards and decorations 2399:Peace through strength 2374:Low-intensity conflict 2008:Conscientious objector 1881:Area of responsibility 573: 530: 355: 320:U.S. Strategic Command 311: 273: 220:United Nations Command 183: 148:Information Operations 5754:Psychological warfare 5531:Baker, Ralph (2006). 5303:"The Al Qaeda Manual" 4986:25 April 2012 at the 4797:27 April 2018 at the 4782:27 April 2018 at the 3846:Psychological warfare 3771:Gatekeeper (politics) 3731:Bolivarian propaganda 3465: 3316:. RFA first aired in 3252: 3117:Israel Defense Forces 3102:cited a statement by 2952:EC-130J Commando Solo 2921:EC-130E Commando Solo 2868: 2829: 2779:NATO leaflet in Libya 2778: 2770: 2754: 2660:EC-130J Commando Solo 2658: 2638: 1018:Torpedo data computer 1008:Ship gun fire-control 571: 528: 349: 309: 271: 181: 5641:improve this article 5045:2 March 2012 at the 4083:. 11 February 1952. 3786:Industrial espionage 3180:launchers or mobile 2933:EC-121S Coronet Solo 2544:Military occupations 2379:Military engineering 2281:Unrestricted Warfare 2138:Force multiplication 1036:Military manoeuvrers 446:Fort Totten (Queens) 354:, WA on May 7, 2017. 291:U.S. Pacific Fleet's 104:factual accuracy is 5653:footnote references 4817:The Daily Telegraph 3811:Operations Security 3507:Corriere della Sera 3162:air defence systems 2982:, specifically the 2943:) and in Operation 2861:Operations security 2792:(PA), MILDEC, CNO, 2230:Penal military unit 2215:Rules of engagement 1891:Command and control 1516:Operations research 980:Director (military) 970:Fire-control system 740:Command and control 621:Part of a series on 168:operations security 46:of this article is 21:Information warfare 4932:on 7 February 2012 4853:on 12 October 2007 4035:Brauer, Albert C. 4005:Meier, William A. 3949:Gormly, Kellie B. 3890:on 8 February 2015 3801:Military Deception 3761:Electronic Warfare 3706:Stanley McChrystal 3674:In 2011, Lt. Col. 3614:around the world. 3558:Military deception 3528:The New York Times 3476: 3255: 3166:L-3 Communications 3019:United States Navy 2980:Air National Guard 2929:Air National Guard 2871: 2833: 2816:Military deception 2781: 2773: 2765: 2663: 2653: 2631:Electronic Warfare 2339:Counter-insurgency 2260:Command of the sea 2205:Jewish laws on war 2180:Geneva Conventions 1716:Divide and conquer 1511:Military operation 1476:Tactical objective 975:Fire-control radar 952:Electronic-warfare 574: 535:United States Navy 531: 494:Norwich University 370:United States Army 356: 312: 274: 224:Operation Strangle 184: 164:military deception 152:electronic warfare 5681: 5680: 5673: 4843:"Black Surprises" 4752:. Virus Bulletin. 4652:. Tucson Sentinel 3836:Political Warfare 3791:Irregular Warfare 3671: 3670: 3525:In October 2001, 3387: 3386: 3220:Operation Orchard 3212:Israeli Air Force 3178:ballistic missile 3150:computer networks 3072:Microsoft Windows 2617: 2616: 2509:Horses in warfare 2456:Anti-war movement 2359:Gunboat diplomacy 2349:Disaster response 2297:Philosophy of war 2292:Principles of war 2265:Deterrence theory 2210:Right of conquest 2133:Lanchester's laws 1901:Principles of war 1591:Counter-offensive 1576:Military campaign 1481:Target saturation 1404:Counterinsurgency 1013:Gun data computer 947:Close air support 909:Aircraft carriers 216:airborne leaflets 145: 144: 137: 87: 86: 79: 5761: 5676: 5669: 5665: 5662: 5656: 5624: 5623: 5616: 5606: 5596: 5574: 5573: 5571: 5569: 5557: 5551: 5550: 5548: 5546: 5541:on 5 August 2011 5528: 5522: 5521: 5519: 5517: 5502: 5496: 5481: 5475: 5474: 5472: 5470: 5454: 5448: 5441: 5435: 5424: 5418: 5412: 5406: 5403: 5397: 5394: 5388: 5382: 5376: 5370: 5364: 5361: 5355: 5350: 5341: 5335: 5329: 5328: 5326: 5324: 5318: 5312:. Archived from 5307: 5299: 5293: 5292: 5281: 5275: 5269: 5263: 5262: 5260: 5258: 5246: 5240: 5234: 5223: 5217: 5211: 5205: 5199: 5198: 5196: 5194: 5189:on 23 April 2012 5185:. Archived from 5175: 5169: 5168: 5166: 5164: 5153: 5147: 5144: 5138: 5131: 5125: 5111: 5105: 5098: 5092: 5085: 5079: 5072: 5066: 5059: 5050: 5036: 5027: 5013: 5007: 5000: 4991: 4977: 4971: 4970: 4968: 4966: 4961:on 15 April 2013 4957:. Archived from 4951: 4942: 4941: 4939: 4937: 4921: 4915: 4914: 4912: 4910: 4898: 4889: 4888: 4886: 4884: 4872: 4863: 4862: 4860: 4858: 4849:. Archived from 4838: 4829: 4828: 4826: 4824: 4808: 4802: 4774: 4768: 4767: 4760: 4754: 4753: 4746: 4740: 4739: 4737: 4735: 4719: 4713: 4712: 4710: 4708: 4703:on 21 April 2021 4693: 4687: 4686: 4684: 4682: 4668: 4662: 4661: 4659: 4657: 4645: 