Review of Ferguson and Faith: Sparking Leadership and Awakening Community

Ferguson and Faith: Sparking Leadership and Awakening Community by Dr. Leah Gunning Francis, the Vice President for Academic Affairs and Dean of the Faculty at Christian Theological Seminary in Indianapolis, Indiana is composed of selections from interviews by clergy that participated in the Ferguson protests.

The interviews are notable as they provide insight into the motivations of those participating (1) prior to the completion of judicial due processes which culminated in a Department of Justice Report regarding the shooting death of Michael Brown which clearly showed that the shooting was justified, (2) a not guilty verdict on the charges brought against the officer involved in the shooting, (3) in collaboration with segmented, polycentric ideological networks.

The reasons for clergy-members involvement in the protest actions include:
• To feel oneness with God (understood as catharsis in protests).
• To be a part of divine salvation.
• To proselytize people who would not normally come to church.
• To provide pastoral care.
• To validate a historical interpretive frame with which they identify.
• To prove oneself as being an anti-racist.
• To obtain a guidance role in the protests (Ministry of Presence).
• To fulfill a perceived obligation to prevent history from repeating itself.
• To fulfill a theological imperative.
• To act like one of the Biblical prophets.

Network Collaboration

“Not only did they voice their support of the protestors, but they put their bodies on the line and brought the gravitas of their moral authority to the moment and movement. They sent a clear message that they were bringing the resources and authority of their faith to the cause of racial justice.”

After arrests at the St. Ann Police Station clergy collaborated with those arrested soon thereafter the two groups “began to, as a unit and as a network, commit to doing that more systematically.” (67)

Network Development

“For many clergy who responded to the killing of Michael Brown, their rationale was deeply tied to their understanding of God and the mission of the church. They preached about the ill effects of racism upon young black men, held book discussions about bias in the criminal justice system with Michelle Alexanders’ The New Jim Crow, an provided community lectures as part of Metropolitan Congregations United’s sacred conversations on race…. “for these clergy, to stand with the oppressed is to stand with God. (91)”

Network Growth

“…we ended up hosting an ecumenical prayer service here in our sanctuary, and that was with representation from churches and pastors all through the neighborhood. The alderman and I worked on pulling that together. So – that really stepped up the congregations engagement once the shooting in our neighborhood happened.” (124)
Jacquelyn Foster, Pastor of Compton Heights Christian Church

“Unitarian Universalists from out of town have ecome to stand with us…”(134)
Krista Taves

Network Support

“for the weekend, we became a host site providing shelter for people, providing space for strategy to take place, and providing a worship experience for them… two hundred people come back for Ferguson October and convene at the church in the basement, and there they organize, strategize a week of tesistance to occur two weeks later. That’s when you begin to see “Shut down the streets in Chattanooga,” Shut doen the streets in Atlanta,” “shut down the BART in Oakland. That was organized in a church basement where the BLM riders come back and then they begin to trade ideas.”
Starky Wilson, Pastor of St. Johns UCC, CEO of the Deaconess Foundation

Network Focus

“Since Ferguson, there has been an important shift, and I can’t not see it this way anymore, and that has been toward figuring out how the seminary can be an agent in the movement of dismantling racism in the church and broader community.”
Deborah Krause, Eden Seminary’s academic dean

Network References

“My hero was Angela Davis. I tried to get her to come to my high school. I think it was 1968, and I was a junior or senior in high school, and I arranged it. What I’m remembering is there was one subversive teacher who helped me, but he king of stayed in the background.
Rabbi Talve

“I think I’ve always preached with a view towards liberation and history… I think I felt a push to make us aware of the violence around us; and to talk about it and to preach about it, but to preach about it from the standpoint of restoration, to speak about it from the standpoint of liberation, to speak about it from the standpoint of “Ubuntu,” the African proverb that says “I am because we are… the history of the church was born from protests…”
Karen Anderson

“Some variations of “for such a time of this” came up repeatedly in the interviews for this book. Several clergy reported feeling called to respond in the ways that they did. They connected it with a greater purpose and described how God seemed to use their life skills, experiences and resources for the benefit of this collective effort.”

#StayWoke
The “street signposts” also challenge us to consider the opportunities for faith communities in the wake of Ferguson – to join the quest for racial justice around the country. As previously mentioned, Ferguson is merely one example of the racial injustice that is present in cities and towns across the United States, not an anomaly. This is a moral injustice and faith communities are still being called upon to frame it as such. Now that we have been awakened to these injustices, there are at least three things we must do to #staywoke in order to be able to demand systemic changes that promote the fair and equitable treatment of black people. We must awaken to the awareness of our own privilege, build relationships in our own communities, and connect this awareness and the corresponding action in order to effect change for a more racially just world.” (158)

Subjects Interviewed/Involved in Ferguson Protests
Rebecca Ragland, Pastor of Holy Communion Episcopal Church, University City, Missouri
Jon Stratton, Episcopal Priest and Director of the Episcopal Service Corp.
Brendan O’Connor, Intern from Washington
Rosemary Haynes, Intern from North Carolina,
Sherry Nelson, Intern from Illinois
Tori Dahl, intern from Minnesota
Reverend Sekou
David Gerth, Executive Director of Metropolitan Congregations United,
Willis Johnson, Pastor of the Wellspring United Methodist Church
Traci Blackmon, Pastor of Christ the King United Church of Christ, Florissant, Missouri
Carlton Lee, Founder Flood Christian Church, Ferguson, Missouri
Mary Gene,
People Improving Communities Through Organizing (PICO)
Heather Arcovitch, Pastor of First Congregational Church of St. Louis, Clayton, Missouri
Mike Kinman, Dean of Christ Church Cathedral, St. Louis, Missouri,
Shaun Jones, Assistant Pastor of Mt. Zion Baptist Church, Officer in the Clergy Coalition,
Jamell Spann, youth activist
Brittany Ferrell, Millennial Activists United founder
Alexis Templeton, Millennial Activists United founder
Tef Poe,
Organization for Black Struggle
Starky Wilson, Pastor of St. Johns UCC, CEO of the Deaconess Foundation
Susan Talve, Rabbi
Karen Yang, young adult activist and seminary student
Dietra Wise Baker, Pastor of Liberation Christian Church, St. Louis
Sara Herbertson, Episcopal Service Corp intern, Connecticut
Nelson Pierce, pastor in Ohio,
Deborah Krause, Eden Seminary’s academic dean
Fred Pestello, President of St. Louis University
Jacquelyn Foster, Pastor of Compton Heights Christian Church
Waltrina Middleton, National Youth Coordinator for United Church of Christ
Krista Taves, Congregational Minister at Emerson Unitarian Universalist Chapel
Christi Griffin, Executive Director of The Ethics Project, St. Louis
DeMarco Davidson, seminary student and President of the consistory for St. John’s UCC
Renita Lamkin, Pastor of St. John’s AME Church in St. Charles, Missouri
Julie Taylor, Unitarian Universalist community minister and active participant in the protest movement
Derrick Robinson, Pastor of Kingdom Dominion Church
Martin Geiger, Episcopal Service Corp. intern from Illinois
Karen Anderson, Pastor of Ward Chapel AME Church
Rebecca Ragland, Pastor of the Episcopal Church of the Holy Communion
Gamaliel
Pacific, Asian, and North American Asian Women in Theology and Ministry

 

 

 

 

Notes from Information Warfare Principles and Operations

Notes from the book Information Warfare Principles and Operations by Edward Waltz

***

This ubiquitous and preeminent demand for information has shaped the current recognition that war fighters must be information warriors—capable of understanding the value of information in all of its roles: as knowledge, as target, as weapon.

• Data—Individual observations, measurements, and primitive messages form the lowest level. Human communication, text messages, electronic queries, or scientific instruments that sense phenomena are the major sources of data.

• Information—Organized sets of data are referred to as information. The organizational process may include sorting, classifying, or indexing and linking data to place data elements in relational context for subsequent searching and analysis.

• Knowledge—Information, once analyzed and understood, is knowledge. Understanding of information provides a degree of comprehension of both the static and dynamic relationships of the objects of data and the ability to model structure and past (and future) behavior of those objects. Knowledge includes both static content and dynamic processes. In the military context, this level of understanding is referred to as intelligence.

Information is critical for the processes of surveillance, situation assessment, strategy development, and assessment of alternatives and risks for decision making.

Information in the form of intelligence and the ability to forecast possible future outcomes distinguishes the best warriors.

The control of some information communicated to opponents, by deception (seduction and surprise) and denial (stealth), is a contribution that may provide transitory misperception to an adversary.

The supreme form of warfare uses information to influence the adversary’s perception to subdue the will rather than using physical force.

 

The objective of A is to influence and coerce B to act in a manner favorable to A’s objective. This is the ultimate objective of any warring party—to cause the opponent to act in a desired manner: to surrender, to err or fail, to withdraw forces, to cease from hostilities, and so forth. The attacker may use force or other available influences to achieve this objective. The defender may make a decision known to be in favor of A (e.g., to acknowledge defeat and surrender) or may fall victim to seduction or deception and unwittingly make decisions in favor of A.

Three major factors influence B’s decisions and resulting actions (or reactions) to A’s attack.

The capacity of B to act

The will of B to act

The perception of B

 

 

 

Information warfare operations concepts are new because of the increasing potential (or threat) to affect capacity and perception in the information and perception domains as well as the physical domain. These information operations are also new because these domains are vulnerable to attacks that do not require physical force alone. Information technology has not changed the human element of war. It has, however, become the preeminent means by which military and political decision makers perceive the world, develop beliefs about the conflict, and command their forces.

Information targets and weapons can include the entire civil and commercial infrastructure of a nation. The military has traditionally attacked military targets with military weapons, but IW introduces the notion that all national information sources and processes are potential weapons and targets.

Col. Richard Szafranski has articulated such a view, in which the epistemology (knowledge and belief systems) of an adversary is the central strategic target and physical force is secondary to perceptual force [6].

Economic and psychological wars waged over global networks may indeed be successfully conducted by information operations alone.

Information superiority is the end (objective) of information operations (in the same sense that air superiority is an objective), while the operations are the means of conduct (in the sense that tactical air power is but one tool of conflict).

Since the Second World War, the steady increase in the electronic means of collecting, processing, and communicating information has accelerated the importance of information in warfare in at least three ways.

First, intelligence surveillance and reconnaissance (ISR) technologies have extended the breadth of scope and range at which adversaries can be observed and targeted, extending the range at which forces engage. Second, computation and communication technologies supporting the command and control function have increased the rate at which information reaches commanders and the tempo at which engagements can be conducted. The third area of accelerated change is the integration of information technology into weapons, increasing the precision of their delivery and their effective lethality.

The shift is significant because the transition moves the object of warfare from the tangible realm to the abstract realm, from material objects to nonmaterial information objects. The shift also moves the realm of warfare from overt physical acts against military targets in “wartime” to covert information operations conducted throughout “peacetime” against even nonmilitary targets. This transition toward the dominant use of information (information-based warfare) and even the targeting of information itself (information warfare, proper) [8] has been chronicled by numerous writers.

 

 

According to the Tofflers, the information age shift is bringing about analogous changes in the conduct of business and warfare in ten areas.

  1. Production—The key core competency in both business and warfare is information production.

In business, the process knowledge and automation of control, manufacturing, and distribution is critical to remain competitive in a global market; in warfare, the production of intelligence and dissemination of information is critical to maneuvering, supplying, and precision targeting.

  1. Intangible values—The central resource for business and warfare has shifted from material values (property resources) to intangible information. The ability to apply this information discriminates between success and failure.
  2. Demassification—As information is efficiently applied to both business and warfare, production processes are shifting from mass production (and mass destruction) to precision and custom manufacturing (and intelligence collection, processing, and targeting).
  3. Worker specialization—The workforce of workers and warriors that performs the tangible activities of business and war is becoming increasingly specialized, requiring increased training and commitment to specialized skills.
  4. Continuous change—Continuous learning and innovation characterize the business and workforces of information-based organizations because the information pool on which the enterprise is based provides broad opportunity for understanding and improvement. Peter Senge has described the imperative for these learning organizations in the new information-intensive world [12].
  5. Scale of operations—As organizations move from mass to custom production, the teams of workers who accomplish tangible activities within organizations will become smaller, more complex teams with integrated capabilities. Business units will apply integrated process teams, and military forces will move toward integrated force units.
  6. Organization—Organizations with information networks will transition from hierarchical structure (information flows up and down) toward networks where information flows throughout the organization. Military units will gain flexibility and field autonomy.

8.Management—Integrated, interdisciplinary units and management teams will replace “stovepiped” leadership structures of hierarchical management organizations.

  1. Infrastructure—Physical infrastructures (geographic locations of units, physical placement of materials, physical allocation of resources) will give way to infrastructures that are based upon the utility of information rather than physical location, capability, or vulnerability.
  2. Acceleration of processes—The process loops will become tighter and tighter as information is applied to deliver products and weapons with increasing speed. Operational concurrence, “just-in-time” delivery, and near-real-time control will characterize business and military processes.

 

 

 

an information-based age in which:

  • Information is the central resource for wealth production and power.
  • Wealth production will be based on ownership of information—the creation of knowledge and delivery of custom products based on that knowledge.
  • Conflicts will be based on geoinformation competitions over ideologies and economies.
  • The world is trisected into nations still with premodern agricultural capabilities (first wave), others with modern industrial age capabilities (second wave), and a few with postmodern information age capabilities (third wave).

 

The ultimate consequences, for not only wealth and warfare, will be the result of technology’s impact on infrastructure, which influences the social and political structure of nations, and finally, that impact on the global collection of nations and individuals.

Table 1.2 illustrates one cause-and-effect cascade that is envisioned. The table provides the representative sequence of influences, according to some futurists, that has the potential even to modify our current structure of nation states, which are defined by physical boundaries to protect real property.

 

“Cyberwar is Coming!” by RAND authors John Arquilla and David Ronfeldt distinguished four basic categories of information warfare based on the expanded global development of information infrastructures (Table 1.3) [16].

Net warfare (or netwar)—This form is information-related conflict waged against nation states or societies at the highest level, with the objective of disrupting, damaging, or modifying what the target population knows about itself or the world around it.

The weapons of netwar include diplomacy, propaganda and psychological campaigns, political and cultural subversion, deception or interference with the local media, infiltration of computer databases, and efforts to promote dissident or opposition movements across computer networks [17].

Political warfare—Political power, exerted by institution of national policy, diplomacy, and threats to move to more intense war forms, is the basis of political warfare between national governments.

Economic warfare—Conflict that targets economic performance through actions to influence economic factors (trade, technology, trust) of a nation intensifies political warfare from the political level to a more tangible level

Command and control warfare (C2W)—The most intense level is conflict by military operations that target opponent’s military command and control.

 

The relationships between these forms of conflict may be viewed as sequential and overlapping when mapped on the conventional conflict time line that escalates from peace to war before de-escalation to return to peace

Many describe netwar as an ongoing process of offensive, exploitation, and defensive information operations, with degrees of intensity moving from daily unstructured attacks to focused net warfare of increasing intensity until militaries engage in C2W.

Martin Libicki, has proposed seven categories of information warfare that identify specific type of operations [21].

  1. Command and control warfare—Attacks on command and control systems to separate command from forces;
  2. Intelligence-based warfare—The collection, exploitation, and protection of information by systems to support attacks in other warfare forms;
  3. Electronic warfare—Communications combat in the realms of the physical transfer of information (radioelectronic) and the abstract formats of information (cryptographic);
  4. Psychological warfare—Combat against the human mind;
  5. Hacker warfare—Combat at all levels over the global information infrastructure;
  6. Economic information warfare—Control of economics via control of information by blockade or imperialistic controls;
  7. Cyber warfare—Futuristic abstract forms of terrorism, fully simulated combat, and reality control are combined in this warfare category and are considered by Libicki to be relevant to national security only in the far term.

 

Author Robert Steele has used two dimensions to distinguish four types of warfare.

Steele’s taxonomy is organized by dividing the means of conducting warfare into two dimensions.

  • The means of applying technology to conduct the conflict is the first dimension. High-technology means includes the use of electronic information-based networks, computers, and data communications, while low-technology means includes telephone voice, newsprint, and paper-based information.
  • The type of conflict is the second dimension, either abstract conflict (influencing knowledge and perception) or physical combat.

the principles of information operations apply to criminal activities at the corporate and personal levels (Table 1.5). Notice that these are simply domains of reference, not mutually exclusive domains of conflict; an individual (domain 3), for example, may attack a nation (domain 1) or a corporation (domain 2).

Numerous taxonomies of information warfare and its components may be formed, although no single taxonomy has been widely adopted.

1.5.1 A Functional Taxonomy of Information Warfare

A taxonomy may be constructed on the basis of information warfare objectives, functions (countermeasure tactics), and effects on targeted information infrastructures [29]. The structure of such a taxonomy (Figure 1.3) has three main branches formed by the three essential security properties of an information infrastructure and the objectives of the countermeasures for each.

Availability of information services (processes) or information (content) may be attacked to achieve disruption or denial objectives.

Integrity of information services or content may be attacked to achieve corruption objectives (e.g., deception, manipulation of data, enhancement of selective data over others).

Confidentiality (or privacy) of services or information may be attacked to achieve exploitation objectives.

  • Detection—The countermeasure may be (1) undetected by the target, (2) detected on occurrence, or (3) detected at some time after the after occurrence.
  • Response—The targeted system, upon detection, may respond to the countermeasure in several degrees: (1) no response (unprepared), (2) initiate audit activities, (3) mitigate further damage, (4) initiate protective actions, or (5) recover and reconstitute.

One type of attack, even undetected, may have minor consequences, for example, while another attack may bring immediate and cascading consequences, even if it is detected with response. For any given attack or defense plan, this taxonomy may be used to develop and categorize the countermeasures, their respective counter-countermeasures, and the effects to target systems.

the air force defines information warfare as any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against those actions; and exploiting our own military information functions.

 1.6 Expanse of the Information Warfare Battlespace

As indicated in the definitions, the IW battlespace extends beyond the information realm, dealing with information content and processes in all three realms introduced earlier in our basic functional model of warfare.

  • The physical realm—Physical items may be attacked (e.g., destruction or theft of computers; destruction of facilities, communication nodes or lines, or databases) as a means to influence information. These are often referred to as “hard” attacks.
  • The information infrastructure realm—Information content or processes may be attacked electronically (through electromagnetic transmission or over accessible networks, by breaching information security protections) to directly influence the information process or content without a physical impact on the target. These approaches have been distinguished as indirect or “soft” attacks.
  • The perceptual realm—Finally, attacks may be directly targeted on the human mind through electronic, printed, or oral transmission paths. Propaganda, brainwashing, and misinformation techniques are examples of attacks in this realm.

 

Viewed from an operational perspective, information warfare may be applied across all phases of operations (competition, conflict, to warfare) as illustrated in Figure 1.5.

(Some lament the nomenclature “information warfare” because its operations are performed throughout all of the phases of traditional “peace.” Indeed, net warfare is not at all peaceful, but it does not have the traditional outward characteristics of war.)

Because information attacks are occurring in times of peace, the public and private sectors must develop a new relationship to perform the functions of indication and warning (I&W), security, and response.

1.7 The U.S. Transition to Information Warfare

The U.S. Joint Chiefs of Staff “Joint Vision 2010,” published in 1996, established “information superiority” as the critical enabling element that integrates and amplifies four essential operational components of twenty-first century warfare.

  1. Dominant maneuver to apply speed, precision, and mobility to engage targets from widely dispersed units;
  2. Precision engagement of targets by high-fidelity acquisition, prioritization of targets, and joint force command and control;
  3. Focused logistics to achieve efficient support of forces by integrating information about needs, available transportation, and resources;
  4. Full-dimension protection of systems processes and forces through awareness and assessment of threats in all dimensions (physical, information, perception).

Nuclear and information war are both technology-based concepts of warfare, but they are quite different. Consider first several similarities. Both war forms are conceptually feasible and amenable to simulation with limited scope testing, yet both are complex to implement, and it is difficult to accurately predict outcomes. They both need effective indications and warnings, targeting, attack tasking, and battle damage assessment. Nevertheless, the contrasts in the war forms are significant. Information warfare faces at least four new challenges beyond those faced by nuclear warfare.

The first contrast in nuclear and information war is the obvious difference in the physical effects and outward results of attacks. A nuclear attack on a city and an information warfare attack on the city’s economy and infrastructure may have a similar functionaleffect on its ability to resist an occupying force, but the physical effects are vastly different.

 

Second, the attacker may be difficult to identify, making the threat of retaliatory targeting challenging. Retaliation in kind and in proportion may be difficult to implement because the attacker’s information dependence may be entirely different than the defender’s.

The third challenge is that the targets of information retaliation may include private sector information infrastructures that may incur complex (difficult to predict) collateral damages.

Finally, the differences between conventional and nuclear attacks are distinct. This is not so with information operations that may begin as competition, escalate to conflict, and finally erupt in to large-scale attacks that may have the same functional effects as some nuclear attacks.

In the future, the IW continuum may be able to smoothly and precisely escalate in the dimensions of targeting breadth, functional coverage, and impact intensity. (This does not imply that accurate effects models exist today and that the cascading effects of information warfare are as well understood as nuclear effects, which have been thoroughly tested for over three decades.)

1.8 Information Warfare and the Military Disciplines

Organized information conflict encompasses many traditional military disciplines, requiring a new structure to orchestrate offensive and defensive operations at the physical, information, and perceptual levels of conflict.

1.9 Information and Peace

Information technology not only provides new avenues for conflict and warfare, but it also provides new opportunities for defense, deterrence, deescalation, and peace.

In War and Anti-War, the Tofflers argue that while the third-wave war form is information warfare, the third-wave peace form is also driven by the widespread availability of information to minimize misunderstanding of intentions, actions, and goals of competing parties. Even as information is exploited for intelligence purposes, the increasing availability of this information has the potential to reduce uncertainty in nation states’ understanding of each other. Notice, however, that information technology is a two-edged sword, offering the potential for cooperation and peace, or its use as an instrument of conflict and war. As with nuclear technology, humankind must choose the application of the technology.

information resources provide powerful tools to engage nations in security dialogue and to foster emerging democracies by the power to communicate directly to those living under hostile, undemocratic regimes. The authors recommended four peace-form activities that may be tasked to information peacemakers.

  1. Engage undemocratic states and aid democratic traditions—Information tools, telecommunications, and broadcast and computer networks provide a means to supply accurate news and unbiased editorials to the public in foreign countries, even where information is suppressed by the leadership.
  2. Protect new democracies—Ideological training in areas such as democratic civil/military relationships can support the transfer from military rule to democratic societies.
  3. Prevent and resolve regional conflicts—Telecommunication and network information campaigns provide a means of suppressing ethnonationalist propaganda while offering an avenue to provide accurate, unbiased reports that will abate rather than incite violence and escalation.
  4. Deter crime, terrorism, and proliferation, and protect the environment—Information resources that supply intelligence, indications and warnings, and cooperation between nations can be used to counter transnational threats in each of these areas.

1.10 The Current State of Information Warfare

At the writing of this book, it has been well over a decade since the concept of information warfare was introduced as a critical component of the current revolution in military affairs (RMA).

1.10.1 State of the Military Art

The U.S. National Defense University has established a School of Information Warfare and Strategy curriculum for senior officers to study IW strategy and policy and to conduct directed research at the strategic level.

The United States is investigating transitional and future legal bases for the conduct of information warfare because the character of some information attacks (anonymity, lack of geospatial focus, ability to execute without a “regulated force” of conventional “combatants,” and use of unconventional information weapons) are not consistent with current accepted second-wave definitions in the laws of armed conflict.

1.10.2 State of Operational Implementation

The doctrine of information dominance (providing dominant battlespace awareness and battlespace visualization) has been established as the basis for structuring all command and control architectures and operations. The services are committed to a doctrine of joint operations, using interoperable communication links and exchange of intelligence, surveillance, and reconnaissance (ISR) in a global command and control system (GCCS) with a common software operating environment (COE).

1.10.3 State of Relevant Information Warfare Technology

The technology of information warfare, unlike previous war forms, is driven by commercial development rather than classified military research and development.

Key technology areas now in development include the following:

  • Intelligence, surveillance, and reconnaissance (ISR) and command and control (C2) technologies provide rapid, accurate fusion of all-source data and mining of critical knowledge to present high-level intelligence to information warfare planners. These technologies are applied to understand geographic space (terrain, road networks, physical features) as well cyberspace (computer networks, nodes, and link features).
  • Information security technologies include survivable networks, multilevel security, network and communication security, and digital signature and advanced authentication technologies.
  • Information technologies, being developed in the commercial sector and applicable to information-based warfare, include all areas of network computing, intelligent mobile agents to autonomously operate across networks, multimedia data warehousing and mining, and push-pull information dissemination.
  • Electromagnetic weapon technologies, capable of nonlethal attack of information systems for insertion of information or denial of service.
  • Information creation technologies, capable of creating synthetic and deceptive virtual information (e.g., morphed video, synthetic imagery, duplicated virtual realities).

1.11 Summary

Information warfare is real. Information operations are being conducted by both military and non-state-sponsored organizations today. While the world has not yet witnessed nor fully comprehended the implications of a global information war, it is now enduring an ongoing information competition with sporadic conflicts in the information domain.

 

Szafranski, R., (Col. USAF), “A Theory of Information Warfare: Preparing for 2020,” Airpower Journal, Vol. 9, No. 1, Spring 1995.

Part I
Information-Based Warfare

Information, as a resource, is not like the land or material resources that were central to the first and second waves.

Consider several characteristics of the information resource that make it unique, and difficult to quantify.

  • Information is abstract—It is an intangible asset; it can take the form of an entity (a noun—e.g., a location, description, or measurement) or a process (a verb—e.g., a lock combination, an encryption process, a patented chemical process, or a relationship).
  • Information has multiple, even simultaneous uses—The same unit of information (e.g., the precise location and frequency of a radio transmitter) can be used to exploit the transmissions, to selectively disrupt communications, or to precisely target and destroy the transmitter. Information about the weather can be used simultaneously by opposing forces, to the benefit of both sides.
  • Information is inexhaustible, but its value may perish with time—Information is limitless; it can be discovered, created, transformed, and repeated, but its value is temporal: recent information has actionable value, old information may have only historical value.
  • Information’s relationship to utility is complex and nonlinear—The utility or value of information is not a function simply of its volume or magnitude. Like iron ore, the utility is a function of content, or purity; it is a function of the potential of data, the content of information, and the impact of knowledge in the real world. This functional relationship from data to the impact of knowledge is complex and unique to each application of information technology.

2.1 The Meaning of Information

The observation process acquires data about some physical process (e.g., combatants on the battlefield, a criminal organization, a chemical plant, an industry market) by the measurement and quantification of observed variables. The observations are generally formatted into reports that contain items such as time of observation, location, collector (or sensor or source) and measurements, and the statistics describing the level of confidence in those measurements. An organization process converts the data to information by indexing the data and organizing it in context (e.g., by spatial, temporal, source, content, or other organizing dimensions) in an information base for subsequent retrieval and analysis. The understanding process creates knowledge by detecting or discovering relationships in the information that allow the data to be explained, modeled, and even used to predict future behavior of the process being observed. At the highest (and uniquely human) level, wisdom is the ability to effectively apply knowledge to implement a plan or action to achieve a desired goal or end state.

We also use the terminology creation or discovery to refer to the effect of transforming data into useful knowledge. Several examples of discovering previously unknown knowledge by the processes of analyzing raw data include the detection or location of a battlefield target, the identification of a purchasing pattern in the marketplace, distinguishing a subtle and threatening economic action, the cataloging of the relationships between terrorist cells, or the classification of a new virus on a computer network.

The authors of the Measurement of Meaning have summed up the issue:

[Meaning] certainly refers to some implicit process or state which must be inferred from observables, and therefore it is a sort of variable that contemporary psychologists would avoid dealing with as long as possible. And there is also, undoubtedly, the matter of complexity—there is an implication in the philosophical tradition that meanings are uniquely and infinitely variable, and phenomena of this kind do not submit readily to measurement [2].

In the business classic on the use of information, The Virtual Corporation, Davidow and Malone [3] distinguish four categories of information (Table 2.2).

  • Content information—This describes the state of physical or abstract items. Inventories and accounts maintain this kind of information; the military electronic order of battle (EOB) is content information.
  • Form information—This describes the characteristics of the physical or abstract items; the description of a specific weapon system in the EOB is a form.
  • Behavior information—In the form of process models this describes the behavior of objects or systems (of objects); the logistics process supporting a division on the battlefield, for example, may be modeled as behavior information describing supply rate, capacity, and volume.
  • Action information—This is the most complex form, which describes reasoning processes that convert information to knowledge, upon which actions can be taken. The processes within command and control decision support tools are examples of Davidow’s action information category.

In a classic text on strategic management of information for business, Managing Information Strategically, the authors emphasized the importance of understanding its role in a particular business to develop business strategy first, then to develop information architectures.

  • Information leverage—In this strategy, IT enables process innovation, amplifying competitive dimensions. An IBW example of this strategy is the application of data links to deliver real-time targeting to weapons (sensor-to-shooter applications) to significantly enhance precision and effectiveness.

Information product—This strategy captures data in existing processes to deliver information or knowledge (a by-product) that has a benefit (market value) in addition to the original process. Intelligence processes in IBW that collect vast amounts of data may apply this strategy to utilize the inherent information by-products more effectively. These by-products may support civil and environmental applications (markets) or support national economic competitive processes [6].

• Information business—The third strategy “sells” excess IT capacity, or information products and services. The ability to share networked computing across military services or applications will allow this strategy to be applied to IBW applications, within common security boundaries.

