Escolar Documentos
Profissional Documentos
Cultura Documentos
by
June 2007
by
Approved: ________________________________________________________
Name & Title of First Reader
Approved: ________________________________________________________
Name & Title of Second Reader
Approved: _________________________________________________________
Name & Title of Program Director
18 June 2007
Abstract
Thomas Wingfield. Not only is Tom the premier expert on the areas of international law
touched by the subject matter in this thesis, he is a terrific scholar, teacher and friend. As
Lerche for allowing me to perform research using the field of information science, which
I dearly love, and which is outside the mainstream of counter-terrorism and diplomacy.
Dr. Mich Kabay, who ranks among the most intelligent and educated people I
know (as well as the perfect gentleman), listened patiently to my theories and did not
hesitate to debate them with me. The value of those debates and his friendship cannot be
overstated. Phil Susmann and Eric Brahman at NUARI – The Norwich University
Finally, I must credit some people with adding moral support, even if it only
meant letting me vent my frustrations during the program. I found, well into the counter-
terrorism part of the program, that this can be a very unpleasant subject. They listened
even when I was, perhaps, less than clear about what was bothering me.
Those include Elizabeth Templeton, Sophia Bennett and Kris Rowley (all of the
Norwich School of Graduate Studies), and, of course, Deborah, my wife who would just
as soon have tossed the whole project out and got her husband back. No matter how
many times I do things such as this, though, she always seems to manage to suffer
through them. I’m done, Deb. This is my last degree (for a while, anyway).
ii
Contents
ABSTRACT..................................................................................................................................... I
ACKNOWLEDGMENTS .............................................................................................................II
CONTENTS.................................................................................................................................. III
FIGURES.....................................................................................................................................VII
TABLES..................................................................................................................................... VIII
1. INTRODUCTION.......................................................................................................................1
2. LITERATURE REVIEW...........................................................................................................6
iii
2.6 CONCLUSIONS .......................................................................................................................12
iv
5.1 MUNICIPAL OR DOMESTIC LAW ............................................................................................44
v
7.2 KOPP’S THEORY OF INFORMATION CONFLICT .......................................................................63
WORKS CITED............................................................................................................................84
vi
Figures
Continuum......................................................................................................................... 16
Conflict ............................................................................................................................. 18
........................................................................................................................................... 19
Groups............................................................................................................................... 66
........................................................................................................................................... 67
Development ..................................................................................................................... 70
vii
Tables
........................................................................................................................................... 58
viii
1
1. INTRODUCTION
technologies. Some of these technologies are what the author refers to as hard
technologies and some are what the author considers soft technologies. Hard
technologies are those that lean towards application of computer and communications
systems to problems of information management. Soft technologies are those that lean
more towards sociology and information content. When these technologies combine,
they offer opportunities for the use of information both as an offensive weapon and as a
defensive tool.
In this thesis, the author explores one application of this approach that he refers to
as information dominance. Information dominance is a term that one generally sees used
in a state-on-state context. However, here the author attempts to generalize the term and
codify exactly what it means. In that regard, the concept of information dominance
information warfare and information operations. Specifically, this thesis looks at the
1.1 Background
THE UNITED STATES is gradually losing the online war against
terrorists. Rather than aggressively pursuing its enemies, the U.S.
government has adopted a largely defensive strategy, the centerpiece of
which is an electronic Maginot Line that supposedly protects critical
infrastructure (for example, the computer systems run by agencies such as
the Department of Defense and the Federal Aviation Administration)
against online attacks. In the meantime, terrorists and their sympathizers,
unhindered by bureaucratic inertia and unchallenged by Western
governments, have reorganized their operations to take advantage of the
Internet's more prosaic properties. (Kohlmann; 2004)
2
and the first wave of a ‘digital Pearl Harbor.’” (Devost, Houghton, and Pollard; 2002)
While these two viewpoints frame the problem, they do not give enough
information to understand the issues fully. Neither does either statement describe, fully
and unambiguously, where information science fits in the overall spectrum of counter-
terrorism issues.
understanding how terrorist organizations use the entire spectrum of information both
strategically and tactically, and applying effective countermeasures, both offensively and
countermeasure against terrorism by non-state actors in much the same manner that states
1.4 Motivations
Since 9/11, the Global War on Terror (GWOT) has cost hundreds of billions of
dollars and thousands of lives. Not only is the war no closer to being won, some might
say that it actually is being lost and may never be won. Public sentiment against the
GWOT becomes more and more negative with every US serviceperson killed and every
Congressional budget increase requested by the administration. Cries for a new direction,
while well meant, do not take into account that there are very few “new directions” left.
It is clear that along with what few strategies and tactics actually are working, we must
As the comments above show (section 1.1) there is a perception that the US is
behind in areas of information warfare. This is not because American strategists do not
understand the concept. Rather, it is because the GWOT is a different kind of war than
we ever have fought and we have yet to understand its deeper implications, both as a war
and as a set of enemy strategies. One area where we can improve our chances is by
wresting control of the infosphere from the enemy. If one takes Kohlmann literally, one
can see that this is a significant current vulnerability for the US and its Coalition partners
in the GWOT.
1.5 Contributions
The contributions that this thesis makes are the analysis of information conflict in
the context of terrorism, and the formulation and application of a set of tools that the US
and its partners can apply in the infosphere. These tools achieve the traditional goal of
4
systems while defending one’s own information and information systems” (Wingfield;
2000). However, unlike other current approaches, this thesis examines information
The research for this thesis was conducted in several ways. First, traditional
literature searches provided a background and a context for the theory of Information
infosphere provided a context for the application of information dominance in the Global
War on Terror. During that research, the author applied several tools, some of which are
just coming into common use, to characterize the notion of terrorism and allow mapping
of terrorist organizations.
mapping, scale-free networking (sometimes called “small world” networks) as well as the
application of both new and traditional aspects of knowledge science. Finally, the author
This thesis is organized from the general to the specific. Chapter 1 opens the
discussion by framing the problem and presenting the thesis statement, which offers a
background, both historically and currently, for information conflict, both state-on-state
(where practitioners of information warfare are most familiar) and in the context to
terrorism. The author explores the literature both of terrorism issues and of historical
Chapter 3 lays the foundation for understanding information conflict and its
components, as well as introducing some novel approaches using information science and
new views of where information conflict, especially cyber conflict, is headed. This
chapter is important because it is from these well-established core concepts that the
Chapter 4 briefly introduces the cogent issues surrounding terrorism. These issues
frame the battlespace. The author describes the terrorist battlespace here and proposes the
aspects of that battlespace that may be vulnerable to information dominance, the key
cyberspace and as it converges with laws of conflict. Chapter 6 begins the convergence
of the ideas in the rest of the thesis into a coherent approach. It lays the final level of the
foundation for Chapter 7, which describes a new approach to controlling the infosphere in
the context of terrorism. This approach the author refers to as Information Dominance.
Chapter 8 addresses the future and draws some conclusions from the author’s
research.
6
2. LITERATURE REVIEW
terrorism. However, there is almost nothing that brings the two together. In this chapter,
1. International relations
2. Information conflict
3. Terrorism
information superiority and for understanding the stage upon which information conflict
plays out globally. The many facets of information conflict are important to the theme of
this thesis. Finally, terrorism, not a new phenomenon certainly, is the target of the
author’s research and we will seek to understand it in this thesis in the context of
information conflict. This chapter begins with an overview of the writers that are
important to this thesis along with some examples of their work and then discusses
The author has proposed, in a term paper for the Master of Arts in Diplomacy
which, in the information age, one may analyze international relations taking into account
from the perspective of developing such a theory. Relevant authors and examples of their
7
work include:
The literature on information conflict and related topics as a basis for international
relations is surprisingly rich. This literature falls into two distinct categories. First, there
is the theoretical literature. This explores various concepts of information conflict as they
apply to international relations in the information age. The second category comprises
operational treatises, often written by military authors. While this body of work does not
address terrorism directly, it does lay groundwork for further discussion in that context.