4639: 4638: 4636: 4634: 4623: 4617: 4616: 4610: 4602: 4600: 4598: 4592: 4586:. Archived from 4585: 4577: 4571: 4566: 4560: 4557: 4548: 4547: 4545: 4543: 4534: 4526: 4520: 4518: 4516: 4514: 4504: 4496: 4490: 4489: 4487: 4485: 4480:. U.S. Air Force 4470: 4464: 4463: 4461: 4459: 4454:. U.S. Air Force 4444: 4438: 4437: 4435: 4433: 4428:. U.S. Air Force 4418: 4412: 4411: 4409: 4407: 4401: 4391: 4385: 4384: 4382: 4380: 4366: 4360: 4359: 4357: 4355: 4341: 4335: 4334: 4332: 4330: 4316: 4310: 4309: 4307: 4305: 4291: 4285: 4284: 4282: 4280: 4265: 4259: 4258: 4256: 4254: 4242: 4236: 4235: 4233: 4231: 4219: 4213: 4212: 4210: 4208: 4198: 4190: 4184: 4183: 4181: 4179: 4165: 4156: 4155: 4153: 4151: 4145: 4134: 4128: 4127: 4125: 4123: 4117: 4106: 4100: 4099: 4097: 4095: 4073: 4067: 4066: 4054: 4048: 4047: 4041: 4032: 4026: 4025: 4023: 4021: 4011: 4002: 3993: 3992: 3990: 3988: 3973: 3967: 3966: 3964: 3962: 3946: 3940: 3939: 3937: 3935: 3920: 3914: 3913: 3907: 3899: 3897: 3895: 3889: 3883:. Archived from 3882: 3874: 3726:Black propaganda 3702:Michael Hastings 3684:William Caldwell 3666: 3663: 3657: 3630: 3629: 3622: 3382: 3379: 3373: 3346: 3345: 3338: 3288:Other/Integrated 3260:Paktika Province 3142:computer program 3023:EC-130Q Hercules 2958:used to conduct 2945:Enduring Freedom 2712:Cyber Operations 2609: 2602: 2595: 2364:Humanitarian aid 2302:Security dilemma 2123:Power projection 1906:Economy of force 1886:Chain of command 1601:Defence in depth 1586:Commerce raiding 1409:Defeat in detail 745:Defense ministry 649: 640: 639: 630: 618: 598: 458: 438: 420: 400: 380: 140: 133: 129: 126: 120: 117:reliably sourced 97: 96: 89: 82: 75: 71: 68: 62: 36: 35: 28: 5769: 5768: 5764: 5763: 5762: 5760: 5759: 5758: 5739: 5738: 5677: 5666: 5660: 5657: 5638: 5629:This article's 5625: 5621: 5614: 5609: 5594: 5587: 5583: 5578: 5577: 5567: 5565: 5559: 5558: 5554: 5544: 5542: 5530: 5529: 5525: 5515: 5513: 5504: 5503: 5499: 5482: 5478: 5468: 5466: 5465:. Rolling Stone 5456: 5455: 5451: 5442: 5438: 5425: 5421: 5413: 5409: 5404: 5400: 5395: 5391: 5383: 5379: 5371: 5367: 5362: 5358: 5351: 5344: 5336: 5332: 5322: 5320: 5319:on 26 July 2014 5316: 5305: 5301: 5300: 5296: 5283: 5282: 5278: 5270: 5266: 5256: 5254: 5248: 5247: 5243: 5235: 5226: 5218: 5214: 5206: 5202: 5192: 5190: 5177: 5176: 5172: 5162: 5160: 5155: 5154: 5150: 5145: 5141: 5132: 5128: 5122:Wayback Machine 5112: 5108: 5099: 5095: 5086: 5082: 5073: 5069: 5060: 5053: 5047:Wayback Machine 5037: 5030: 5024:Wayback Machine 5014: 5010: 5001: 4994: 4988:Wayback Machine 4978: 4974: 4964: 4962: 4953: 4952: 4945: 4935: 4933: 4923: 4922: 4918: 4908: 4906: 4900: 4899: 4892: 4882: 4880: 4874: 4873: 4866: 4856: 4854: 4840: 4839: 4832: 4822: 4820: 4810: 4809: 4805: 4799:Wayback Machine 4784:Wayback Machine 4775: 4771: 4762: 4761: 4757: 4748: 4747: 4743: 4733: 4731: 4721: 4720: 4716: 4706: 4704: 4695: 4694: 4690: 4680: 4678: 4670: 4669: 4665: 4655: 4653: 4647: 4646: 4642: 4632: 4630: 4625: 4624: 4620: 4603: 4596: 4594: 4593:on 21 July 2013 4590: 4583: 4581:"Archived copy" 4579: 4578: 4574: 4567: 4563: 4558: 4551: 4541: 4539: 4532: 4528: 4527: 4523: 4512: 4510: 4502: 4498: 4497: 4493: 4483: 4481: 4472: 4471: 4467: 4457: 4455: 4446: 4445: 4441: 4431: 4429: 4420: 4419: 4415: 4405: 4403: 4399: 4393: 4392: 4388: 4378: 4376: 4368: 4367: 4363: 4353: 4351: 4343: 4342: 4338: 4328: 4326: 4318: 4317: 4313: 4303: 4301: 4293: 4292: 4288: 4278: 4276: 4267: 4266: 4262: 4252: 4250: 4244: 4243: 4239: 4229: 4227: 4221: 4220: 4216: 4206: 4204: 4196: 4192: 4191: 4187: 4177: 4175: 4167: 4166: 4159: 4149: 4147: 4143: 4136: 4135: 4131: 4121: 4119: 4115: 4108: 4107: 4103: 4093: 4091: 4075: 4074: 4070: 4056: 4055: 4051: 4039: 4034: 4033: 4029: 4019: 4017: 4009: 4004: 4003: 3996: 3986: 3984: 3975: 3974: 3970: 3960: 3958: 3948: 3947: 3943: 3933: 3931: 3922: 3921: 3917: 3900: 3893: 3891: 3887: 3880: 3878:"Archived copy" 3876: 3875: 3864: 3859: 3722: 3667: 3661: 3658: 3652:or excerpts to 3643: 3631: 3627: 3620: 3612:organized crime 3595: 3587:Dorothy Denning 3575: 3573:Martyrdom video 3569: 3560: 3445: 3439: 3433: 3417:information war 3400: 3383: 3377: 3374: 3368:or excerpts to 3359: 3347: 3343: 3336: 3331: 3306: 3300: 3295: 3290: 3277: 3247: 3241: 3236: 3135: 3129: 3112:Daily Telegraph 3061: 3055: 3050: 2956:C-130J Hercules 2910: 2908:Lockheed EC-130 2904: 2899: 2894: 2863: 2857: 2824: 2818: 2812: 2749: 2743: 2737: 2714: 2708: 2702: 2633: 2627: 2622: 2613: 2584: 2583: 2534: 2524: 2523: 2489: 2481: 2480: 2421: 2411: 2410: 