2.2 Information Science

We find useful approaches to quantifying data, information, and knowledge in at least six areas: the epistemology and logic branches of philosophy, the engineering disciplines of information theory and decision theory, the semiotic theory, and knowledge management. Each discipline deals with concepts of information and knowledge from a different perspective, and each contributes to our understanding of these abstract resources. In the following sections, we summarize the approach to define and study information or knowledge in each area.

2.2.1 Philosophy (Epistemology)

The study of philosophy, concerned with the issues of meaning and significance of human experience, presumes the existence of knowledge and focuses on the interpretation and application of knowledge. Because of this, we briefly consider the contribution of epistemology, the branch of philosophy dealing with the scope and extent of human knowledge, to information science.

Representative of current approaches in epistemology, philosopher Immanuel Kant [7] distinguished knowledge about things in space and time (phenomena) and knowledge related to faith about things that transcend space and time (noumena). Kant defined the processes of sensation, judgment, and reasoning that are applied to derive knowledge about the phenomena. He defined three categories of knowledge derived by judgment:

(1) analytic a priori knowledge is analytic, exact, and certain (such as purely theoretical, imaginary constructs like infinite straight lines), but often uninformative about the world in which we live;

(2) synthetic a priori knowledge is purely intuitive knowledge derived by abstract synthesis (such as purely mathematical statements and systems like geometry, calculus, and logic), which is exact and certain; and

(3) synthetic a posteriori knowledge about the world, which is subject to human sense and perception errors.

2.2.2 Philosophy (Logic)

Philosophy has also contributed the body of logic that has developed the formal methods to describe reasoning. Logic uses inductive and deductive processes that move from premises to conclusions through the application of logical arguments.

The general characteristics of these forms of reasoning can be summarized.

  1. Inductive arguments can be characterized by a “degree of strength” or “likelihood of validity,” while deductive arguments are either valid (the premises are true and the conclusion must always be true) or invalid (as with the non sequitur, in which the conclusion does not follow from the premises). There is no measure of degree or uncertainty in deductive arguments; they are valid or invalid—they provide information or nothing at all.
  2. The conclusions of inductive arguments are probably, but not necessarily, true if all of the premises are true because all possible cases can never be observed. The conclusions of a deductive argument must be true if all of the premises are true (and the argument logic is correct).
  3. Inductive conclusions contain information (knowledge) that was not implicitly contained in the premises. Deductive conclusions contain information that was implicitly contained in the premises. The deductive conclusion makes that information (knowledge) explicit.

To the logician, deduction cannot provide “new knowledge” in the sense that the conclusion is implicit in the premises.

2.2.3 Information Theory

The engineering science of information theory provides a statistical method for quantifying information for the purpose of analyzing the transmission, formatting, storage, and processing of information.

 

2.2.4 Decision Theory

Decision theory provides analytical means to make decisions in the presence of uncertainty and risk by choosing among alternatives. The basis of this choice is determined by quantifying the relative consequences of each alternative and choosing the best alternative to optimize some objective function.

Decision theory distinguishes two categories of utility functions that provide decision preferences on the basis of value or risk [12].

  • Value—These utility functions determine a preferred decision on the basis of value metrics where no uncertainty is present.
  • Risk—These functions provide a preferred decision in the presence of uncertainty (and therefore a risk that the decision may not deliver the highest utility).

While not offering a direct means of measuring information per se, utility functions provide a means of measuring the effect of information on the application in which it is used. The functions provide an intuitive means of measuring effectiveness of information systems.

2.2.5 Semiotic Theory

  1. S. Peirce (1839–1914) introduced philosophical notions, including a “semiotic” logic system that attempts to provide a “critical thinking” method for conceptual understanding of observations (data) using methods of exploratory data analysis [13]. This system introduced the notion of abduction as a means of analyzing and providing a “best explanation” for a set of data. Expanding on the inductive and deductive processes of classical logic, Peirce viewed four stages of scientific inquiry [14].
  • Abduction explores a specific set of data and creates plausible hypotheses to explain the data.
  • Deduction is then applied to refine the hypothesis and develops a testable means of verifying the hypothesis using other premises and sets of data.
  • Induction then develops the general explanation that is believed to apply to all sets of data viewed together in common. This means the explanation should apply to future sets of data.
  • Deduction is finally applied, using the induced template to detect the presence of validated explanations to future data sets.

2.2.6 Knowledge Management

The management of information, in all of its forms, is a recognized imperative in third-wave business as well as warfare. The discipline of “knowledge management” developed in the business domain emphasizes both information exploitation (identified in Table 2.5) and information security as critical for businesses to compete in the third-wave marketplace.

Information Value (I v ) = [Assets − Liabilities] − Total Cost of Ownership

Where, assets include
At = The assets derived from the information at time of arrival

An = The assets if the information did not arrive;
Lt = The liabilities derived from the information at time of arrival;

Ln = The liabilities if the information did not arrive;
In = Total cost associated with the information;
I1 = The cost to generate the information;
I2 = The cost to format the information;
I3 = The cost to reformat the information;
I4 = The cost to duplicate the information;
I5 = The cost to transmit or transport the information (distribute);

I6 = The cost to store the information;
I7 = The cost to use the information, including retrieval.

 

The objective of knowledge management is ultimately to understand the monetary value of information. These measures of the utility of information in the discipline of business knowledge management are based on capital values.

 

2.4 Measuring the Utility of Information in Warfare

The relative value of information can be described in terms of the information performance within the information system, or in terms of the effectiveness (which relates the utility), or the ultimate impact of information on the user.

Utility is a function of both the accuracy and timeliness of information delivered to the user. The utility of estimates of the state of objects, complex situations, or processes is dependent upon accuracies of locations of objects, behavioral states, identities, relationships, and many other factors. Utility is also a function of the timeliness of information, which is often perishable and valueless after a given period. The relationships between utility and many accuracy and timeliness variables are often nonlinear and always highly dependent upon both the data collection means and user application.

The means by which the utility of information and derived knowledge is enhanced in practical systems usually includes one (or all) of four categories of actions.

  • Acquire the right data—The type, quality, accuracy, timeliness, and rate of data collected have a significant impact on knowledge delivered.
  • Optimize the extraction of knowledge—The processes of transforming data to knowledge may be enhanced or refined to improve efficiency, throughput, end-to-end speed, or knowledge yield.
  • Distribute and apply the knowledge—The products of information processes must be delivered to users on time, in understandable formats, and in sufficient quantity to provide useful comprehension to permit actions to be taken.
  • Ensure the protection of information—In the competitive and conflict environments, information and the collection, processing, and distribution channels must be protected from all forms of attack. Information utility is a function of both reliability for and availability to the user.

Metrics in a typical military command and control system that may be used to measure information performance, effectiveness, and military utility, respectively.

  • Sensor detection performance at the data level influences the correlation performance that links sensor data, and therefore the inference process that detects an opponent’s hostile action (event).
  • Event detection performance (timeliness and accuracy) influences the effectiveness of reasoning processes to assess the implications of the event.
  • Effectiveness of the assessment of the impact on military objectives influences the decisions made by commanders and, in turn, the outcome of those responses. This is a measure of the utility of the entire information process. It is at this last step that knowledge is coupled to military decisions and ultimately to military utility.

2.5 Translating Science to Technology

information, as process and content, is neither static nor inorganic. To view information as the static organized numbers in a “database” is a limited view of this resource. Information can be dynamic process models, capable of describing complex future behavior based on current measurements. Information also resides in humans as experience, “intuitive” knowledge, and other perceptive traits that will always make the human the valuable organic element of information architectures.

3

The Role of Technology in Information-Based Warfare

We now apply the information science principles developed in the last chapter to describe the core informationprocessing methods of information-based warfare: acquisition of data and creation of “actionable” knowledge.

The knowledge-creating process is often called exploitation—the extraction of military intelligence (knowledge) from collected data. These are the processes at the heart of intelligence, surveillance, and reconnaissance (ISR) systems and are components of most command and control (C2) systems. These processes must be understood because they are, in effect, the weapon factories of information-based warfare and the most lucrative targets of information warfare [1].

3.1 Knowledge-Creation Processes

Knowledge, as described in the last chapter, is the result of transforming raw data to organized information, and then to explanations that model the process from which the data was observed. The basic reasoning processes that were introduced to transform data into understandable knowledge apply the fundamental functions of logical inference.

In each reasoning case, collected data is used to make more general or more specific inferences about patterns in the data to detect the presence of entities, events, or relationships that can be used to direct the actions of the user to achieve some objective.

In the military or information warfare domain, these methods are used in two ways. First, both abduction (dealing with specific cases) and induction (extending to general application) are used to learn templates that describe discernible patterns of behavior or structure (of an opponent). Because both are often used, we will call this stage abduction-induction [2].

Second, deductive processes are used in the exploitation or intelligence analysis to detect and understand situations and threats based on the previously learned patterns. This second phase often occurs in a hierarchy of knowledge elements.

3.2 Knowledge Detection and Discovery

Two primary categories of knowledge-creation processes can be distinguished, based on their approach to inference. Each is essential to information-based warfare exploitation processes that seek to create knowledge from volumes of data described.

The abductive-inductive process, data mining, discovers previously unrecognized patterns in data (new knowledge about characteristics of an unknown pattern class) by searching for patterns (relationships in data) that are in some sense “interesting.” The discovered candidates are usually presented to human users for analysis and validation before being adopted as general cases.

The deductive exploitation process, data fusion, detects the presence of previously known patterns in many sources of data (new knowledge about the existence of a known pattern in the data) by searching for specific templates in sensor data streams to understand a local environment.

datasets used by these processes for knowledge creation are incomplete and dynamic and contain data contaminated by noise. These factors make the following process characteristics apply:

  • Pattern descriptions—Data mining seeks to induce general pattern descriptions (reference patterns, templates, or matched filters) to characterize data understood, while data fusion applies those descriptions to detect the presence of patterns in new data.
  • Uncertainty in inferred knowledge—The data and reference patterns are uncertain, leading to uncertain beliefs or knowledge.
  • Dynamic state of inferred knowledge—The process is sequential and inferred knowledge is dynamic, being refined as new data arrives.
  • Use of domain knowledge—Knowledge about the domain (e.g., constraints or context) may be used in addition to observed data.

 

3.3 Knowledge Creation in the OODA Loop

The observe-orient-decide-act (OODA) model of command and control introduced earlier in Chapter 1 may now be expanded to show the role of the knowledge-creation processes in the OOD stages of the loop. Figure 3.3 details these information functions in the context of the loop.

Observe functions include technical and human collection of data. Sensing of signals, pixels, and words (signals, imagery, and human intelligence) forms the core of information-based warfare observation.

Orient functions include data mining to discover or learn previously unknown characteristics in the data that can be used as templates for detection and future prediction in data fusion processes.

Decide functions include both automated and human processes. Simple, rapid responses can be automated upon the detection of preset conditions, while the judgment of human commanders is required for more complex, critical decisions that allow time for human intervention.

3.4 Deductive Data Fusion

Data fusion is an adaptive knowledge-creation process in which diverse elements of similar or dissimilar observations (data) are aligned, correlated, and combined into organized and indexed sets (information), which are further assessed to model, understand, and explain (knowledge) the makeup and behavior of a domain under observation

The process is performed cognitively by humans in daily life (e.g., combining sight, sound, and smells to detect a threat) and has long been applied for manual investigations in the military, intelligence, and law enforcement. In recent decades, the automation of this process has been the subject of intense research and development within the military, particularly to support intelligence and command and control

Deduction is performed at the data, information, and knowledge levels.

The U.S. DoD Joint Directors of Laboratories (JDL) have established a reference process model of data fusion that decomposes the process into four basic levels of information-refining processes (based upon the concept of levels of information abstraction).

  • Level 1: object refinement—Correlation of all data to refine individual objects within the domain of observation. (The JDL model uses the term object to refer to real-world entities; however, the subject of interest may be a transient event in time as well.)
  • Level 2: situation refinement—Correlation of all objects (information) within the domain to assess the current situation.
  • Level 3: meaning refinement—Correlation of the current situation with environmental and other constraints to project the meaning of the situation (knowledge). (The meaning of the situation refers to its implications to the user, such as threat, opportunity, or change. The JDL adopted the terminology threat refinement for this level; however, we adopt meaning refinement as a more general term encompassing broader applications than military threats.)
  • Level 4: process refinement—Continual adaptation of the fusion process to optimize the delivery of knowledge against a defined knowledge objective.

The technology development in data fusion has integrated disciplines such as the computer sciences, signal processing, pattern recognition, statistical analysis, and artificial intelligence to develop R&D and operational systems.

3.5 Abductive-Inductive Data Mining

Data mining is a knowledge-creation process in which large sets of data (in data warehouses) are cleansed and transformed into organized and indexed sets (information), which are then analyzed to discover hidden and implicit but previously undefined patterns that reveal new understanding of general structure and relationships (knowledge) in the data of a domain under observation.

The object of discovery is a “pattern,” which is defined as a statement in some language, L, that describes relationships in subset Fs of a set of data F such that:

  1. The statement holds with some certainty, c;
  2. The statement is simpler (in some sense) than the enumeration of all facts in Fs [11].

Mined knowledge, then, is formally defined as a pattern that is (1) interesting, according to some user-defined criterion, and (2) certain to a userdefined measure of degree.

Data mining (also called knowledge discovery) is distinguished from data fusion by two key characteristics.

  • Inference method—Data fusion employs known patterns and deductive reasoning, while data mining searches for hidden patterns using abductive-inductive reasoning.
  • Temporal perspective—The focus of data fusion is retrospective (determining current state based on past data), while data mining is both retrospective and prospective, focused on locating hidden patterns that may reveal predictive knowledge.

While there is no standard reference model for fusion, the general stages of the process as shown in Figure 3.5 illustrate a similarity to the data fusion process [14–16]. Beginning with sensors and sources, the data warehouse is populated with data, and successive functions move the data toward learned knowledge at the top. The sources, queries, and mining processes may be refined, similar to data fusion. The functional stages in the figure are described in the sections that follow.

Data Warehouse

Data from many sources are collected and indexed in the warehouse, initially in the native format of the source. One of the chief issues facing many mining operations is the reconciliation of diverse databases that have different formats (e.g., field and record sizes or parameter scales), incompatible data definitions, and other differences. The warehouse collection process (flow-in) may mediate between these input sources to transform the data before storing in common form [17].

Data Cleansing

The warehoused data must be inspected and cleansed to identify and correct or remove conflicts, incomplete sets, and incompatibilities common to combined databases. Cleansing may include several categories of checks.

  • Uniformity checks verify the ranges of data, determine if sets exceed limits, and verify that formats versions are compatible.
  • Completeness checks evaluate the internal consistency of datasets to make sure , for example, that aggregate values are consistent with individual data components (e.g., “verify that total sales is equal to sum of all regional sales, and that data for all sales regions is present”).
  • Conformity checks exhaustively verify that each index and reference exists.
  • Genealogy checks generate and check audit trails to primitive data to permit analysts to “drill down” from high-level information.

Data Selection and Transformation

The types of data that will be used for mining are selected on the basis of relevance. For large operations, initial mining may be performed on a small set, then extended to larger sets to check for the validity of abducted patterns. The selected data may then be transformed to organize all data into common dimensions and to add derived dimensions as necessary for analysis.

Data Mining Operations

Mining operations may be performed in a supervised manner in which the analyst presents the operator with a selected set of “training” data in which the analyst has manually determined the existence of pattern classes.

Discovery Modeling

Prediction or classification models are synthesized to fit the data patterns detected. This is the proscriptive aspect of mining: modeling the historical data in the database (the past) to provide a model to predict the future.

Visualization

The human analyst uses visualization tools that allow discovery of interesting patterns in the data. The automated mining operations “cue” the operator to

discovered patterns of interest (candidates), and the analyst then visualizes the pattern and verifies if, indeed, it contains new and useful knowledge.

On-line analytic processing (OLAP) refers to the manual visualization process in which a data manipulation engine allows the analyst to create data views from the human perspective, and to perform the following categories of functions:

  1. Multidimensional analysis of the data across dimensions, through relationships (e.g., hierarchies), and in perspectives natural to the analyst (rather than inherent in the data);
  2. Transformation of the viewing dimensions or slicing of the multidimensional array to view a subset of interest;
  3. Drill down into the data from high levels of aggregation, downward into successively deeper levels of information;
  4. Reach through from information levels to the underlying raw data, including reaching beyond the information base back to raw data by the audit trail generated in genealogy checking;
  5. Modeling of hypothetical explanations of the data, in terms of trend analysis and extrapolations.

Refinement Feedback

The analyst may refine the process by adjusting the parameters that control the lower level processes, as well as requesting more or different data on which to focus the mining operations.

3.6 Integrating Information Technologies

On-line analytic processing (OLAP) refers to the manual visualization process in which a data manipulation engine allows the analyst to create data views from the human perspective, and to perform the following categories of functions:

  1. Multidimensional analysis of the data across dimensions, through relationships (e.g., hierarchies), and in perspectives natural to the analyst (rather than inherent in the data);
  2. Transformation of the viewing dimensions or slicing of the multidimensional array to view a subset of interest;
  3. Drill down into the data from high levels of aggregation, downward into successively deeper levels of information;
  4. Reach through from information levels to the underlying raw data, including reaching beyond the information base back to raw data by the audit trail generated in genealogy checking;
  5. Modeling of hypothetical explanations of the data, in terms of trend analysis and extrapolations.

 

3.6 Integrating Information Technologies

It is natural that a full reasoning process would integrate the discovery processes of data mining with the detection processes of data fusion to coordinate learning and application activities.

(Nonliteral target signatures refer to those signatures that extend across many diverse observation domains and are not intuitive or apparent to analysts, but may be discovered only by deeper analysis of multidimensional data.)

3.7 Summary

The automation of the reasoning processes of abduction, induction, and deduction provides the ability to create actionable knowledge (military intelligence) from large volumes of data collected in IBW. As the value of information increases in all forms of information warfare, even more so is the importance of developing these reasoning technologies. While the scope of the global information infrastructure (and global sensing) increases, these technologies are required to extract meaning (and commercial value) from the boundless volumes of data available.

Data fusion and mining processes are yet on the initial slope of the technology development curve, and development is fueled by significant commercial R&D investments. Integrated reasoning tools will ultimately provide robust discovery and detection of knowledge for both business competition and information warfare.

4

Achieving Information Superiority Through Dominant Battlespace Awareness and Knowledge

The objective of information-based warfare is ultimately to achieve military goals with the most efficient application of information resources. Fullspectrum dominance is the term used to describe this effective application of military power by information-based planning and execution of military opera-tions. The central objective is the achievement of information superiority or dominance. Information superiority is the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. It is that degree of dominance in the information domain that permits the conduct of operations without effective opposition

Dominant battlespace awareness (DBA)—The understanding of the current situation based, primarily, on sensor observations and human sources;

Dominant battlespace knowledge (DBK)—The understanding of the meaning of the current situation, gained from analysis (e.g., data fusion or simulation).

DBK is dependent upon DBA, and DBA is dependent on the sources of data that observe the battlespace. Both are necessary for information superiority.

4.1 Principles of Information Superiority

Information superiority is a component of an overall strategy for application of military power and must be understood in that context.

Massed effects are achieved by four operating concepts that provide a high degree of synergy from widely dispersed forces that perform precision targeting of high-lethality weapons at longer ranges.

  1. Dominant maneuver—Information superiority will allow agile organizations with high-mobility weapon systems to attack rapidly at an aggressor’s centers of gravity across the full depth of the battlefield. Synchronized and sustained attacks will be achieved by dispersed forces, integrated by an information grid.
  2. Precision engagement—Near-real-time information on targets will permit responsive command and control, and the ability to engage and reengage targets with spatial and temporal precision (“at the right place, just at the right time”).
  3. Focused logistics—Information superiority will also enable efficient delivery of sustainment packages throughout the battlefield, optimizing the logistic process.
  4. Full-dimension protection—Protection of forces during deployment, maneuver, and engagement will provide freedom of offensive actions and can be achieved only if superior information provides continuous threat vigilance.

Information superiority must create an operational advantage to benefit the applied military power and can be viewed as a precondition for these military operations in the same sense that air superiority is viewed as a precondition to certain strategic targeting operations.

DBA provides a synoptic view, in time and space, of the conflict and supplies the commander with a clear perception of the situation and the consequences of potential actions. It dispels the “fog of war” described by Clausewitz.

To be effective, DBA/DBK also must provide a consistent view of the battlespace, distributed to all forces—although each force may choose its own perspective of the view. At the tactical level, a continuous dynamic struggle occurs between sides, and the information state of a side may continuously change from dominance, to parity, to disadvantage.

The information advantage delivered by DBA/DBK has the potential to deliver four categories of operational benefits:

Battlespace preparation—Intelligence preparation of the battlespace (IPB) includes all activities to acquire an understanding of the physical, political, electronic, cyber, and other dimensions of the battlespace. Dimensions such as terrain, government, infrastructure, electronic warfare, and telecommunication/computer networks are mapped to define the structure and constraints of the battlespace [10]. IPB includes both passive analysis and active probing of specific targets to detail their characteristics. Orders of battle and decision-making processes are modeled, vulnerabilities and constraints on adversaries’ operations are identified, and potential offensive responses are predicted. The product of this function is comprehension of the battlespace environment.

Battlespace surveillance and analysis—Continuous observation of the battlespace and analysis of the collective observations provide a detailed understanding of the dynamic states of individual components, events, and behaviors from which courses of action and intents can be inferred. The product is comprehensive state information.

Battlespace visualization—This is the process by which the commander (1) develops a clear understanding of the current state with relation to the enemy and environment, (2) envisions a desired end state that represents mission accomplishment, and then (3) subsequently visualizes the sequence of activities that moves the commander’s force from its current state to the end state. The product of this visualization is human comprehension and a comprehensive plan.

Battlespace awareness dissemination—Finally, the components of awareness and knowledge are distributed to appropriate participants at appropriate times and in formats compatible with their own mission. The product here is available and “actionable” knowledge.

4.1.1 Intelligence, Surveillance, and Reconnaissance (ISR)

Intelligence, the information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding, is the product that provides battlespace awareness.

The process that delivers strategic and operational intelligence products is generally depicted in cyclic form (Figure 4.3), with six distinct phases :

  • Collection planning—Government and military decision makers define, at a high level of information abstraction, the knowledge that is required to make policy, strategy, or operational decisions. The requests are parsed into information required to deduce the required answers. This list of information is further parsed into the individual elements of data that must be collected to form that required information base. The required data is used to establish a plan of collection, which details the elements of data needed and the targets (people, places, and things) from which the data may be obtained.
  • Collection—Following the plan, human and technical sources of data are tasked to perform the collection. Table 4.4 summarizes the major collection sources, which include both open and closed access sources and human and technical means of acquisition.
  • Processing—The collected data is indexed and organized in an information base, and progress on meeting the requirements of the collection plan is monitored. As a result of collection, this organized data may adjust the plan on the basis of received data.
  • Analysis—The organized information base is processed using deductive inference techniques (described earlier in Chapter 3) that fuse all source data in an attempt to answer the requester’s questions.
  • Production—Intelligence may be produced in the format of dynamic visualizations on a war fighter’s weapon system or in formal reports to policymakers. Three categories of formal strategic and tactical intelligence reports are distinguished by their past, present, and future focus: (1) current intelligence reports are news-like reports that describe recent events or indications and warnings; (2) basic intelligence reports provide complete descriptions of a specific situation (order of battle or political situation, for example); and (3) intelligence estimates attempt to predict feasible future outcomes as a result of current situations, constraints, and possible influences [16].
  • Application—The intelligence product is disseminated to the user, providing answers to queries and estimates of accuracy of the product delivered. Products range from strategic intelligence estimates in the form of large hardcopy or softcopy documents for policy makers, to real-time displays that visualize battlespace conditions for a war fighter.

 

4.1.1.1 Sources of Intelligence Data

A taxonomy of intelligence data sources (Table 4.4) includes sources that are openly accessible or closed

two HUMINT sources are required to guide the technical intelligence sources. HUMINT source A provides insight into trucking routes to be used, allowing video surveillance to be focused on most likely traffic points. HUMINT source B, closely related to crop workers, monitors the movements of harvesting crews, providing valuable cueing for airborne sensors to locate crops and processing facilities. The technical sources also complement the HUMINT sources by providing verification of uncertain cues and hypotheses for the HUMINT sources to focus attention.

4.1.1.3 Automated Intelligence Processing

The intelligence process must deal with large volumes of source data, converting a wide range of text, imagery, video, and other media types into processed products. Information technology is providing increased automation of the information indexing, discovery, and retrieval (IIDR) functions for intelligence, especially the exponentially increasing volumes of global OSINT

The information flow in an automated or semiautomated facility (depicted in Figure 4.5) requires digital archiving and analysis to ingest continuous streams of data and manage large volumes of analyzed data. The flow can be broken into three phases: capture and compile, preanalysis, and exploitation (analysis).

The preanalysis phase indexes each data item (e.g., article, message, news segment, image, or book chapter) by (1) assigning a reference for storage; (2) generating an abstract that summarizes the content of the item and metadata describing the source, time, reliability-confidence, and relation to other items (“abstracting”); and (3) extracting critical descriptors that characterize the contents (e.g., keywords) or meaning (“deep indexing”) of the item for subsequent analysis. Spatial data (e.g., maps, static imagery, video imagery) must be indexed by spatial context (spatial location) and content (imagery content). The indexing process applies standard subjects and relationships, maintained in a lexicon and thesaurus that is extracted from the analysis information base. Following indexing, data items are clustered and linked before entry into the analysis base. As new items are entered, statistical analyses are performed to monitor trends or events against predefined templates that may alert analysts or cue their focus of attention in the next phase of processing. For example, if analysts are interested in relationships between nations A and B, all reports may be scored for a “tension factor” between those nations, and alerts may be generated on the basis of frequency, score intensity, and sources of incoming data items.

The third, exploitation, phase of processing presents data to the human intelligence analyst for examination using visualization tools to bring to focus the most meaningful and relevant data items and their interrelationships.

The categories of automated tools that are applied to the analysis information base include the following [25]:

  • Interactive search and retrieval tools permit analysts to search by topic, content, or related topics using the lexicon and thesaurus subjects.
  • Structured judgment analysis tools provide visual methods to link data, synthesize deductive logic structures, and visualize complex relationships between datasets. These tools enable the analyst to hypothesize, explore, and discover subtle patterns and relationships in large data volumes—knowledge that can be discerned only when all sources are viewed in a common context.
  • Modeling and simulation tools model hypothetical activities, allowing modeled (expected) behavior to be compared to evidence for validation or projection of operations under scrutiny.
  • Collaborative analysis tools permit multiple analysts in related subject areas, for example, to collaborate on the analysis of a common subject.
  • Data visualization tools present synthetic views of data and information to the analyst to permit patterns to be examined and discovered. Table 4.6 illustrates several examples of visualization methods applied to the analysis of large-volume multimedia data.

 

4.2 Battlespace Information Architecture

We have shown that dominant battlespace awareness is achieved by the effective integration of the sensing, processing, and response functions to provide a comprehensive understanding of the battlespace, and possible futures and consequences.

At the lowest tier is the information grid, an infrastructure that allows the flow of information from precision sensors, through processing, to precision forces.

This tier is the forward path observe function of the OODA loop, and the feedback path distribution channel to control the act function of the loop and collaborative exchange paths. The grid provides for secure, robust transfer of four categories of information (Table 4.8) across the battlespace: (1) information access, (2) messaging, (3) interpersonal communications, and (4) publishing or broadcasting.

Precision information direction tailors the flow of information on the grid, responding dynamically to the environment to allocate resources (e.g., bandwidth and content) to meet mission objectives. The tier includes the data fusion and mining processes that perform the intelligence-processing functions described in previous sections. These processes operate over the information grid, performing collaborative assessment of the situation and negotiation of resource allocations across distributed physical locations

The highest tier is effective force management, which interacts with human judgment to provide the following:

• Predictive planning and preemption—Commanders are provided predictions and assessments of likely enemy and planned friendly COAs with expected outcomes and uncertainties. Projections are based upon the information regarding state of forces and environmental constraints (e.g., terrain and weather). This function also provides continuous monitoring of the effectiveness of actions and degree of mission accomplishment. The objective of this capability is to provide immediate response and preemption rather than delayed reaction.

• Integrated force management—Because of the information grid and comprehensive understanding of the battlespace, force operations can be dynamically synchronized across echelons, missions, components, and coalitions. Both defense and offense can be coordinated, as well as the supporting functions of deployment, refueling, airlift, and logistics.

• Execution of time-critical missions—Time-critical targets can be prosecuted by automatic mission-to-target and weapon-to-target pairings, due to the availability (via the information grid) of immediate sensorderived targeting information. Detection and cueing of these targets permit rapid targeting and attack by passing targeting data (e.g., coordinates, target data, imagery) to appropriate shooters.

Force management is performed throughout the network, with long-term, high-volume joint force management occurring on one scale, and time-critical, low-volume, precision sensor-toshooter management on another. Figure 4.7 illustrates the distinction between the OODA loop processes of the time-critical sensor-to-shooter mission and the longer term theater battle management mission.

4.3 Summary

Dominant battlespace awareness and knowledge is dependent upon the ability to both acquire and analyze the appropriate data to comprehend the meaning of the current situation, the ability to project possible future courses of action, and the wisdom to know when sufficient awareness is achieved to act.

Part II
Information Operations for Information Warfare

5

Information Warfare Policy, Strategy, and Operations

Preparation for information warfare and the conducting of all phases of information operations at a national level requires an overarching policy, an implementing strategy developed by responsible organizations, and the operational doctrine and personnel to carry out the policy.

Information warfare is conducted by technical means, but the set of those means does not define the military science of C2W or netwar. Like any form of competition, conflict, or warfare, there is a policy that forms the basis for strategy, and an implementing strategy that governs the tactical application of the technical methods. While this is a technical book describing the methods, the system implementations of information warfare must be understood in the context of their guiding implementation.