2.3 Terrorism
• Terrorism motivations
systems appears on the Information Warfare Site on the Internet. Galley discusses the
concept of “computer terrorism” and concludes that it is possible, even likely (Galley;
1996). He writes: “It would be suicidal for any dictator such as Saddam Hussein at the
present time to conceive a major offensive without benefiting of the advantages from the
information systems but not quite in the manner that Galley suggests. Rather, Hussein
terrorism appeared in 1999 (Denning; 1999 pp 68-74). In her book Information Warfare
and Security Denning discusses several facets of information warfare that range from
cyber warfare (including what today is called computer network attack or CNA) to
misinformation and disinformation. She quotes Mark Pollitt, then a special agent in the
FBI but, ultimately, the chief of the FBI’s computer forensics laboratory, as defining
She further reports the first known instance of a cyber attack (1998) by terrorists:
However, Arquilla and Ronfeldt foresaw the emergence of cyber war as early as
This description was important because it began the process of defining the notion of
information conflict. This early work evolved by 1999 to include a well-formed vision of
the realm of information conflict as we see it emerging today. Although they did not
connect cyber war with terrorism, their description in 1993 did not preclude later
(Jones, Kovacich, and Luzwick; 2002 pp 109-113). They define a techno-terrorist as “...
those who use technology for terrorist activities....” This expanded the range of
possibilities for the technical aspects of cyber terrorism even though the authors viewed
Dunn was an early leader in expanding the notions of information warfare and
traditional international relations theory into a single, converged concept (Dunn; 2002).
Dunn’s theories (although they do not cite Dunn in their paper) and offer a superb
Armistead (Armistead; 2004), however, took some of the most important steps in
into a single set of converged concepts that supported practical application. Building on
Dunn’s work, he also expanded the seminal work of Arquilla and Ronfeldt (Arquilla and
Ronfeldt; 1999).
Arquilla and Ronfeldt developed and expanded the notion of noopolitik which
included the notion of the noosphere. This was an important step forward because it
12
warfare and information operations. It built upon their earlier work (Arquilla and
Ronfeldt; 1993) and of others published in a book edited by them called In Athena’s
Camp (Arquilla and Ronfeldt; 2003). From a theoretical perspective, the topics addressed
in this collection of essays were seminal in shaping thinking about information conflict
information warfare and terrorist insurgencies comes from work by O’Neil (O'Neil; 205).
In his book, the author describes nine succinct insurgent types and a well-developed
insights into ways to use information warfare to disrupt terrorist groups and lessen their
effectiveness. One final important paper in this regard deserves our attention. The
“Militant Ideology Atlas” (Combating Terrorism Center; 2006) offers insights into
militant groups, their relationships and the nature and sources of their ideologies.
cyberspace is Wingfield and his book The Law of Information Conflict (Wingfield; 2000)
2.6 Conclusions
While there is virtually nothing in the literature that addresses the convergence of
information conflict and terrorism directly in a useful manner, there is ample foundation
conflict involving sub-national actors. The seminal works of Dunn, Arquilla and
Ronfeldt, Eriksson and Giacomello, Armistead, Wingfield and others offer an excellent
These writers give us a solid basis for understand the motivations, politics, strategies and
tactics of terrorists and terrorist groups, both independently and in the context of their
state sponsors. Finally, the rich and extensive literature on international relations offers a
context upon which to build although in many regards that context is dated as it applies to
an information age.
14
Information conflict is not well understood and has not yet reached the level of a
formal discipline. Armistead, Dunn, and Arquilla and Ronfeldt are the primary direct
(information theory) are important. In this chapter, the author explores an emerging
information operations.
One of the most important concepts when one considers information conflict is
the difference between hard and soft power. Arquilla and Ronfeldt (Arquilla and
and Ronfeldt as “…foreign-policy behavior for the information age that emphasizes the
primacy of ideas, values, norms, laws and ethics—it would work through ‘soft power’
The author discusses this notion in detail in a paper produced as part of the Master
many guises. Even when one considers information, one may make a distinction between
the hard power end of the information continuum and soft power. Thus, we describe the
information continuum as bipolar—extending from the hard power pole in the context of
information (cyber conflict) to the soft power pole (pure information and thought). In the
center of the continuum is the space where hard and soft power converges. The soft
15
power pole of the continuum we refer to as the noosphere. The convergence we refer to
as the infosphere. The hard power pole comprises cyber events (i.e., those actions that
Most information conflict takes place in the infosphere. However, certain forms
of information conflict operations may occur at either the hard or soft power ends of the
continuum. At the cyber end, we find computer network attack (CNA) and other
technical operations such as the development of web sites on the Internet. At the
noosphere end, we find pure information that may include propaganda, misinformation,
and disinformation, especially as web site content. Therefore, information conflict, and
three areas of the continuum, but its results will be most observable in the infosphere.
We may break information conflict into the subsets of offensive conflict and
defensive conflict. While this thesis will address both of these subsets, the author is most
counterterrorism.
1
“Information warriors” include those individuals with specialized capabilities such as experts in
cyber conflict, hackers, propagandists, public relations experts, intelligence analysts, and political analysts.
16
interactions of hard and soft power within a second continuum: that of criminal activity
and warfare. Information conflict is present in contexts other than war. One can observe
the effects of information conflict even in the corporate world. For example, the
for intimidation (e.g., gang graffiti) at the soft end of the continuum. The author has
implicate his partner in a federal crime. In this example, the fraudster used a trivial
activity to warfare, we may add a dimension to the graphical representation in Figure one.
Any operation, tactic, or strategy that includes or depends for its success on the
that this thesis will examine in a later chapter, the application of the tactics and strategies
in Figure 2. Some have suggested that terrorism has strong criminal elements associated
Criminal Code of the Republic Uzbekistan (Uzbekistan; 2005). Many other countries
including Australia, France, Germany, Greece, Norway, Spain, Sweden, and the United
States consider terrorism to be a criminal act (The Secretary of State for Foreign and
From Figure 3 we can see that terrorism falls in the continuum between criminal
activity and warfare containing elements of both. We may also surmise that information
conflict relating to terrorism, as with the rest of the continuum between criminal activity
and warfare, appears largely in the infosphere. However, this is not to imply that there
are no elements of information conflict relating to terrorism at either of the opposite poles
of the continuum.
continuum, intelligence, for example. One might think of the Z-axis as consisting of
“slices” that mirror and are behind the continuum of Figure 3. We position these slices
along the Z-axis extending from operational intelligence (closest to the front) to pure
intelligence that consists largely of situation reports without any direct resultant action
implied. Each slice stands alone as an explicit definition of an intelligence goal within
19
another point. Frequently the messages have meaning; that is they refer to or are
understanding of how one may apply elements of both offensive and defensive
content that may be associated with a random outcome. If, probabilistically, there is an
20
equal likelihood of all potential outcomes, the value of entropy is at the maximum. If, on
the other hand, the outcome is a probabilistic certainty, the value of entropy is zero. The
However, as we can see from Figure 4, the potential for the injection of noise in
the signal path between the transmitter and the receiver exists. By way of clarification,
Consider the child's game of “telephone.” As a simple message passes from one
end of a line of children to the other, it is likely that the message received at the distant
end will not be the same message sent from the original transmitter. In this case, each
child with the exception of the first and last in the row is both a transmitter and a
receiver. Each child receives the message and passes it to the next child in line. The
process continues until the final child (receiver) receives the message. Because each
child is not only a transmitter and a receiver, but also a noise source, entropy generally is
One might also interpret this process as consisting of a transmitter (first child in
the row), a receiver (last child in the row) and a noise source (all of the other children
between the transmitter and the receiver). This analysis allows us to hypothesize that by
controlling the noise source one might control the entropy of the information at the
receiver, achieving the level of entropy desired. This has interesting implications in the
religious figures, etc.) to terrorist groups in the field. As well, one might reinterpret
with the analysis slightly shifted (noise) to one's benefit might well have an impact upon
Additionally, when it is to one’s benefit, one might insure that there is no noise in
the transmission and that a clear message with entropy of zero arrives at the receiver.