2384:Multilateralism 2369:Law enforcement 2329: 2319: 2318: 2287:Just war theory 2245: 2235: 2234: 2185:Geneva Protocol 2155: 2145: 2144: 2118: 2108: 2107: 2049: 2039: 2038: 1946: 1936: 1935: 1876: 1866: 1865: 1831: 1821: 1820: 1751:Network-centric 1671: 1661: 1660: 1568: 1558: 1557: 1506: 1496: 1495: 1444:Rapid dominance 1349: 1339: 1338: 1294:Electromagnetic 1203: 1193: 1192: 1179: 1132: 1080: 1056: 1046: 1045: 1041:Combat training 1022: 999: 965:Combat systems: 961: 923: 919:Auxiliary ships 885: 845: 841:Military police 807: 730: 720: 719: 659: 633: 632: 631: 626: 566: 523: 479: 344: 304: 299: 266: 176: 141: 130: 124: 121: 110: 102:This article's 98: 94: 83: 72: 66: 63: 52: 37: 33: 24: 17: 12: 11: 5: 5767: 5765: 5757: 5756: 5751: 5741: 5740: 5737: 5736: 5731: 5719: 5713: 5707: 5702: 5697: 5692: 5687: 5679: 5678: 5633:external links 5628: 5626: 5619: 5613: 5612:External links 5610: 5608: 5607: 5584: 5582: 5579: 5576: 5575: 5552: 5523: 5505:Ukman, Jason. 5497: 5476: 5449: 5436: 5419: 5415:Denning (2005) 5407: 5398: 5389: 5385:Denning (2005) 5377: 5373:Denning (2005) 5365: 5356: 5353:Denning (2005) 5342: 5338:Denning (2005) 5330: 5294: 5276: 5264: 5241: 5237:Denning (2005) 5224: 5220:Denning (2005) 5212: 5208:Denning (2005) 5200: 5170: 5148: 5139: 5126: 5106: 5093: 5080: 5067: 5051: 5028: 5008: 4992: 4981:Radio in a Box 4972: 4943: 4916: 4890: 4879:. The Register 4864: 4830: 4803: 4769: 4755: 4741: 4730:on 25 May 2012 4714: 4688: 4663: 4648:Post, Global. 4640: 4618: 4572: 4561: 4549: 4521: 4491: 4465: 4439: 4413: 4386: 4361: 4336: 4311: 4286: 4260: 4249:. The Atlantic 4237: 4226:. Defensescoop 4214: 4185: 4157: 4129: 4101: 4068: 4049: 4027: 3994: 3968: 3941: 3915: 3861: 3860: 3858: 3855: 3854: 3853: 3851:Radicalization 3848: 3843: 3838: 3833: 3828: 3823: 3818: 3813: 3808: 3803: 3798: 3793: 3788: 3783: 3778: 3773: 3768: 3763: 3758: 3756:Disinformation 3753: 3748: 3743: 3738: 3733: 3728: 3721: 3718: 3717: 3716: 3713: 3710: 3676:Michael Holmes 3669: 3668: 3634: 3632: 3625: 3619: 3616: 3594: 3591: 3568: 3565: 3559: 3556: 3548: 3547: 3544: 3541: 3435:Main article: 3432: 3429: 3428: 3427: 3426: 3425: 3399: 3396: 3395: 3394: 3385: 3384: 3350: 3348: 3341: 3335: 3332: 3330: 3329:Adversarial IO 3327: 3302:Main article: 3299: 3296: 3294: 3291: 3289: 3286: 3282: 3281: 3276: 3273: 3245:Radio in a box 3243:Main article: 3240: 3239:Radio in a Box 3237: 3235: 3232: 3140:is a military 3131:Main article: 3128: 3125: 3121:Gabi Ashkenazi 3074:, and targets 3057:Main article: 3054: 3051: 3049: 3046: 2954:is a modified 2906:Main article: 2903: 2900: 2898: 2895: 2893: 2890: 2889: 2888: 2876: 2869:Someone Talked 2856: 2853: 2852: 2851: 2846: 2842: 2838: 2814:Main article: 2811: 2808: 2807: 2806: 2801: 2797: 2796:(CMO), and EW. 2790:public affairs 2739:Main article: 2736: 2733: 2732: 2731: 2727: 2723: 2719: 2704:Main article: 2701: 2698: 2697: 2696: 2690: 2683: 2682: 2681: 2678: 2675: 2629:Main article: 2626: 2623: 2621: 2618: 2615: 2614: 2612: 2611: 2604: 2597: 2589: 2586: 2585: 2582: 2581: 2576: 2571: 2566: 2561: 2556: 2551: 2549:Military terms 2546: 2541: 2535: 2530: 2529: 2526: 2525: 2522: 2521: 2516: 2511: 2506: 2501: 2496: 2490: 2487: 2486: 2483: 2482: 2479: 2478: 2473: 2468: 2463: 2458: 2453: 2448: 2443: 2438: 2433: 2428: 2422: 2417: 2416: 2413: 2412: 2409: 2408: 2403: 2402: 2401: 2396: 2386: 2381: 2376: 2371: 2366: 2361: 2356: 2351: 2346: 2341: 2336: 2330: 2325: 2324: 2321: 2320: 2317: 2316: 2311: 2310: 2309: 2307:Tripwire force 2299: 2294: 2289: 2284: 2277: 2272: 2267: 2262: 2257: 2252: 2246: 2241: 2240: 2237: 2236: 2233: 2232: 2227: 2222: 2217: 2212: 2207: 2202: 2197: 2192: 2187: 2182: 2177: 2172: 2167: 2162: 2156: 2151: 2150: 2147: 2146: 2143: 2142: 2141: 2140: 2130: 2125: 2119: 2114: 2113: 2110: 2109: 2106: 2105: 2104: 2103: 2098: 2093: 2083: 2078: 2077: 2076: 2071: 2061: 2056: 2050: 2045: 2044: 2041: 2040: 2037: 2036: 2027: 2022: 2021: 2020: 2010: 2005: 2000: 1995: 1990: 1985: 1980: 1975: 1970: 1965: 1960: 1959: 1958: 1947: 1942: 1941: 1938: 1937: 1934: 1933: 1928: 1923: 1918: 1913: 1908: 1903: 1898: 1893: 1888: 1883: 1877: 1872: 1871: 1868: 1867: 1864: 1863: 1858: 1853: 1848: 1843: 1838: 1832: 1829:Administrative 1827: 1826: 1823: 1822: 1819: 1818: 1813: 1808: 1803: 1798: 1793: 1788: 1783: 1778: 1773: 1768: 1763: 1758: 1756:New generation 1753: 1748: 1743: 1738: 1733: 1731:Fleet in being 1728: 1723: 1718: 1713: 1708: 1703: 1698: 1693: 1688: 1683: 1678: 1672: 1669:Grand strategy 1667: 1666: 1663: 1662: 