Because of the uncertainty of consequences and the potential impact of information operations on civilian populations, policy and strategy must be carefully developed to govern the use of information operations technologies—technologies that may even provide capabilities before consequences are understood and policies for their use are fully developed.

5.1 Information Warfare Policy and Strategy

The technical methods of information warfare are the means at the bottom of a classical hierarchy that leads from the ends (objectives) of national security policy. The hierarchy proceeds from the policy to an implementing strategy, then to operational doctrine (procedures) and a structure (organization) that applies at the final tactical level the technical operations of IW. The hierarchy “flows down” the security policy, with each successive layer in the hierarchy implementing the security objectives of the policy.

Security Policy

Policy is the authoritative articulation of the position of a nation, defining its interests (the objects being secured), the security objectives for those interests, and its intent and willingness to apply resources to protect those interests. The interests to be secured and the means of security are defined by policy. The policy may be publicly declared or held private, and the written format must be concise and clear to permit the implementing strategy to be traceable to the policy.

Any security policy addressing the potential of information warfare must consider the following premises:

  1. National interest—The national information infrastructure (NII), the object of the information security policy, is a complex structure comprised of public (military and nonmilitary) and private elements. This infrastructure includes the information, processes, and structure, all of which may be attacked. The structure, contents, owners, and security responsibilities must be defined to clearly identify the object being

protected. The NII includes abstract and physical property; it does not include human life, although human suffering may be brought on by collateral effects.

  1. New vulnerabilities—Past security due to geographic and political positions of a nation no longer applies to information threats, in which geography and political advantages are eliminated. New vulnerabilities and threats must be assessed because traditional defenses may not be applicable.
  2. Security objective—The desired levels of information security must be defined in terms of integrity, authenticity, confidentiality, nonrepudiation, and availability.
  3. Intent and willingness—The nation must define its intent to use information operations and its willingness to apply those weapons. Questions that must be answered include the following:
    • What actions against the nation will constitute sufficient justification to launch information strikes?
    • What levels of information operations are within the Just War Doctrine? What levels fall outside?
    • What scales of operations are allowable, and what levels of direct and collateral damage resulting from information strikes are permissible?
    • How do information operations reinforce conventional operations?
    • What are the objectives of information strikes?
    • What are the stages of offensive information escalation, and how

are information operations to be used to de-escalate crises?

  1. Authority—The security of highly networked infrastructures like the NII requires shared authorities and responsibilities for comprehensive protection; security cannot be assured by the military alone. The authority and roles of public and private sectors must be defined. The national command authority and executing military agencies for offensive, covert, and deceptive information operations must be defined. As in nuclear warfare, the controls for this warfare must provide assurance that only proper authorities can launch offensive actions.
  2. Limitations of means—The ranges and limitations of methods to carry out the policy may be defined. The lethality of information operations, collateral damage, and moral/ethical considerations of conducting information operations as a component of a just war must be defined.
  3. Information weapons conventions and treaties—As international treaties and conventions on the use (first use or unilateral use) of information operations are established, the national commitments to such treaties must be made in harmony with strategy, operations, and weapons development.

essential elements of security policy… that may now be applied to information warfare by analogy include the following:

Defense or protection—This element includes all defensive means to protect the NII from attack: intelligence to assess threats, indications and warning to alert of impending attacks, protection measures to mitigate the effects of attack, and provisions for recovery and restoration. Defense is essentially passive—the only response to attack is internal.

Deterrence—This element is the threat that the nation has the will and capability to conduct an active external response to attack (or a preemptive response to an impending threat), with the intent that that the threat alone will deter an attack. A credible deterrence requires (1) the ability to identify the attacker, (2) the will and capability to respond, and (3) a valued interest that may be attacked [5]. Deterrence includes an offensive component and a dominance (intelligence) component to provide intelligence for targeting and battle damage assessment (BDA) support.

Security Strategy

National strategy is the art and science of developing and using the political, economic, and psychological powers of a nation, together with its armed forces, during peace and war, to secure national objectives.

The strategic process (Figure 5.2) includes both strategy developing activities and a complementary assessment process that continuously monitors the effectiveness of the strategy.

 

The components of a strategic plan will include, as a minimum, the following components:

  • Definition of the missions of information operations (public and private, military and nonmilitary);
  • Identification of all applicable national security policies, conventions, and treaties;
  • Statement of objectives and implementation goals;
  • Organizations, responsibilities, and roles;
  • Strategic plan elements:
    1. Threats, capabilities, and threat projections;
    2. NII structure, owners, and vulnerabilities;
    3. Functional (operational) requirements of IW capabilities (time phased);
    4. Projected gaps in ability to meet national security objectives, and plan to close gaps and mitigate risks;
    5. Organizational plan;
    6. Operational plan (concepts of operations);
    7. Strategic technology plan;
    8. Risk management plan;
  • Performance and effectiveness assessment plan.

5.2 An Operational Model of Information Warfare

Information operations are performed in the context of a strategy that has a desired objective (or end state) that may be achieved by influencing a target (the object of influence).

Information operations are defined by the U.S. Army as

Continuous military operations within the Military Information Environment (MIE) that enable, enhance and protect the friendly force’s ability to collect, process, and act on information to achieve an advantage across the full range of military operations; information operations include interacting with the Global Information Environment (GIE) and exploiting or denying an adversary’s information and decision capabilities

The model recognizes that targets exist in (1) physical space, (2) cyberspace, and (3) the minds of humans. The highest level target of information operations is the human perception of decision makers, policymakers, military commanders, even entire populations. The ultimate targets and the operational objective are to influence their perception to affect their decisions and resulting activities.

for example, the objective perception for targeted leaders may be “overwhelming loss of control, disarray, and loss of support from the populace.”

These perception objectives may be achieved by a variety of physical or abstract (information) means, but the ultimate target and objective is at the purely abstract perceptual level, and the effects influence operational behavior. The influences can cause indecision, delay a decision, or have the effect of biasing a specific decision. The abstract components of this layer include objectives, plans, perceptions, beliefs, and decisions.

Attacks on this intermediate layer can have specific or cascading effects in both the perceptual and physical layers.

5.3 Defensive Operations

The U.S. Defense Science Board performed a study of the defensive operations necessary to implement IW-defense at the national level, and in this section we adapt some of those findings to describe conceptual defensive capabilities at the operational level.

Offensive information warfare is attractive to many [potential adversaries] because it is cheap in relation to the cost of developing, maintaining, and using advanced military capabilities. It may cost little to suborn an insider, create false information, manipulate information, or launch malicious logic-based weapons against an information system connected to the globally shared telecommunication infrastructure. In addition, the attacker may be attracted to information warfare by the potential for large nonlinear outputs from modest inputs

Threat Intelligence, I&W

Essential to defense is the understanding of both the external threats and the internal vulnerabilities that may encounter attack. This understanding is provided by an active intelligence operation that performs external assessments of potential threats [16] and internal assessments of vulnerabilities.

The vulnerability assessment can be performed by analysis, simulation, or testing. Engineering analysis and simulation methods exhaustively search for access paths during normal operations or during unique conditions (e.g., during periods where hardware faults or special states occur). Testing methods employ “red teams” of independent evaluators armed with attack tools to exhaustively scan for access means to a system (e.g., communication link, computer, database, or display) and to apply a variety of measures (e.g., exploitation, disruption, denial of service, or destruction).

Protection Measures (IW-Defense)

Based on assessments of threats and vulnerabilities, operational capabilities are developed to implement protection measures (countermeasures or passive defenses) to deny, deter, limit, or contain attacks against the information infrastructure. All of these means may be adopted as a comprehensive approach, each component providing an independent contribution to overall protection of the infrastructure.

The prevention operations deploy measures at three levels.

Strategic-level activities seek to deter attacks by legal means that ban attacks, impose penalties or punishment on offenders, or threaten reprisals.

Operational security (OPSEC) activities provide security for physical elements of the infrastructure, personnel, and information regarding the infrastructure (e.g., classified technical data).

Technical security (INFOSEC) activities protect hardware, software, and intangible information (e.g., cryptographic keys, messages, raw data, information, knowledge) at the hardware and software levels.

The functions of tactical response include the following:

  • Surveillance—Monitor overall infrastructure status and analyze, detect, and predict effects of potential attacks. Generate alert status reports and warn components of the infrastructure of threat activity and expected events.
  • Mode control—Issue controls to components to modify protection levels to defend against incipient threat activities, and to oversee restoration of service in the postattack period.
  • Auditing and forensic analysis—Audit attack activity to determine attack patterns, behavior, and damage for future investigation, effectiveness analysis, offensive targeting, or litigation.
  • Reporting—Issue reports to command authorities.

5.4 Offensive Operations

Offensive operational capabilities require the capability to identify and specify the targets of attack (targeting) and then to attack those targets. These two capabilities must be able to be performed at all three levels of the operational model, as presented earlier in Section 5.2. In addition to these two, a third offensive capability is required at the highest (perceptual) level of the operational model: the ability to manage the perceptions of all parties in the conflict to achieve the desired end.

Public and civil affairs operations are open, public presentations of the truth (not misinformation or propaganda) in a context and format that achieves perception objectives defined in a perception plan. PSYOPS also convey only truthful messages (although selected “themes” and emphases are chosen to meet objectives) to hostile forces to influence both the emotions and reasoning of decision makers. PSYOPS require careful tailoring of the message (to be culturally appropriate) and selection of the media (to ensure that the message is received by the target population). The message of PSYOPS may be conveyed by propaganda or by actions.

military deception operations are performed in secrecy (controlled by operational security). These operations are designed to induce hostile military leaders to take operational or tactical actions that are favorable to, and exploitable by, friendly combat operations

They have the objective of conveying untruthful information to deceive for one of several specific purposes.

  1. Deceit—Fabricating, establishing, and reinforcing incorrect or preconceived beliefs, or creating erroneous illusions (e.g., strength or weakness, presence or nonexistence);
  2. Denial—Masking operations for protection or to achieve surprise in an attack operation;
  3. Disruption—Creating confusion and overload in the decision-making process;
  4. Distraction—Moving the focus of attention toward deceptive actions or away from authentic actions;
  5. Development—Creating a standard pattern of behavior to develop preconceived expectations by the observer for subsequent exploitation.

All of these perception management operations applied in military combat may be applied to netwar, although the media for communication (the global information infrastructure) and means of deceptive activities are not implemented on the physical battlefield. They are implemented through the global information infrastructure to influence a broader target audience.

Intelligence for Targeting and Battle Damage Assessment

The intelligence operations developed for defense also provide support to offensive attack operations, as intelligence is required for four functions.

  1. Target nomination—Selecting candidate targets for attack, estimating the impact if the target is attacked;
  2. Weaponeering—Selecting appropriate weapons and tactics to achieve the desired impact effects (destruction, temporary disruption or denial of service, reduction in confidence in selected function); the process targets vulnerability, weapon effect, delivery accuracy, damage criteria, probability of kill, and weapon reliability;
  3. Attack plan—Planning all aspects of the attack, including coordinated actions, deceptions, routes (physical, information infrastructure, or perception), mitigation of collateral damage, and contingencies;
  4. Battle damage assessment (BDA)—Measuring the achieved impact of the attack to determine effectiveness and plan reattack, if necessary.

Attack (IW-Offense) Operations

Operational attack requires planning, weapons, and execution (delivery) capabilities. The weapons include perceptual, information, and physical instruments employed to achieve the three levels of effect in the operational model.

Offensive operations are often distinguished as direct and indirect means.

Indirect attacks focus on influencing perception by providing information to the target without engaging the information infrastructure of the target. This may include actions to be observed by the target’s sensors, deception messages, electronic warfare actions, or physical attacks. External information is provided to influence perception, but the target’s structure is not affected.

Direct attacks specifically engage the target’s internal information, seeking to manipulate, control, and even destroy the information or the infrastructure of the target.

Offensive information warfare operations integrate both indirect and direct operations to achieve the desired effects on the target. The effectiveness of attacks is determined by security (or stealth), accuracy, and direct and collateral effects.

5.5 Implementing Information Warfare Policy and Strategy

This chapter has emphasized the flow-down of policy to strategy, and strategy to operations, as a logical, traceable process. In theory, this is the way complex operational capabilities must be developed. In the real world, factors such as the pace of technology, a threatening global landscape, and dynamic national objectives force planners to work these areas concurrently—often having a fully developed capability (or threat) without the supporting policy, strategy, or doctrine to enable its employment (or protection from the threat).

6
The Elements of Information Operations

Information operations are the “continuous military operations within the military information environment that enable, enhance, and protect the friendly force’s ability to collect, process, and act on information to achieve an advantage across the full range of military operations; information operations include interacting with the global information environment and exploiting or denying an adversary’s information and decision capabilities”

Some information operations are inherently “fragile” because they are based on subtle or infrequent system vulnerabilities, or because they rely on transient deceptive practices that if revealed, render them useless. Certain elements of IO have therefore been allocated to the operational military, while others (the more fragile ones) have been protected by OPSEC within the intelligence communities to reduce the potential of their disclosure.

6.1 The Targets of Information Operations

The widely used term information infrastructure refers to the complex of sensing, communicating, storing, and computing elements that comprise a defined information network conveying analog and digital voice, data, imagery, and multimedia data. The “complex” includes the physical facilities (computers, links, relays, and node devices), network standards and protocols, applications and software, the personnel who maintain the infrastructure, and the information itself. The infrastructure is the object of both attack and defense; it provides the delivery vehicle for the information weapons of the attacker while forming the warning net and barrier of defense for the defender. Studies of the physical and abstract structure of the infrastructure are therefore essential for both the defender and the targeter alike.

Three infrastructure categories are most commonly identified.

The global information infrastructure (GII) includes the international complex of broadcast communications, telecommunications, and computers that provide global communications, commerce, media, navigation, and network services between NIIs. (Note that some documents refer to the GII as the inclusion of all NIIs; for our purposes, we describe the GII as the interconnection layer between NIIs.)

The national information infrastructure (NII) includes the subset of the GII within the nation, and internal telecommunications, computers, intranets, and other information services not connected to the GII. The NII is directly dependent upon national electrical power to operate, and the electrical power grid is controlled by components of the NII.

The defense information infrastructure (DII) includes the infrastructure owned and maintained by the military (and intelligence) organizations of the nation for purposes of national security. The DII includes command, control, communications, and computation components as well as dedicated administration elements. These elements are increasingly integrated to the NII and GII to use commercial services for global reach but employ INFOSEC methods to provide appropriate levels of security.

The critical infrastructures identified by the U.S. President’s Commission on Critical Infrastructure Protection (PCCIP) include five sectors

  1. Information and communications (the NII)
  2. Banking and finance
  3. Energy
  4. Physical distribution
  5. Vital human services

Attackers may seek to achieve numerous policy objectives by attacking these infrastructures. In order to achieve these policies, numerous intermediate attack goals may be established that can then be achieved by information infrastructure attacks. Examples of intermediate goals might include the following:

  • Reduce security by reducing the ability of a nation to respond in its own national interest;
  • Weaken public welfare by attacking emergency services to erode public confidence in the sustainment of critical services and in the government;
  • Reduce economic strength to reduce national economic competitiveness.

Two capabilities are required for the NII:

  • Infrastructure protection requires defenses to prevent and mitigate the effects of physical or electronic attack.
  • Infrastructure assurance requires actions to ensure readiness, reliability, and continuity—restricting damage and providing for reconstitution in the event of an attack.

 

The conceptual model provides for the following basic roles and responsibilities:

  • Protected information environment—The private sector maintains protective measures (INFOSEC, OPSEC) for the NII supported by the deterrent measures contributed by the government. Deterrence is aimed at influencing the perception of potential attackers, with the range of responses listed in the figure. The private sector also holds responsibility for restoration after attack, perhaps supported by the government in legally declared emergencies.
  • Attack detection—The government provides the intelligence resources and integrated detection capability to provide indications and warnings (strategic) and alerts (tactical) to structured attacks.
  • Attack response—The government must also ascertain the character of the attack, assess motives and actors, and then implement the appropriate response (civil, criminal, diplomatic, economic, military, or informational).
  • Legal protection—In the United States, the government also holds responsibility (under the Bill of Rights, 1791, and derivative statues cited below) for the protection of individual privacy of information, including oral and wire communications [26]; computers, e-mail, and digitized voice, data, and video [27]; electronic financial records and the transfer of electronic funds [28,29]; and cellular and cordless phones and data communications [30]. This is the basis for civil and criminal deterrence to domestic and international criminal information attacks on the NII.

While the government has defined the NII, the private sector protects only private property, and there is no coordinated protection activity. Individual companies, for example, provide independent protection at levels consistent with their own view of risk, based on market forces and loss prevention.

IO attacks, integrated across all elements of critical infrastructure and targeted at all three levels of the NII, will attempt to destabilize the balance and security of these operations. The objective and methodology is to:

  • Achieve perception objectives at the perceptual level, causing leadership to behave in a desired manner.
  • This perception objective is achieved by influencing the components of the critical infrastructure at the application level.
  • This influence on the critical infrastructure is accomplished through attacks on the information infrastructure, which can be engaged at the physical, information, and perceptual layers.

6.1.3 Defense Information Infrastructure (DII)

The DII implements the functional “information grid”. In the United States, the structure is maintained by the Defense Information Systems Agency (DISA), which established the following definition:

The DII is the web of communications networks, computers, software, databases, applications, weapon system interfaces, data, security services, and other services that meet the information-processing and transport needs of DoD users across the range of military operations. It encompasses the following:

  1. Sustaining base, tactical, and DoD-wide information systems, and command, control, communications, computers, and intelligence (C4I) interfaces to weapons systems.
  2. The physical facilities used to collect, distribute, store, process, and display voice, data, and imagery.
  3. The applications and data engineering tools, methods, and processes to build and maintain the software that allow command and control (C2), intelligence, surveillance, reconnaissance, and mission support users to access and manipulate, organize, and digest proliferating quantities of information.
  4. The standards and protocols that facilitate interconnection and interoperation among networks.
  5. The people and assets that provide the integrating design, management, and operation of the DII, develop the applications and services, construct the facilities, and train others in DII capabilities and use.

Three distinct elements of the U.S. DII are representative of the capabilities required by a third-wave nation to conduct information-based warfare.

6.2 Information Infrastructure War Forms

As the GII and connected NIIs form the fundamental interconnection between societies, it is apparent that this will become a principal vehicle for the conduct of competition, conflict, and warfare. The concept of network warfare was introduced and most widely publicized by RAND authors John Arquilla and David Ronfeldt in their classic think piece, “Cyberwar is Coming!”

The relationships between these forms of conflict may be viewed as sequential and overlapping when mapped on the conventional conflict time line that escalates from peace to war before de-escalation to return to peace (Figure 6.7). Many describe netwar as an ongoing process, with degrees of intensity moving from daily unstructured attacks to focused net warfare of increasing intensity until militaries engage in C2W. Netwar activities are effectively the ongoing, “peacetime”-up-to-conflict components of IO.

6.3 Information Operations for Network Warfare

Ronfeldt and Arquilla define netwar as a societal-level ideational conflict at a grand level, waged in part through Internetted modes of communications. It is conducted at the perceptual level, exploiting the insecurities of a society via the broad access afforded by the GII and NIIs. Netwar is characterized by the following qualities that distinguish it from all other forms:

  • Target—Society at large or influential subsets are targeted to manage perception and influence the resulting opinion. Political, economic, and even military segments of society may be targeted in an orchestrated fashion. The effort may be designed to create and foster dissident or opposition groups that may gain connectivity through the available networks.
  • Media—All forms of networked and broadcast information and communications within the NII of a targeted nation state may be used to carry out information operations. The GII may be the means for open access or illicit penetration of the NII.
  • Means—Networks are used to conduct operations, including (1) public influence (open propaganda campaigns, diplomatic measures, and psychological operations); (2) deception (cultural deception and subversion, misinformation); (3) disruption and denial (interference with media or information services); and (4) exploitation (use of networks for subversive activities, interception of information to support targeting).
  • Players—The adversaries in netwar need not be nation states. Nation states and nonstate organizations in any combination may enter into conflict. As networks increasingly empower individuals with information influence, smaller organizations (with critical information resources) may wage effective netwar attacks.

In subsequent studies, Arquilla and Ronfeldt have further developed the potential emergence of netwar as dominant form of societal conflict in the twenty-first century and have prescribed the necessary preparations for such conflicts. A 1994 U.S. Defense Science Board study concluded that “A large structured attack with strategic intent against the U.S. could be prepared and exercised under the guise of unstructured activities”

6.3.1 A Representative Netwar Scenario

The U.S. defense community, futurists, and security analysts have hypothesized numerous netwar scenarios that integrate the wide range of pure information weapons, tactics, and media that may be applied by future information aggressors.

6.4 Information Operations for Command and Control Warfare (C2W)

Information operations, escalated to physical engagement against military command and control systems, enter the realm of C2W. C2W is “the integrated use of operations security (OPSEC), military deception, psychological operations (PSYOPS), electronic warfare (EW), and physical destruction, mutually supported by intelligence to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions”.

C2W is distinguished from netwar in the following dimensions:

Target—Military command and control is the target of C2W. Supporting critical military physical and information infrastructures are the physical targets of C2W.

Media—While the GII is one means of access for attack, C2W is characterized by more direct penetration of an opponent’s airspace, land, and littoral regions for access to defense command and control infrastructure. Weapons are delivered by air, space, naval, and land delivery systems, making the C2W overt, intrusive, and violent. This makes it infeasible to conduct C2W to the degree of anonymity that is possible for netwar.

Means—C2W applies physical and information attack means to degrade (or destroy) the OODA loop function of command and control systems, degrading military leaders’ perceptual control effectiveness and command response. PSYOPS, deception, electronic warfare, and physically destructive means are used offensively, and OPSEC provides protection of the attack planning.

Players—The adversaries of C2W are military organizations of nation states, authorized by their governments.

Ronfeldt and Arquilla emphasize that future C2W will be characterized by a revision in structure, as well as operations, to transform the current view of command and control of military operations:

Waging [C2W] may require major innovations in organizational design, in particular a shift from hierarchies to networks. The traditional reliance on hierarchical designs may have to be adapted to network-oriented models to allow greater flexibility, lateral connectivity, and teamwork across institutional boundaries. The traditional emphasis on command and control, a key strength of hierarchy, may have to give way to emphasis on consultation and coordination, the crucial building blocks of network designs

6.5.1 Psychological Operations (PSYOPS)

PSYOPS are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behaviors of foreign governments, organizations, groups, and individuals. The objective of PSYOPS is to manage the perception of the targeted population, contributing to the achievement of larger operational objectives. Typical military objectives include the creation of uncertainty and ambiguity (confusion) to reduce force effectiveness, the countering of enemy propaganda, the encouragement of disaffection among dissidents, and the focusing of attention on specific subjects that will degrade operational capability. PSYOPS are not synonymous with deception; in fact, some organizations, by policy, present only truthful messages in PSYOPS to ensure that they will be accepted by target audiences.

PSYOPS are based on two dimensions: the communication of a message via an appropriate media to a target population (e.g., enemy military personnel or foreign national populations).

PSYOP activities begin with creation of the perception objective and development of the message theme(s) that will create the desired perception in the target population (Figure 6.11). Themes are based upon analysis of the psychological implications and an understanding of the target audience’s culture, preconceptions, biases, means of perception, weaknesses, and strengths. Theme development activities require approval and coordination across all elements of government to assure consistency in diplomatic, military, and economic messages. The messages may take the form of verbal, textual messages (left brain oriented) or “symbols” in graphic or visual form (right brain oriented).

6.5.2 Operational Deception

Military deception includes all actions taken to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of a friendly mission [60]. Deception operations in netwar expand the targets to include society at large, and have the objective of inducing the target to behave in manner (e.g., trust) that contributes to the operational mission.

Deception contributes to the achievement of a perception objective; it is generally not an end objective in itself.

Two categories of misconception are recognized: (1) ambiguity deception aims to create uncertainty about the truth, and (2) misdirection deception aims to create certainty about a falsehood. Deception uses methods of distortion, concealment, falsification of indicators, and development of misinformation to mislead the target to achieve surprise or stealth. Feint, ruse, and diversion activities are common military deceptive actions.

 

Because deception operations are fragile (their operational benefit is denied if detected), operational security must be maintained and the sequencing of deceptive and real (overt) activities must be timed to protect the deception until surprise is achieved. As in PSYOPS, intelligence must provide feedback on the deception effects to monitor the degree to which the deception story is believed.

Deception operations are based on exploitation of bias, sensitivity, and capacity vulnerabilities of human inference and perception (Table 6.9) [61]. These vulnerabilities may be reduced when humans are aided by objective decision support systems, as noted in the table.

Electronic attack can be further subdivided into four fundamental attack categories: exploitation, deception, disruption or denial, or destruction

6.5.5 Intelligence

Intelligence operations contribute assessments of threats (organizations or individuals with inimical intent, capability, and plans); preattack warnings; and postattack investigation of events.

Intelligence can be viewed as a defensive operation at the perception level because it provides information and awareness of offensive PSYOPS and deception operations.

Intelligence on information threats must be obtained in several categories:

  1. Organization threat intelligence—Government intelligence activities maintain watches for attacks and focus on potential threat organizations, conducting counterintelligence operations (see next section) to determine intent, organizational structure, capability, and plans.
  2. Technical threat intelligence—Technical intelligence on computer threats and technical capabilities are supplied by the government, academia, or commercial services to users as services.

 

6.5.6 Counterintelligence

Structured attacks require intelligence gathering on the infrastructure targets, and it is the role of counterintelligence to prevent and obstruct those efforts. Network counterintelligence gathers intelligence on adversarial individuals or organizations (threats) deemed to be motivated and potentially capable of launching a network attack.

6.5.7 Information Security (INFOSEC)

We employ the term INFOSEC to encompass the full range of disciplines to provide security protection and survivability of information systems from attacks, including the most common disciplines,

  • INFOSEC—Measures and controls that protect the information infrastructure against denial of service and unauthorized (accidental or intentional) disclosure, modification, or destruction of information infrastructure components (including data). INFOSEC includes consideration of all hardware and/or software functions, characteristics and/or features; operational procedures, accountability procedures, and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices; and personnel and communication controls needed to provide an acceptable level of risk for the infrastructure and for the data and information contained in the infrastructure. It includes the totality of security safeguards needed to provide an acceptable protection level for an infrastructure and for data handled by an infrastructure.
  • COMSEC—Measures taken to deny unauthorized persons information derived from telecommunications and to ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, and physical security of communications security material and information.
  • TEMPEST—The study and control of spurious electronic signals emitted by electrical equipment.
  • COMPUSEC—Computer security is preventing attackers from achieving objectives through unauthorized access or unauthorized use of computers and networks.
  • System survivability—The capacity of a system to complete its mission in a timely manner, even if significant portions of the system are incapacitated by attack or accident.

 

6.5.8 Operational Security (OPSEC)

Operations security denies adversaries information regarding intentions, capabilities, and plans by providing functional and physical protection of people, facilities, and physical infrastructure components. OPSEC seeks to identify potential vulnerabilities and sources of leakage of critical indicators [80] to adversaries, and to develop measures to reduce those vulnerabilities. While INFOSEC protects the information infrastructure, OPSEC protects information operations (offensive and defensive).

7

An Operational Concept (CONOPS) for Information Operations

Units or cells of information warriors will conduct the information operations that require coordination of technical disciplines to achieve operational objectives. These cells require the support of planning and control tools to integrate and synchronize both the defensive and offensive disciplines introduced in the last chapter.

This chapter provides a baseline concept of operations (CONOPS) for implementing an offensive and defensive joint service IO unit with a conceptual support tool to conduct sustained and structured C2W. We illustrate the operational-level structure and processes necessary to implement information operations—in support of overall military operations—on a broad scale in a military environment.

 

The 16 essential capabilities identified in the U.S. Joint Warfighter Science and Technology Plan (1997) as necessary to achieve an operational information warfare capability [1].

  1. Information consistency includes the integrity, protection, and authentication of information systems.
  2. Access controls/security services ensures information security and integrity by limiting access to information systems to authorized personnel only. It includes trusted electronic release, multilevel information security, and policies.

3.Service availability ensures that information systems are available when needed, often relying upon communications support for distributed computing.

  1. Network management and control ensures the use of reconfigurable robust protocols and control algorithms, self-healing applications, and systems capable of managing distributed computing over heterogeneous platforms and networks.
  2. Damage assessment determines the effectiveness of attacks in both a defensive capacity (e.g., where and how bad) and an offensive capacity (e.g., measure of effectiveness).
  3. Reaction (isolate, correct, act) responds to a threat, intruder, or network or system disturbance. Intrusions must be characterized and decision makers must have the capability to isolate, contain, correct, monitor surreptitiously, and so forth. The ability to correct includes recovery, resource reallocation, and reconstitution.
  4. Vulnerability assessment and planning is an all-encompassing functional capability that includes the ability to realistically assess the joint war fighter’s information system(s) and information processes and those of an adversary. The assessment of war-fighter systems facilitates the use of critical protection functions such as risk management and vulnerability analysis. The assessment of an adversary’s information system provides the basis for joint war-fighter attack planning and operational execution.
  5. Preemptive indication provides system and subsystem precursors or indications of impending attack.
  6. Intrusion detection/threat warning enables detection of attempted and successful intrusions (malicious and nonmalicious) by both insiders and outsiders.

10.Corruption of adversary information/systems can take many diverse forms, ranging from destruction to undetected change or infection of information. There are two subsets of this function: (1) actions taken on information prior to its entry into an information system, and (2) actions taken on information already contained within an information system.

  1. Defeat of adversary protection includes the defeat of information systems, software and physical information system protection schemes, and hardware.
  2. Penetration of adversary information system provides the ability to intrude or inject desired information into an adversary’s information system, network, or repository. The function includes the ability to disguise the penetration—either the fact that the penetration has occurred or the exact nature of the penetration.