Figure 5.
Notice in Figure 5 that a correction System requires an observer, the role of which
is to (1) collect information from the source (prior to transmission) and the destination
(after receiving), (2) compare the two versions of the information and (3) submit the
corrected version to a correcting device that delivers the information to the destination.
A terrorist group kidnaps an American soldier. The group kills the soldier and
beheads him while recording the entire process on video. The group delivers the video to
al Jazeera and eventually the video finds its way to CNN. CNN televises the video but
deletes the portion where the soldier is beheaded. The producer of the newscast (noise)
distorts the content of the video between the transmitter (the source of the video,
presumably al Jazeera) and the receiver (the newscast audience). A voyeuristic, and, one
might assume, sympathetic blogger (observer) obtains the original video, places it on his
information based upon Shannon information theory is not simply interesting but,
exercise in managing entropy. One may manage entropy at multiple points on the
information continuum shown in Figure 3. This thesis explores these concepts in Chapter
7.
The mathematical analyses in the Shannon paper are rigorous and are beyond the
Barabasi and Albert first described the concept of scale-free networks in 1999
(Barabasi and Albert; 1999). In their early descriptions, Barabasi and others demonstrate
the concept through examples including the Internet, World Wide Web, and certain types
of social networks (Barabasi, Ravasz, and Vicsek; 2001). These networks contradicted
earlier views of network growth (Erdos and Renyi; 1959, Arquilla and Ronfeldt 1-25;
23
2002) that viewed networks as growing like chains, stars or “all-channel” networks where
all nodes connect more or less randomly to each other. Erdos graphed these networks as
a typical bell curve while Barabasi, et al described them as power law networks.
expansion) and preferential attachment (new nodes prefer to attach to nodes with the
Besides a new view of the growth of scale-free networks, Barabasis and his
resistant to error and failure but are not resistant to attack (Barabasi, Albert, and Jeong;
terrorist network.
researchers extended that concept to include, explicitly, terrorist groups and terrorist acts
(Matthew and Shambaugh; 2005, Clauset and Young; 2005, Stripling; 2007). Of these,
the Stripling paper may prove the most valuable in that it extends and updates Barabasi’s
theory relative, explicitly, to terrorist networks and, more specifically, to the al Qaeda
network.
In his paper, Stripling adds the notion of directed links between nodes showing
that not all terrorist links are two-way. This accounts for different types of interactions
24
within the same network (financial support, logistical support, training support,
operational support, etc.). These interactions characterize the state of global terrorist
networks well. Since the early years of this century, terrorist networks have tended to
become far less centralized than they were in the 1990s and earlier.
critical number of nodes, and because other nodes tend to attempt to rebuild the network
after a failure, two important points emerge. First, disabling links is not an effective way
to disable a scale-free network because the links will re-establish wherever possible.
Second, a critical mass of node destruction must occur before the network becomes
effectively disabled. Two groups of researchers have shown that careful selection
(“targeting”) of nodes can cause a cascading effect that will bring down the network
(Motter and Lai; 2002, Moreno, Gomez, and Pacheco; 2002). Inducement of a cascading
effect using information superiority may affect terrorist networks and may offer an
refers to them as “small world networks”) is Sageman (Sageman; 2004). Sageman has
taken the work of Barabasi et al and applied it to his seminal work on characterizing
terrorist networks.
The notion of soft power is a staple in the writings of Dunn (Dunn; 2002) and
Arquilla and Ronfeldt (Arquilla and Ronfeldt; 1999). Additionally, Armistead wrote an
entire book on the topic of soft power and its role in modern warfare (Armistead; 2004),
25
building upon the work of Dunn and Arquilla and Ronfeldt. This author explored these
writers in the context of various lenses on international relations and proposed a theory of
information dominance that builds upon prior work in the field (Stephenson; 2007).
international relations are limited in the context of the information age. For that we must
turn to the writings of Eriksson and Giacomello (Eriksson and Giacomello; 2004).
those proposed by the above writers and researchers do well at analyzing events that have
passed but have proven, based upon this writer’s research, to be weak at anticipating
trends or events of interest. Thus, beyond providing basic understanding of why things
happened the way that they happened, virtually no current theory offers a direct path to
actionable intelligence.
This author proposed a theory of information dominance that takes into account
theory uses Rosen’s definition of anticipatory systems for the purpose of expanding upon
the past and anticipating the future (Rosen; 1985). Rosen defines an anticipatory system,
“An anticipatory system is a system containing a predictive model of itself and/or of its
environment that allows it to change state at an instant in accord with the model’s
1998), “A system is simple if all its models are simulable. A system that is not simple,
This is important because this author speculates (Stephenson; Feb 2006) that part
complexity of such systems. This complexity increases when the target is not a well-
defined nation-state, but, rather, is a non-state entity such as a terrorist group or network.
models, along with information dominance and social network theory may offer the
and operations.
describe what most of the literature calls ‘Information Warfare,’ ‘InfoWar,’ or ‘IW’”
27
taken to affect adversary information and information systems while defending one’s
Passive information conflict includes defensive action and actions taken against
an adversary without the intent of direct exploitation using those actions. An example of
information from and about the adversary. It might also include accessing information
provided by insiders and espionage agents placed inside the adversary’s ranks. Active
and passive information conflict may exist in the context of either offensive or defensive
information conflict.
28
define it and the most common definitions combine the definitions of information warfare
conventional warfare.
However, information warfare is not always a “hot” war. For example, there are
writers who believe that China, although not engaged in a “shooting war” with the US,
none-the-less, believe that we are at war with China (Jones, et al; 2002, Exhibit 7). The
Chinese view of information warfare focuses, in part, upon preemption or, in terms used
by Sun Tzu, “winning war without fighting” (Yoshihara; 2000). Yoshihara describes six
influence perceptions.
29
information conflict in cyber space. Cyber conflict tends toward the technical end of the
Information operation is, arguably, the best understood of the terms related to
information conflict. However, it also is the least stable in terms of solid definitions
difficulty with this, however, is that a war implies an ongoing declared conflict with an
identifiable enemy. Information operations may or may not fit cleanly within that
paradigm. Information operations may be carried out as part of a war, to be sure, but they
also may be carried out as individual skirmishes in a propaganda war between states
This should not be confused, however, with the notion that information operations
are a subset of information warfare. In fact, in today’s parlance, quite the opposite is
true. Information warfare grows out of information operations, not the other way round.
• Civil affairs
• Deception
• Destruction
• Electronic warfare
• Operations security
• Public affairs
• Psychological operations
notion that a war is narrow while information operations are broad. Armistead’s
say, however, that in the context of information conflict, an information operation may
However, some distinguishing factors make this association inaccurate. First, one cannot
equate cyber crime to any type of war, formal or informal. Second, the notion of
information operations is inconsistent with the characteristics of cyber crime. Third, and
either the six pillars of information warfare or the capabilities and related activities of
31
consistent connection.