1659: 1658: 1656:Scorched earth 1653: 1648: 1643: 1638: 1633: 1628: 1623: 1618: 1613: 1608: 1603: 1598: 1593: 1588: 1583: 1578: 1569: 1564: 1563: 1560: 1559: 1556: 1555: 1550: 1545: 1540: 1535: 1533:Deep operation 1530: 1525: 1518: 1513: 1507: 1502: 1501: 1498: 1497: 1494: 1493: 1488: 1483: 1478: 1473: 1468: 1463: 1462: 1461: 1451: 1446: 1441: 1436: 1431: 1426: 1421: 1416: 1411: 1406: 1401: 1396: 1391: 1386: 1381: 1380: 1379: 1374: 1369: 1359: 1350: 1345: 1344: 1341: 1340: 1337: 1336: 1334:Unconventional 1331: 1326: 1321: 1316: 1311: 1306: 1301: 1296: 1291: 1282: 1280:Disinformation 1277: 1272: 1267: 1262: 1257: 1252: 1251: 1250: 1245: 1235: 1230: 1225: 1220: 1215: 1210: 1204: 1199: 1198: 1195: 1194: 1191: 1190: 1185: 1178: 1177: 1176: 1175: 1174: 1173: 1163: 1158: 1153: 1148: 1143: 1131: 1130: 1129: 1128: 1127: 1126: 1116: 1111: 1106: 1101: 1096: 1091: 1079: 1078: 1077: 1076: 1071: 1066: 1057: 1052: 1051: 1048: 1047: 1044: 1043: 1038: 1033: 1031:Basic training 1028: 1021: 1020: 1015: 1010: 1005: 998: 997: 992: 987: 982: 977: 972: 967: 960: 959: 957:Reconnaissance 954: 949: 944: 939: 934: 929: 922: 921: 916: 911: 906: 901: 896: 891: 884: 883: 878: 876:Special forces 873: 868: 867: 866: 856: 851: 844: 843: 838: 833: 831:Reconnaissance 828: 823: 818: 813: 806: 805: 796: 791: 782: 777: 772: 767: 762: 757: 752: 747: 742: 737: 731: 726: 725: 722: 721: 718: 717: 716: 715: 710: 700: 699: 698: 693: 683: 682: 681: 674:Post-classical 671: 666: 660: 655: 654: 651: 650: 642: 641: 623: 622: 612: 611: 604:Hurlburt Field 565: 562: 522: 519: 518: 517: 514: 506: 505: 486: 478: 475: 474: 473: 452: 432: 414: 394: 343: 340: 303: 300: 298: 295: 265: 262: 175: 172: 166:(MILDEC), and 143: 142: 101: 99: 92: 85: 84: 40: 38: 31: 15: 13: 10: 9: 6: 4: 3: 2: 5766: 5755: 5752: 5750: 5747: 5746: 5744: 5735: 5732: 5729: 5728: 5723: 5722:K. A. Taipale 5720: 5717: 5714: 5711: 5708: 5706: 5703: 5701: 5698: 5696: 5693: 5691: 5688: 5686: 5683: 5682: 5675: 5672: 5664: 5654: 5650: 5649:inappropriate 5646: 5642: 5636: 5634: 5627: 5618: 5617: 5611: 5604: 5600: 5593: 5592: 5586: 5585: 5580: 5563: 5556: 5553: 5540: 5536: 5535: 5527: 5524: 5512: 5508: 5501: 5498: 5494: 5490: 5486: 5480: 5477: 5464: 5460: 5453: 5450: 5446: 5440: 5437: 5433: 5429: 5423: 5420: 5416: 5411: 5408: 5402: 5399: 5393: 5390: 5386: 5381: 5378: 5374: 5369: 5366: 5360: 5357: 5354: 5349: 5347: 5343: 5339: 5334: 5331: 5315: 5311: 5304: 5298: 5295: 5290: 5286: 5280: 5277: 5273: 5268: 5265: 5252: 5245: 5242: 5238: 5233: 5231: 5229: 5225: 5221: 5216: 5213: 5209: 5204: 5201: 5188: 5184: 5180: 5174: 5171: 5158: 5152: 5149: 5143: 5140: 5136: 5130: 5127: 5123: 5119: 5116: 5110: 5107: 5103: 5097: 5094: 5090: 5084: 5081: 5077: 5071: 5068: 5064: 5058: 5056: 5052: 5048: 5044: 5041: 5035: 5033: 5029: 5025: 5021: 5018: 5012: 5009: 5005: 4999: 4997: 4993: 4989: 4985: 4982: 4976: 4973: 4960: 4956: 4950: 4948: 4944: 4931: 4927: 4920: 4917: 4904: 4897: 4895: 4891: 4878: 4871: 4869: 4865: 4852: 4848: 4844: 4837: 4835: 4831: 4818: 4814: 4807: 4804: 4800: 4796: 4793: 4789: 4785: 4781: 4778: 4773: 4770: 4765: 4759: 4756: 4751: 4745: 4742: 4729: 4725: 4718: 4715: 4702: 4698: 4692: 4689: 4677: 4673: 4667: 4664: 4651: 4644: 4641: 4628: 4622: 4619: 4614: 4608: 4589: 4582: 4576: 4573: 4570: 4565: 4562: 4556: 4554: 4550: 4538: 4531: 4525: 4522: 4508: 4501: 4495: 4492: 4479: 4475: 4469: 4466: 4453: 4449: 4443: 4440: 4427: 4423: 4417: 4414: 4398: 4397: 4390: 4387: 4375: 4371: 4365: 4362: 4350: 4346: 4340: 4337: 4325: 4321: 4315: 4312: 4300: 4296: 4290: 4287: 4274: 4270: 4264: 4261: 4248: 4241: 4238: 4225: 4218: 4215: 4202: 4195: 4189: 4186: 4173: 4172: 4164: 4162: 4158: 4142: 4141: 4133: 4130: 4114: 4113: 4105: 4102: 4090: 4086: 4082: 4078: 4072: 4069: 4064: 4060: 4053: 4050: 4045: 4038: 4031: 4028: 4015: 4008: 4001: 3999: 3995: 3982: 3978: 3972: 3969: 3956: 3952: 3945: 3942: 3929: 3925: 3919: 3916: 3911: 3905: 3886: 3879: 3873: 3871: 3869: 3867: 3863: 3856: 3852: 3849: 3847: 3844: 3842: 3839: 3837: 3834: 3832: 3829: 3827: 3824: 3822: 3819: 3817: 3814: 3812: 3809: 3807: 3804: 3802: 3799: 3797: 3794: 3792: 3789: 3787: 3784: 3782: 3779: 3777: 3774: 3772: 3769: 3767: 3764: 3762: 3759: 3757: 3754: 3752: 3749: 3747: 3744: 3742: 3739: 3737: 3734: 3732: 3729: 3727: 3724: 3723: 3719: 3714: 3711: 3707: 3703: 3699: 3698: 3697:Rolling Stone 3693: 3689: 3685: 3681: 3677: 3673: 3672: 3665: 3662:February 2015 3655: 3651: 3647: 3641: 3640: 3635:This article 3633: 3624: 3623: 3617: 3615: 3613: 3608: 3605: 3599: 