13.Physical destruction of adversary’s information system physically denies an adversary the means to access or use its information systems. Actions include traditional hard kills as well as actions of a less destructive nature that cause a physical denial of service.

  1. Defeat of adversary information transport defeats any means involved in the movement of information either to or within a given information system. It transcends the classical definition of electronic warfare by encompassing all means of information conveyance rather than just the traditional electrical means.
  2. Insertion of false station/operator into an adversary’s information system provides the ability to inject a false situation or operator into an adversary’s information system.
  3. Disguise of sources of attack encompasses all actions designed to deny an adversary any knowledge of the source of an information attack or the source of information itself. Disguised sources, which deny the adversary true information sources, often limit the availability of responses, thereby delaying correction or retaliation.

Concept of Operations (CONOPS) for Information Operations Support System (IOSS)

Section 1 General 1.1 Purpose

This CONOPS describes an information operations support system (IOSS) comprised of integrated and automated tools to plan and conduct offensive and defensive information operations.

This CONOPS is a guidance document, does not specify policy, and is intended for audiences who need a quick overview or orientation to information operations (IO).

1.2 Background

Information operations provide the full-spectrum means to achieve information dominance by: (1) monitoring and controlling the defenses of a force’s information infrastructure, (2) planning activities to manage an adversary’s perception, and (3) coordinating PSYOPS, deception, and intrusive physical and electronic attacks on the adversary’s information infrastructure.

CONOPS provides an overview of the methodology to implement an IO cell supported by the semiautomated and integrated IOSS tools to achieve information dominance objectives. The following operational benefits are accrued:

  • Synchronization—An approach to synchronize all aspects of military operations (intelligence, OPSEC, INFOSEC, PSYOPS, deception, information, and conventional attack) and to deconflict adverse actions between disciplines;
  • Information sharing—The system permits rapid, adaptive collaboration among all members of the IO team;
  • Decision aiding—An automated process to manage all IO data, provide multiple views of the data, provide multiple levels of security, and aid human operators in decision making.

 

3.3 Operational Process

Defensive planning is performed by the OPSEC and INFOSEC officers, who maintain a complete model of friendly networks and status reports on network performance. Performance and intrusion detection information is used to initiate defensive actions (e.g., alerts, rerouting, service modification, initiation of protection or recovery modes). The defensive process is continuous and dynamic, and adapts security levels and access controls to maintain and manage the level of accepted risk established at the operational level.

The flow of offensive planning activities performed by the IOSS  is organized by the three levels of planning.

• Perceptual level—The operational plan defines the intent of policy and operational objectives. The operational and perception plans, and desired behaviors of the perception targets (audiences), are defined at this level.

• Information infrastructure level—The functional measures for achieving perception goals, in the perception target’s information infrastructure, are developed at this level.

• Physical level—The specific disciplines that apply techniques (e.g., physical attack, network attack, electronic support) are tasked at this level.

The IOSS performs the decide function of the OODA loop for information operations, and the functional flow is organized to partition both the observe/orient function that provides inputs and the operational orders (OPORDS) that initiate the attack actions. The sequence of planning activities proceeds from the perceptual to the physical level, performing the flow-down operations defined in the following subsections.

3.3.1 Perception Operations The operational objectives and current situation are used to develop the desired perception objectives, which are balanced with all other operational objectives.

3.3.2 Information Infrastructure Operations At this level, the targeted information infrastructure (II) (at all ISO levels) is analyzed and tactics are developed to achieve the attack objectives by selecting the elements of the II to be attacked (targeted). The product is a prioritized high-value target (HVT) list. Using nodal analysis, targets are nominated for attack by the desired functional effect to achieve flowed-down objectives: denial, disruption, deceit, exploitation, or destruction.

Once the analysis develops an optimized functional model of an attack approach that achieves the objectives, weapons (techniques) are selected to accomplish the functional effects. This weaponeering process pairs the techniques (weapons) to targets (e.g., links, nodes, processing, individual decision makers). It also considers the associated risks due to attack detection and collateral damage and assigns intelligence collection actions necessary to perform BDA to verify the effectiveness of the attack.

3.3.3 Physical Level At the physical level, the attacking disciplines plan and execute the physical-level attacks.

Section 4 Command Relationships

4.3 Intelligence Support

IOSS requires intelligence support to detect, locate, characterize, and map the threat-critical infrastructure at three levels.

Section 5 Security 5.1 General

IO staff operations will be implemented and operated at multiple levels of security (MLS). Security safeguards consist of administrative, procedural, physical, operational, and/or environmental, personnel, and communications security; emanation security; and computer security (i.e., hardware, firmware, network, and software), as required.

Section 6 Training

6.1 General

Training is the key to successful integration of IO into joint military operations. Training of IO battle staff personnel is required at the force and unit levels, and is a complex task requiring mastery of the related disciplines of intelligence, OPSEC, PSYOPS, deception, electronic warfare, and destruction.

6.2 Formal Training

The fielding and operation of an IO cell or battle staff may require formal courses or unit training for the diverse personnel required. Training audiences include instructors, IO operators, IO battle staff cadre, system support, a broad spectrum of instructors in related disciplines, and senior officers.

7.2 Select Bibliography

Command and Control Warfare Policy

CJCSI 3210.01, Joint Information Warfare Policy, Jan. 2, 1996. DOD Directive S-3600.1, Information Warfare.

CJCSI 3210.03, Joint Command and Control Warfare Policy (U), Mar. 31, 1996.
JCS Pub 3-13.1, Joint Command and Control Warfare (C2W) Operations, Feb. 7, 1996.

Information Operations

“Information Operations,” Air Force Basic Doctrine (DRAFT), Aug. 15, 1995. FM-100-6, Information Operations, Aug. 27, 1997.
TRADOC Pam 525-69, Concept for Information Operations, Aug. 1, 1995.

Intelligence

Joint Pub 2-0, Doctrine for Intelligence Support to Joint Operations, May 5, 1995. AFDD 50, Intelligence, May 1996.
FM 34-130, Intelligence Preparation of the Battlefield, July 8, 1994.

PSYOPS, Civil and Public Affairs

JCS Pub 3-53, “Doctrine for Joint Psychological Operations,” AFDD 2.5-5, Psychological Operations, Feb. 1997.

FM 33-1, Psychological Operations, Feb. 18, 1993. FM 41-10, Civil Affairs Operations, Jan. 11, 1993. FM 46-1, Public Affairs Operations, July 23, 1992.

Operational Deception

CJCSI 3211.01, Joint Military Deception, June 1, 1993.
JCS Pub 3-58, Joint Doctrine for Operational Deception, June 6, 1994.
AR 525-21, Battlefield Deception Policy, Oct. 30, 1989.
FM 90-2, Battlefield Deception [Tactical Cover and Deception], Oct. 3, 1988. FM 90-2A (C), Electronic Deception, June 12, 1989.

Information Attack

FM 34-1, Intelligence and Electronic Warfare Operations, Sept. 27, 1994.

FM 34-37, Echelon Above Corps Intelligence and Electronic Warfare Operations, Jan. 15, 1991.

FM 34-36, Special Intelligence Forces Intelligence and Electronic Warfare Operations, Sept. 30, 1991.

Operational Security (OPSEC)

DOD Directive 5205.2, Operations Security Program, July 7, 1983. Joint Pub No. 3-54 Joint Doctrine for Operations Security.

AFI 10-1101, (Air Force), Operational Security Instruction.

AR 530-1, (Army) Operations Security, Mar. 3, 1995.

Information Security (INFOSEC)

DoD 5200.1-R, Information Security Program Regulation. AFPD 31-4, (Air Force) Information Security, Aug. 1997.
AR 380-19, (Army) Information System Security, Aug. 1, 1990.

8
Offensive Information Operations

This chapter introduces the functions, tactics, and techniques of malevolence against information systems. Offensive information operations target human perception, information that influences perception, and the physical world that is perceived. The avenues of these operations are via perceptual, information, and physical means.

Offensive information operations are malevolent acts conducted to meet the strategic, operational, or tactical objectives of authorized government bodies; legal, criminal, or terrorist organizations; corporations; or individuals. The operations may be legal or illegal, ethical or unethical, and may be conducted by authorized or unauthorized individuals. The operations may be performed covertly, without notice by the target, or they may be intrusive, disruptive, and even destructive. The effects on information may bring physical results that are lethal to humans.

Offensive operations are uninvited, unwelcome, unauthorized, and detrimental to the target; therefore, we use the term attack to refer to all of these operations.

security design must be preceded by an understanding of the attacks it must face.

Offensive information attacks have two basic functions: to capture or to affect information. (Recall that information may refer to processes or to data/information/knowledge content.) These functions are performed together to achieve the higher level operational and perceptual objectives. In this chapter, we introduce the functions, measures, tactics, and techniques of offensive operations.

  • Functions—The fundamental functions (capture and affect) are used to effectively gain a desired degree of control of the target’s information resources. Capturing information is an act of theft of a resource if captured illegally, or technical exploitation if the means is not illicit. The object of capture may be, for example, a competitor’s data, an adversary’s processed information, another’s electronic cash (a knowledgelevel resource with general liquidity), or conversations that provide insight into a target’s perception. Affecting information is an act of intrusion with intent to cause unauthorized effects, usually harmful to the information owner. The functional processes that capture and affect information are called offensive measures, designed to penetrate operational and defensive security measures of the targeted information system.
  • Tactics—The operational processes employed to plan, sequence, and control the countermeasures of an attack are the attack tactics. These tactics consider tactical factors, such as attack objectives; desired effects (e.g., covertness; denial or disruption of service; destruction, modification, or theft of information); degree of effects; and target vulnerabilities.
  • Techniques—The technical means of capturing and affecting information of humans—their computers, communications, and supporting infrastructures—are described as techniques. In addition to these dimensions, other aspects, depending upon their application, may characterize the information attacks.
  • Motive—The attacker’s motive may be varied (e.g., ideological, revenge, greed, hatred, malice, challenge, theft). Though not a technical characteristic, motive is an essential dimension to consider in forensic analysis of attacks.
  • Invasiveness—Attacks may be passive or active. Active attacks invade and penetrate the information target, while passive attacks are noninvasive, often observing behaviors, information flows, timing, or other characteristics. Most cryptographic attacks may be considered passive relative to the sender and receiver processes, but active and invasive to the information message itself.
  • Effects—The effects of attacks may vary from harassment to theft, from narrow, surgical modification of information to large-scale cascading of destructive information that brings down critical societal infrastructure.
  • Ethics and legality—The means and the effects may be legal or illegal, depending upon current laws. The emerging opportunities opened by information technology have outpaced international and U.S. federal laws to define and characterize legal attacks. Current U.S. laws, for example, limit DoD activities in peacetime. Traditional intelligence activities are allowed in peacetime (capture information), but information attacks (affect information) form a new activity (not necessarily lethal, but quite intrusive) not covered by law. Offensive information operations that affect information enable a new range of nonlethal attacks that must be described by new laws and means of authorization, even as blockades, embargoes, and special operations are treated today. These laws must define and regulate the authority for transitional conflict operations between peace and war and must cover the degree to which “affect” operations may access nonmilitary infrastructure (e.g., commercial, civilian information). The laws must also regulate the scope of approved actions, the objective, and the degree to which those actions may escalate to achieve objectives. The ethics of these attacks must also be considered, understanding how the concepts of privacy and ownership of real property may be applied to the information resource. Unlike real property, information is a property that may be shared, abused, or stolen without evidence or the knowledge of the legitimate owner.

8.1 Fundamental Elements of Information Attack

Before introducing tactics and weapons, we begin the study of offense with a complete taxonomy of the most basic information-malevolent acts at the functional level. This taxonomy of attack countermeasures may be readily viewed in an attack matrix formed by the two dimensions:

  • Target level of the IW model: perceptual, information, or physical;
  • Attack category: capture or affect.

The attack matrix (Figure 8.1) is further divided into the two avenues of approach available to the attacker:

Direct, or internal, penetration attacks—Where the attacker penetrates [1] a communication link, computer, or database to capture and exploit internal information, or to modify information (add, insert, delete) or install a malicious process;

Indirect, or external, sensor attacks—Where the attacker presents open phenomena to the system’s sensors or information to sources (e.g., media, Internet, third parties) to achieve counterinformation objectives. These attacks include insertion of information into sensors or observation of the behavior of sensors or links interconnecting fusion nodes.

In C2W, indirect attacks target the observation stage of the OODA loop, while direct attacks target the orient stage of the loop [2]. The attacker may, of course, orchestrate both of these means in a hybrid attack in which both actions are supportive of each other

Two categories of attacks that affect information are defined by the object of attack.

Content attacks—The content of the information in the system may be attacked to disrupt, deny, or deceive the user (a decision maker or process). In C2W information operations, attacks may be centered on changing or degrading the intelligence preparation of the battlefield (IPB) databases, for example, to degrade its use in a future conflict.

Temporal attacks—The information process may be affected in such a way that the timeliness of information is attacked. Either a delay in receipt of data (to delay decision making or desynchronize processes) or deceptive acceleration by insertion of false data characterizes these attacks.

8.2

The Weapons of Information Warfare

8.3.1 Network Attack Vulnerabilities and Categories

Howard has developed a basic taxonomy of computer and network attacks for use in analyzing security incidents on the Internet [5]. The taxonomy structure is based on characterizing the attack process (Figure 8.2) by five basic components that characterize any attack.

  1. Attackers—Six categories of attackers are identified (and motivations are identified separately, under objectives): hackers, spies, terrorists, corporate, professional criminals, and vandals.
  2. Tools—The levels of sophistication of use of tools to conduct the attack are identified.
  3. Access—The access to the system is further categorized by four branches.

Vulnerability exploited—Design, configuration (of the system), and implementation (e.g., software errors or bugs [7]) are all means of access that may be used.

Level of intrusion—The intruder may obtain unauthorized access, but may also proceed to unauthorized use, which has two possible subcategories of use.

 

Use of processes—The specific process or service used by the unauthorized user is identified as this branch of the taxonomy (e.g., SendMail, TCP/IP).

Use of information—Static files in storage or data in transit may be the targets of unauthorized use.

  1. Results—Four results are considered: denial or theft of service, or corruption or theft (disclosure) of information.
  2. Objectives—Finally, the objective of the attack (often closely correlated to the attacker type) is the last classifying property.

(This taxonomy is limited to network attacks using primarily information layer means, and can be considered a more refined categorization of the attacks listed in the information-layer row of the attack matrix presented earlier in Section 8.1.)

/IP).

8.4 Command and Control Warfare Attack Tactics

In military C2W, the desired attack effects are degradation of the opponent’s OODA loop operations (ineffective or untimely response), disruption of decision-making processes, discovery of vulnerabilities, damage to morale, and, ultimately, devastation of the enemy’s will to fight.

Command and control warfare has often been characterized as a war of OODA loops where the fastest, most accurate loop will issue the most effective actions [20]. The information-based warfare concepts introduced in Chapter 3 (advanced sensors, networks, and fusion systems) speed up the loop, improving information accuracy (content), visualization and dissemination (delivery), and update rates (timeliness).

Offensive information operations exploit the vulnerabilities described here and in Section 8.3.1.

Attacks exploit vulnerabilities in complex C4I systems to counter security and protection measures, as well as common human perceptual, design, or configuration vulnerabilities that include the following:

  • Presumption of the integrity of observations and networked reports;
  • Presumption that observation conflicts are attributable only to measurement error;
  • Presumption that lack of observation is equivalent to nondetection rather than denial;
  • Absence of measures to attribute conflict or confusion to potential multisource denial and spoofing.

Four fusion-specific threat mechanisms can be defined to focus information on the fusion process:

  • Exploitation threats seek to utilize the information obtained by fusion systems or the fusion process itself to benefit the adversary. Information that can be captured from the system covertly can be used to attack the system, to monitor success of IW attacks, or to support other intelligence needs.
  • Deception threats to fusion systems require the orchestration of multiple stimuli and knowledge of fusion processes to create false data and false fusion decisions, with the ultimate goal of causing improper decisions by fusion system users. Deception of a fusion system may be synchronized with other deception plots, including PSYOPS and military deceptions to increase confidence in the perceived plot.
  • Disruption of sensor fusion systems denies the fusion process the necessary information availability or accuracy to provide useful decisions. Jamming of sensors, broadcast floods to networks, overloads, and soft or temporary disturbance of selected links or fusion nodes are among the techniques employed for such disruption.
  • Finally, softand hard-kill destruction threats include a wide range of physical weapons, all of which require accurate location and precision targeting of the fusion node.

The matrix provides a tool to consider each individual category of attack against each element of the system.

8.5 IW Targeting and Weaponeering Considerations

Structured information strikes (netwar or C2W) require functional planning before coordinating tactics and weapons for all sorties at the perceptual, information, and physical levels. The desired effects, whether a surgical strike on a specific target or cascading effects on an infrastructure, must be defined and the uncertainty in the outcome must also be determined. Munitions effects, collateral damage, and means of verifying the functional effects achieved must be considered, as in physical military attacks.

8.8 Offensive Operations Analysis, Simulation, and War Gaming

The complexity of structured offensive information operations and the utility of their actions on decision makers is not fully understood or completely modeled. Analytic models, simulations, and war games will provide increasing insight into the effectiveness of these unproven means of attack. Simulations and war games must ultimately evaluate the utility of complex, coordinated, offensive information operations using closed loop models (Figure 8.11) that follow the OODA loop structure presented in earlier chapters to assess the influence of attacks on networks, information systems, and decision makers.

Measures of performance and effectiveness are used to assess the quantitative effectiveness of IW attacks (or the effectiveness of protection measures to defend against them). The measures are categorized into two areas.

• Performance metrics quantify specific technical values that measure the degree to which attack mechanisms affect the targeted information source, storage, or channel.

• Effectiveness metrics characterize the degree to which IW objectives impact the mission functions of the targeted system.

8.9 Summary

The wide range of offensive operations, tactics, and weapons that threaten information systems demand serious attention to security and defense. The measures described in this chapter are considered serious military weapons. The U.S. director of central intelligence (DCI) has testified that these weapons must be considered with other physical weapons of mass destruction, and that the electron should be considered the ultimate precision guided weapon [65].

9
Defensive Information Operations

This chapter provides an overview of the defensive means to protect the information infrastructure against the attacks enumerated in the last chapter. Defensive IO measures are referred to as information assurance.

Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for the restoration of information systems by incorporating protection, detection, and reaction capabilities.

assurance includes the following component properties and capabilities:

  • Availability provides assurance that information, services, and resources will be accessible and usable when needed by the user.
  • Integrity assures that information and processes are secure from unauthorized tampering (e.g., insertion, deletion, destruction, or replay of data) via methods such as encryption, digital signatures, and intrusion detection.
  • Authentication assures that only authorized users have access to information and services on the basis of controls: (1) authorization (granting and revoking access rights), (2) delegation (extending a portion of one entity’s rights to another), and (3) user authentication (reliable corroboration of a user, and data origin. (This is a mutual property when each of two parties authenticates the other.)
  • Confidentiality protects the existence of a connection, traffic flow, and information content from disclosure to unauthorized parties.
  • Nonrepudiation assures that transactions are immune from false denial of sending or receiving information by providing reliable evidence that can be independently verified to establish proof of origin and delivery.
  • Restoration assures information and systems can survive an attack and that availability can be resumed after the impact of an attack.

While these asymmetric threats (e.g., lone teenager versus large corporation or DoD) have captured significant attention, they do not pose the more significant threat that comes in two areas.

• Internal threats (structured or unstructured)—Any insider with access to the targeted system poses a serious threat. Perverse insiders, be they disgruntled employees, suborned workers, or inserted agents, pose an extremely difficult and lethal threat. Those who have received credentials for system access (usually by a process of background and other assessments) are deemed trustworthy. Protection from malicious acts by these insiders requires high-visibility monitoring of activities (a deterrent measure), frequent activity audits, and high-level physical security and internal OPSEC procedures (defensive measures). While continuous or periodic malicious actions may be detected by network behavior monitoring, the insider inserted to perform a single (large) destructive act is extremely difficult to detect before that act. OPSEC activities provide critical protection in these cases, due to the human nature of the threat. This threat is the most difficult, and it’s risk should not be understated because of the greater attention often paid to technical threats.

• Structured external threatsAttackers with deep technical knowledge of the target, strong motivation, and the capability to mount combination attacks using multiple complex tactics and techniques also pose a serious threat. These threats may exploit subtle, even transitory, network vulnerabilities (e.g., configuration holes) and apply exhaustive probing and attack paths to achieve their objectives. While most computer vulnerabilities can be readily corrected, the likelihood that all computers in a network will have no vulnerabilities exposed at any given time is not zero. Structured attackers have the potential to locate even transient vulnerabilities, to exploit the momentary opportunity to gain access, and then expand the penetration to achieve the desired malevolent objective of attack.

9.1 Fundamental Elements of Information Assurance

The definition of information assurance includes six properties, of which three are considered to be the fundamental properties from which all others derive [20].

• Confidentiality (privacy)—Assuring that information (internals) and the existence of communication traffic (externals) will be kept secret, with access limited to appropriate parties;

  • Integrity—Assuring that information will not be accidentally or maliciously altered or destroyed, that only authenticated users will have access to services, and that transactions will be certified and unable to be subsequently repudiated (the property of nonrepudiation);
  • Availability—Assuring that information and communications services will be ready for use when expected (includes reliability, the assurance that systems will perform consistently and at an acceptable level of quality; survivability, the assurance that service will exist at some defined level throughout an attack; and restoration to full service following an attack).

These fundamentals meet the requirements established for the U.S. NII [21] and the international community for the GII.

9.2 Principles of Trusted Computing and Networking

Traditional INFOSEC measures applied to computing provided protection from the internal category of attacks.

For over a decade, the TCSEC standard has defined the criteria for four divisions (or levels) of trust, each successively more stringent than the level preceding it.

  • D: Minimal protection—Security is based on physical and procedural controls only; no security is defined for the information system.
  • C: Discretionary protection—Users (subjects), their actions, and data (objects) are controlled and audited. Access to objects is restricted based upon the identify of subjects.
  • B: Mandatory protection—Subjects and objects are assigned sensitivity labels (that identify security levels) that are used to control access by an independent reference monitor that mediates all actions by subjects.
  • A: Verified protection—Highest level of trust, which includes formal design specifications and verification against the formal security model.

The TCSEC defines requirements in four areas: security policy, accountability, assurance, and documentation.

Most commercial computer systems achieve C1 or C2 ratings, while A and B ratings are achieved only by dedicated security design and testing with those ratings as a design objective.

Networks pose significant challenges to security.

  • Heterogeneous systems—The variety of types and configurations of systems (e.g., hardware platforms, operating systems), security labeling, access controls, and protocols make security analysis and certification formidable.
  • Path security—Lack of control over communication paths through the network may expose data packets to hostile processes.
  • Complexity—The complexity of the network alone provides many opportunities for design, configuration, and implementation vulnerabilities (e.g., covert channels) while making comprehensive analysis formidable.

Trusted networks require the properties already identified, plus three additional property areas identified in the TNI.

  1. Communications integrity—Network users must be authenticated by secure means that prevent spoofing (imitating a valid user or replaying a previously sent valid message). The integrity of message contents must be protected (confidentiality), and a means must be provided to prove that a message has been sent and received (nonrepudiation).
  2. Protection from service denial—Networks must sustain attacks to deny service by providing a means of network management and monitoring to assure continuity of service.
  3. Compromise protection services—Networks must also have physical and information structure protections to maintain confidentiality of the traffic flow (externals) and message contents (internals). This requirement also imposes selective routing capabilities, which permit control of the physical and topological paths that network traffic traverse.

The concept of “layers” of trust or security is applied to networks, in which the security of each layer is defined and measures are taken to control access between layers and to protect information transferred across the layers.

9.3 Authentication and Access Control

The fundamental security mechanism of single or networked systems is the control of access to authentic users. The process of authentication requires the user to verify identity to establish access, and access controls restrict the processes that may be performed by the authenticated user or users attempting to gain authentication.

9.3.1 Secure Authentication and Access Control Functions

Authentication of a user in a secure manner requires a mechanism that verifies the identity of the requesting user to a stated degree of assurance.

Remote authentication and granting of network access is similar to the functions performed by military identification friend or foe (IFF) systems, which also require very high authentication rates. In network systems, as in IFF, cryptographic means combined with other properties provide high confidence and practical authentication. A variety of methods combining several mechanisms into an integrated system is usually required to achieve required levels of security for secure network applications.

 

 

9.5 Incident Detection and Response

Extensive studies of network intrusion detection have documented the technical challenge of achieving comprehensive detection on complex networks. There are several technical approaches to implementing detection mechanisms including the following:

  1. Known pattern templates—Activities that follow specific sequences (e.g., attempts to exploit a known vulnerability, repeated password attacks, virus code signatures, etc.) of identified threats may be used to detect incidents. For example, Courtney, a detection program developed by the Lawrence Livermore National Laboratory, specifically detects the distinctive scan pattern of the SATAN vulnerability scanning tool.
  2. Threatening behavior templatesActivities that follow general patterns that may jeopardize security are modeled and applied as detection criteria. Statistical, neural network, and heuristic detection mechanisms can detect such general patterns, but the challenge is to maintain an acceptably low false alarm rate with such general templates.
  3. Traffic analysisNetwork packets are inspected within a network to analyze source and destination as an initial filter for suspicious access activities. If packets are addressed to cross security boundaries, the internal packet contents are inspected for further evidence of intrusive or unauthorized activity (e.g., outgoing packets may be inspected for keywords, data contents; inbound packets for executable content).
  4. State-based detectionChanges in system states (i.e., safe or “trusted” to unsafe transitions as described in Section 9.2) provide a means of detecting vulnerable actions.

 

Responses to incident detections can range from self-protective measures (terminate offending session and modify security policy) to offensive reactions, if the source of attack can be identified. In order to identify attackers, entrapment measures that are used include the deliberate insertion of an apparent security hole into a system.

In order to identify attackers, entrapment measures that are used include the deliberate insertion of an apparent security hole into a system. The intruder is seduced (through the entrapment hole) into a virtual system (often called the “honey pot”) that appears to be real and allows the intruder to carry out an apparent attack while the target system “observes” the attack. During this period, the intruder’s actions are audited and telecommunication tracing activities can be initiated to identify the source of the attack. Some firewall products include such entrapment mechanisms, presenting common or subtle security holes to attackers’ scanners to focus the intruder’s attention on the virtual system.

In addition to technical detection and response for protection, conventional investigative responses to identify and locate network or electronic attack intruders are required for deterrence (e.g., to respond with criminal prosecution or military reprisal). Insight into the general methodology for investigating ongoing unstructured attacks on networks is provided by a representative response that was performed in 1994 by the Air Force Computer Emergency Response Team (AFCERT) from the U.S. Information Warfare Center [47].

  1. Auditing—Analyze audit records of attack activities and determine extent of compromise. The audit records of computer actions and telecommunication transmissions must be time-synchronized to follow the time sequence of data transactions from the target, through intermediate network systems, to the attacker. (Audit tracking is greatly aided by synchronization of all telecommunication and network logging to common national or international time standards.)
  2. Content monitoring—Covertly monitor the content of ongoing intrusion actions to capture detailed keystrokes or packets sent by the attacker in these attacks.
  3. Context monitoring—Remotely monitor Internet traffic along the connection path to determine probable telecommunication paths from source to target. This monitoring may require court-ordered “trap and trace” techniques applied to conventional telecommunication lines.
  4. End-game search—Using evidence about likely physical or cyber location and characteristics of the attacker, other sources (HUMINT informants, OSINT, other standard investigative methods) are applied to search the reduced set of candidates to locate the attacker.

 

9.6 Survivable Information Structures

Beyond the capabilities to detect and respond to attacks is the overall desired property of information system survivability to provide the following characteristics:

• Fault tolerance—Ability to withstand attacks, gracefully degrade (rather than “crash”), and allocate resources to respond;

• Robust, adaptive response—Ability to detect the presence of a wide range of complex and subtle anomalous events (including events never before observed), to allocate critical tasks to surviving components, to isolate the failed nodes, and to develop appropriate responses in near real time;

• Distribution and variability—Distributed defenses with no singlepoint vulnerability, and with sufficient diversity in implementations to avoid common design vulnerabilities that allow single attack mechanisms to cascade to all components;

• Recovery and restoration—Ability to assess damage, plan recovery, and achieve full restoration of services and information.

Survivable systems are also defined by structure rather than properties (as above), characterizing such a system as one comprised of many individual survivable clusters that “self-extend,” transferring threat and service data to less capable nodes to improve overall health of the system

The U.S. Defense Advanced Research Projects Agency (DARPA) survivability program applies a “public health system” model that applies (1) distributed immune system detection, (2) active probing to diagnose an attack and report to the general network population, (3) reassignment of critical tasks to trusted components, (4) quarantine processes to segregate untrusted components, and (5) immunization of the general network population [52]. The DARPA program is developing the technology to provide automated survivability tools for large-scale systems.

9.7 Defense Tools and Services

System and network administrators require a variety of tools to perform security assessments (evaluation of the security of a system against a policy or standard) and audits (tracing the sequence of actions related to a specific security-relevant event)

9.9 Security Analysis and Simulation for Defensive Operations

Security analysis and simulation processes must be applied to determine the degree of risk to the system, to identify design, configuration, or other faults and vulnerabilities, and to verify compliance with the requirements of the security policy and model. Depending on the system and its application, the analysis can range from an informal evaluation to a comprehensive and exhaustive analysis.

The result of the threat and vulnerability assessment is a threat matrix that categorizes threats (by attack category) and vulnerabilities (by functions). The matrix provides a relative ranking of the likelihood of threats and the potential adverse impact of attacks to each area of vulnerability. These data form the basis for the risk assessment.