One tends to think of cyber crime as actions in cyber space that support illegal
Generally, one equates the notion of cyber crime with definitions of electronic or
electronic crime that one can use to compare cyber crime with information conflict:
From this definition and those of the various aspects of information conflict, one
can see that there is virtually no connection between the two concepts. However, as
shown in Figures 2 and 3, criminal activity is part of the information conflict continuum.
operations and cyber conflict are not directly considered to be criminal activities under
current definitions, if one approaches the problem in the reverse one sees that there is, in
fact, a connection.
The connection between information conflict and cyber crime (or “electronic
crime”) comes in the effect, not the cause. In other words, while current definitions
consider the motivation for a criminal act ( “…fraud, theft, forgery, child pornography or
transactions…”) they do not consider the outcome (e.g., terrorist funding from illegal
drug trafficking) which may be both a criminal act and an act of information operations.
Consider the example of the Internet as a tool for raising money to fund terrorist
activities through the illegal production and sale of drugs. The Internet may be used as a
terrorist groups. Another example is the use of terrorist web sites to advertise the results
the kidnapping itself is a violation of law in most states. Thus, the continuum between
crime and war, especially where the traditional paradigms of war break down, is valid
and, beyond typical definitions of both one finds common ground that must be addressed.
3.7 Conclusions
and of theories that contribute to it. The components of information conflict include
information warfare, information operations and cyber conflict. However, new theories
are emerging that attempt to explain the environment in which information conflict
exists. The notion of information conflict policy seems, from the literature, to be
The author takes the position that policy follows understanding. Operational
theories follow definitional theories. At this writing, definitional and operational theories
terrorism. Finally, contributing theories such as information theory, game theory and
scale-free social network theory may play a significant role in evolving such a meta-
framework. The rest of this thesis explores those contributions and develops a meta-
However, a few key elements determine how one might approach an effective use of
understanding of terrorist goals and objectives. This is an element that is not well
understood by most Westerners and it is key to any successful information warfare effort.
The second element is some detail as to the target. While there are hundreds of
terrorist organizations (over 70 in Iraq alone) ranging in size from a few members to al
Qaeda with over 50,000 members worldwide, only a few are of real consequence. As we
will discuss in Chapter 7, scale-free social network theory implies that by attacking some
The third element is understanding the tools that terrorists use to plan and execute
important. Sun Tzu said, “If you know the enemy and know yourself, you need not fear
the result of a hundred battles.” 2 Understanding what drives terrorists, what their tools are
and how they operate will assist in understanding where their weaknesses are. In this
Today’s terrorists have multiple goals and their goals have multiple aspects.
Sageman produced a concise study of why Salafist terrorists perform acts of terrorism
2
There are dozens, perhaps hundreds, of translations of this venerable classic on The Art of War.
This one is the 1910 translation from the Chinese by Lionel Giles. It may be found at
http://www.chinapage.com/sunzi-e.html.
35
(Sageman; 2004). He characterized this group of terrorists, the most prominent of today’s
terrorist networks, in the preface to his book as the “global Salafi jihad.” Sageman’s
study was unique in that it drew from detailed first person information about more
than170 mujahadin. It also was unique in that it was the first to explore seriously the
notion of social networks based upon scale-free network theory (referred to by Sageman
as “small world networks”). This thesis explores that approach in more detail in Chapter
7.
when one examines contemporary terrorism and terrorist groups, one finds that
Sageman’s Salafists dominate them. Thus, for the purposes of this thesis we will focus
upon Salafists (or as some refer to them, “Islamist fundamentalists”) and their
motivations.
interpretation of the Koran and the teachings of Muhammad. Various sects, such as the
Wahabist sect, interpret these teachings so strictly that they have added to and augmented
Islamic teaching to include the duty of jihad. In the early 1900s Sayyid Qtub took up the
Wahabist teachings and proclaimed that there must be jihad to establish a true Muslim
The duty of jihad consists of the “near jihad” and the “far jihad.” The far jihad
aims to create a global jihad with the goal of a global Muslim state. This fundamentalist
interpretation is at the heart of most of the Islamist terrorism seen today. There are other
aspects, such as poverty, a view that justice has bypassed Muslims and other socio-
economic factors. However, before one can address those factors using information
36
warfare, one must understand the cultural underpinnings of Islamist terrorism. This issue
suggests one fertile target for information operations. Another fertile target, affected by
all of the other factors, is terrorist fund-raising and other support or sponsorship from
Communications allow the jihadists to plan terrorist acts, obtain funding, spread
type from “mouth-to-ear” conversations to sophisticated use of the Internet and the World
Wide Web. Clearly, Islamist communications fall well within both Shannon
communication theory and the political theories of Dunn, Arquilla and Ronfeldt, and
others.
Based upon the author’s research and open source data, there are over 70 terrorist
groups in Iraq alone. 3 Globally, there are at least 76 terrorist groups aligned in one way
or another with al Qaeda. This makes al Qaeda, with an estimated 50,000 members
worldwide, arguably the most important terrorist organization within the Islamist
The author published a paper that addresses in depth the topic of a taxonomy of
terrorism (Stephenson; Nov. 2006). Much of this section references that paper. The
3
One particularly useful open source for this type of information is MITB Terrorism Knowledge
Base - http://www.tkb.org/Home.jsp
37
obviously a requirement for beginning any sort of understanding, are problematic when
one discusses terrorism. Different states have different definitions for terrorism and its
associated concepts. Often these definitions aim to serve national, political or religious
included laws, treaties and other defining information (JUSTICE; 2006) along with
definitions from some of the important writers on the subject. While there is no
political motivation, seem to appear regularly in the literature. It was the author’s intent
refinements and analyses, develop a taxonomy that allowed a more useful analysis of
Although the author describes the entire process in detail in his paper, it is useful
to summarize here. The steps involved in extracting and analyzing the characteristics of
terrorism are:
(Kabay; 2006)
38
4. Extraction as a taxonomy
The full taxonomy in Appendix A.1 reflects the extraction referenced in step 4.
key elements of terrorism – those elements that provided a context for analysis – include:
• Justifiability
• Hostage-taking
39
The individual relationships become more obvious if the link analysis is displayed
A yet more meaningful analysis emerges when we extract clusters from the
overall analysis. The author’s paper describes clustering in detail and illustrates the
clustering of the data at one level deeper then illustrated here. However, clustering of the
targeting the general public, damage to aircraft and ships, the means of performing
terrorist acts, and the invocation of a state of terror in victims. This cluster aids in the
The author’s paper goes into detail regarding the second level analysis of the
ontological data extracted in step 3 above. However, from that analysis eight core
characteristics emerged:
3. Threat of Violence
41
4. Induces Fear
5. Use of Force
6. Conspiracy
7. Financing
From these eight core determinants one begins to see the emergence of a
definition that addresses the most nearly universally accepted elements of terrorism. The
author, in his paper, proposed an axiom that is necessary but not necessarily sufficient to
characteristics:
security, that depend upon psychological effects for their success and that
induce fear through the use of force or threat of violence against the general
participants.
of the strong interconnections between the most frequently appearing elements in the
literature. However, from the literature we also find that terrorism is ideological or
political in its underpinnings (appearing in the ontology as a slot under motive and not
42
Therefore, in the context of this thesis, the author will use the following definition
Definition 1 - Terrorism
4.4 Conclusions
fundamentalist Islamists and the Western world in the context of terrorism is a clear
that are useful to us, but we can characterize factors and aspects of terrorist acts and
sources and from that, we have evolved a useful definition. Using that definition and the
In the context of this thesis, there is little need to explore this area in depth. Most
of the seminal work on this topic has been done by Wingfield (Wingfield; 2000).