3592: 3590: 3588: 3583: 3579: 3574: 3566: 3564: 3557: 3555: 3551: 3545: 3542: 3539: 3538: 3537: 3534: 3530: 3529: 3523: 3521: 3517: 3513: 3509: 3508: 3503: 3499: 3498: 3494: 3488: 3483: 3482: 3473: 3469: 3468:forum avatars 3464: 3460: 3458: 3454: 3450: 3444: 3438: 3437:Steganography 3431:Steganography 3430: 3422: 3421: 3418: 3414: 3413: 3412: 3408: 3404: 3397: 3392: 3391: 3390: 3381: 3378:February 2015 3371: 3367: 3363: 3357: 3356: 3351:This article 3349: 3340: 3339: 3333: 3328: 3326: 3324: 3319: 3315: 3311: 3305: 3297: 3292: 3287: 3285: 3279: 3278: 3274: 3272: 3269: 3265: 3261: 3251: 3246: 3238: 3233: 3231: 3229: 3225: 3221: 3217: 3213: 3208: 3206: 3202: 3198: 3194: 3190: 3185: 3183: 3179: 3174: 3169: 3167: 3163: 3159: 3155: 3151: 3148:that attacks 3147: 3144:developed by 3143: 3139: 3134: 3126: 3124: 3122: 3118: 3114: 3113: 3109: 3105: 3101: 3100: 3094: 3092: 3088: 3084: 3080: 3077: 3073: 3069: 3068:computer worm 3065: 3060: 3052: 3047: 3045: 3043: 3039: 3035: 3031: 3027: 3024: 3020: 3015: 3013: 3009: 3005: 3001: 2997: 2993: 2989: 2985: 2981: 2977: 2973: 2969: 2965: 2961: 2957: 2953: 2948: 2946: 2942: 2941:Iraqi Freedom 2938: 2934: 2930: 2926: 2922: 2917: 2915: 2909: 2901: 2896: 2891: 2886: 2882: 2877: 2873: 2872: 2867: 2862: 2854: 2850: 2849:Article title 2847: 2843: 2839: 2835: 2834: 2828: 2823: 2817: 2809: 2805: 2802: 2798: 2795: 2791: 2786: 2783: 2782: 2777: 2769: 2762: 2758: 2753: 2748: 2742: 2734: 2728: 2724: 2720: 2716: 2715: 2713: 2707: 2699: 2694: 2691: 2688: 2684: 2679: 2676: 2673: 2672: 2670: 2665: 2664: 2661: 2657: 2650: 2646: 2642: 2637: 2632: 2624: 2619: 2610: 2605: 2603: 2598: 2596: 2591: 2590: 2588: 2587: 2580: 2577: 2575: 2572: 2570: 2567: 2565: 2562: 2560: 2557: 2555: 2552: 2550: 2547: 2545: 2542: 2540: 2537: 2536: 2533: 2528: 2527: 2520: 2517: 2515: 2512: 2510: 2507: 2505: 2502: 2500: 2497: 2495: 2492: 2491: 2485: 2484: 2477: 2474: 2472: 2469: 2467: 2464: 2462: 2459: 2457: 2454: 2452: 2449: 2447: 2444: 2442: 2439: 2437: 2436:Warrior caste 2434: 2432: 2429: 2427: 2424: 2423: 2420: 2415: 2414: 2407: 2406:Show of force 2404: 2400: 2397: 2395: 2394:Peacebuilding 2392: 2391: 2390: 2387: 2385: 2382: 2380: 2377: 2375: 2372: 2370: 2367: 2365: 2362: 2360: 2357: 2355: 2352: 2350: 2347: 2345: 2342: 2340: 2337: 2335: 2332: 2331: 2328: 2323: 2322: 2315: 2312: 2308: 2305: 2304: 2303: 2300: 2298: 2295: 2293: 2290: 2288: 2285: 2283: 2282: 2278: 2276: 2273: 2271: 2268: 2266: 2263: 2261: 2258: 2256: 2253: 2251: 2250:Air supremacy 2248: 2247: 2244: 2239: 2238: 2231: 2228: 2226: 2223: 2221: 2218: 2216: 2213: 2211: 2208: 2206: 2203: 2201: 2198: 2196: 2193: 2191: 2190:Islamic rules 2188: 2186: 2183: 2181: 2178: 2176: 2173: 2171: 2170:Court-martial 2168: 2166: 2163: 2161: 2158: 2157: 2154: 2149: 2148: 2139: 2136: 2135: 2134: 2131: 2129: 2126: 2124: 2121: 2120: 2117: 2112: 2111: 2102: 2099: 2097: 2094: 2092: 2089: 2088: 2087: 2084: 2082: 2079: 2075: 2072: 2070: 2069:Arms industry 2067: 2066: 2065: 2062: 2060: 2057: 2055: 2052: 2051: 2048: 2043: 2042: 2035: 2031: 2028: 2026: 2023: 2019: 2016: 2015: 2014: 2011: 2009: 2006: 2004: 2001: 1999: 1996: 1994: 1991: 1989: 1986: 1984: 1981: 1979: 1976: 1974: 1971: 1969: 1966: 1964: 1961: 1957: 1954: 1953: 1952: 1949: 1948: 1945: 1940: 1939: 1932: 1929: 1927: 1924: 1922: 1919: 1917: 1914: 1912: 1909: 1907: 1904: 1902: 1899: 1897: 1894: 1892: 1889: 1887: 1884: 1882: 1879: 1878: 1875: 1870: 1869: 1862: 1859: 1857: 1854: 1852: 1849: 1847: 1844: 1842: 1839: 1837: 1834: 1833: 1830: 1825: 1824: 1817: 1814: 1812: 1809: 1807: 1804: 1802: 1799: 1797: 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1777: 1774: 1772: 1769: 1767: 1764: 1762: 1759: 1757: 1754: 1752: 1749: 1747: 1744: 1742: 1739: 1737: 1734: 1732: 1729: 1727: 1724: 1722: 1719: 1717: 1714: 1712: 1709: 1707: 1704: 1702: 1699: 1697: 1694: 1692: 1689: 1687: 1686:Broken-backed 1684: 1682: 1679: 1677: 1674: 1673: 1670: 1665: 1664: 1657: 1654: 1652: 1649: 1647: 1644: 1642: 1639: 1637: 1634: 1632: 1629: 1627: 1624: 1622: 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1602: 1599: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1577: 1574: 1573: 1572: 1567: 1562: 1561: 1554: 1551: 1549: 1546: 1544: 1541: 1539: 1536: 1534: 1531: 1529: 1528:Expeditionary 1526: 1524: 1523: 1519: 1517: 1514: 1512: 1509: 1508: 1505: 1500: 1499: 1492: 1489: 1487: 1484: 1482: 1479: 1477: 1474: 1472: 1469: 1467: 1464: 1460: 1457: 1456: 1455: 1452: 1450: 1447: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1427: 1425: 