The risk management process begins by assessing the risks to the system that are posed by the risk matrix. Risks are quantified in terms of likelihood of occurrence and degree of adverse impact if they occur. On the basis of this ranking of risks, a risk management approach that meets the security requirement of the system is developed. This process may require modeling to determine the effects of various threats, measured in terms of IW MOP or MOEs, and the statistical probability of successful access to influence the system.

Security performance is quantified in terms of risk, including four components: (1) percent of attacks detected; (2) percent detected and contained; (3) percent detected, contained, and recovered; and (4) percent of residual risk.

This phase introduces three risk management alternatives.

  • Accept risk—If the threat is unlikely and the adverse impact is marginal, the risk may be accepted and no further security requirements imposed.
  • Mitigate (or manage) risk—If the risk is moderate, measures may be taken to minimize the likelihood of occurrence or the adverse impact, or both. These measures may include a combination of OPSEC, TCSEC, INFOSEC, or internal design requirements, but the combined effect must be analyzed to achieve the desired reduction in risk to meet the top-level system requirements.
  • Avoid risk—For the most severe risks, characterized by high attack likelihood or severe adverse impact, or both, a risk avoidance approach may be chosen. Here, the highest level of mitigation processes are applied (high level of security measures) to achieve a sufficiently low probability that the risk will occur in operation of the system.

When the threats and vulnerabilities are understood, the risks are quantified and measures are applied to control the balance of risk to utility to meet top-level security requirements, and overall system risk is managed.

10
The Technologies of Information Warfare

The current state of the art in information operations is based on core technologies whose performance is rapidly changing, even as information technologies (sensing, processing, storage, and communication) rapidly advance. As new technologies enable more advanced offenses and defense, emerging technologies farther on the horizon will introduce radically new implications for information warfare.

10.1 A Technology Assessment

Information warfare–related technologies are categorized both by their information operations role and by three distinct levels of technology maturity.

  • Core technologies are the current state-of-the-art, essential technologies necessary to sustain the present level of information operations.
  • Enabling technologies form the technology base for the next generation of information warfare capabilities; more than incremental improvements, they will enable the next quantum enhancement in operations.
  • Emerging technologies on the far horizon have conceptual applications when feasibility is demonstrated; they offer a significant departure from current core technologies and hold the promise of radical improvements in capability, and changes in the approach to information operations.

Developers, strategists, and decision makers who create and conduct information operations must remain abreast of a wide range of technologies to conceive the possibilities, predict performance impacts, and strategically manage development to retain leadership in this technology-paced form of warfare.

U.S. panels commissioned by the federal government and independent organizations have considered global environment as well as information technology impacts in studies of the intelligence organizational aspects of information-based warfare.

  • Preparing for the 21st Century: An Appraisal of U.S. Intelligence—An appraisal commissioned by the U.S. White House and Congress.
  • IC21—The Intelligence Community in the 21st Century—A “bottom-up” review of intelligence and future organization options by the U.S. Congress.
  • Making Intelligence Smarter: The Future of U.S. Intelligence—Report of an independent task force sponsored by the Council on Foreign Relations, February 1996.

 

10.2 Information Dominance Technologies

Three general areas characterize the information dominance technologies: collection of data, processing of the data to produce knowledge, and dissemination of the knowledge to humans.

• Collection—The first area includes the technical methods of sensing physical phenomena and the platforms that carry the sensors to carry out their mission. Both direct and remote sensing categories of sensors are included, along with the means of relaying the sensed data to users.

• Processing—The degree and complexity of automation in information systems will continue to benefit from increases in processing power (measured in operations per second), information storage capacity (in bits), and dissemination volumes (bandwidth). Processing “extensibility” technologies will allow heterogeneous nets and homogeneous clusters of hardware along with operating systems to be scaled upwards to ever-increasing levels of power. These paramount technology drivers are, of course, essential. Subtler, however, are the intelligent system technologies that contribute to system autonomy, machine understanding, and comprehension of the information we handle. Software technologies that automate reasoning at ever more complex levels will enable humans to be elevated from data-control roles to informationsupervision roles and, ultimately, to knowledge-management roles over complex systems.

• Dissemination—Communication technologies that increase bandwidth and improve the effective use of bandwidth (e.g., data, information and knowledge compression) will enhance the ability to disseminate knowledge. (Enhancements are required in terms of capacity and latency.) Presentation technologies that enhance human understanding of information (“visualization” for the human visual sense, virtual reality for all senses) by delivering knowledge to human minds will enhance the effectiveness of the humans in the dominance loop.

10.2.1 Collection Technologies

Collection technologies include advanced platforms and sensing means to acquire a greater breadth and depth of data. The collection technologies address all three domains of the information warfare model: physical, information, and perceptual variables.

10.2.2 Processing Technologies

Processing technologies address the increased volume of data collected, the increased complexity of information being processed, and the fundamental need for automated reasoning to transform data to reliable knowledge.

Integrated and Intelligent Inductive (Learning) and Deductive Decision Aids

Reasoning aids for humans applying increasingly complex reasoning (integrating symbolic and neural or genetic algorithms) will enhance the effectiveness of humans. These tools will allow individuals to reason and to make decisions on the basis of projected complex outcomes across many disciplines (e.g., social, political, military, and environmental impacts). Advances in semiotic science will contribute to practical representations of knowledge and reasoning processes for learning, deductive reasoning, and self-organization.

Computing Networks (Distributed Operating Systems) With Mediated Heterogeneous Databases

Open system computing, enabled by common object brokering protocols, will perform network computing with autonomous adaptation to allocate resources to meet user demands. Mediation agents will allow distributed heterogeneous databases across networks to provide virtual object-level database functions across multiple types of media.

Precision Geospatial Information Systems

Broad area (areas over 100,000 km2) geospatial information systems with continuous update capability will link precision (~1m) maps, terrain, features, and other spatially linked technical data for analysis and prediction.

Autonomous Information Search Agents

Goal-seeking agent software, with mobile capabilities to move across networks, will perform information search functions for human users. These agents will predict users’ probable needs (e.g., a military commander’s information needs) and will prepare knowledge sets in expectation of user queries.

Multimedia Databases (Text, Audio, Imagery, Video) Index and Retrieval

Information indexing discovery and retrieval (IIDR) functions will expand from text-based to true multimedia capabilities as object linking and portable ontology techniques integrate heterogeneous databases and data descriptions. IIRD functions will permit searches and analysis by high-level conceptual queries.

Digital Organisms

Advanced information agents, capable of adaptation, travel, and reproduction will perform a wide range of intelligent support functions for human users, including search, retrieval, analysis, knowledge creation, and conjecture.

Hypermedia Object Information Bases

Object-oriented databases with hyperlinks across all-media sources will permit rapid manipulation of large collections of media across networks.

10.2.3 Dissemination and Presentation Technologies

Dissemination technologies increase the speed with which created knowledge can be delivered, while expanding the breadth of delivery to all appropriate users. Presentation technologies address the critical problems of communicating high-dimensionality knowledge to human users efficiently and effectively, even while the human is under duress.

10.3 Offensive Technologies

Current offensive technologies (Table 10.4) are essentially manual weapons requiring human planning, targeting, control, and delivery. Enabling technologies will improve the understanding of weapon effects on large-scale networks, enabling the introduction of semiautomated controls to conduct structured attacks on networks. Integrated tools (as discussed in Chapter 7) will simulate, plan, and conduct these semiautomated attacks. Emerging technologies will expand the scope and complexity of attacks to provide large-scale network control with synchronized perception management of large populations.

Computational Sociology (Cyber PSYOPS)

Complex models of the behavior of populations and the influencing factors (e.g., perceptions of economy, environment, security) will permit effective simulation of societal behavior as a function of group perception. This capability will permit precise analysis of the influence of perception management plans and the generation of complex multiple-message PSYOPS campaigns. These tools could support the concepts of “neocortal warfare” in which national objectives are achieved without force [29,30].

10.4 Defensive Technologies

Core defensive technologies (Table 10.5) now being deployed by both the military and commercial domains provide layers of security to bridge the gap between the two approaches.

  • First generation (and expensive) military “trusted” computers based on formal analysis/testing, and dedicated secure nets with strong cryptography;
  • Commercial information technologies (computers, UNIX or Windows NT operating systems, and networks) with augmenting components (e.g., firewalls, software wrappers, smart card authentication) to manage risk and achieve a specified degree of security for operation over the nonsecure GII.

Enabling technologies will provide affordable security to complex heterogeneous networks with open system augmentations that provide layers of protection for secure “enclaves” and the networks over which they communicate.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Notes from Guide to Subversive Organizations and Publications (and Appendixes): Revised (Including Index)

Guide to Subversive Organizations and Publications 

Below are legal definitions and examples of Subversive Organizations and Publications along with some historical background.

DOES “YES” ANSWER THE FOLLOWING QUESTIONS?

“For the guidance of the American people in detecting Communist-front organizations, we present the following criteria:

“1. Does the organization have Communist Party—members or those trusted by the Communist Party, In its posts of real power on its executive board, as secretary, organizer, educational director, editor, office staff?
“2. Are meetings of the organization addressed by Communists or their trusted agents? Does its publication include articles by such persons?
“3. Does the organization follow the Communist Party line?
“4. Does the organization cooperate with campaigns, activities, publications, of the Communist Party or other front organizations?
“5. Is the address of the organization in the same building with other front organizations or within the cooperating vicinity?
“6. Does the organization cooperate with Communist-controlled unions?
“7. Does the organization’s official publication reflect the line of the Communist Party, publish articles by pro-Communists, advertise Communist activities, or those of other front organizations or of Communist vacation resorts?
“8. Are questions injected into meetings or in official publications, which have more to do with the current policy of the Communist Party, than with the pro- fessed purposes of the organization?
“9. Are funds kicked back directly or indirectly to the Communist Party or to other front organizations?
“10. I sprinting do neat a Communist printing house?
“11. Does the organization use entertainers associated with pro-Communist organizations or entertainments?
“12. Does the organization receive favorable publicity in the Communist press?
“13. Is the organization uniformly loyal to the Soviet Union?

CHANGES IN PARTY LINE
The line of the Communist Party on foreign policy is cited herewith. Its advocacy by an individual or organization, throughout all its variations, is a sound test of the loyalty and subservience of such an individual or organization to the Communist Party:

Communist cooperation is offered to socialists and capitalists, with a special pitch to the non-Communist governments and peoples of economically underdeveloped nations ; substituted for Hitler as the “main enemy” of the united front, however, are the “monopoly capitalists” allegedly ruling the United States and pursuing bellicose and imperialistic policies. The Communist “peace” propaganda slogan, “outlaw nuclear weapons,” is expanded to “total disarmament,” while the Soviet Union in practice steadfastly resists implementation of the slogans by rejecting all free-nation proposals for an effective system of armament inspection and control.

There has never been a change in one basic Communist purpose from 1918 to the present date, however—the eventual elimination of non-Communist governments and the establishment of world hegemony for the Soviet Union.

The first requisite for front organizations is an idealistic sounding title. Hundreds of such organizations have come into being and have gone out of existence when their true purposes have become known or exposed while others with high-sounding names are continually springing up.

*******
There are easy tests to establish the real character of such organizations :
1. Does the group espouse the cause of Americanism or the cause of Soviet Russia?
2. Does the organization feature as speakers at its meetings known Communists, sympathizers, or fellow travelers ?
3. Does the organization shift when the party line shifts?
4. Does the organization sponsor causes, campaigns, literature, petitions, or other activities sponsored by the party or other front organizations?
5. Is the organization used as a sounding board by or is it endorsed by Com- munist-controlled labor unions?
6. Does Its literature follow the Communist line or is it printed by the Com- munist press?
7. Does the organization receive consistent favorable mention in Communist publications?
8. Doestheorganizationpresentitselftobenonpartisanyetengageinpolitical activities and consistently advocate causes favored by the Communists?
9. Does the organization denounce American and British foreign policy while always lauding Soviet policy?
10. Does the organization utilize Communist “double talk” by referring to Soviet-dominated countries as democracies, complaining that the United States is imperialistic and constantly denouncing monopoly-capital?
11. Have outstanding leaders in public life openly renounced affiliation with the organization?
12. Does the organization, if espousing liberal progressive causes, attract well- known honest patriotic liberals or does it denounce well-known liberals?
13. Does the organization have a consistent record of supporting the American viewpoint over the years?
14. Does the organization consider matters not directly related to its avowed purposes and objectives?

The value to the Communist Party of the front organization and a front’s operating techniques are described by Mr. Hoover as follows in his book, Masters of Deceit:
Fronts probably represent the Party’s most successful tactic in capturing non- communist support. Like mass agitation and Infiltration, fronts espouse the deceptive Party line (hence the term “front”) while actually advancing the real Party line. In this way the Party is able to influence thousands of noncommunists, collect large sums of money, and reach the minds, pens, and tongues of many high-ranking and distinguished individuals. Moreover, fronts are excellent fields for Party recruitment.

What are Fronts and Transmission Belts

A front is an organization which the communists openly or secretly control. The communists realize that they are not welcome in American society. Party influence, therefore, is transmitted, time after time, by a belt of concealed members, sympathizers, and dupes. Fronts become transmission belts between the Party,and the non-communist world. Earl Browder, when head of the Party, gave this definition : “Transmission belts mean having Communists work among the masses in the various organizations.”

The danger of a Party front rests not on its physical appearance or size but on its ability to deceive.

LEGISLATION WITH RESPECT TO FRONT ORGANIZATIONS

In 1950, Congress enacted a comprehensive Communist control law

knownastheInternalSecurityAct. This legislation, which is based largely upon the findings of fact and legislative recommendations of the Committee on Un-American Activities, contains certain registration and disclosure requirements aimed at countering the deceptive front operations of the Communist Party.

The Congress, adopting virtually the exact language proposed in a bill reported out by this committee, declared in the Internal Security Act:

As a result of evidence adduced before various committees of the Senate and House of Representatives, the Congress finds that

(4) The direction and control of the world Communist movement is vested In and exercised by the Communist dictatorship of a foreign country.

(5) The Communist dictatorship of such foreign country, in exercising such direction and control and in furthering the purposes of the world Communist movement, establishes or causes the establishment of, and utilizes, in various countries, action organizations which are not free and independent organisations, but are sections of a world-wide Communist organization and are controlled, directed, and subject to the discipline of the Communist dictatorship of such foreign country.

(6) The Communist action organizations so established and utilized in various countries, acting under such control, direction, and discipline, endeavor to carry out the objectives of the world Communist movement by bringing about the overthrow of existing governments by any available means, including force if necessary, and setting up Communist totalitarian dictatorships which will be subservient to the most powerful existing Communist totalitarian dictatorship.

(7) In carrying on the activities referred to in paragraph (6) of this section such Communist organizations in various countries are organized on a secret, conspiratorial basis and operate to a substantial extent through organizations, commonly known as “Communist fronts”, which in most instances are created and maintained, or used, in such manner as to conceal the facts as to their true character and purposes and their membership. One result of this method of operation is that such affiliated organizations are able to obtain financial and other support from persons who would not extend such support if they knew the true purposes of, and the actual nature of the control and influence exerted upon, such “Communist fronts”.

The Internal Security Act created the Subversive Activities Control Board, a quasi-judicial agency empowered upon petition from the United States Attorney General to hold public hearings and subpoena witnesses and documentary material for the purpose of determining whether an organization is a Communist-action or Communist-front organization. Judicial safeguards such as the right to present oral and documentary evidence and cross-examination are afforded the organization subject to such proceedings before the SACB. Once an organization has been found by the SACB to fall within either the Communist-action or Communist-front category, the organization is required to register as such with the Attorney General and submit annual reports with such information as its name and address, its officers, an accounting of all monies received and disbursed together with the sources of the funds and the purposes of expenditures.

(f) Determination of Communist-front organization; matters considered.

In determining whether any organization is a “Communist-front organization”, the Board shall take into consideration—
(1) the extent to which persons who are active in its management, direction, or supervision, whether or not holding office therein, are active in the management, direction, or supervision of, or as representatives of, any Communist-action organization, Communist foreign government, or the world Communist movement referred to in section 7S1 of this title; and
(2) the extent to which its support, financial or otherwise, is derived from any Communist-action organization. Communist foreign government, or the world communist movement referred to in section 781 of this title ; and
(3) the extent to which its funds, resources, or personnel are used to further or promote the objectives of any Communist-action organization, Communist foreign government, or the world Communist movement referred to in section 781 of this title; and
(4) the extent to which the positions taken or advanced by it from time to time on matters of policy do not deviate from those of any Communist- action organization. Communist foreign government, or the world Communist movement referred to in section 781 of this title.

On June 5, 1961, the Supreme Court upheld the constitutionality of the basic registration and disclosure provisions of the Internal Security Act, and sustained the SACB order requiring the Communist Party to register as a Communist-action organization.

An amendment to the Internal Security Act in 1954 added a third category of organizations covered by the Act, namely Communist- infiltrated organizations. Such an organization is defined as being “substantially directed, dominated, or controlled by an individual or individuals who are, or who within three years have been actively engaged in, giving aid or support to a Communist-action organization, a Communist foreign government or the world Communist movement”, and “is serving, or within three years has served, as a means
for (i) the giving of aid or support to any such organization, government, or movement, or (ii) the impairment of the military strength of the United States or its industrial capacity to furnish logistical or other material support required by its Armed Forces.”

Communist-infiltrated organizations are not required to “register” under the Act, but they are required to label their publications and mail in interstate or foreign commerce and to identify themselves in radio or television broadcasts sponsored by them; they are also deprived of certain tax exemption benefits and benefits under the National Labor Relations Act.

The Guide lists a total of 663 organizations or projects and 122 publications cited as Communist or Communist front by Federal Agencies; and 155 organizations and 25 publications cited as Communist or Communist front by State or Territorial investigating committees.

This edition of the Guide contains the names of 200 organizations and projects and 44 publications which have been characterized as Communist or Communist front by Federal authorities, but which have not appeared in previous editions of the Guide.

The committee has ascertained that a Communist front is an organization or publication created or captured by the Communists to do the party’s work in areas where an openly Communist project would be unwelcome. Because subterfuge often makes it difficult to recognize its true nature, the Communist front has become an important weapon of communism in this country. A Communist front, for example, may camouflage its true purposes behind such moral and human appeals as “peace” and “civil rights” while serving the aims of the Communist Party and the Soviet Union.

Similar efforts to create what Communists called a “united front” with non-Communists occurred in the mid-1930’s as a direct result of the Soviet Union’s fear of the rising power of the Fascist dictatorships. A multitude of Communist fronts flourished in the United States in that period because thousands of dupes were lulled by the Communists’ siren song of friendship. Many of the organizations which operated at that time are listed in this compilation.

The current “united front” strategy was decreed by the post-Stalin “collective leadership” of the Soviet Union and continued by Nikita Khrushchev when he inherited Josef Stalin’s mantle as supreme Soviet dictator. The united front was one of a number of new strategies
adopted to meet the exigencies of the post-Stalin Soviet leadership.

In listing Communist and Communist-front organizations and publications, the committee has relied upon the characterization which was made by the Federal or State authority originally making the declaration.

ORGANIZATIONS

Abolish Peonage Committee
Abraham Lincoln Brigade or Battalion. (See international Brigades, Fifteenth.)
Abraham Lincoln School (Chicago)
Academic and Civil Rights Committee
Academic and Civil Rights Council of California
Action Committee To Free Spain Now
Actors’ Laboratory
Actors’ Laboratory Theatre
Adolph Larson-Ruby Hynes Defense Committee
Alabama People’s Educational Association. (See entry under Communist Political Association.)
Albanian-American Committee for Protection of Foreign Born
Alex Bittelman Defense Committee
A 11- America Anti-Imperialist League
All-California Conference for Defense of Civil Rights and Aid to Labor’s Prisoners
Allied Labor News (Service)
Almanac Singers
Ambijan Committee for Emergency Aid to the Soviet Union American Association for Reconstruction in Yugoslavia, Inc American Branch of the Federation of Greek Maritime Unions.
under Maritime Unions, Federation of Greek.)
American Christian Nationalist Party
American Committee for a Free Indonesia
American Committee for a Free Yugoslavia, The
American Committee for a Korean People’s Party
American Committee for Chinese War Orphans
American Committee for Democracy and Intellectual Freedom
American Committee for European Workers’ Relief (see also Socialist Workers’ Party)
American Committee for Friendship With the Soviet Union American Committee for Indonesian Independence American Committee for Protection of Foreign Born
National Conference of Defense Committees, June 1955 (New York)
American Committee for Russian Famine Relief (Los Angeles and San Francisco)
American Committee for Spanish Freedom
American Committee for Struggle Against War (see also World Congress Against War)
Americans of South Slavic Descent
American Committee in Aid of Chinese Industrial Cooperatives
American Committee To Aid Korean Federation of Trade Unions (San Francisco)
American Committee for the Settlement of Jews in Birobidjan, Inc
American Committee for Yugoslav Relief, Inc
American Committee for Yugoslav Relief of the War Relief Fund
American Committee To Aid Soviet Russia
American Committee To Save Refugees
American Committee To Survey Labor Conditions in Europe
American Committee To Survey Trade Union Conditions in Europe
American Continental Congress for Peace (September5-10,1949, Mexico Page City, Mexico)
Committee for United States Participation in the American Continental Congress for Peace
American Council for a Democratic Greece American Council, Institute of Pacific Relations.
Relations.)
American Council on Soviet Relations
American Croatian Congress
American Federation for Political Unity
American Federation of Labor (AFL)
American Federation of Labor Trade Union Committee for Unemployment
Insurance and Relief
American Friends of Spanish Democracy American Friends of the Chinese People
American Friends of the Mexican People American Friends of the Spanish People
American Fund for Public Service (Garland Fund)
American Jewish Labor Council
American Labor Alliance (see also Communist Labor Party of America; Communist Party of America; Communist Party of the United States of America; Communist Political Association; United Communist Party of America; Workers (Communist) Party of America; Workers Party of America)
American Labor Party
American League Against War and Fascism
United States Congress Against War (First Congress of the American League Against War and Fascism, September 30 to October 1, 1933, New York City)
American League for Peace and Democracy (see also China Aid Council, National People’s Committee Against Hearst)
American National Labor Party
American National Socialist League
American National Socialist Party
American Nationalist Party
American Negro Labor Congress
American Patriots
American People’s Congress and Exposition for Peace, June 29-July 1,1951 (Chicago) 27 Colorado Peace Council
Delegates’ National Assembly for Peace, April 1, 1952 (Washington, D.C.)
American Lithuanian Workers Literary Association (also known as Amerikos Lietuviu Darbininku Literaturos Draugija)
American Peace Appeal
American Peace Crusade (organized in 1951)
American Peace Mobilization (see also Washington Peace Mobilization)
American People’s Meeting, April 5-6, 1941 (New York City)
American People’s Congress and Exposition for Peace, June 29-JuIy 1, 1951 (Chicago, 111.). (See entry under American Peace Crusade.)
American People’s Fund
American People’s Meeting. (See entry under American Peace Mobilization.)
American People’s Mobilization
American Poles for Peace
American-Polish Committee for Protection of Foreign Born (see also
Polish- American Committee for Protection of Foreign Born) American Polish Labor Council
American Polish League
American Relief Ship for Spain
American Rescue Ship Mission
American-Rumanian Film Corp
American-Russian Fraternal Society (IWO)
American Russian Institute (for Cultural Relations with the Soviet Union):
American Serbian Committee for Relief of War Orphans in Yugoslavia
American-Russian Trading Corp. (Amtorg)
American Slav Congress
American Society for Cultural Relations with Russia
American Society for Technical Aid to Spanish Democracy
American-Soviet Science Societjes
American Sponsoring Committee for Representation at the Second World
Peace Congress. (See entrv under World Peace Congress, Second, November 13, 1950, Sheffield, England.)
American Student Union
American Students Repudiate Aggression in Korea
American Technical Aid Society
American Unitarian Association
American Veterans for Peace (see also Veterans for Peace)
American Women for Peace
American Workers’ Party (December 1933-December 1934)..
American Writers Congresses. (<See entries under League of American Writers.)
American Youth Congress American Youth for a Free World American Youth for Democracy
American Youth Peace Crusade
American-Yugoslav Committee for Protection of Foreign Born (Pittsburgh, Pa.).
Americans of Croatian Descent, National Council. (See National Council of Americans of Croatian Descent.)
Amerikos Lietuviu Darbininku Lieraturos Draugija. (See American Lithuanian Workers Literary Association.)
Amtorg Trading Corp. (See American-Russian Trading Corp.)
AndrulisDefenseCommittee. (SeeVincentAndrulisDefenseCommittee.)
Angelo Herndon Defense Committee
Armenian Progressive League of America Artists and Writers Guild…
Artists’ Front To Win the War
Artists Union
Arts, Sciences, and Professions Council. (See National Council of the Arts, Sciences, and Professions, Southern California Chapter.)
Asociacion Nacional Mexicana-Americana. (See National Association of Mexican- Americans.)
Associated Film Audiences

Association of Democratic Journalists. (See International Organization of Journalists.)
Association of German Nationals (Reichsdeutsche Vereinigung) Association of Interns and Medical Students
Association of Lithuanian Workers
Ausland-Organization der NSDAP (overseas branch of Nazi Party)

B

Baltimore County Committee for Peace Baltimore Forum
Baltimore Youth for Peace
Bay Area Committee To Save the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Bay Area Rosenberg-Sobell Committee. (See entry under National Rosenberg-Sobell Committee.)
Bay Cities Committee for Protection of Foreign Born Benjamin Davis Freedom Committee
Black Dragon Society
Book Union
Boston Committee To Secure Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Boston Freedom of the Press Committee. (See entry under National Committee for Freedom of the Press.)
Comittee for Harry Bridges
Citizens’ Victory Committee for Harry Bridges,
Harry Bridges Defense Committee, Harry Bridges Victory Committee.
Briehl’s Farm (near Wallkill, N.Y.)
Bronx Victory Labor Committee
Brooklyn College, Karl Marx Society
Brookwood Labor College (Katonah, N.Y.)
Bulgarian-American Committee for Protection of Foreign Born
Bulgarian-American People’s League of the United States of America