However, it is useful to note where the law and information conflict either are adequate
Many analysts address terrorism and the law – both domestically and
internationally—by viewing terrorist acts as criminal acts. In this regard, it may be useful
to analyze the convergence of the law, information conflict and terrorism. To that
purpose, this chapter offers a brief discussion of the legal issues potentially involved in
the use of information warfare, information operations and cyber conflict as tools for
counter-terrorism.
The context for this chapter is counter-terrorism, terrorist groups and sub-national
actors. The question to be answered is, does international or domestic law prohibit the use
differs widely for country to country. We may consider domestic communications law
on two levels. The first is the level that pertains to international law and the second is the
Convention of 1982 (ITC) simply bans communications by one state that would interfere
45
with those of another (Wingfield, 473; 2000). According to Wingfield, not only are there
conflict all international telecommunications laws are suspended for the belligerents.
left to use telecommunications laws as our guide. Thus, we turn to domestic law
When the author refers to activities “within countries,” the reference assumes that
the topic has no international implications and is strictly a domestic issue. For the most
part countries that do address cyberspace do so within their own borders. This, of course,
is problematic since cyberspace has no borders. Thus, for the purpose of this analysis,
and for consistency, we will assume that cyberspace issues within a particular country are
those whose source is that country. In that regard, most countries, if they address
activities in cyberspace at all, address it in terms of criminal acts not acts relating to war.
This can be a problem in some cases. In the United States, for example, there are
ample laws on the books, both state and federal, that prohibit hacking. These laws
computer security experts agree that these laws explicitly prohibit the technique of “hack-
back” sometimes called “strike back.” However, in the spirit of the ITC lifting all
international bans on telecommunications activities during time of war, and a total lack of
international law directly addressing information operations, it would seem that lifting
Where the use of this technique against terrorists is proposed, however, these
46
questions remain open since terrorists usually are a sub-national group and the fight
against them may not be considered, legally, to be a war. Therefore, it becomes an open
question as to whether there actually are any prohibitions against performing attacks in
computer crime, is defined as being a crime against a computer or computing system. All
other crimes, whether they use the computer or not, are traditional crimes, sometimes
the topic of whether to handle terrorist activity as an act of war or as a traditional crime of
violence.
gain control of it over a rival gang we generally consider that a law enforcement issue,
even though, in extreme circumstances, the acts may be quite similar to act of terrorism.
Nevertheless, this activity is gang-related street crime, not terrorism, because it is not
When crime occurs in cyber space, however, we have a much more complicated
constrained and not constrained depending upon the circumstances. For example, some
US States have passed laws prohibiting on-line gambling. However, there are many on-
line casinos that operate outside of US borders and, thus, outside of US jurisdiction. In
response, many states have updated their laws against on-line gambling to mean that the
47
gambler may not access these sites and gamble within the State’s borders regardless of
where the site actually is located physically. Laws such as this tend to characterize cyber
crime and, often, are completely unenforceable because they are, for practical purposes,
undetectable.
The difficulty with the use of cyber space as a battlespace in the war on terror is
that activities in cyber space may well be considered violations of applicable state laws.
Individual countries may have laws that would be broken should the US or any other
state opt to fight the war in cyber space instead of physical space. While physical
explainable, as attack in cyber space likely would be considered a law enforcement issue.
Wingfield sets the stage nicely for a discussion on international law at the end of
his book (Wingfield, 370ff; 2000). Here, one finds a table of 23 “Use of Force
Principles.” This table, in summary, addresses all of the issues in the book and focuses
on the use of force. The most important point that Wingfield makes, and he makes it
both directly and indirectly throughout the book, is that hostilities in cyber space
constitute a use of force just as if there were an atomic bomb being used or its use
a use of force—underlies the whole of this thesis. This means that, in terms of
international law at least, there actually are some guiding principles against which one
can measure cyber space activities. Therefore, one can use cyber conflict (or information
dominance) as if they were weapons. One then may use the weapon of information
48
dominance where the use of force is permitted (or not explicitly prohibited).
Of all forms of violence, war is the only one that has, throughout history been
acceptable (Wingfield, 32ff; 2000). Wingfield further goes on to define the law of
conflict management: “The law of conflict management, jus ad bellum, is a set of rules
that govern the resort to armed conflict and determine whether the conflict is lawful or
For the purposes of this thesis, this is an extremely important point because the
notion of the lawfulness of a conflict is at the heart of what one can do in pursuing that
conflict. For example, if the conflict is lawful, the combatants may resort to the use of
force and, as we have seen, that means that the tools of information dominance are not
prohibited.
Although the Charter of the United Nations applies to states, and not to sub-state
actors, one nevertheless may draw a bit of guidance from it regarding the use of force and
the legality of hostilities. Wingfield describes the paradox of articles 2(4), 39, and 51, 4
The Charter clearly outlaws the aggressive use of force while recognizing
a state’s inherent right of individual and collective self-defense in Article
51 and the Security Council’s obligation under Article 39 to maintain and
restore international peace and security. Articles 2(4), 39, and 51 of the
Charter now redefine and codify the contemporary jus ad bellum in its
entirety.” (Wingfield, 37ff; 2000).
It seems obvious that terrorist hostilities such as those seen in Iraq and
4
Wingfield offers the text of the salient sections of the UN Charter in his Appendix C. Thus, we
will not spend time here analyzing and citing the various sections and the author refers the reader to
Winfield’s book for a complete analysis, which, since it applies to states, is outside the scope of this thesis.
49
Afghanistan are a threat to both local (state) and international peace and security. Osama
bin Laden has declared war in the name of al Qaeda, particularly on the United States, but
indirectly on the rest of the non-Muslim world (bin Laden; 2007). The American
In the case of al Qaeda, we see a sub-state actor declaring war on a state. Not
only is al Qaeda a sub-state actor, it is, today, so loosely connected that it may be an
congress or legislature. In legal terms, al Qaeda does not have the legal capacity to
declare war.
against a concept (e.g., terror, drugs, poverty, etc.) can at best only be thought of as
rhetoric and saber rattling. Unfortunately, the administration has resorted to sending tens
of thousand of troops and spent hundreds of billions of dollars to fight this “war.”
However, for all of the political wrangling, sound bites, and media manipulation,
one very interesting concept may be emerging: the role of the sub-national actor, by this
precedent, may be expanded to coverage by the same principles of the UN Charter that
govern states. What this means, in simple terms, is that a state of war may exist between
a state and a sub-state entity such as al Qaeda and its affiliates. That being the case, the
concepts in jus ad bellum are likely to apply. That would include a nation’s right to use
force to protect itself and that force could include information operations.
50
Wingfield gives a concise definition of the law of armed conflict that the author
will use as the working definition: “The law of war, jus in bello, also commonly referred
to as the law of armed conflict, governs the actual conduct of hostilities and had
developed as customary international law through the practice of almost all societies over
There are four primary concepts that define the conduct of war (Wingfield, 140ff;
2000):
• Necessity—limits the degree and kind of force that may be used – often
civilian damage
These four principles make legal war against a terrorist group quite difficult since,
by their stock-in-trade terrorists violate each one of these. That issue notwithstanding,
however, the United States at least, has recognized formally, that it must, under some
circumstances, do battle with terrorists. In defining a hostile act, the “Standing Rules of
51
Thus, in the case of the United States, at least, there is no difference from a
practical perspective between declared war and a terrorist act. In fact, all that is required
to illicit a response is a hostile act. Given that the notion of anticipatory self-defense is
becoming more and more accepted internationally, the rules of engagement give a solid
The application of both international law and domestic law to acts of terrorism is
supporting the fight against terrorism. Laws as they exist today address what terrorism is,
a dicey proposition at best, and they make terrorism illegal under their definitions.