1422: 1420: 1417: 1415: 1412: 1410: 1407: 1405: 1402: 1400: 1399:Counterattack 1397: 1395: 1392: 1390: 1387: 1385: 1382: 1378: 1375: 1373: 1370: 1368: 1365: 1364: 1363: 1360: 1358: 1355: 1354: 1353: 1348: 1343: 1342: 1335: 1332: 1330: 1327: 1325: 1324:Psychological 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1286: 1283: 1281: 1278: 1276: 1273: 1271: 1268: 1266: 1263: 1261: 1260:Combined arms 1258: 1256: 1253: 1249: 1246: 1244: 1241: 1240: 1239: 1236: 1234: 1231: 1229: 1226: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1205: 1202: 1197: 1196: 1189: 1186: 1184: 1181: 1180: 1172: 1169: 1168: 1167: 1164: 1162: 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1142: 1139: 1138: 1137: 1134: 1133: 1125: 1122: 1121: 1120: 1117: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1099:Fortification 1097: 1095: 1092: 1090: 1087: 1086: 1085: 1082: 1081: 1075: 1072: 1070: 1067: 1065: 1062: 1061: 1059: 1058: 1055: 1050: 1049: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1023: 1019: 1016: 1014: 1011: 1009: 1006: 1004: 1001: 1000: 996: 993: 991: 988: 986: 983: 981: 978: 976: 973: 971: 968: 966: 963: 962: 958: 955: 953: 950: 948: 945: 943: 940: 938: 935: 933: 930: 928: 925: 924: 920: 917: 915: 914:Landing craft 912: 910: 907: 905: 902: 900: 897: 895: 892: 890: 887: 886: 882: 879: 877: 874: 872: 869: 865: 862: 861: 860: 857: 855: 852: 850: 847: 846: 842: 839: 837: 834: 832: 829: 827: 824: 822: 819: 817: 814: 812: 809: 808: 804: 800: 799:Standing army 797: 795: 792: 790: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 732: 729: 724: 723: 714: 711: 709: 706: 705: 704: 701: 697: 694: 692: 691:pike and shot 689: 688: 687: 684: 680: 677: 676: 675: 672: 670: 667: 665: 662: 661: 658: 653: 652: 648: 644: 643: 637: 629: 624: 620: 619: 616: 609: 605: 601: 597: 593: 592: 591: 588: 586: 581: 579: 570: 563: 561: 559: 555: 551: 546: 544: 540: 536: 527: 520: 515: 512: 511: 510: 503: 499: 495: 491: 487: 484: 483: 482: 476: 472: 471:(Deactivated) 469: 465: 461: 457: 453: 451: 447: 443: 442: 437: 433: 431: 427: 423: 419: 415: 413: 409: 405: 404: 399: 395: 393: 389: 385: 384: 379: 375: 374: 373: 371: 366: 364: 360: 353: 348: 341: 339: 337: 333: 329: 325: 321: 317: 308: 301: 296: 294: 292: 287: 284: 280: 270: 263: 261: 257: 255: 250: 247: 246:John P. White 243: 238: 234: 232: 227: 225: 221: 217: 213: 209: 204: 202: 197: 193: 189: 180: 173: 171: 169: 165: 161: 157: 153: 149: 139: 136: 128: 118: 114: 108: 107: 100: 91: 90: 81: 78: 70: 60: 56: 50: 49: 45: 39: 30: 29: 26: 22: 5726: 5667: 5658: 5643:by removing 5630: 5590: 5581:Bibliography 5566:. Retrieved 5555: 5543:. Retrieved 5539:the original 5533: 5526: 5514:. Retrieved 5510: 5500: 5488: 5479: 5467:. Retrieved 5462: 5452: 5439: 5422: 5417:, p. 13 5410: 5401: 5392: 5387:, p. 12 5380: 5368: 5359: 5333: 5321:. Retrieved 5314:the original 5309: 5297: 5288: 5279: 5267: 5255:. Retrieved 5253:. Reuters US 5244: 5239:, p. 11 5222:, p. 20 5215: 5203: 5191:. Retrieved 5187:the original 5182: 5173: 5161:. Retrieved 5151: 5142: 5129: 5109: 5096: 5083: 5070: 5011: 4975: 4963:. Retrieved 4959:the original 4934:. Retrieved 4930:the original 4919: 4907:. Retrieved 4881:. Retrieved 4855:. Retrieved 4851:the original 4821:. Retrieved 4816: 4806: 4772: 4758: 4744: 4734:16 September 4732:. Retrieved 4728:the original 4717: 4705:. Retrieved 4701:the original 4691: 4679:. Retrieved 4675: 4666: 4654:. Retrieved 4643: 4631:. Retrieved 4621: 4595:. Retrieved 4588:the original 4575: 4564: 4540:. Retrieved 4536: 4524: 4511:. Retrieved 4506: 4494: 4482:. Retrieved 4477: 4468: 4456:. Retrieved 4451: 4442: 4430:. Retrieved 4425: 4416: 4404:. Retrieved 4395: 4389: 4377:. Retrieved 4373: 4364: 4352:. Retrieved 4348: 4339: 4327:. Retrieved 4323: 4314: 4302:. Retrieved 4298: 4289: 4277:. Retrieved 4272: 4263: 4251:. Retrieved 4240: 4228:. Retrieved 4217: 4205:. Retrieved 4200: 4188: 4176:. Retrieved 4170: 4148:. Retrieved 4139: 4132: 4120:. Retrieved 4111: 4104: 4092:. Retrieved 4080: 4071: 4062: 4058: 4052: 4043: 4030: 4018:. Retrieved 4013: 3985:. Retrieved 3980: 3971: 3959:. Retrieved 3954: 3944: 3932:. Retrieved 3927: 3918: 3892:. Retrieved 3885:the original 3751:Cyberwarfare 3695: 3659: 3644:Please help 3636: 3609: 3604:Mohamed Atta 3600: 3596: 3584: 3580: 3576: 3561: 3552: 3549: 3526: 3524: 3515: 3505: 3490: 3479: 3477: 3446: 3409: 3405: 3401: 3388: 3375: 3360:Please help 3352: 3307: 3283: 3256: 3209: 3207:since 2006. 