C

CIO. (See Congress of Industrial Organizations.)
California Committee for Political Unity 209 California Conference for Democratic Action (also known as Conference
for Democratic Action)
California Emergency Defense Committee
[California] Federation for Political Unity
California Joint Fact-Finding Committee on Un-American Activities
California Labor School, Inc
Boston Labor Conference for Peace
Boston School for Marxist Studies (Boston, Mass.)
Boston School of Social Science
Bridges-Robertson-Schmidt Defense Committee
Southern California Labor School, Inc. (Los Angeles Division)
California Legislative Conference
California Senate Fact-Finding Committee on Un-American Activities
California Senate Fact-Finding Subcommittee on Un-American Activities.
[California] State-Wide Civil Rights Conference
[California] State-Wide Legislative Conferences
California Youth Legislature (see also Model Youth Legislature of Northern California)
Cambridge Youth Council
Camp Arcadia
Camp Beacon (New York State)
Camp Kinderland (Hopewell Junction, N.Y.)
Camp Lakeland (Hopewell Junction, N.Y.)
Camp Timberline (Jewett, N.Y.)
Camp Unity (Wingdale, N.Y.)
Camp Woodland (Phoenicia, N.Y.)
Carpatho-Russian Peoples Society (I WO)
Central Council of American Croatian Women (See Central Council of American Women of Croatian Descent.)
Central Council of American Women of Croatian Descent
Central Japanese Association (Beikoku Chuo Nipponjin Kai)
Central Japanese Association of Southern California
Central Organization of the German-American National Alliance
Cervantes Fraternal Society (IWO)
Charles Doyle Defense Committee
Charles Rowoldt Defense Committee
Chelsea Jewish Children’s School (Massachusetts)
Chicago Committee for Peaceful Alternatives to the Atlantic Pact.
Chicago Committee To Secure Justice in the Rosenberg Case. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Chicago Greek Committee for Protection of Foreign Born
Chicago Jewish Committee for Protection of Foreign Born
Chicago Labor Defense Committee
Chicago Sobell Committee. (See entry under National Committee To Secure Justice for Morton Sobell in the Rosenberg Case.)
China Aid Council
China Welfare Appeal, Inc.
Chinese Cultural Cabaret
Chinese Democratic Youth Chorus
Chinese Workers Mutual Aid Association
Chopin Cultural Center
Citizens Committee for Better Education
Citizens Committee for Constitutional Liberties (New York City)
Citizens’ Committee for Harry Bridges (see also Bridges- Robertson-Schmidt Defense Committee, Citizens’ Victory Committee for Harry Bridges,
Harrv Bridges Defense Committee, Harry Bridges Victory Committee).
Citizens’ Committee for the Defense of Mexican-American Youth
Citizens’ Committee for the Motion Picture Strikers
Citizens’ Committee for the Recall of Councilman McCianahan (13th Los Angeles District)
Citizens’ Committee of the Upper West Side (New York City)
Citizens’ Committee To Aid Locked-out Hearst Employees (Los Angeles)
Citizens’ Committee To Free Earl Browder
National Free Browder Congress
Citizens Committee To Preserve American Freedoms
Citizens’ Committee To Support Labor’s Rights
Citizens Emergency Defense Conference
Citizens Protective League
Citizens’ Victory Committee for Harry Bridges. (See also Bridges-Robertson-Schmidt Defense Committee, Citizens’ Committee for Harry Bridges, Harry Bridges Defense Committee, Harry Bridges Victory Committee)
City Action Committee Against the High Cost of Living
Civil Rights Congress. (See also Hawaii Civil Liberties Committee)
Veterans Against Discrimination of Civil Rights Congress of New York
Civil Rights Congress Bail Funds. (See entry under Civil Rights Congress)
City College of the City of New York Marxist Study Club
Civil Liberties Sponsoring Committee of Pittsburgh
Civil Rights Council of Northern California. (See entry under National Federation for Constitutional Liberties.)
Civil Rights Division of Mobilization for Democracy
Colorado Committee To Protect Civil Liberties
Colorado Peace Council. (See entry under American Peace Crusade.)
Columbians
Columbus Peace Association
Cominform. (See Information Bureau of the Communist and Workers’ Parties.)
Comintern. (See International)
Comite Coordinador pro Republica Espanola
Comite Pro Derechos Civiles. (See Puerto Rican Comite Pro Libertades Civiles.)
Committee for a Democratic Far Eastern Policy
National Conference on American Policy in China and the Far East
Civil Rights Federation (Michigan)
Clatsop County Committee for Protection of Foreign Born (Oregon) Claudia Jones Defense Committee
Cleveland Committee To Secure Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg
Case.)
Committee for Citizenship Rights
Committee for Civil Rights for Communists
Committee for Concerted Peace Efforts (see also American League for Peace and Democracy)
Committee for Constitutional and Political Freedom
Committee for Defense of Four of Oregon’s Foreign Born. (See Committee for Protection of Oregon’s Foreign Born.)
Committee for Defense of Greek-Americans
Committee for Defense of Martin Karasek (Bittendorf, Iowa)
Committee for Defense of Morning Freiheit Writers
Committee for Defense of Public Education
Committee for International Student Cooperation (144 Bleecker Street, New York, N.Y.)
Committee for Justice
Committee for May Day. (See United May Day Committee.) Committee for Nationalist Action
Committee for Peace and Brotherhood Festival in Philadelphia Committee for Peace Through World Cooperation
Committee for Peace Week-End
Committee for Peaceful Alternatives to the Atlantic Pact (see also Conference for Peaceful Alternatives to the Atlantic Pact; Continuations Committee of the Conference for Peaceful Alternatives to the Atlantic Pact; Northern California Committee for Peaceful Alternatives )
Mid-Century Conference for Peace, May 29-30, 1950 (Chicago)
Committee for Protection of Oregon’s Foreign Born 50, 51
Committee for Repeal of the Walter-McCarran Law and the Defense of
Sam and Fanny Manewitz 51, 55, 147
Committee for the Defense of Eulalia Figueiredo (New Bedford, Mass.)
Committee for the Defense of Henry Podolski. (See Committee in Defense of Henry Podolski.)
Committee for the Defense of Mexican-American Youth. (See Citizens Committee for the Defense of Mexican-American Youth.)
Committee for the Defense of the Pittsburgh Six Committee for the First Amendment
Committee for the Freedom of Martin Young
Committee for the Freedom of Sam Milgrom
Committee for the Negro in the Arts
Committee for the Protection of the Bill of Rights
Committee for United States Participation in the American Continental
Congress for Peace. (See entry under American Continental Congress for Peace.)
Committee for World Youth Friendship and Cultural Exchange
Committee in Defense of Henry Podolski
Committee of One Thousand
Committee of Philadelphia Women for Peace
Committee of Professional Groups for Browder and Ford
Committee on Election Rights
Committee To Abolish Discrimination in Maryland (see also Congress ‘ Against Discrimination
Maryland Congress Against Discrimination, Provisional Committee To Abolish Discrimination in the State of Maryland)
Committee To End Sedition Laws
Committee To Protect Joseph Mankin’s Citizenship
Committee To Repeal the Walter-McCarran Law and Stop Deportation
of Sam and Fanny Manewitz
Committee To Repeal the Walter-McCarran Law and To Protect the Foreign Born
Committee To Aid the Fighting South
Committee To Defend America by Keeping Out of War
Committee To Defend Angelo Herndon
Committee To Defend Chungsoon and Choon Cha Kwak
Committee To Defend Hazel Wolf
Committee To Defend Lincoln Veterans
Committee To Defend Marie Richardson
Committee To Defend Mike Daniels
Committee To Defend Toma Babin
Committee To Defend the Rights and Freedom of Pittsburgh’s Political Prisoners
Committee To Save the Life of John Juhn
Committee To Uphold the Bill of Rights
Commonwealth College (Mena, Ark.)
Communist Information Bureau. (See Information Bureau of the Communist and Workers’ Parties; Cominform.)
Communist International (COMINTERN). (See International III.)
Communist Labor Party of America (September 1919 to May 1920)
(see also:
American Labor Alliance;
Communist Party of America;
Communist Party of the United States of America;
Communist Political Association;
United Communist Party of America
Workers (Communist) Party of America
Workers Party of America) Communist League of America (Opposition)
Communist League of Struggle
Communist Party, U.S.A. (Majority Group)
Communist Party, U.S.A. (Opposition)
Communist Party of America (September 1919 to April 1923)
(see also
American Labor Alliance
Communist Labor Party of America;
Communist Party of the United States of America
Communist Political Association;
United Communist Party of America
Workers (Communist) Party of America;
Workers Party of America)
Communist Party of Panama (See Partido Del Pueblo of Panama.)
Communist Party of the United States of America

Communist Political Association (May 1944 to July 1945) (see also Ameri- can Labor Alliance; Communist Labor Party of America; Communist Party of America; Communist Party of the United States of America; United Communist Party of America; Workers (Communist) Party of
America; Workers Party of America)
Alabama People’s Educational Association
Florida Press and Educational League
Oklahoma League for Political Education
People’s Educational and Press Association of Texas Virginia League for People’s Education
Community Unitarian Fellowship
Conference for Democratic Action. {See California Conference for
Democratic Action.)
Conference for Legislation in the National Interest, April 7, 1956 (New York City)
Conference for Peaceful Alternatives to the Atlantic Pact {see also Com-
mittee for Peaceful Alternatives to the Atlantic Pact; Continuations
Committee of the Conference for Peaceful Alternatives to the Atlantic
Pact)
Conference for Progressive Labor Action
Conference for Social Legislation, January 16, 1938, and March 27, 1938
(Boston, Mass.)
Conference on Constitutional Liberties in America. (See entry under
National Federation for Constitutional Liberties.)
Conference on Pan-American Democracy {see also Council for Pan-
American Democracy)
Congress Against Discrimination (see also Committee to Abolish Discrimi-
nation in Maryland)
Congress (First) of the Mexican and Spanish-American Peoples of the
United States
Congress of American Revolutionary Writers. (See League of American Writers, First American Writers Congress.)
Congress of American Soviet Friendship. (See entry under National Council of American-Soviet Friendship.)
Congress of American Women
Congress of Industrial Organizations (CIO) Political Action Committee
Territorial CIO Political Action Committee
Congress of the Unemployed
Connecticut Committee To Aid Victims of the Smith Act Connecticut State Youth Conference
Connecticut Volunteers for Civil Rights
Consumers’ National Federation
Contemporary Theatre (Los Angeles, Calif.)
Continuations Committee of the Conference on Peaceful Alternatives to
the Atlantic Pact (see also Conference for Peaceful Alternatives to the Atlantic Pact; Committee for Peaceful Alternatives to the Atlantic Pact; Northern California Committee for Peaceful Alternatives)
Coordinating Committee To Lift the (Spanish) Embargo
Coordination Committee of Jewish Landsmanschaften and Fraternal Organizations. (See United Committee of Jewish Societies and Landsmanschaft Federations.)
Council for Jobs, Relief and Housing
Council for Pan-American Democracy (see also Conference on Pan-American Democracy)
Council of Greek Americans
Council of United States Veterans
Council of Young Southerners
Council on African Affairs
Croatian-American National Council. (See National Council of Americans of Croatian Descent.)
Croatian Benevolent Fraternity (of America) (IWO)
Croatian Educational Club
Cultural and Scientific Conference for World Peace. (See entry under National Council of the Arts, Sciences and Professions.)
Czechoslovak Committee for Protection of Foreign Born

D

Dai Nippon Butoku Kai (Military Virtue Society of Japan or Military
Art Society of Japan)
Daily Worker Press Club
Daniels Defense Committee (North Carolina)
Dante Alighieri Society
Daughters of the American Revolution (DAR)
Defense Committee for Eugene Dennis. (See (Eugene) Dennis Defense Committee.)
Defense Committee for Gerhardt Eisler. (See (Gerhardt) Eisler Defense Committee.)
Defense Committee for Victims of the Ohio Un-American Activities Commission
Delegates National Assembly for Peace, April 1, 1952 (Washington, D.C.).
(See entry under American Peace Crusade.)
Dennis Defense Committee. (See(Eugene) Dennis Defense Committee.)
Denver Peace Council. (See entry under American Peace Crusade.)
Descendants of the American Revolution
Detroit Bill of Rights Defense Committee
Detroit Committee for Protection of Foreign Born
Detroit Committee To Secure Justice in the Rosenberg Case.
(See entry under National Committee To Secure Justice in the Rosenberg Case.)
Detroit Youth Assembly
Deutsche-AmerikanischeBerufsgemeinschaft. (See German-American Vocational League.)
Dora Coleman Defense Committee
Down River Citizens Committee (Detroit, Mich.)
Downtown Club (Los Angeles)
Downtown Forum

E

East Bay Arts, Sciences, and Professions Council. (See entry under National Council of the Arts, Sciences, and Professions.)
East Bay Civil Rights Congress
East Bay Committee for Protection of Foreign Born
East Bay Committee To Save the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
East Bay Community Forum
East Bay Peace Committee (Oakland, Calif.) East Bay Youth Cultural Center
East Harlem Women for Peace
East Los Angeles Defense Committee
East Meadow and Westbury Rosenberg Committee. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
East Side Committee for Protection of Foreign Born
Eisler (Gerhardt) Defense Committee. {See (Gerhardt) Eisler Defense Committee.)
Elizalde Antidiscrimination Committee
Elsinore Progressive League
Emergency Civil Liberties Committee
Emergency Committee of the Arts and Professions To Secure Clemency for the Rosenbergs.
Emergency Conference To Aid the Spanish Republic 70 Emergency Conference To Halt the Blackout of Civil Liberties in California
Emergency Conference To Save Spanish Refugees
Emergency Peace Mobilization
Emergency Trade Union Conference To Aid Spanish Democracy
Emil Rabin Institute. {See Marxist Institute, Oakland, Calif.)
Emory Collier Defense Committee
Estonian Committee for Protection of Foreign Born
Estonian Women’s Club (Massachusetts)
Estonian Workers’ Clubs
Ethel Linn Defense Committee for the Repeal of the McCarran-Walter Act
Ethiopian Defense Committee
(Eugene) Dennis Defense Committee
Everybody’s Committee To Outlaw War
Exiled Writers Committee of the League of American Writers

F

Faculty of Social Science
Falange. (»See Spanish Fascist Party.)
Families of the Baltimore Smith Act Victims
Families of the Smith Act Victims
Farm Research
Federated Press
Federation of Greek Maritime Unions.
of Greek, American Branch.)
Federation of Italian War Veterans in the U.S.A., Inc. (Associazione Nazionale Combattenti Italiani, Federazione degli Stati Uniti d’America)
Ferdinand Smith Defense Committee Festus Coleman Committee
Film and Photo League
Film Audiences for Democracy Films for Democracy
Finnish American Freedom Committee Finnish-American Mutual Aid Society (IWO)
Finnish Federation
Finnish Women’s Clubs (of Massachusetts)
Finnish Workers’ Clubs
First Congress of the Mexican and Spanish-American Peoples of the United States. {See Congress (First) of the Mexican and Spanish-American Peoples of the United States.)
First Unitarian Church (San Diego). {See Unitarian Church, First.) First World Congress of the Defenders of Peace. {See World Peace Congress.)
First World Congress of the Partisans of Peace. {See World Peace Congress.)
First World Peace Congress. {See World Peace Congress.)
First World Student Congress. {See World Student Congress.)
Florida Press and Educational League. {See entry under Communist Political Association.)
Francis Vivian Defense Committee
Frank Ibanez Defense Committee
Frank Spector Defense Committee
Frederick Douglass Educational Center (New York City)
Free Italy Society
Freedom From Fear Committee
Freedom of the Press Committee. (See National Committee for Freedom of the Press.)
Freedom of the Press Committee Against Deportation
Freedom Stage, Inc
Friends and Neighbors of David Hyun
Friends of Chinese Democracy
Friends of Diamond Kimm
Friends of Freedom
Friends of Soviet Russia (see also Friends of the Soviet Union)
Friends of the Abraham Lincoln Brigade
Friends of the Campus
Friends of the New Germany (Freunde des Neuen Deutschlands)
Friends of the Soviet Union (see also American Technical Aid Society; and American Committee for Friendship With the Soviet Union)
Frontier Bookstore (Seattle, Wash.)
Frontier Films
Fund for Social Analysis, The
Fur and Leather Workers Union, International

G

German-American Republican League
German-American Vocational League (Deutsche-Amerikanische Berufsgemeinschaft)
Galena Defense Committee (Galena, N.C.)
Garibaldi American Fraternal Society (IWO)
GarlandFund. (See American Fund for Pubic Service.)
Gates Defense Committee. {See Mike Gates Defense Committee.)
George Washington Carver School
Georgia Peace Council. (See entry under American Peace Crusade.)
(Gerhardt) Eisler Defense Committee
German-American Bund (Amerikadeutscher Volksbund)
German-American National Alliance, Central Organization of (Deutsche-
Gosman Fabian Defense Committee
Great Neck Rosenberg Committee. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Greater New York Committee for Employment
Greater New York Emergency Conference on Inalienable Rights (see also New York Conference for Inalienable Rights)
Greek-American Committee for Defense of Peter Harisiades
Greek-American Committee for National Unity
Greek-American Committee for Protection of Foreign Born (Detroit)
Greek-American Council
Greek-American Defense Committee (Detroit, Mich.)
Greek Committee for Defense of Peter Harisiades
Guardian Club.
Gus Polites Defense Committee

H

H.O.G. (Armenian Group)
Harbor Committee for Protection of Foreign Born.
Harlem Trade Union Council
Harlem Youth Congress
Harry Bridges Defense Committee (see also Bridges-Robertson-Schmidt Defense Committee, Citizens’ Committee for Harry Bridges, Citizens’ Victory Committee for Harry Bridges, Harry Bridges Victory Committee)
Harry Bridges Victory Committee (see also Bridges-Robertsonbchmidt
Defense Committee, Citizens’ Committee for Harry Bridges, Citizens Victory for Harry Bridges, Harry Bridges Defense Committee).
Hawaii Civil Liberties Committee
Hawaii Civil Rights Congress. (See entry under Civil Rights Congress.)
Hawaii Commission on Subversive Activities

Hawaii Committee for Smith Act Defendants. 215
Heimuska Kai, also known as Nokubei Heieki Gimusha Kai, Zaibel Nihonjin, Heiyaku Gimusha Kai, and Zaibei Heimusha Kai (Japanese residing in America, Military Conscripts Association)
Hellenic-American Brotherhood (IWO)
Hempstead Rosenberg Committee. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Henry Holt & Co
Henry Steinberg Defense Committee
Herndon Defense Committee. (See Angelo Herndon Defense Committee.)
Hinode Kai (Japanese Imperialist Reservists)
Hinomaru Kai (Rising Sun Flag Society a group of Japanese War Veterans)
Hokubei Zaigo Shoke Dan (North American Reserve Officers Association)
Hold the Price Line Committee
Hollywood Actors’ Laboratory School. (See Actors’ Laboratory Theater)
Hollywood Anti-Nazi League
Hollywood Arts, Sciences and Professions Council. (See National Council of the Arts, Sciences and Professions, Southern California Chapter.)
Hollywood Community Radio Group, Inc
Hollywood Council of the Arts, Sciences and Professions. (See National Council of the Arts, Sciences and Professions, Southern California Chapter)
Hollywood Democratic Committee
Hollywood Independent Citizens Committee of the Arts and Sciences
Professions. (See entry under Independent Citizens Committee of the Arts, Sciences, and Professions.)
Hollywood League Against Naziism. (See Hollywood Anti-Nazi League)
Hollywood League for Democratic Action
Hollywood Mooney Defense Committee
Hollywood Motion Picture Democratic Committee
Hollywood Peace Forum
Hollywood Theater Alliance
Hollywood Writers Mobilization for Defense
Holyoke Book Shop
Honolulu Chapter, Inter-Professional Association
Honolulu Forum
Honolulu Record Publishing Co
Housewives Price Protest Committee. (See Housewives Protest Committee (Pittsburgh, Pa.).)
Housewives Protest Committee (Pittsburgh, Pa.)
Hungarian-American Committee for Protection of Foreign Born
Hungarian-American Council for Democracy
Hungarian-American Defense Committee
Hungarian Brotherhood (IWO)
Hungarian Defense Committee

I

Ida Gottesman Defense Committee
Idaho Pension Union
Illinois Assembly of the American Peace Crusade. (See American Peace Crusade, Illinois Chapter.)
Illinois Chapter of the American Peace Crusade. (See entry under American Peace Crusade.)
Illinois Council of the American Peace Crusade. (See American Peace – Crusade, Illinois Chapter.)
Illinois People’s Conference for Legislative Action 84 ILWU Book Club (San Francisco and Honolulu). (See entry under
Longshoremen’s Warehousemen’s Union, International.)
Independent Citizens Committee of the Arts, Sciences and Professions
Hollywood Independent Citizens Committee of the Arts, Sciences, and Professions
Independent Communist Labor League of America Independent Labor League of America
Independent Party (Seattle, Wash.) (see also Independent People’s Party)
Independent People’s Party (see also Independent Party)
Independent Progressive Party (California) . (See Progressive Party, California.)
Independent Socialist League (see also Workers Party, 1940-1948)
Independent Voters League (Pittsburgh, Pa.)
INDUSCO, Inc. (See American Committee in Aid of Chinese Industrial Cooperatives.)
Industrial Workers of the World
Information Bureau of the Communist and Workers’ Parties (Communist Information Bureau) (Cominform)
Institute of Marxist Studies (See entry under Jefferson School of Social Science.)
Institute of Pacific Relations
Intercontinent News Service
Inter-Professional Association, Honolulu chapter
International, III (Communist) (also known as Comintern and International Workers’ Association)
Seventh World Congress, July 25 to August 20, 1935 (Moscow)
International Association of Democratic Lawyers
International Book Shop (Boston, Mass.)
International Book Store, Inc. (San Francisco, Calif.)
International Brigades (in the Spanish Civil War) (see also Veterans of the Abraham Lincoln Brigade). Eleventh, Twelfth, Thirteenth, Fourteenth, Fifteenth (also known as Abraham Lincoln Brigade or Battalion, George Washington Battalion, MacKenzie-Papineau Battalion)
International Committee of Intellectuals for Peace. (See International Committee of Intellectuals in Defense of Peace.)
International Committee of Intellectuals in Defense of Peace ‘ (see also World Congress of Intellectuals) International Democratic Women’s Federation. (See Women’s International Democratic Federation.)
International Juridical Association .
International Labor Defense (see also Galena Defense Committee, Trade Union Advisory Committee)
International Liaison Committee of Intellectuals for Peace. (See International Committee of Intellectuals in Defense of Peace.)
International Music Bureau
International Organization of Democratic Journalists.
Organization of Journalists.
International Organization of Journalists
International Publishers Council
International Red Aid (MOPR) (also referred to as Red International of Labor Defense)
International Secretariat, Institute of Pacific Relations. (See Institute of Pacific Relations.)
International Union of Students (lUS) (see also World Youth Festivals)
International Preparatorv Committee
First World Student Congress, August 1946 (Prague)
Second World Student Congress, August 14-28, 1950 (Prague)

M

M.O.P.R. (See International Red Aid)
Macedonian-American People’s League
Manhattan Citizens Committee
Manhattan Clemency Committee. (See National Committee To Secure Justice in the Rosenberg Case, Manhattan Committee To Serve Justice in the Rosenberg Case.)
Manhattan Committee To Serve Justice in the Rosenberg Case. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Marie Kratochvil Defense Committee
Marine Workers Industrial Union
Mario Morgantini Circle
Maritime Book Shop (San Francisco)
Maritime Labor Committee To Defend Al Lannon
Maritime Unions, Federation of Greek, American Branch
Marshall Foundation. (See Robert Marshall Foundations)
Martinsville Seven Committee
Marxist Forums (New York).
Marxist Institute. (See Jefferson School of Social Science, Institute of Marxist Studies.)
Marxist Institute (Oakland, Calif.)
Marxist Study Club of the City College of New York. (City College of the City of New York.)
Maryland Committee for Peace
Maryland Congress Against Discrimination {see also Committee to Abolish
Discrimination in Maryland)
Massachusetts Action Committee for Peace
Massachusetts Committee for the Bill of Rights
Massachusetts Committee to Curb Communism
Massachusetts Minute Women for Peace ‘
Massachusetts Peace Council
Massachusetts Special Commission on Communism, Subversive Activities
and Related Matters Within the Commonwealth
Massachusetts Special Commission To Investigate the Activities Within this Commonwealth of Communistic, Fascist, Nazi and Other Subversive Organizations
Massachusetts Youth Council
Maurice Braverman Defense Committee
May Day Committees (See United May Day Committee, United May Day Conference.)
May Day Parade (see also United May Day Committee, United May Day Conference)
Medical Bureau and North American Committee To Aid Spanish Democracy
Michael Salerno Defense Committee
Michigan Civil Rights Federation. (See Civil Rights Federation, Michigan.)
Michigan Committee for Protection of Foreign Born..
Medical Bureau To Aid Spanish Democracy Memorial Day Youth Parade (1938)
Merrick Rosenberg Committee
Methodist Federation for Social Action Metropolitan Music School, Inc
Mexican and Spanish-American Peoples Congress. (See Congress (First) of the Mexican and Spanish-American Peoples of the United States.)
Michigan Committee for Peace
Michigan Council for Peace
Michigan Labor Committee for Peace
Michigan School of Social Science
Mid-Century Conference for Peace. (See entry under Committee for Peaceful Alternatives to the Atlantic Pact.)
Midwest Committee for Protection of Foreign Born
Mike Gates Defense Committee
Milwaukee Committee in the Rosenberg-Sobell Case. (See entry under National Rosenberg-Sobell Committee.)
Milwaukee Provisional Committee To Commute the Death Sentence of the Rosenbergs. (See National Committee To Secure Justice in the Rosenberg Case, Provisional Committee To Commute the Death Sentence of the Rosenbergs, Milwaukee.)
Mimi Kagan Dance Group
Minneapolis Chapter of the American Peace Crusade. (See American Peace Crusade, Minneapolis Council for Peace.)
Minneapolis Civil Rights Committee
Minneapolis Committee for Protection of Foreign Born
Minneapolis Council for Peace. (See entry under American Peace Crusade.)
Minneapolis Joint Committee Against Deportation
Minnesota Committee for Protection of Foreign Born
Minute Women for Peace
Mobilization for Democracy
Model Youth Legislature of Northern California (also referred to as Second Annual California Model Legislature) Modern Book Shop (California)
Modern Book Store (Chicago, 111.)
Modesto Defense Committee
Morning Freiheit Association
(Morris) Schappes Defense Committee
Moses Resnikoff Defense Committee
Motion Picture Artists’ Committee
Motion Picture Democratic Committee. (See Hollywood Motion Picture Democratic Committee.)
Murray Defense Committee
Musicians Committee To Secure Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Musicians Congress Committee
Musicians’ Democratic Committee
Musicians’ Open Forum
Musicians, American Federation of, Local 47

N

Nanka Teikoku Gunyudan (Imperial Military Friends Group or Southern California War Veterans) National Assembly Against UMT
National Assembly for Democratic Rights, September 2 (New York City)
National Association of Mexican-Americans (also known as the Nacional Mexicana-Americana or ANMA)
National Committee To Abolish the Un-American Activities Committee
National Committee To Defeat the Mundt Bill
National Committee To Repeal the McCarran Act
National Blue Star Mothers of America
National Citizens Political Action Committee
National Civil Rights Federation
National Committee for Freedom of the Press Boston Freedom of the Press Committee
National Committee for People’s Rights
National Committee for the Defense of Political Prisoners
National Committee To Secure Justice for Morton Sobell in the Rosenberg Case
National Committee To Secure Justice in the Rosenberg Case
National Committee To Win Amnesty for Smith Act Victims
National Committee To Win the Peace National Conference of Defense Committees (See entry under American Committee for Protection of Foreign Born.)
National Conference on American Policy in China and the Far East. (See entry under Committee for a Democratic Far Eastern Policy.)
National Congress for Unemployment and Social Insurance, January 5-7, 1935 (Washington, D.C.)
National Council of American-Soviet Friendship (see also American-Soviet Science Society)
Congress of American-Soviet Friendship, Nov. 7-8, 1942 (New York City)
National Council of Americans of Croatian Descent (also known as Croatian American National Council)
National Council of Croatian Women. (See Central Council of American Women of Croatian Descent.)
National Council of the Arts, Sciences, and Professions

National Delegates Assembly for Peace. (See American Peace Crusade, Delegates’ National Assembly for Peace, April 1, 1952 (Washington,
D.C.) Page
National Emergency Committee To Stop Lynching
National Emergency Conference
National Emergency Conference for Democratic Rights
National Federation for Constitutional Liberties
Civil Rights Council of Northern California
Conference on Constitutional Liberties in America, June 7-9, 1940 (Washington, D.C.)
Oklahoma Federation for Constitutional Rights
Washington Committee for Democratic Action (District of Columbia) .
National Free Browder Congress. (See entry under Citizens’ Committee To Free Earl Browder.)
National Labor Committee for Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
National Labor Conference for Peace
National Lawyers’ Guild
National Negro Congress
National Negro Labor Congress
National Negro Labor Council
National Women’s Appeal for the Rights of Foreign Born Americans
Los Angeles
National People’s Committee Against Hearst National Rosenberg-Sobell Committee
Bay Area Rosenberg-Sobell Committee
Milwaukee Committee in the Rosenberg-Sobell Case Northern California Rosenberg-Sobell Defense Committee Philadelphia Rosenberg-Sobell Committee
Provisional Western Regional Sobell Committee._
San Francisco Rosenberg-Sobell Committee
National Student League
Nationalist Action League
Nationalist Party of Puerto Rico
Nationality Committee of Western Pennsylvania
Nature Friends of America
Needle Trades Committee for Protection of Foreign Born
Negro Labor Victory Committee
Negro People’s Committee To Aid Spanish Democracy
Neighbors Committee for Defense of Peter Harisiades and Anna Taffler
Neighbors Committee To Defend Benjamin Saltzman
New Bedford Committee To Fight Unemployment (Massachusetts)
New Bedford Peace Committee
New Bedford Surplus Committee. (See New Bedford Committee To Fight Unemployment.)
New Century Publishers
New Committee for Publications
New England Citizens Concerned for Peace
New England Committee for Protection of Foreign Born
New England Committee for the Defense of Political Prisoners
New England Council for Protection of Foreign Born
New England Labor College
New England Labor Research Association
New Film Alliance
New Foundations Forums
New Jersey Committee for Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
New Theatre Group (Boston)
New Theatre League
New York Committee for Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg case.)
New York Committee for Protection of Foreign Born
New York Committee for the Southern Newsletter
New York Conference for Inalienable Rights(see also Greater New York Page Emergency Conference on Inalienable Rights)
New York State Conference on Legislation for Democracy, February 14, 1941
New York Conference on Civil Rights (see also Civil Rights Congress, New York)
New York Council of the American Peace Crusade. (See entry under American Peace Crusade.)
New York Joint Legislative Committee To Investigate Procedures and Methods of Allocating State Moneys for Public School Purposes and Subversive Activities, Subcommittee of (Rapp-Coudert Committee)
New York Labor Conference for Peace (see also National Labor Conference for Peace)
New York Peace Institute
New York Polish Committee for Protection of Foreign Born
New York State Conference on Legislation for Democracy. (See entry under New York Conference for Inalienable Rights.)
New York State Conference on National Unity
New York Tom Mooney Committee
New York Trade Union Committee for Protection of Foreign Born
New York Trade Union Committee To Free Earl Browder
New York Workers School. (See Workers School, New York.)
Newark Peace Action Committee
Nichibei Kogyo Kaisha (the Great Fujii Theater)
Nichibei Minshu Kyokai, Waipahu Chapter (Japanese American Association for Democracy (JAAD))
Non-Partisan Committee for Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Non-Partisan Committee for the Re-Election of Congressman Vito Marcantonio
Non-Sectarian Committee for Political Refugees
Norman Tallentire Defense Committee
North American Committee To Aid Spanish Democracy
North American Spanish Aid Committee
North American Emergency Conference To Save Spanish Refugees
North Philadelphia Forum
North Side Peace Club
North Westchester Rosenberg Committee. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Northern California Civil Rights Council. (See National Federation for Constitutional Liberties, Civil Rights Council of Northern California.)
Northern California Committee for Peaceful Alternatives (see also Committee for Peaceful Alternatives to the Atlantic Pact; Conference on Peaceful Alternatives to the Atlantic Pact; Continuations Committee of the Conference on Peaceful Alternatives to the Atlantic Pact)
Northern California Committee for Protection of Foreign Born
Northern California Peace Crusade. (See entry under American Peace Crusade.)
Northern California Rosenberg-Sobell Committee. (See entry under National Rosenberg-Sobell Committee.)
Northwest Committee for Protection of Foreign Born (also known as Washington (State) Committee for Protection of Foreign Bom) Northwest Japanese Association

O

Oahu Servicemen’s Committee for Speedier Demobilization
Ohio Bill of Rights Conference
Ohio Committee for Protection of Foreign Born
Ohio Committee To Secure Justice in the Rosenberg Case
Ohio Freedom of the Press Association
Ohio Labor Conference for Peace
Ohio Provisional Committee for Protection of Foreign Bora Ohio School of Social Sciences
Ohio Un-American Activities Commission
Oklahoma Committee To Defend PoHtieal Prisoners
Oklahoma Federation for Constitutional Rights. (See entry under National Federation for Constitutional Liberties.)
Oklahoma League for Political Education.
Open Letter for Closer Cooperation With the Soviet Union
Open Letter in Defense of Harry Bridges
Open Letter to American Liberals
Orange County Committee for Protection of Foreign Born
Ormsby Village for Youth Foundation (Topanga Canyon, Calif.)
Otto Skog Defense Committee