However, when it comes to fitting the actions that one may take in a war against
terrorism, we usually must depend upon other laws that address the problem less directly
This does not mean that there is no legal basis for fighting a war against terrorism.
Clearly there is. However, because of the “neither fish nor fowl” nature of terrorism
(neither formal war nor wholly a criminal act) it is likely that lawyers and states will be
sorting out the legal details for some time to come. That does not preclude fighting such
52
a “war.” There are ample precedents for such conflicts and, as time goes on, these
5.4 Conclusions
What is still unclear is how this affects the use of information operations against a
sub-state actor where there can be no official war in the traditional sense. In this case,
perhaps one must fall back on domestic law, because acts involving telecommunications
and cyber space, originating within that country’s borders, are controlled by that
country’s laws. However, in the absence of any direct prohibitions, we must accept for
now that there are no reasons, either in international or domestic law, why information
terrorist groups.
53
This chapter begins the convergence of the issues of terrorism and information
dominance. It forms the basis for Chapter 7 where the author will present some potential
This definition comes directly from an older version of the Doctrine for Joint
Operations. The current version, 17 September 2006, replaces the term with the newer
Taken together, these two definitions – the older one and the current one – offer a
definitions in earlier chapters (such as the definition of “terrorism”), the author takes the
approach of characterizing the term(s) in question in such a manner that the reader may
ask, “Does this characteristic of battlespace apply to terrorism and, if so, how does it
apply?” Characteristics, or, one might posit, an informal taxonomy illustrated as a Mind-
Map in Figure 9, of the concept of a battlespace based upon these two definitions consist
of:
Using this informal taxonomy, the author proposes the characteristics of the
Environment Anywhere
Deliberate and planned
Factors application of violence (255)
Conditions Various
Circumstances Various
Ideological and operational
Influences imperatives (229)
Terrorist acts and insurgent
Apply combat power acts
Not necessary if martyrdom
Protect the force is a factor
Complete the mission in any
Complete the mission way possible
Surprise, violence,
Employment of capabilities intimidation, hostage-taking,
etc.
Bear on the decisions of Availability of targets,
the commander carefully planned (255)
Air N/A
Land Yes
Sea Yes
Space N/A
Included enemy forces Yes
Yes, including state sponsors
Included friendly forces and affiliated terrorist groups
Facilities Targets
Weather Not important
Terrain Not important
Communication between
The electromagnetic
terrorists and dissemination
spectrum of propaganda
The information Legitimize use of violence,
environment recruitment (197ff)
Operational areas Worldwide
Anywhere that does not
conform to the terrorist's
Areas of interest political or ideological
objectives
As Table 1 shows, there are no limits on the physical battlespace, at least when
one addresses Islamist terrorism. However, explicitly, Osama bin Laden in his Fatwa
specifically declares war against America (Bin Laden; 1996). Here, he explicitly quotes
the Koran: “…so when the sacred months have passed away, then slay the idolaters
where ever you find them, and take them captives and besiege them and lie in wait for
motivated terrorism when one discusses the physical battlespace. 5 While, as we have
terrorist acts generally are directed at the source of the perceived political oppression.
Thus, in addressing political terrorism, the physical battlespace is more directed and
The virtual battlespace is, essentially, unlimited. Referring to Section 3.1, the
reader can see the scope of the information continuum. This information continuum
(Figure 1) comprises the potential virtual battlespace. Referring to Table 1, one sees that
the terrorist battlespace comprises both the electromagnetic spectrum and the information
terrorist organizations could employ portions of the entire information continuum. This
5
Although Islamist terrorists, pursuing the “far jihad” will take the terrorism battle anywhere,
political terrorists often restrict their activities to the local are where they can have the desired effect. For a
sense of what this means in terms of defining the battlespace, compare the global activities of al Qaeda to
the regional or local activities of the IRA.
57
turns out to be the case (Hoffman, 197ff; 2006, Zhou, Qin, and Lai; 2005, Kohlmann;
2004).
applying the concepts in Table 1, one can see some of the elements of information
warfare as they apply to terrorism. In that section, Yoshihara refers to six pillars of
1. Physical Attack/Destruction
2. Electro-Magnetic Warfare
4. Military Deception
5. Psychological Operations
6. Operations Security
Referring to Table 1 and the six pillars, one can get a good picture of how
information warfare might apply in the context of terrorism. Table 2 represents those
connections.
58
least, a strong connection between information warfare and the terrorist battlespace in
two important classes: military deception and psychological operations. These two
important connections operate on several levels. The following sections examine some of
these.
station comes under this class. However, the use of misinformation and disinformation
can confuse adversaries and threats of violence can have a psychological impact. These
both are consistent with the author’s taxonomy of terrorism. Violence anticipated against
These have much the same impact, and in much the same way, as deliberate and
59
Information warfare is a potent tool in this aspect of the terrorist battlespace. Key
initiatives for terrorist groups address recruitment, fund raising, and operational
internal communications. Terrorists need to ensure that their terrorist acts get the widest
“air-play” to achieve maximum impact. This is the message of the terrorist: we will kill
you, brutally, violently and unexpectedly if you do not acquiesce to our demands.” In
order to disseminate that message beyond the immediate neighborhood, terrorists need to
information assets also are required. Those assets can be anything from cell phones to
the Internet. The Internet, video and other communications media are becoming the
Hoffman (Hoffman, 229; 2006) is clear that terrorists are neither capricious nor
60
are they insane. Their acts are carefully planned and executed. This clearly opens the
door for misinformation and such tactics are commonplace. Terrorist groups imply in
web casts that they are sending secret communications to terrorist cells around the globe.
Intelligence analysts call this “chatter” and separating useful chatter from disinformation
movement. Its details are described above in other connections illustrating the
elements. One important aspect here is the sophisticated use of the Internet and the World
Wide Web. Terrorist groups use these tools extensively for training, fund-raising,
These two aspects are important to terrorist organizations and, in many respects,
they are interconnected. Terrorists must put a legitimate face on violent acts. These acts
and fund-raising.
61
6.3 Conclusions
elements of information warfare and the terrorist battlespace suggest that there may be
as feasible as it is in state-on-state conflict. The next chapter explores this possibility and
terrorism context.
62
The rest of this thesis has been setting the stage for this chapter, which articulates
terrorism arsenal. There are several components of this theory, each of which plays a
First, the author reviews briefly each of the tools that this chapter brings together
and focuses them on the problem of countering terrorism and the terrorist use of the
infosphere to his or her advantage. For the tools that this thesis has addressed in more
detail earlier, such as Shannon information theory, the author simply applies them to the
problem. Second, the author introduces some new tools such as game theory and the
Kopp theory of information conflict. These new tools apply, as has the existing tool set.
Finally, the entire tool set converges into a meta-framework for addressing
here since an important aspect of terrorism is its ability to adjust to changing conditions.