3186: 3170: 3136: 3110: 3099:Need To Know 3097: 3095: 3062: 3022: 3016: 3012:Pennsylvania 3000:Olmstead AFB 2995: 2951: 2949: 2920: 2918: 2913: 2911: 2800:individuals. 2784: 2692: 2669:subdivisions 2519:Fifth column 2499:War resister 2494:Women in war 2389:Peacekeeping 2334:Arms control 2279: 1968:Mobilization 1963:Conscription 1921:Intelligence 1874:Organization 1520: 1449:Encirclement 1329:Radiological 1265:Conventional 1119:Subterranean 1026:Development: 1025: 1002: 964: 926: 889:Naval units: 888: 881:Signal corps 848: 826:Intelligence 811:Specialties: 810: 735:Organization 686:Early modern 613: 589: 582: 575: 547: 532: 507: 480: 470: 459: 439: 421: 401: 388:Fort Belvoir 381: 367: 357: 313: 310:JIOWC Emblem 288: 279:flag-officer 275: 258: 251: 239: 235: 228: 205: 185: 147: 146: 131: 122: 103: 73: 67:October 2023 64: 42: 25: 5516:28 November 5469:28 November 5375:, p. 5 5340:, p. 7 5310:Justice.gov 5210:, p. 6 4823:14 February 4777:Gary Samore 4484:26 November 4458:26 November 4432:26 November 4406:26 November 4379:26 November 4354:26 November 4329:26 November 4304:26 November 4207:25 December 4203:. U.S. Army 4178:25 December 4150:25 December 4122:25 December 4020:27 November 3987:27 November 3983:. U.S. Navy 3961:27 November 3934:27 November 3688:John McCain 3520:Jack Kelley 3453:e-mail spam 3424:objectives. 3318:Afghanistan 3304:Radio Azadi 3298:Radio Azadi 3205:Afghanistan 3184:launchers. 3146:BAE Systems 3104:Gary Samore 3042:E-6 Mercury 2883:, multiple 2722:themselves. 2504:War studies 2327:Non-warfare 2255:Appeasement 2220:Martial law 2059:War economy 1998:Transgender 1951:Recruitment 1711:Containment 1596:Culminating 1504:Operational 1424:Envelopment 1367:Air assault 1248:Air cavalry 1208:Air defence 1188:Information 1089:Cold-region 1054:Battlespace 1003:Historical: 849:Land units: 775:Space force 770:Coast guard 703:Late modern 664:Prehistoric 332:Joint Staff 231:Vietnam War 212:Eighth Army 201:TBM Avenger 188:World War 2 5743:Categories 4707:5 December 4279:5 December 4253:24 January 4230:5 December 3857:References 3692:Carl Levin 3654:Wikisource 3571:See also: 3441:See also: 3370:Wikisource 3275:B (SOMS-B) 3214:to thwart 3154:Big Safari 3079:industrial 3038:Boeing 707 3008:Middletown 2859:See also: 2820:See also: 2745:See also: 2710:See also: 2564:War crimes 2554:Operations 2461:Foot drill 2431:Battle cry 2344:deterrence 2003:Harassment 1978:Specialism 1801:Technology 1796:Succession 1741:Liberation 1676:Asymmetric 1611:Empty fort 1522:Blitzkrieg 1491:Withdrawal 1454:Investment 1233:Camouflage 1228:Biological 1166:Underwater 1141:Amphibious 1060:Aerospace 927:Air units: 904:Submarines 713:fourth-gen 708:industrial 696:napoleonic 498:Northfield 468:California 464:Camp Parks 462:(USAR) at 444:(USAR) at 426:Camp Mabry 424:(ARNG) at 412:Washington 406:(ARNG) at 208:Korean War 192:Ghost Army 125:April 2024 44:neutrality 5645:excessive 4909:5 October 4883:5 October 4857:5 October 4094:12 August 4089:0040-781X 3746:Cyberware 3650:Wikiquote 3637:contains 3618:Criticism 3516:USA Today 3481:USA Today 3366:Wikiquote 3353:contains 2730:networks. 2726:networks. 2451:War novel 2354:Grey-zone 2314:War games 2275:Overmatch 2225:War crime 2175:Desertion 2165:Ceasefire 2160:Armistice 2047:Logistics 2025:Mercenary 2013:Volunteer 1944:Personnel 1916:Engineers 1861:Sociology 1816:World war 1811:Total war 1791:Strategic 1781:Religious 1766:Political 1761:Perpetual 1736:Irregular 1651:Offensive 1626:Defensive 1621:Deception 1581:Attrition 1434:Guerrilla 1429:Formation 1372:Airbridge 1304:Loitering 1218:Artillery 871:Artillery 821:Engineers 789:Irregular 760:Air force 363:DOTMLPF-P 162:(PSYOP), 113:talk page 55:talk page 5661:May 2016 5603:Archived 5568:17 April 5545:26 April 5489:see also 5257:27 April 5193:24 April 5163:18 April 5118:Archived 5043:Archived 5020:Archived 4984:Archived 4965:24 April 4936:24 April 4819:. London 4795:Archived 4780:Archived 4681:18 April 4656:18 April 4633:18 April 4607:cite web 3904:cite web 3720:See also 3497:eBay.com 3493:al-Qaeda 3491:Lately, 2998:(former 2937:Gulf War 2881:Facebook 2466:War song 2441:War film 2074:Materiel 1993:Children 1973:Training 1911:Medicine 1896:Doctrine 1851:Training 1786:Resource 1771:Princely 1721:Economic 1706:Conquest 1701:Colonial 1696:Cold war 1681:Blockade 1566:Strategy 1538:Maneuver 1299:Infantry 1255:Chemical 1109:Mountain 1069:Airborne 932:Fighters 899:Warships 854:Infantry 780:Reserves 728:Military 558:Virginia 450:New York 392:Maryland 283:ConStaff 106:disputed 48:disputed 5639:Please 5631:use