P

POC. (See Provisional Organizing Committee for a Marxist-Leninist Communist Party.)
Pacific Northwest Labor School, Seattle, Wash, (also known as Seattle
Labor School)
Pacific Pubhshing Foundation, Inc
Palo Alto Peace Club
Partido del Pueblo of Panama (operating in the Canal Zone) (Communist Peace Committee of Alameda and Contra Costa Counties (California)
Paul Yuditch Defense Committee
Pax Productions
Peace Conference of the Asian and Pacific Regions (Peping, China, 1952)
Peace Information Center (799 Broadway, New York, N.Y.)
Peace Movement of Ethiopia
Peace Pilgrimage To Washington, D.C., March 15, 1951. (See entry under American Peace Crusade.)
Peggy Wellman Defense Committee
People’s Defense Committee
People’s Drama, Inc
People’s Educational and Press Association of Texas
People’s Educational Association. (See People’s Educational Center.)
People’s Educational Center (Los Angeles)
People’s Institute of Applied Religion
People’s Party (Connecticut). (See Progressive Party, Connecticut.)
People’s Peace
People’s Programs (Seattle, Wash.)
People’s Radio Foundation, Inc
People’s Rights Party
People’s School. (See People’s Educational Center.)
People’s University. (See People’s Educational Center.)
Permanent Committee of the World Peace Congress. (World Peace Congress.)
Pete Nelson Defense Committee
Peter Warhol Defense Committee
Petros Lezos Defense Committee
Philadelphia Committee for Defense of the Foreign Born
Philadelphia Committee for Repeal of the Walter-McCarran Act and To Defend Its Victims
Philadelphia Committee To Secure Justice in the Rosenberg Case. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Philadelphia Labor Committee for Negro Rights
Philadelphia Rosenberg-Sobell Committee. (See entry under National Rosenberg-Sobell Committee.)
Philadelphia School of Social Science and Art
Philadelphia Women for Peace.
Photo League Pittsburgh Arts Club
Polish-American Committee for Protection of Foreign Born (see also American-Polish Committee for Protection of Foreign Born)
Political Prisoners’ Welfare Committee
Polona Society (IWO)
Polska Partja Komunistyzna (foreign language Marxist group)
Prestes Defense Committee
Prisoners’ Relief Committee
Professionals for Clemency (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Profitern. (See Red International of Labor Unions.)
Progressive Bookshop (or Store):
Progressive Citizens of America (California branches)
Progressive Committee To Rebuild American Labor Party
Progressive German-Americans (also known as Progressive German-
Americans of Chicago) Progressive Labor School (Boston)
Progressive Party
California (Independent Progressive Party) Downtown Club
Connecticut (People’s Party)
Massachusetts
Progressive Students of America
Progressive Trade Union School (Worcester, Mass.) Progressive Women’s Council
Proletarian Party of America
Prompt Press, Inc
Protestant War Veterans of the United States, Inc
Provisional Committee for the 69th Anniversary of May Day. (See United May Day Committee.)
Provisional Committee of Citizens for Peace, Southwest Area
Provisional Committee on Latin American Affairs
Provisional Committee to Abolish Discrimination in the State of Maryland (see also Committee to Abolish Discrimination in Maryland)
Provisional International Trade Union Committee of Negro Workers
Provisional Organizing Committee for a Marxist-Leninist Party Communist
Provisional Western Regional Sobell Committee. (See entry under National Rosenberg-Sobell Committee.)
Provisional Workers and People’s Committee for May Day. (See United May Day Committee.)
Public Use of Arts Committee.
Puerto Rican Comite Pro Libertades Civiles (CLC) (also known as Comite Pro Derechos Civiles)
Puerto Ricans United (also known as Puertorriquenos Unidos)
Puertorriquenos Unidos. (See Puerto Ricans United)

Q

Quad City Committee for Peace
Queens Rosenberg Committee.
Queensbridge Tenants League

R
Rapp-Coudert Committee. (See New York Joint Legislative Committee “To Investigate Procedures and Methods of Allocating State Moneys for Public School Purposes and Subversive Activities, Subcommittee of.)
Red International of Labor Defense. (See International Red Aid)
Red International of Labor Unions (RILU) (Profitern).
Refugee Scholarship and Peace Campaign
Reichsdeutsche Vereinigung (See Association of German Nationals.)
Reichstag Fire Trial Anniversary Committee
Repertory Playhouse
Revolutionary Workers League
Robert Marshall Foundation
Robotnik Polski (Polish Labor)
Romanian-American Committee for Protection of Foreign Born
Romanian-American Fraternal Society (IWO)
Rose Chernin Defense Committee
Rose Chernin Emergency Defense Committee
Rose Nelson Defense Committee
Rose Spector Defense Committee
Rosenberg Committee of the Bronx {See entry under National Committee To Secure Justice in the Rosenberg Case.)
Roslyn Rosenberg Committee. (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Runag News Service (Moscow)
Russian-American Committee for Protection of Foreign Born
Russian-American Industrial Corp
Russian American Society, Inc
Russian Reconstruction Farms, Inc

S

SEATO. (See Southeast Asia Treaty Organization.)
St. Louis Committee To Secure Justice for Morton SobeU. {See entry under National Committee To Secure Justice for Morton Sobe
St. Louis Committee To Secure Justice in the Rosenberg Case. {See entry under National Committee To Secure Justice in the Rosenberg Case.)
St. Louis Emergency Defense Committee 147, 199 St. Nicholas Arena (New York City)
Sakura Kai (Patriotic Society, or Cherry Association composed of veterans of Russo-Japanese War)
Sam and Fanny Manewitz Defense Committee (St. Louis, Mo.) (see also Committee for Repeal of the Walter-McCarran Law and the Defense of Sam and Fanny Manewitz (St. Louis, Mo.); and Committee To Repeal the Walter-McCarran Law and Stop Deportation of Sam and—Fanny Manewitz)
Samuel Adams School (for Social Studies) (Boston, Mass.)
San Diego Emergency Defense Committee
San Diego Peace Forum. (See entry under American Peace Crusade.)
San Francisco Labor Conference for Peace (see also National Labor Conference for Peace)
San Francisco Rosenberg-Sobell Committee. (See entry under National Rosenberg-Sobell Committee.)
Santa Barbara Peace Forum
Save Our Sons Committee
Scandinavian-American Defense Committee
Schappes Defense Committee. (See (Morris) Schappes Defense Committee.)
School of Jewish Studies (New York)
Scientific and Cultural Conference for World Peace. (See National Council of the Arts, Sciences and Professions, Cultural and Scientific Conference for World Peace.)
Scottsboro Defense Committee
Seattle Labor School. (See Pacific Northwest Labor School.)
Second Annual California Model Legislature. (See Model Youth Legislature of Northern California.)
Second World Congress of the Defenders of Peace. (See World Peace Congress.)
Second World Congress of the Partisans for Peace. (See World Peace Congress.)
Second World Peace Congress. (See World Peace Congress.)
Second World Student Congress. (See International Union of Students,
Schneiderman-Darcy Defense Committee School for Democracy (New York City)
School of Jewish Studies (Los Angeles, California)
Second World Student Congress.)
Serbian-American Fraternal Society (IWO)
Serbian Vidovdan Council
Silver Shirt Legion of America
Simon J. Lubin Society
Slavic Council of Los Angeles
Slavic Council of Southern California
Sleepy Lagoon Defense Committee
Slim Connelly Defense Committee
Slovak Workers Society (IWO)
Slovenian-American National Council
Socialist Party of the United States, Left Wing Section
Socialist Workers Party (see also American Committee for European Workers’ Relief)
Socialist Youth League (see also Workers Party, 1940-48)
Society for Cultural Relations With Soviet Russia. (See American Society for Cultural Relations With Russia.)
Sokoku Kai (Fatherland Society)
Sons and Daughters of the Foreign Born in the Fight Against Deportations Committee To Secure Justice in the Rosenberg Case.)
Southern California Chapter of the National Council of the Arts, Sciences, and Professions. (See entry under National Council of the Arts, Sciences, and Professions.)
Southern California Emergency Committee for Clemency for the Rosenbergs. (See entry under National Committee To Secure Justice for the Rosenbergs.)
Southern California Labor School, Inc. (See entry under California Labor School, Inc.)
Southern California Peace Crusade. (See entry under American Peace Crusade.)
Southern Conference for Human Welfare
Southern Negro Youth Congress
Soviet Association of Friendship and Cultural Cooperation with the Countries of Latin America Spanish Refugee Appeal. (See entry under Joint Anti-Fascist Refugee Committee.)
Spanish Refugee Relief Campaign
South Slav Committee for Protection of Foreign Born
South Westchester Rosenberg Committee.
Springfield Citizens’ Protective League
Springfield Committee To Aid Spanish Democracy (Massachusetts)
Stanley Nowak Defense Committee (Detroit)
Spanish Speaking People’s Congress
State-Wide Civil Rights Conference. (See [California] State-Wide Civil Rights Conference.)
State-Wide Legislative Conference. (See [California] State-Wide Legislative Conferences.)
Stella Brown Defense Committee
Stockholm Peace Appeal (or Petition). (See World Peace Appeal.)
Straight Arrow Camp (Golden’s Bridge, N.Y.)
Student Congress Against War
Student Councils for Academic Freedom
Student Rights Association
Students for Wallace
Suiko Sha (Reserve Officers Association, Los Angeles)
Sweethearts of Servicemen
Syracuse Women for Peace

T

Tom Mooney Labor School (San Francisco, Calif.) (see also California Teachers Union, New York)
Teen Art Club
Territorial CIO Political Action Committee of Industrial Organizations, Political Action Committee (See entry under Congress Labor School)
Tom Paine School (Westchester, N.Y.)
Tom Paine School of Social Science (Philadelphia, Pa.)
Toumayian Club (Chelsea, Mass.)
Town Meeting of Youth
Trade Union Advisory Committee
Trade-Union Committee for Free Spain
Trade Union Committee for Peace (also known as Trade Unionists for Peace)
Trade Union Committee for Repeal of the Walter-McCarran Law
Trade Union Committee for the Repeal of the Smith Act
Trade-Union Committee on Industrial Espionage
Trade-Union Committee To Put America Back to Work
Trade-Union Educational League (TUEL)
Trade-Union Unity League (TUUL)
Trade-Union Women’s Committee for Peace
Trade Unionists for Peace. (*See Trade Union Committee for Peace)
Tri-State Negro Trade Union Council
Twentieth Century Book Shop (or Store) :

U

Ukrainian-American Committee for the Defense of Zazuliak and Kushnir..
Ukrainian-American Fraternal Union (IWO)
Ukrainian Committee for Protection of Foreign Born
Ukrainian Defense Committee Against Deportation
United Committee of Jewish Societies and Landsmanschaft Federations
(also known as Coordination Committee of Jewish Landsmanschaften
Unemployed Councils (see also Workers Alliance)
Unemployed Workers’ Organization of Hawaii
Union of American Croatians (see also National Council of Americans of
Croatian Descent
Union of Concerted Peace Efforts
Union of New York Veterans
Union of Orthodox Jewish Congregations of America
Union of Progressive Veterans
Unitarian Church, First (San Diego)
United American Artists
United American Spanish Aid Committee
United Committee of Jewish Societies and Landsmanschaft Federations (also known as Coordination Committee of Jewish Landsmanschaften and Fraternal Organizations)
United Committee of South Slavic Americans (New York)
United Communist Party (May 1920 to May 1921) (see also American Labor Alliance; Communist Labor Party of America; Communist Party of America; Communist Party of the United States of America; Communist Political Association; Workers (Communist) Party of America
United May Day Committee (also known as United Labor and People’s Committee for May Day) Workers Party of America
United Cultural Association
United Defense Council of Southern California
United Farmers League
United Harlem Tenants and Consumers Organization
United Labor and People’s Committee for May Day.
United May Day Conference
United Negro and Allied Veterans of America
United States Service & Shipping, Inc
United States Veterans Council. (See Council of United States Veterans.)
United States Youth Sponsoring Committee, World Peace Appeal. entry under World Peace Appeal.)
United Student Peace Committee
United Toilers
United Youth Committee Against Lynching

V

Vacaville Committee for Protection of Foreign Born (California)
Valley Committee for Protection of Foreign Born (California)
Valley Stream Rosenberg Committees (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Vart Galalian Committee
Vassar College (Poughkeepsie, N.Y.)
Veterans Against Discrimination of Civil Rights Congress of New York
Veterans for Peace {see also American Veterans for Peace)
Veterans of the Abraham Lincoln Brigade {see also International Brigades)
Victory Book Store (San Diego)
Vincent Andrulis Defense Committee
Virginia League for People’s Education. {See entry under Communist Political Association.)
Voice of Freedom Committee

W

Walt Whitman Book Shop
Walt Whitman School of Social Science (Newark, N.J.)
Washington Bookshop Association. {See Washington Cooperative Bookshop.)
Washington CIO Committee To Reinstate Helen Miller (District of Columbia)
Washington Committee for Aid to China (District of Columbia)
Washington Committee for Democratic Action (District of Columbia). {See entry under National Federation for Constitutional Liberties.)
Washington Committee for Justice in the Rosenberg Case (Washington State). {See entry under National Committee To Secure Justice in the Rosenberg Case.)
Washington Committee for Protection of Foreign Born. (See Washington State Committee for Protection of Foreign Born)
Washington Committee To Defend the Bill of Rights
Washington Committee To Secure Justice in the Rosenberg Case (District of Columbia) (See entry under National Committee To Secure Justice in the Rosenberg Case.)
Washington Commonwealth Federation (Washington State) (see also Washington Pension Union)
Washington Cooperative Bookshop (District of Columbia)
Washington Friends of Spanish Democracy (District of Columbia)
Washington Old Age Pension Union (Washington State)
Washington Peace Mobilization
Washington State Committee for Protection of Foreign Born. (See Northwest Committee for Protection of Foreign Born).
Washington State Joint Legislative Fact-Finding Committee on Un-American Activities
West Side Rosenberg Committee. (See entry under National Committee to Secure Justice in the Rosenberg Case.)
Western Council for Progressive Labor in Agriculture
Western Pennsylvania Committee for Protection of Foreign Born
Western Writers’ Congress
William Allan Defense Committee
Workers Library Publishers, Inc
Workers Party (1940-48). (See also Independent Socialist League; Socialist Youth League.) Workers Party of America (December 1921 to August 1925) (see also American Labor Alliance; Communist Labor Party of America; Communist Party of America; Communist Party of the United States of America; Communist Political Association; United Communist Party of America; Workers (Communist) Party of America
Workers Party of the United States (December 1933 to 1944). (See American Wingdale Lodge, Inc. (Wingdale, N.Y.) (see also Camp Unity)
Wisconsin Conference on Social Legislation
Wisconsin Peace Crusade. (See entry under American Peace Crusade.)
Women’s Committee To Free Katherine Hyndman
Women’s International Democratic Federation
Workers Alliance. (See Workers AUiance of America.)
Workers Alliance of America (see also Unemployed Councils).
Workers Bookshop (New York City)
Workers (Communist) Party of America (August 1925 to March 1929) (see Workers Party.)
Workers Schools
Workmen’s Educational Association
World Congress Against War (August 27-29, 1932, Amsterdam) (see also American Committee for Struggle Against War) 19, 156, 176 World Congress for Peace. (See World Peace Congress.)
World Congress of Defenders of Peace. (See World Peace Congress.)
World Congress of Intellectuals, August 25-28, 1948, (Wroclaw, Poland) (see also International Committee of Intellectuals in Defense of Peace)
World Congress of Partisans of Peace. (See World Peace Congress.)
World Council of Peace. (See World Peace Council.)
World Federation of Democratic Women. (See Women’s International Democratic Federation.)
World Federation of Democratic Youth (WFDY)
World Federation of Scientific Workers
World Federation of Trade Unions ( WFTU)
World Peace Appeal (also known as Stockholm Peace Appeal or Petition)
United States Youth Sponsoring Committee
World Peace Circle of Hollywood, Calif
World Peace Congress (also known as the World Congress of Partisans of Page Peace and the World Congress of Defenders of Peace)
First Congress, April 20-24, 1949 (Paris, France)
Second Congress, November 13, 1950, Sheffield, England; November 16-22 (Warsaw, Poland)
American Sponsoring Committee for Representation at the Second World Peace Congress Permanent Committee
World Tourists, Inc
World Youth Congress, Second Congress, August 15-24, 1938, Vassar College
World Peace Council (also known as World Council of Peace)
World Student Congress, First and Second. (See entries under International Union of Students.)
World Youth Festivals:
Second Youth Festival, August 14-28, 1949 (Budapest)
Seventh Youth Festival, July 26-August 4, 1959 (Vienna, Austria)

Y

Yanks Are Not Coming Movement
Yiddisher Kultur Farband
Young Communist International
Young Communist League, USA
Young People’s General Assembly for Peace
Young Progressives of America:
Young Workers League of America
Youth Against the House Un-American Activities Committee
Youth To Abolish the House Un-American Activities Committee.
Youth Against the House Un-American Activities Committee.)
Youth To Abolish Un-American Committees. (See Youth Against the House Un-American Activities Committee.)
Yugoslav-American Cooperative Home, Inc
Yugoslav Seamen’s Club, Inc

 

 

Quotes from “Their Morals and Ours” by Leon Trotsky

I first read Their Morals and Ours by Leon Trotsky after buying the Pathfinder Press edition at the Miami chapter of the Socialist Workers Party in 2005. I’d started to gain an interest in Trotskyist politics, and the Communist movement that year as I’d grown disillusioned with what I saw as the lifestylism of the modern anti-globalization movement. At my invitation, Alyson Kennedy, the 2016 Socialist Workers Party Presidential candidate, visited the school that I worked at in 2008, when she was then the Vice-Presidential candidate. After she left the students shared that they thought her calls for class struggle and revolution were weird and they, a group whose family originated in a number of different places in the Caribbean and Latin America, openly questioned her sanity and my judgement for having her come speak to them.

Given that the Socialist Workers Party has recently chosen Manuel Castells to be a functionary in the coalition government, that he’s recently attended Oxford University to give some lectures, and that the Director of the Oxford Internet Institute – Dr. Philip N. Howard – has wrote a book praising Castells I thought it sensible to highlight some quotes of Trotsky’s – who founded the Socialist Workers Party – related to his advocacy of deception and lying in pursuit of revolution.

Lax Ethica: Philip N. Howard, Disinformation and Socialist Academic Networks

Lax Ethica

 
A Historical Account, Data Analysis, Network Ethnography & Theoretic Exegesis
that
Demonstrates
Dr. Philip N. Howard  
– Director of the Oxford Internet Institute –
Disseminates Disinformation
to Further the Ambitions of the Bolivarian Socialist Movement
and
Demonstrates his Participation in
The Network of Intellectuals and Artists in Defense of Humanity (REDH),
a Counter-Intelligence Operation
Developed and Managed by the Venezuelan and Cuban Intelligence Services


Abstract:

This article presents the case that Dr. Philip N. Howard has a history of fundamentally fraudulent research designed to politically polarize, misinform and misdirect his audience.

After providing an account of how the Director of the Oxford Internet Institute, Philip N. Howard, violated the spirit and letter of the American Sociological Associations code of professional ethics by: (1) refusing to update self-published research (2) by publishing and promoting articles from multiple investigations whose research design was without merit (3) providing testimony to government bodies whose effect was to misdirect or misinform.

Content analysis based on the messaging effects of these publications leads to a hypothesis that Philip N. Howard is a Socialist – a close reading of Philip N. Howard’s academic work and network ethnography proves that this is true and, furthermore, that he is likely a member of a trans-national network of alter-globalization academics promoted by the Hugo Chavez founded, Cuban and Venezuelan Intelligence Services’ managed “Networks of Intellectuals”. 

Keywords: Disinformation, Political Manipulation, Fraud, Subversive Academic Networks, Sao Paulo Forum 

***

After Dr. Philip N. Howard and I were both quoted in the New York Times about Facebook’s participation in the Social Science One investigation into Social Media and Democracy, I decided to visit the website of the Oxford’s Internet Institute (OII) and review their publications. Upon reading The Global Disinformation Order: 2019 Global Inventory of Organised Social Media Manipulationwhich Howard co-authored with Samantha Bradshaw I noticed four significant errors in their findings – described below – based on my investigation of Venezuela’s social media behavior over the past two years in partnership with Universidad Pontifica Bolivariana (UPB).

As this report was self-published, correctable in under five minutes with Adobe Acrobat Pro and as according to the American Sociological Association’s Code of Ethics Section 12.4 Subsection E it is considered best practice to update research in light of new data I sent OII an email with notification of their errors along with appropriate documentation on September 29th– three days after the Inventory’s publication.

My initial contact was ignored, but after repeated follow ups I received a response, briefly corresponded with Dr. Howard and was then informed that he would not update the document, not answer questions I had casting doubt on his research methodology, and was informed that he would not solicit UPB’s expert opinion for their 2020 Inventory and that he was instructing his subordinates at the OII to ignore all future requests from me. I was shocked by such behavior.

At first I graciously believed this was a result of mere narcissistic negligence – which is random in its effect. But given that this was verbatim the same behavior I’d witnessed when asking certain questions of American media producers that were currently or previously had worked for Venezuela’s state media company I was suspicions.

After investigating Dr. Philip N. Howard’s academic work, press mentions, and professional associations I now understand the reason he wanted to foreclose the inclusion of counterfactual data to his claims is likely a result of his Socialist political convictions manifesting in a desire to misdirect attention from Venezuela’s online and in-real-life political propaganda activities and – most especially – the Leon Trotsky-inspired “network of networks” founded by Hugo Chavez in 2005 to help develop a new Socialist Internationale by providing assistance, amongst other means, to subversive professors – a policy which Venezuela’s ally Cuba has engaged in since 1963.

First I’ll illustrate Dr. Howard’s public history of correcting trivial research errors.

After this I document several significant errors found in his research whose baseless findings have made their way into the press. After this trend is established, I examine Dr. Howard’s testimony to the U.S. Senate Intelligence Service to show his engagement in misdirection and that the submission of his expert opinion the U.K. Parliament was  disinformation.

Content analysis is then used to illustrate that the general thrust of Dr. Howard’s research project has been to mirror the political positions of Socialist and Communist Parties associated with the Alter-Globalization/International Socialism Project mentioned above.

Following this I document the evidence showing Dr. Philip Howard’s engagement with Communist and Communist-sympathizing actors and his use of Marxian theoretical frameworks within his published research. In close, I demonstrate what appears to be the effects of participation in the Cuban and Venezuelan Government sponsored Network of Intellectuals in Defense of Humanity and summarize the results of this exercise in ethnographic and process mapping.

 Philip N. Howard’s History of Correcting and Ignoring Research Errors

To err is human, to correct mistakes is divine – so when Philip N. Howard amends his article Zuckerberg Goes to Russia as the Global Network Initiative Turns 4 on the blog for Princeton’s Center for Information Technology Policyhe is aligning himself with best academic practices. The same is true for the three articles (123) of Philip N. Howard has posted on the Pacific Standard website, and the error he describes in a Tweet on December 9th, 2018. And yet there exists several other research articles and testaments of his which remain unexpiated and that, when placed together indicate his research project’s alignment with the Bolivarian goals.

Case Study: Fake Research Contra Donald Trump 

Mother Jones published an article entitled Trump Supporters Spread the Majority of Phony News on Social Media based on Philip Howard’s research, as did several other news outlets.

In an Opinion article by Erik Wemple for The Washington Post titled Study bashes Trumpites for promoting ‘junk’ news. But what’s that?, Erik Wemple also points out an issue related to categorization which invalidated Philip N. Howard’s research findings.

Elizabeth Harrington at The Washington Free Beacon in an article titled The Oxford Study Saying Trump Supporters Share More Fake News Is Fake Newspoints out a second categorization error that complicates, if not nullifies, the findings of Philip N. Howard’s study.

Both of these journalists, however, overlooked two even larger issues that categorically invalidates the study that this Mother Jones article was based on.

(1) During the period under Oxford’s investigation SparkToro estimated at least 61% of Donald Trump’s Twitter followers were false accounts – which nowhere within the methodology is it stated that this was even accounted for.

(2) According to research from the University of Cambridge, bots retweet much more content than do real humans. Again – nowhere within the methodology is it stated that this was accounted for.

(3) According the findings section of the report a variant of the k-core reduction was used to reduce the data-set to 13,477 users, yet on page 6 of the online supplement it states that the k-core consisted of 12,413 users. Questions about this discrepancy sent to the Oxford Internet Institute went unanswered.

In other words, ironically enough, the researcher who claims to be the authority on “exposing the role of bots and trolls” doesn’t even account for the fact that bots were producing the majority of the content analyzed in his own dataset.

That such an research was published at all ought to surprise anyone familiar with the Twitter ecosystem. Indeed Philip N. Howard seems to admit that this line of research was fundamentally erroneous in a Tweet on February 1st– four days before Mother Jones and several other outlets announced to the world that Donald Trump fake-news sharing fools.

And yet despite these public criticisms and the larger research design flaws – the article remain published and the outlets which cover it remain uncorrected.

Case Study: Fake Research Contra Jair Bolsonaro

WhatsApp fake news during Brazil election ‘favoured Bolsonaro’ was published in The Guardian and features original research by Daniel Avelarwhich features a quote by former Oxford Internet Institute researcher Caio Machado.

Machado’s own research was covered in the New York Time article Disinformation Spreads on WhatsApp Ahead of Brazilian Election and was based on one of two research articles in which he is listed as the coauthor of with Philip N. Howard:  A Study of Misinformation in WhatsApp groups with a focus on the Brazilian Presidential Electionsand News and Political Information Consumption in Brazil: Mapping the First Round of the 2018 Brazilian Presidential Election on Twitter.

After reading the two articles published by OII, I sent a request for more information about the WhatsApp investigation on November 25th, as I has no interest in the Twitter study as I population studies on that platform are essentially invalid, in contrast to what OII claims – which will be discussed later.

The questions that I asked OII were as follows:

  • Are the privatized data-set available for researchers to review?
  • Is there a publicly available data repository for review by researchers that contains JUST the 99,988 media files, the 50,795 Original URLS, the 38,800 coded links or even just 200 coded images/videos?
  • Since URLs were coded on a domain and sub domain level, is there a codebook available to review that shows the classification of domains?
  • In the sampling and methods section, it’s stated that 200 images/videos were randomly chosen for coding but there the method for randomization is not described.

All these questions stem from a desire to see if their findings could be duplicated. This is important as replicability is a key component of Science, and the inability to do this in the materials science, data science and social sciences has caused some to describe the current capacity of research teams not to repeat experiments and get the same findings of others as a replicability crisis.

That I received no response from OII is suspicious enough in itself, however after doing cursory research into Caio Machado it’s all the more so. Sao Paulo, Brazil – where Machado went to law school – has long been a center of socialist activity. Indeed it hosted the first iteration of a pan-Latin American conference of social movements, Communist and Socialist parties conceived of by Fidel Castro and Lula Brazil to help steer pan-Latin American integration called the Sao Paulo Forum. By itself Caio Machado having gone to law school in Sao Paulo, Brazil means nothing – but in light of the fact that he retweeted content from an account claiming to be the embodiment of the spirit of Communist Cultural Critic Mark Fisher and that he has – it appears – attended a lecture featuring Liberation Theologist Enrique Dussel it appears that there could be a possibility for unreported bias. I emailed Caio Machado, who responded to my introduction, but then decided not to respond to my question about the nature of his relationship to Liberation Theologist Enrique Dussel – pictured above receiving an award from Hugo Chavez from the magazine Humanidad en Red no 0– the magazine of the Red de Intelectuals y Artistas en Defensa de la Humanidad (REDH).

It’s possible that I’m incorrect in my assessment that the WhatsApp research that Oxford Internet Institute published is indeed valid – however given the omissions from their methodological description, their unwillingness to answer basic research design questions, to share data and that one of their researchers to answer a question related to a potential conflict of interest I’m highly suspicions of its legitimacy in light of all of the other issues related to Philip N Howard’s research. 

Case Study: Fake Research Pro Venezuela

Philip N. Howard’s research falsely claims that Venezuela’s propaganda activities are far less active and complex then they actually are. Here are, in short, the sections that they get wrong.

Organizational Form and Preference:

The number of citizens and influencers listed on OII’s report is listed as blank – as if no one was engaged in propaganda on behalf of the Venezuelan government. However ABC International has published reports about citizens receiving money for citizen engagements on social media and it’s well known that Danny Glover, Oliver Stone and Roger Waters – and others – have received all gifts and payment for engaging in propaganda on Venezuela’s behalf.

Messaging and Valence:

TeleSUR’s official page shares memes which encourage violence against fascists (a substitute for American politicians, law enforcement, and those whose policies don’t align with Venezuela’s goals). A variety of Jewish groups have published about TeleSUR’s antisemitism and that of their contractors while Venezuela’s other government’s other pages share content meant to appeal to anti-Semites, or that present false, politically polarizing quotes from politicians, and deepfake nudes and images meant to drive hatred towards police.

Communication Strategies:

The OII reports that Venezuela isn’t using mass reporting to take down undesirable content. I provided them with a case study wherein that happened to me for my publications on these topics.

The OII report states that Venezuela isn’t using data driven strategies, however even if one hasn’t engaged in the research or collected data from interviews as UPB has – it’s an on its face absurd proposition that a media network with, which OII admits, multiple centers of activity and its own news network wouldn’t use data to monitor and manage their efforts.

Harassment and Threats of Violence:

While this is a category not included in Oxford’s report, thus something that I did not submit evidence of, had it been included I would have provided examples of digital harassment and threats of violence against me.