The author recognizes that any effective counter-terrorism weapon itself must be
able to adjust as rapidly and easily without restarting from the beginning. Thus, a meta-
framework that lays down some important precepts and approaches offers a flexible,
affirmative framework for a response to the problems of terrorism even as terrorists alter
because a key characteristic of terrorist tactics is the ability to respond and alter tactical
63
As explained in Chapter 3 of this thesis, Shannon articulates this core premise: “The
conflict, the parties are concerned with meeting this objective for their own information
Thus, as a basis for any meta-framework of information dominance, Shannon theory must
Kopp is notable in his discussions of information conflict for his nearly unique
(Dr. Andrew Borden of the US Air Force also published similar research leading to the
connection between Shannon and IW/IO leading to the common reference as the
information warfare.) Kopp, in a seminal paper on the topic, describes a very simple
Thus, the connection between Kopp’s theory, information conflict and Shannon
theory is made and is mathematically defensible. However, where Kopp falls short is
generalizing the theory beyond technical applications. The author has extended the
Borden-Kopp model:
• DoI – embeds information within other information such that the original
receiving system such that neither the information inserted nor any other
Note that in this extension the author refers explicitly to “information.” That
information may be electronic in nature but does not need to be. Also, note that
through fooling it with deceptive information so that the vehicle loses its credibility with
its audience completely. Another example is the discrediting of an authority figure such
as a mullah or other Islamic cleric such that the individual’s constituency no longer takes
begins when selected nodes of a scale-free network are destroyed and progresses until the
network itself crumbles. While the author does not suggest that information dominance
alone can trigger a cascade sufficient to destroy a terrorist network, he does suggest that
As pointed out in Section 3.3.1 of this thesis, research by the author and others
66
suggests that terrorist networks are scale-free in nature. Figure 10 shows the example of
Figure 10 - A Map Showing Links Between al Qaeda and Associated Terrorist Groups
While this map is difficult to read, al Qaeda sits at the center or hub of the map
and the characteristic “peacock” display of rays or spokes fanning out from the center
terminating in another fan of links and nodes. If one performs a clustering operation on
the map in Figure 10, one sees a map of the organizations most tightly connected to al
Qaeda. That clustering result is shown in Figure 11 (see section 4.3 for a discussion of
clustering).
67
represent optimal targets if one expects to start a cascade that would destroy al Qaeda.
However simple this sounds, there are some other issues that increase the difficulty of
First, the relationships between al Qaeda and other terrorist groups are by no
means stable or consistent. Second, destruction of the nodes in this diagram is difficult
and none of the attacks against the nodes can take place outside of the minimum period
that it takes a node that has lost its partner node to build a new thread. Thus, the entire
a terrorist network, is based upon the use of elements of information conflict across the
entire continuum discussed in section 3.1, and within the terrorism battlespace as a force
multiplier for kinetic attacks, diplomacy related to state sponsors of terrorist groups and
68
(Kilcullen; 2005).
Thus, the author views the application of information dominance within the
technologies, strategies and tactics. This approach is similar to the role that information
superiority plays in traditional international politics. This is consistent with the author’s
manner that states use information superiority in the conduct of international politics and
In this section, the author proposes a meta-framework that one can use to craft an
together to form a new model. One of the major uses of meta-frameworks is in computer
application programming, especially for the Java application language environment. One
can get a very good idea of what comprises a good meta-framework by consulting experts
69
the context of Java development of which the author applies four that are appropriate to
1. Broad scope
2. Co-existence
3. Abstraction
4. Longevity
situations. It may not be restrictive in the intended context but must, at the same time,
directly related frameworks (in this case diplomacy or kinetic attacks, for example)
without either losing its own definition or unnecessarily restricting the other
framework(s).
Abstraction refers to the ability to abstract away from limiting details without
Longevity means that the meta-framework has a long “shelf life” in that it does
not require substantive change just because the conditions in which it is being used
change. This is a critical characteristic because of the ability of terrorist groups to shift
In the context of this thesis, the meta-framework is derived from both formal
(e.g., the Shannon and Borden-Kopp models) and informal (e.g., information dominance
are, by definition, typically considered to have some mathematical basis. They usually
can be expressed either mathematically or using logic notation and they usually can be
proven formally. When one simply develops an approach that is codified structurally—
such as using a matrix of some sort—one has created a framework, not a model. An
in this thesis is a similar depiction. The difference between the CTIDF and the Zachman
Architecture Framework is that the CTIDF is based upon the frameworks described
The CTIDF builds upon the matrix in Table 2. Figure 13 depicts the CTIDF.
There are three dimensions to the CTIDF: The key characteristics of the terrorist
battlespace from Table 2 (left-hand column), the six pillars of information warfare from
72
Yoshihara (Yoshihara; 2001) (top row), and the elements of Shannon information theory
from the Borden-Kopp model (see the “key”). The Framework applies the Borden-Kopp
elements either from the perspective of the terrorist or the counter-terrorist (-T or -C)
Thus, in the upper right cell where “Operations Security” and “Deliberate and
planned application of violence” converge, one sees the entries, D&M-T, DoI-T and
misinformation.
The CTIDF was derived from the six pillars, the terrorist battlespace and the
Borden-Kopp model (properly a model because it is based upon Shannon theory, which is
mathematically sound). The author associated each of the Borden-Kopp elements, both
from the perspective of terrorism and counter-terrorism, with each element of the six
associated with an individual element of the six pillars or the terrorist battlespace.
73
After completing the associations, the author performed a standard link analysis
and extracted all of the relationships from the link analysis map. These relationships
connected individual instances of the Borden-Kopp model to pairings of the six pillars
1. Broad scope – The CTIDF covers the full scope of the terrorist
that it does not pose any conflict and, in fact, uses several in its
construction.
complexity.
campaigns and tactics. Thus, it is both an analytical tool and an operational planning
74
tool. It also may be used across the entire information dominance continuum.
7.5 Conclusions
The CTIDF shows clearly that there is a generalized meta-framework that may be
used to analyze terrorism and to construct information dominance strategies, tactics and
This thesis has examined the elements of information conflict, terrorism and the
building blocks, the author has constructed a meta-framework for information dominance
that is appropriate for use in a counter-terrorism context. The elements of that meta-
framework are:
6. The legal basis for the use of information operations against terrorist
groups
The author concludes that the use of such a meta-framework is both desirable and
practical. However, some areas for future research are outside the scope of this thesis.
terrorism practice
research
76
Is Violent
Jeopardizes Property
Seize Control of Aircraft in Flight
Targets General Population
Threat of Violence
Threatens International Peace and Security
Conspiracy
Advances a Criminal Agenda
Affects Constitutional Structure
Affects Economic Structure
Affects Political Structure
Aiding and Abetting Terrorist Acts
Is Criminal
Affects Are Psychological
Endangers Human Life
Imperils Freedoms or Rights
Imperils Honor
Imperils Lives
Imperils Security
Includes Threat of Force
Induces Fear
Is a Campaign
Is Covert
Is Not Justified
Is Political
Is Religious
Is Systematic
Is Unpredictable
Is Violent
Jeopardizes Property
Targets General Population
Threat of Violence
Threatens International Peace and Security
Financing
Advances a Criminal Agenda
Affects Constitutional Structure
Affects Economic Structure
Affects Political Structure
Is Criminal
Affects Are Psychological
Endangers Human Life
Imperils Freedoms or Rights
Imperils Honor
Imperils Lives
Imperils Security
Includes Threat of Force
79
Induces Fear
Is a Campaign
Is Covert
Is Not Justified
Is Political
Is Religious
Is Systematic
Is Unpredictable
Is Violent
Jeopardizes Property
Targets General Population
Threat of Violence
Threatens International Peace and Security
Aircraft and Ships
Safety of Aircraft
Destroy Aircraft in Flight
Affects Are Psychological
Induces Fear
Is an Accomplice of Person Who Seizes Aircraft in
Flight
Jeopardizes Property
Jeopardizes Safety of Passengers
Performs an Act of Violence against Passengers
Renders an Aircraft and Capable Flight
Targets General Population
Threat of Violence
Threatens International Peace and Security
Targets Air Navigation Facilities
Effects Are Psychological
Induces Fear
Targets General Population
Threat of Violence
Threatens International Peace and Security
Communicating False Information
Effects Are Psychological
Induces Fear
Targets General Population
Threat of Violence
Threatens International Peace and Security
Targets Airport Facilities
Effects Are Psychological
Induces Fear
Targets General Population
Threat of Violence
Threatens International Peace and Security
Safety of Ships
80
Criminal Penalties
Are Civilians
Are Criminal
Are Noncombatants
Effects Are Psychological
Induces Fear
Targets General Population
Threat of Violence
Threatens International Peace and Security
Internationally Protected Persons
Murder
Kidnapping
Attack Official Premises
Is Violent
Targets Residence
84
Works Cited
Primary Sources
Armistead, Leigh, ed. Information Operations - Warfare and the Hard Reality of Soft
Power. 1 ed. Washington: Brassey's, Inc, 2004.