of 4672:"OPSEC" 4597:4 April 4569:, p. 98 4537:Gwu.edu 4507:Gwu.edu 3894:4 April 3119:(IDF), 3108:British 3091:rootkit 3083:malware 3076:Siemens 3064:Stuxnet 3059:Stuxnet 3053:Stuxnet 3040:-based 2579:Writers 2574:Weapons 2539:Battles 2488:Related 2476:Wargame 2471:Uniform 2419:Culture 2200:Perfidy 2195:Justice 2116:Science 2101:Outpost 2054:History 2034:Warrior 2030:Soldier 2018:foreign 1956:counter 1856:Service 1806:Theater 1746:Limited 1726:Endemic 1641:Nuclear 1414:Foxhole 1389:Cavalry 1377:Airdrop 1362:Airlift 1347:Tactics 1319:Nuclear 1309:Missile 1238:Cavalry 1223:Barrage 1201:Weapons 1161:Surface 942:Command 937:Bombers 894:Frogman 864:Cavalry 836:Medical 803:Militia 785:Regular 765:Marines 679:castles 669:Ancient 657:History 636:outline 608:Florida 548:In the 533:In the 502:Vermont 368:In the 158:(CNO), 5323:20 May 4542:20 May 4513:20 May 4087:  3533:USENET 3472:mozaiq 3216:Syrian 3197:F-16CJ 3195:, and 3193:RC-135 3189:EC-130 3089:(PLC) 3026:TACAMO 2902:EC-130 2761:Kirkuk 2559:Sieges 2243:Theory 1983:Morale 1841:Policy 1836:Branch 1616:Mosaic 1606:Fabian 1553:Covert 1486:Trench 1471:Screen 1394:Charge 1384:Battle 1357:Aerial 1275:Denial 1243:Horses 1171:Seabed 1124:Tunnel 1104:Jungle 1094:Desert 1064:Aerial 154:(EW), 5595:(PDF) 5317:(PDF) 5306:(PDF) 4591:(PDF) 4584:(PDF) 4533:(PDF) 4503:(PDF) 4400:(PDF) 4197:(PDF) 4144:(PDF) 4116:(PDF) 4040:(PDF) 4010:(PDF) 3888:(PDF) 3881:(PDF) 3593:OPSEC 3567:PSYOP 3512:Milan 3487:jihad 3449:email 3293:Radio 3228:F-16s 3224:F-15s 3173:radar 3138:Suter 3127:Suter 3066:is a 3002:) at 2885:blogs 2532:Lists 1988:Women 1926:Ranks 1846:Staff 1776:Proxy 1691:Class 1646:Naval 1631:Depth 1466:Swarm 1459:Siege 1439:Naval 1419:Drone 1314:Music 1289:Robot 1285:Drone 1270:Cyber 1213:Armor 1183:Cyber 1156:Green 1151:Brown 1114:Urban 1074:Space 995:Radar 990:Sonar 859:Armor 816:Staff 794:Ranks 430:Texas 328:Texas 196:D-Day 5570:2012 5547:2012 5518:2023 5493:2011 5485:2011 5471:2023 5445:2011 5432:2011 5428:2011 5325:2016 5259:2012 5195:2012 5165:2012 4967:2012 4938:2012 4911:2007 4885:2007 4859:2007 4825:2012 4736:2010 4709:2010 4683:2012 4658:2012 4635:2012 4613:link 4599:2015 4544:2016 4515:2016 4486:2023 4460:2023 4434:2023 4408:2023 4381:2023 4356:2023 4331:2023 4306:2023 4281:2023 4255:2022 4232:2023 4209:2023 4180:2023 4152:2023 4124:2023 4096:2021 4085:ISSN 4081:Time 4022:2023 3989:2023 3963:2023 3936:2023 3910:link 3896:2015 3796:iWar 3690:and 3502:9/11 3226:and 3203:and 3201:Iraq 3030:SIOP 3017:The 2950:The 2927:and 2919:The 2912:The 2569:Wars 2086:Base 1636:Goal 1548:Raid 1146:Blue 1084:Land 755:Navy 750:Army 576:The 352:JBLM 314:The 41:The 5647:or 5487:); 3268:VOA 3266:or 3264:BBC 3021:'s 3006:in 2153:Law 2096:FOB 2091:MOB 1136:Sea 628:War 602:at 496:in 386:at 5745:: 5724:, 5601:. 5597:. 5509:. 5495:). 5461:. 5447:). 5434:). 5345:^ 5308:. 5287:. 5227:^ 5181:. 5054:^ 5031:^ 4995:^ 4946:^ 4893:^ 4867:^ 4845:. 4833:^ 4815:. 4674:. 4609:}} 4605:{{ 4552:^ 4535:. 4505:. 4476:. 4450:. 4424:. 4372:. 4347:. 4322:. 4297:. 4271:. 4199:. 4160:^ 4079:. 4063:15 4061:. 4042:. 4012:. 3997:^ 3979:. 3953:. 3926:. 3906:}} 3902:{{ 3865:^ 3191:, 3168:. 3093:. 3044:. 3014:. 3010:, 2976:TV 2974:, 2972:HF 2970:, 2968:FM 2966:, 2964:AM 2897:EW 2671:: 2647:, 2643:, 2032:/ 1287:/ 801:/ 787:/ 606:, 560:. 556:, 500:, 466:, 448:, 428:, 410:, 390:, 326:, 244:, 233:. 5674:) 5668:( 5663:) 5659:( 5655:. 5637:. 5572:. 5549:. 5520:. 5473:. 5327:. 5291:. 5261:. 5197:. 5167:. 4969:. 4940:. 4913:. 4887:. 4861:. 4827:. 4738:. 4711:. 4685:. 4660:. 4637:. 4615:) 4601:. 4546:. 4519:] 4517:. 4488:. 4462:. 4436:. 4410:. 4383:. 4358:. 4333:. 4308:. 4283:. 4257:. 4234:. 4211:. 4182:. 4154:. 4126:. 4098:. 4024:. 3991:. 3965:. 3938:. 3912:) 3898:. 3664:) 3660:( 3656:. 3642:. 3380:) 3376:( 3372:. 3358:. 2608:e 2601:t 2594:v 638:) 634:( 610:. 504:. 138:) 132:( 127:) 123:( 119:. 109:. 80:) 74:( 69:) 65:( 61:. 51:. 23:.

Index

Information warfare
neutrality
disputed
talk page
conditions to do so are met
Learn how and when to remove this message
disputed
talk page
reliably sourced
Learn how and when to remove this message
electronic warfare
computer network operations
psychological operations
military deception
operations security

World War 2
Ghost Army
D-Day
TBM Avenger
Korean War
Eighth Army
airborne leaflets
United Nations Command
Operation Strangle
Vietnam War
Deputy Secretary of Defense
John P. White
1st Information Operations Command (Land)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.