Barabasi, Albert-Laszlo, Reka Albert, and Hawoong Jeong. “Error and Attack Tolerance
of Complex Networks.” Nature 406 (2000): 378-82.
Clauset, Aaron, and Maxwell Young. “Scale Invariance in Global Terrorism.” Physics 2
(2005):
Dunn, Myriam. Information Age Conflicts: A Study of the Information Revolution and a
Changing International Operating Environment, Zurich Contributions to Security
Policy and Conflict Analysis, Nr. 64. 1 ed. Zurich: Center for Security Studies,
2002.
<http://www.csse.monash.edu.au/courseware/cse468/subject-info.html>.
MITP Terrorism Knowledge Base. Ed. The Memorial Institute for the Prevention of
Terrorism. April 2007. MITB. 17 Apr. 2007 <http://www.tkb.org/Home.jsp>.
Stephenson, Peter. Investigating Computer Related Crime. 1st ed. CRC P, 2000.
---. “Toward A Formal Taxonomy of Terrorism”. Nov 2006. Norwich University. 16
Apr. 2007 <http://www2.norwich.edu/pstephen/docs/Terrorism_Taxonomy.pdf>.
Wingfield, Thomas C. The Law of Information Conflict. 1 ed. Falls Church: Aegis
Research Corporation, 2000.
Byman, Daniel. Deadly Connections - States that Sponsor Terrorism. 1st ed. New York:
Cambridge U P, 2005.
Denning, Dorothy E. Information Warfare and Security. 1st ed. New York: ACM P,
1999.
Hoffman, Bruce. Inside Terrorism. 1st ed. New York: Columbia U P, 2006.
Jones, Andy, Gerald L. Kovacich, and Perry G. Luzwick. Global Information Warfare.
1st ed. New York: Auerbach, 2002.
Mingst, Karen A. Essentials of International Relations. 3rd ed. New York: W. W. Norton
& Company, 2004.
Morgenthau, Hans J. Politics Among Nations: The Struggle for Power and Peace. 1st ed.
New York: Alfred A. Knopf, 1967.
Nye, Joseph S. Bound to Lead: The Changing Nature of American Power. 1st ed. New
York: Basic Books, 1990.
O'Neil, Bard E. From Revolution to Apocalypse - Insurgency & Terrorism. 2nd ed.
86
Waltz, Kenneth. Theory of International Politics. 1st ed. New York: McGraw-Hill, 1979.
Bar, Schmuel. “The Religious Sources of Islamic Terrorism.” Policy Review June & July
Bin Laden, Osama. Declaration of War against the Americans Occupying the Land of the
Two Holy Places. August 1996. 22 Apr. 2007
<http://www.pbs.org/newshour/terrorism/international/fatwa_1996.html>.
Chairman, US Joint Chiefs of Staff. . Chairman of the Joint Chiefs of Staff Instruction
3121.01, Standing Rules of Engagement for US Forces. Washington, DC: United
States Government, 1994.
Crenshaw, Martha. “The Causes of Terrorism.” Comparative Politics 13.4 (1981): 379-
99.
Cronin, Blaise, and Holly Crawford. “Information Warfare: Its Application in Military
and Civilian Contexts.” The Information Society 15 (1999): 257-63.
87
Devost, Matthew G., Brian K. Houghton, and Neal A. Pollard. “Information Terrorism:
Can You Trust Your Toaster?” Institute for National Strategic Studies. Oct 2002.
National Defense University. 22 Apr. 2007
<http://www.ndu.edu/inss/siws/ch3.html>.
DiCenso, David J. “IW Cyberlaw: The Legal Issues of Information Warfare.” Airpower
Journal (1999).
Erdos, Paul, and Alfred Renyi. “On Random Graphs.” Publ. Math. Debrecen 6 (1959):
290-97.
Ehrlich, Paul R., and Jianguo Liu. “Some Roots of Terrorism.” Population and
Environment 24.2 (2002): 183-92.
Erbschloe, Michael. Information Warfare - How to Survive Cyber Attacks. 1 ed. New
York: McGraw-Hill, 2001. 41-61
Evans, Ernest. “The Mind of a Terrorist.” World Affairs 167.4 (2005): 175-79.
Galley, Patrick. “Computer Terrorism: What Are the Risks?” The Information Warfare
Site. 30 May 1996. 26 Nov. 2006
<http://www.iwar.org.uk/cyberterror/resources/risks/index.html>.
Gambill, Gary C. “The Balance of Terror: War by Other Means in the Contemporary
Middle East.” Journal of Palestine Studies 28.1 (1998): 51-66.
Kohlmann, Evan F. “The Real Online Terrorist Threat.” Foreign Affairs 85.5 (2004): .
Mills, Duncan. “J2EE vs .NET: Where Is Application Development Going?” Java Sys-
Con. 15 Apr. 2005. Java Sys-Con Magazine. 12 May 2007 <http://java.sys-
con.com/read/49198.htm>.
Naef, Wanja Eric. Information Operations Interview with Dan Kuehl. 22 Dec. 2005
<http://www.iwar.org.uk/infocon/print/io-kuehl.htm>.
National Institute of Justice. . Electronic Crime Needs Assessment for State and Local
Law Enforcement. Washington, DC: U. S. Department of Justice, 2001.
Rattray, Greg. “Improving the Nation's Cyber Defense.” Billy Mitchell Chapter - Society
of Old Crows. Aug 2006. Billy Mitchell Chapter - Society of Old Crows. 16 Apr.
2007 <http://www.bmcaoc.org/pdf/Rattray-CyberDefense.pdf>.
89
Schmitt, Michael N. “Computer Network Attack and the Use of Force in International
Law: Thoughts on a Normative Framework.” Columbia Journal of Transnational
Law 37 (1999): 885-937.
Supreme Court of the Republic of Uzbekistan . About the Results of the Trial on 15
Active Participants of Terrorist Attacks. Republic of Uzbekistan: Republic of
Uzbekistan, 2005. 7 Jan. 2007
<http://www.uzbekistan.de/en/2005/e_n1118c.htm>.
US Joint Chiefs of Staff. JP 3-0, Joint Operations. Washington, DC: United States
Government, 2006.
Wei, Jincheng. “New Form of People’s Warfare.” Translated and reported in FBIS-CHI-
96-159 (1996).
Zhou, Ilu, Jialun Qin, and Guanpi Lai. “Building Knowledge Management System for
Researching Terrorist Groups on the Web.” University of Arizona. August 2005.
University of Arizona. 22 Apr. 2007
<http://ai.arizona.edu/research/terror/publications/DarkWeb-
AMCIS2005_Zhou_Collection.pdf>.