Philip N. Howard’s Political Testimony & Lax Ethica

Besides research with design flaws that renders its conclusions invalid, Philip N. Howard has also provided testimony to the British Crown and the United States Senate Intelligence Committee that had the effect of misdirecting politicians from multi-generational irregular, information warfare campaigns to focus exclusively on online activity equivalent with, more or less, to targeted spam campaigns.

Philip N. Howard’s False Research Attempts to Discredit the Brexit Results

In the article Brexit: Leave ‘very likely’ won EU referendum due to illegal overspending, says Oxford professor’s evidence to High Court Philip N. Howard is quoted therein saying:

“Given the scale of the online advertising achieved with the excess spending, combined with conservative estimates on voter modelling, I estimate that Vote Leave converted the voting intentions of over 800,000 voters in the final days of the campaign as a result of the overspend.”

This statement was extracted from a report that he presented to the High Court of Justice, Queens’s Bench Division titled: Impact of Unlawful Overspending on Digital Advertising by Vote Leave and BeLeave campaigns in the 2016 EU Referendum, which can be viewed by clicking the title.

A website called Order-Order published critical commentary on Philip N. Howard’s findings linked to two Twitter accounts of professionals in the field of statistics and data-journalism that debunked Howard’s testimony.

John Burn-Murdoch, a data-visualization journalist for The Financial Times has a Twitter thread on Philip N. Howard’s poor research methodology.

Anthony B. Masters of the Royal Statistical Society also has a Twitter thread on Philip N. Howard’s poor research methodology.

Their arguments against Philip N. Howard’s research findings are as follows:

  • The base is too high: the entire electorate was 46.5m.His basic argument is: 80m Facebook users saw the ads
  • 10% click-through rate is much higher than is typically found for Facebook display advertising. Wordstream (US)says less than 1% — that may be based on impressions, not users. Average conversion is 9.2%, but politics is not a standard industry.
  • Howard’s section on conversion says that 10% click through, 10% believe and “a further 10% of that number can then be expected to do something.” This step is merged or omitted in the calculation.
  • Finally, the citation given is Howard’s own bookNew Media Campaigns and the Managed Citizen says: “Banner ads on political topics generally had a 1 percent click-through rate”. This means that the citation contradicts the statement given in the Court submission.

In other words what Philip N. Howard submitted fundamentally flawed and invalid data to the politicians deciding legal issues related to Brexit.

Philip N. Howard Misleads and Misdirects the Senate Intelligence Committee

On August 1stof 2018, Philip N. Howard presented testimony to the Senate Intelligence Committee.

In his comments to the panel Philip N. Howard states that “The time for industry self-regulation has passed.” a position which echoes his 2014 editorials for the nationalization of Facebook.

At 1 hour, 19 minutes and 15 seconds into the hearing Senator Roy Blunt of Missouri asks Philip N. Howard “Of the other countries you’ve looked at who should we [the political body in charge of making decisions related to politics] be looking at after Russia that are likely impacting our [American] daily conversation.

Philip N. Howard responds: “Well in our research we look at Turkey, China, Hungary and Iran.”

This is a noteworthy in that it is a non-answer to the question – the way it’s framed Philip N. Howard is merely stating countries that the Oxford Internet Institute has investigated.

Senator Blunt, picking up on this, moves on to another interlocutor.

At 1 hour, 34 minutes and 28 seconds, Senator Joe Manchin again brings up the question asks Philip N Howard directly:

  • Which country poses the greatest threat to our democracy using social media platforms?
  • Which countries are making strides to do the same?

Philip N. Howard, again, does not answer the question. Instead he engages in another meandering digression before being Senator Joe Manchin gets him back on topic – at which point Philip N. Howard says – China has the greatest capacity. This, again, is not the question asked of him and, tellingly, despite having done all of this research at no point does he provide any explanation as to what makes one country more of a threat then another.

There are many potential reasons why Howard could have had such difficulty in answering a direct question, however the real reason was he wanted to waste the time of the Senators present and misdirect attention from the greater threat to American democracy – the 17 year long quantitative political programto develop a trans-national, socialist-oriented political party in the United States by Venezuela and Cuba in coordination with the Network of Intellectuals and Artists in Defense of Humanity (REDH) that help steer it’s development by acting as promoters, authorities and gatekeepers – the Network which Philip N. Howard is himself a part of – as well as their witting or unwitting assistants and financiers.

I’ll now explain first how the above-analyzed social science research findings are in fact anti-Truth, pro-Socialist propaganda and then demonstrate how Philip N. Howard’s career trajectory and academic writing demonstrates his communist political commitments and connections to REDH.

Oxford Internet Institute Research Mirrors Socialist Party Positions

The above graphic organizer shows a side-by-side comparison of research published by the Oxford Internet Institute with Philip N. Howard as the Primary Investigator and the political positions promoted by the Socialist Worker Party (U.K), the Democratic Socialists of America, the Party for Socialism and Liberation and the Revolutionary Communist Party (USA) and the Brazilian Workers Party (Brazil). Content analysis shows that both the Oxford Internet Institute under Philip N. Howard’s direction and the Socialist parties networked with Venezuela are promoting electoral invalidation of Brexit as well as the elections of Trump and Bolsonaro. I’ve already covered the latter two investigations, and will cover the issue of Brexit after the following two oversvations.

While in these particular articles here neither Oxford or the socialist parties explicitly reference each the other – it is interesting to note is that in the article Bot Use in the Presidential Election that the U.S. Marxist – Leninist Organization quotes Howard and the Oxford Internet Institute extensively.

Also worthy of note is that in the top right image which has the “Another Europe is Possible” banner that this has been a Socialist Worker organizing slogan since at least 2004, as evident from these Indymedia protest photos.

Given all this, and what will subsequentially be depicted, we can correct President Rodrigo Duterte’s claim that Oxford is for “stupid people”– with Oxford is for Cunning Crypto-Communist Professors.

Who Funds Philip N. Howard at Oxford?

Philip N. Howard’s funding comes from pro-Bolivarian Revolution sources.

The four institutional supporters for Oxford Internet Institute’s 2019 Inventory are the European Research Council, Hewlette Foundation, Luminate and the Adessium Foundation. Ascribing broad intentions to large funding councils can be highly problematic so I’ll focus on two facts that relate to the factual constellation developed herein.

Luminate is a subsection of the Pierre Omidyar Foundation, which also funds the strongly left-biased news-outlet The Intercept.  The founder of The Intercept, Glen Greenwald, has documented connections to Trevor Fitzgibbon – who Venezuela has used for Public Relations – since at least 2009 when both participated in developing the second edition of the Voices of a People’s History of the United States Project. Notably Zinn is listed as one of the strategy developers for the REDH project. Fitzgibbon – who did PR for Julian Assange before and after he was granted Ecuadorian citizenship by President Rafael Correa, one a reliable ally of the Bolivarian project – also helped Greenwald get his big break by doing PR for Edward Snowden and arranging his safe travels to Russia.

 Another project that the European Research Council funded is titled A Global Movement for Environmental Justice: The EJAtlas.

The ETJAtlas is large, searchable data base of environmental conflict. According to the authors, it is:

“informed, based on and co-designed together with global environmental justice organizations; many of which had been building their own repositories of knowledge on such ecological conflicts over the past 30 years in some cases. These include the Observatory of mining conflicts of Latin America (OCMAL), Oilwatch, World Rainforest Movement, FIOCRUZ and the Brazilian network of Environmental Justice; GAIA; and the Centro di Documentazione sui Conflitti Ambientali (CDCA), as well as other sourcewe can say that a further aim of the EJAtlas is to support and contribute to the cohesiveness and self-awareness of an emerging globalizing movement for environmental justice (Martinez-Alier et al. 2016). An exercise that falls under what the historian Vijay Prashad describes as a socialist writing project — one intended to produce a confident community of struggle and to empower opposition to the status quo through the sharing of narratives that highlight the agency of those struggling to create better worlds.”

The project itself is fascinating en toto, but in relation to discussion I want to focus solely on three things.

First is the project’s avowedly socialist orientation.

Second is the use of Manuel Castells as an orienting figure – the introductory sentence invokes his scholarship with the statement: “The environmental movement may be “the most comprehensive and influential movement of our time” (Castells 1997: 67), representing for the ‘post-industrial’ age what the workers’ movement was for the industrial period.”

And third that of the authors is Joan Martinez-Alier – a political ecologist who’s given many speeches for the Latin American Council of Social Sciences, blogged for Venezuela’s Chavista website Apporea, and wrote in his report The Environmentalism of the Poor submitted for readership by U.N. that “Eco-Zapatism was overdue in Mexico”. In an article featured on the website of Venezuelan state media outlet TeleSUR, Joan Martinez-Alier’s work forms the basis for numerous ecological movements and the claims made by Delcy Rodriguez, Vice President of Venezuela, that the United States must abide by the Paris Climate Agreement.

Given that Philip N. Howard has written a book on Manuel Castells, this is appropriate theme on which to begin development.

Philip N Howard’s Intellectual and Professional Trajectory
Engagement with The Zapatista Uprising

In Pax Technica Philip N. Howard describes in brief his journey to the heart of a Marxist insurgency.

“In 1995 I traveled to Chiapas, Mexico, to meet with the Zapatista insurgents. I wanted to learn about their motivations and their struggle, and to understand why they were having such an unusual impact on international politics.”

Why did he go there?

“My first investigations took me to Chiapas to meet with the Zapatistas and learn about their internet strategies in 1994.”

While he describes little about his Mexico experiences in Pax Technica, he later wrote an article with Thomas Homer-Dixon that is, in short, a justification of the Marxist revolutionary movement. He also gives an interpretation of the events there that are quite at odds with the wider literature on the Zapatistas. He says, again in Pax Technica, that:

“The stories of the Zapatistas and the Arab Spring are not about nationalist fervor inspiring political revolution. They are not about religious fundamentalism. These movements were not particularly Marxist, Maoist, or populist. They had leaders, but employed comparatively flat organizations of informal teams…”

This is an unusual claims as it is so at odds with the specialist literature on the subject. Reading The Communist Roots of Zapatismo and the Zapatista Uprisingby Christopher Gunderson ,The Zapatista “Social Netwar” in Mexicoby Rand, Zapatista: Reinventing Revolution in MexicobyLuis Lorenzano or Todd Wolfson’s From the Zapatistas to Indymediayou’d learn that“Zapatismo emerged dialectically, through a series of confrontations, and was/is a fluid response to material conditions of struggle in Mexico” which originated from a group of six urban openly Marxist revolutionaries, including the now famous spokesperson for the organization Subcomandante Marcos, whose real name is Rafael Sebastián Guillén Vicenteand who was a professor in the Sciences and Art for Design Department at UAM that praises Fidel Castroand that assigned his students a reading list that included Karl Marx, Louis Althusser, and Mao Tse-tung. You’d learn that in the 1980s he and his fellow cadre-members moved into the mountains of Chiapas to organize the local Mayan community with the goal of leading an armed uprising that would cause the country to rally to their side so they capture state power.

So why does Howard say that the Zapatistas are not Communists given all this and that the 23 de Enero community in Caracas – the neighborhood that George Ciccariello-Maher claims is the “most radical” –includes an EZLN flag in their movement of movements? Why does Howard make this claim when, as you can see on the bottom right, that Subcomandante Marcos uses Communist icons on flags when he gives public speeches?

I couldn’t say for sure, but all things considered I’d speculate it’s to create the perception of distance from these Marxist revolutionaries. Being an openly communist professor can lead one to increased vigilance being conferred upon their academic work in light of ethical Professional Codes of Ethics and Standards. After all – those who want to overturn all existent rules and laws to suit their whims and those of their comrades are likely to do so in their intellectual work as well. Because of this much of the organizing occurs through email lists – a la the Zapatistas, Social Forum, and IndyMedia – and partnership within the “network of networks” isn’t openly avowed but understood through reference to common symbols, ideas, and connection to other comrade professors.

Indymedia Centers

Emerging in part from the intermingling of myriad NGO activists and academics via encounters curated by the Zapatistas, the Independent Media Centers were born just before the Battle in Seattle. Conceived of as a combination between Alternative Press and vector of cyber-subversion antagonistic to the capitalist paradigm – police record attest to its success toward those ends.

Josh Wolf, a contributor to Indymedia, was jailed for 11 monthsfor refusing to turn over unedited video footage connected to an arson case. An Indymedia user was arrested for leaving a comment implying he was going harass a judge who’d just sent animal rights activists to jail after his personal information was posted on Indymedia. The German government shut down the Indymedia website and banned it as an extremist organization. Police in Bristol raided Indymedia and forced it to close down, as did the police in Greece for the Athens Indymedia.

According to Joshua D. Atkinson in Alternative Media and Politics of Resistance: A Communication Perspective this is not to be considered exceptional but the rule as:

“Past research has demonstrated that Indymedia.org, The Nation and a variety of zines sere as primary sources for information about resistance and social justice for Radical Participatory activities (e.g., Armstrong, 1982; Atkinson & Dougherty, 2006; Atton 2002a; 20040 Downing 2003a; 2003b). These are not the only alternative media titles used by Radical Participatory activists as other titles, like the anarchist news website Inforshop.org, have emerged from additional research projects (e.g., Atton, 2003).”

In New Media Campaigns and the Managed Citizen Philip N. Howard describes his visiting the headquarters of these organizations more than once:

“Near the convention, Francie is getting ready at the Independent Media Center (IMC). She is twenty-three, petite, and dressed in black and green army fatigues bought at a secondhand store. Francie is angry at her country, disgusted by its blind faith in an environmentally unsustainable economy. Francie believes in a carbon tax that would discourage polluters and create a revenue stream for research into green technologies. She doesn’t believe that the mainstream media do justice to environmental issues, so she has volunteered with the IMC…”

While there is nothing wrong with this by itself, put into the evidentiary constellation that this article is develops this becomes another indicator – weak by itself but more significant in light of everything else – of Philip N. Howard’s in-group membership with a covert, coordinated, subversive network.

The Thought of the Marxist Manuel Castells

In the book Castells and the Media: Theory and Media Philip N. Howard claims that the person in the title, Manuel Castells is “one of the most important contemporary social scientists.” More than that, per Howard’s opening dedication, he is “inspiring”.

As a public intellectual with almost 50 years of teaching and publishing behind him so there is a lot one could say about his work.

For our purposes, I only have two issues to focus on:

  • The general orientation of Castells’ research
  • The networks in which Castells operates

The first point is quickly answered: Castells’ is a Marxist. In “Networks in Manuel Castells’ Theory of the Network SocietyAri-Veikko Anttiroiko argues that “‘network’ in Castells’ social theory is not an analytical concept but rather a powerful metaphor that served to capture his idea of the new social morphology of late capitalism.” His career began as a Marxist analyst of the city and as technology developed, he incorporated these new forms of discourse into his work to give the appearance of novelty to his analysis.

As for the networks in which Manuel Castells engages with, he is a political theorist associated with the Sao Paulo Forum, the Association for Progressive Communications and CLACSO– a social sciences organization whose conferences have previously been promoted and covered by Venezuela’s state media. He’s also published open letters via Cuba’s Network in Defense of Humanity.

Taking online graduate level courses with Manuel Castells and a number of other leftist activists and intellectuals such as Juan Carlos Monedero and Pablo Iglesias – two of the founders of Spain’s PODEMOS Party that received over 8.8 million Euros in funding from the governments of Hugo Chavez and Nicholas Maduro Moros for consulting and production work – is possible via CLACSO’s online platform.

Their co-appearances at CLACSO events isn’t the only time that the Director of TeleSUR, Patricia Villegas, and Manuel Castells have had the opportunity to network. They both also gave presentations at the X Encuentro Internacional de Investigadores y Estudiosos de la Información y la Comunicación (ICOM) in Havana, Cuba 2019.

Castells has also been featured in El Telegrafo, an Ecuadorian newspaper, and cited by its director Orlando Perez, who transitioned to becoming an executive at TeleSUR English following the discovery of irregularities during his tenure at El Telegrafo and the departure of his patron, ex-President Rafael Correa due to anti-corruption legal proceedings.

The Orinoco Tribute, a media outlet managed by the former consul general of the Bolivarian Republic of Venezuela in Chicago, Jesus Rodriguez-Espinoza, – the same Jesus Rodriguez-Espinoza who accepted pledges from members of the Freedom Road Socialist Organization to support the Bolivarian Revolution– also publishes calls to study the work of Manuel Castells.

Given all this and Manuel Castells long and intimate association with Uruguay’s FrenteAmplista network, it helps explain why this country was not included within Oxford Internet Institute’s 2019 Global Disinformation Inventory.

The Center for Communication and Civic Engagement & Lance Bennett

According to Philip N. Howard’s CV, when he was an Assistant Professor in the Department of Communication doing research on electoral issuesat the University of Washington the directorof the Center for Communication and Civic Engagement, Lance Bennet, was also on the planning committee for the Northwest Social Forum. The video promoting it, from which the above screenshot comes, is quaint given its low production quality and deceptive given the fact that shorty before the launch of this Movement of Movements in Caracas Hugo Chavez announced at the World Forum of Intellectuals and Artiststhat he would be using the billions of dollars of the oil revenues the governments received to fund a “network of networks”.

Reading the book that Philip N. Howard edited with Andrew Chadwick, Routledge Handbook of Internet Politics,you would learn that had the event not been cancelled it would have been the second Social Forum in the U.S. following the Boston Social Forum– an event extensively promoted by the Venezuela Information Officeand attended, like the aforementioned Caracas event, by Danny Glover.

While it’s interesting to note that when Lance Bennett arrived at Yalefor graduate school it was at a time when Black Panther Party activism was high and talk of general strike was in the air – this says nothing per se about the nature of Bennet’s academics. It is, however, noteworthy to point out that Omar González, Cuba’s former Vice-Minister of Culture, is someone that thinks Lance Bennet’s works is important and a useful theoretical basis for Communist Party praxis.

George Soros’s Central European University

From 2013-2015 Philip N. Howard was the founding Professor for the School of Public Policy and the Director of the Center for Media, Data and Society at Central European University – which was founded and funded by George Soros. George Soros though that this particular department was so worthy that he even recorded a minute long promotional video for the Public Policy Department. My evocation of Soros here is meant to highlight only three points:

The importance of the first one will become apparent in the section below titled “Philip N. Howard’s Covert Support of Arab and US Communist Insurrections”. The importance of the second point will be made apparent by referencing the header images – many of which include the raised fist symbols used by those associated with the Bolivarian Socialist Movement. The third point will come into play in light of the section “Philip N. Howard supports Black Lives Matter-related Intellectuals”.

Discourse with Rebecca MacKinnon

One of the “campaigners for internet freedom” that Philip N. Howard highlights and praises in Pax Technica is Rebecca MacKinnon.

A member and director of a number of advocacy groups that educate, agitate and organize under the banner of human rights not codified in U.S. or international law. The U.S. State Department recently formed an Unalienable Rights Commission to act as a counterbalance to the explosive growth of such organizations, and a cursory review of Rebecca MacKinnon’s presentations demonstrate that she is exemplary of those activists that mobilizes misunderstandings of law and human rights discourse for dubious or malignant purposes.

As is evidenced from the above, Rebecca MacKinnon’s book Consent of the Networked: The Worldwide Struggle for Internet Freedomuses classic socialist iconography. Lest I be deemed guilty of merely judging a book by its cover, it is also worth pointing out that part five of the book is titled “What is to be Done?” – an allusion to the Vladimir Illich Lenin book with the same title.

That Rebecca MacKinnon makes this obvious reference to Lenin is interesting for a number of  reasons. For the purposes of brevity I’ll limit my comments to calling attention to the fact that in What is to be Done? Lenin diverges from the classical Marxian conception of seizure of state power and describes the need for a covert, professional revolutionary cadre – a Vanguard Party.

In his article Lenin and the Concept of the Professional Revolutionary, published in the History of Political Thought, Robert Mayer explicates that while this vanguard party – what Gramsci referred to as the Modern Prince – is Lenin’s main concerns there is another intermediary social group between the Party and the Masses. These are the activists, artists, and intellectuals that are covertly connected to or loosely associated with the party and are either consciously subservient or are generally deferential to it – a Network.

In short, to put Lenin’s dual-power conception of politics in general terms – the Vanguard Party is the Revolutionary-Government-In-Waiting, and the Network is their steering committee.

Within this context, this makes a several facts pulled from Rebecca MacKinnon’s academic/activist biography take on an interesting light – and thus Philip N. Howard’s citation of her.

(1) The World Summit on the Information Society (WSIS) summit that Philip N. Howard describes Rebecca MacKinnon as speaking refers to in the above quote was targeted for institutional capture by the European Social Forum, the European partner of the Sao Paulo Forum – an organization founded by Cuba’s Communist Party and Brazil’s Workers party and now supported by the United Socialist Party of Venezuela.

While there is no online list of members or supporters of the now defunct European Social Forum, content analysis of Rebecca MacKinnon’s messaging, her being on the Advisory Board of organizations whose members include those associated with the Sao Paulo Forums and coverage of her book in journals about leftist social movements – provides provisional proof that she was a part of this cadre.

(2) Rebecca MacKinnon worked at CNN at the same time as Andres Izarra – Venezuela’s former Minister of Communication and Information and the ex-president of TeleSUR. Shortly after Izarra left, so too did she. I don’t know if the two of them ever did interact

(3) Rebecca MacKinnon gave a presentation at RightsCon in Manila in 2015 and FitzGibbon Media, Venezuela’s public relations firm, was also present there. 

(4) Rebecca MacKinnon’s partner in the founding of Global Voices– a journalistic organization that would later play a minor role, along with Julian Assange of Wikileaks, in the Arab Spring – was Ethan Zuckerman and he too had a run in with Andres Izarra. In a blog post entitled Opening Sessions at the Aljazeera Forum, Ethan Zuckerman describes attending an Al Jazeera conference where Izarra was on a panel.

(5) Ethan Zuckerman – who is known to Granma, the newspaper of the Cuban Communist Party – has written a number of quantitative media analysis articles about the Ferguson, Missouri political unrest that was promoted by George Soros, Venezuela’s media contractorsRebel Diaz, Venezuela’s public relations firm FitzGibbon Media, Venezuela’s political allies Code Pink – as evidenced via the documentary Whose Streets?and Danny Glover. In addition to writings on his blog, in a chapter of the book Civic Media: Technology, Design, Practice Ethan Zuckerman also describes how Global Voices helped promote the activity there in the media.

 Marek Toszynski

Another internet activist/organization that Philip N. Howard believes deserving of praise is Marek Toszynski, one of the founders of Tactical Tech.

In addition to being a member of this democracy advocacy NGO, Marek is also a writer for the New Internationalist– a “new left” periodical that describes advocating for Venezuela in their 2019 annual reportand, as is evident from the above magazine cover, uses variations of the Sao Paulo Forum slogan “Another World is Possible” as an orientation point for their editorial vision.

I’ll forego similar analysis as I did to the above, but as I believe it’s noteworthy I will say that it’s deserving of being pointed out that the second co-founder of Tactical Tech is an artist whose recent exhibition could perhaps be described as AgitProp art against Facebook, Stephanie Hankey, and that she is also an academic working at Oxford’s Internet Institute.

What Does Philip N. Howard Promote?

Philip N. Howard supports the de-platforming of Steve Bannon.

While looking through Philip N. Howard’s Twitter account I noticed that he expressed disdain at Steve Bannon addressing the Oxford Union.

More than expressing some kind of rationale with his positions, he breaks form from the polite Canadian stereotype and says that it’s a mistake to allow him on the “platform” as he “chokes public discourse” – and is a “poison.”

This is noteworthy for two reasons.

Rather than saying that Steve Bannon “shouldn’t be allowed an audience” or “a soap box to stand on” or some other variation of the phrases – Philip N. Howard chooses a term that has been widely adopted by Socialist parties and Antifa activists: platform.

While Philip N. Howard doesn’t out and out call Steve Bannon a fascist – his message is the same as that worded by the Communist Party of Canada and the Hugo Chavez Front of Toronto – the city and country where Philip N. Howard received his Bachelor of Arts degree.

Avowed socialist Owen Jones tweeted a similar stance against Bannon and the Canary, a recently founded “social justice” oriented UK news outlet that has published an article about how sad it is that propaganda funded by Venezuela was banned from YouTube and that also promotes Philip N. Howard’s research, also published an article claiming that Bannon is a fascist and thus does not deserve the right to speak at Oxford.

None of this reflects directly upon Philip N. Howard’s scholarship – but the affinities are worthy of being pointed out. 

Philip N. Howard’s Covert Support of Arab and US Communist Insurrections

In the article A State Department 2.0 Response to the Arab Spring Philip N. Howard capitalized on the media’s general interest and specialist ignorance to advocate for State Department policy positions that sought to create sympathies for those engaged in the effort to overthrow the Egyptian government. In his own words he writes:

“We need the State Department to do some 21st century thinking.  Egypt’s elites are defecting, and taking their networks of support away from Mubarak. The protests in Egypt are about social networks that are beyond Mubarak’s reach.  Don’t worry about who is next, worry about which networks need recognition, support, and encouragement. The State Department 2.0 strategy needs to bet on networks of civil society participants in Tunis, Cairo, and the other regional capitals now in crisis. Think in terms of networks, not individual power brokers and traditional political actors. Even the Muslim Brotherhood may be best thought of as a network organization…”

Putting aside the issues of the demands and their legitimacy given by the aggrieved it’s worth point out that nowhere within this article does Howard identify any of the actual actors involved. “The network” as an ideal is all that’s referred to and only by reading other sources, such as the article The Revolutionary Socialists in Post-‘Arab Spring’ Egypt does one learn that many of those initial calls put out to engage in protest were those of Socialists. Ahmed Salah, the “mastermind of the revolution” and the son of a Socialist Labor Party activist is not mentioned at all.

There is, similarly no mention of the role of Julian Assange. Considering groups such as Amnesty International hailed as the catalyst for the Arab Spring, that there is no mention of the fact that it was the World Social Forum that helped propel Assange from lone hacker to networked political actor and that Howard praises Assange’s work in Pax Technica this seems curious.

There’s another compelling omission in Philip N. Howard’s book Democracy’s Fourth Wave?: Digital Media and the Arab Spring – the lack of relationship between poets and revolutionaries.

In Chapter 7 of Translating Egypt’s Revolution: The Soul of Tahirwe learn that performance poets played a significant role in promoting the initial events in Egypt. A cursory look into Egypt’s history shows that this is not the first time such artists played a would be significant political role. In The Artist as ProphetChris Hedges open his article on the importance of emotions as a guiding force in politics with a quote from an Egyptian general on how they managed to surprised the Israelis in the 1973 war he states: “Instead of reading the intelligence reports, you should have read our poets.” Were such a connection unique to Egypt then this might be plausibly explained plausibly as a mere oversight – but it’s less so when one considers the actors that have inspired and the activities promoted by Bolivarian Revolutionary Actors.

José Martí is Cuban poet long praised by Castro and other leftists as a guiding light for their cause. Olga Luzardo was a poet and militant that helped found the Communist Party in Venezuela. Subcomandante Marcos, the leader of the EZLN who now goes by the name Subcomandante Galeano – someone that Howard would presumably be familiar with having engaged in field research in Chiapas, is a poetas well. Eduardo Galeano, one of the main inspirations and co-conspirators of Bolivarian Movement, is also a poet. So too is Jesus Santrich, one of the current leaders of the FARC. Alice Lovelace, the National Lead Organizer for the United States Social Forum in Atlanta – an event which was, as I go into more detail below, promoted by Venezuelan intelligence – was a poet. Public poetry readings, rap performances and artistic workshop demonstrations and marches all have been hallmarks of the carnivalesque atmosphere encouraged by the Social Forums and all of which are connected to an inter-generational effort at achieving fundamental political change. With this focus on granular details and a comparative context in mind a concrete political strategy comes into view – activities to mobilize emotionally charged, highly expressive individuals into what Manuel Castells calls Networks of Outrage and Hope and what Gustav LeBon calls The Crowd. Strange, then, that this is elided from Howard’s account.

The limited network ethnographic fields which Philip N. Howard’s selects isn’t limited to this singular article. In Pax Technica he similarly described Occupy Wall Street as a “spontaneous” network movement. There Howard states the following:

“People sometimes say that the internet doesn’t “cause” democracy. Or “it’s the people, not the mobile phones.” But people and their technology are often impossible to separate. Try to imagine your life without your mobile phone or your internet connection. Or try to tell the story of the Arab Spring, the Occupy movement, or any recent international social movement without mentioning digital media. You’ll find yourself with an incomplete story. Many of the people involved with these movements are eager to talk about the devices and media that are their tools of resistance. Their technology and their story go together.”

despite the fact the extensive documentary evidence shows that this was not some “spontaneous” uprising but a political spectacle that was long planned by groups connected to Venezuela such as the Workers World Party, the Revolutionary Communist Party, the Party for Socialism and Liberation and Crimethinc. (documented here and here) as well as poets and performance artists.

His lack of apparent awareness on the matter is all the more unusual considering that Natalia Buier and Tamara Steger were engaged in research about Occupy Wall Street at Central European University at the same time that Philip N. Howard was there.

Had Philip N. Howard spoken to professor Béla Greskovits during his time at Central European University about Janina Alexandra Mangold’s Master’s thesis The Transnational Diffusion of the Occupy Movement to Germanyor to someone that remembered when two of the people claiming to be co-founders of Occupy Wall Street, Noah Fischer and Maria Byckgave a presentation at Central European University he would have realized this. Had he reached out to Zoltán Glück

who’s a Central European University graduate now working on a PhD in Anthropology with a focus on Critical Theory that’s published a number of articles on Occupy Wall Street it would be in his network ethnography. Were Philip N. Howard have taken the time to talk to Daniel Bochsler, a Central European University professor and attendee of a three day workshop entitled The Transnational Dimension of Protest: From the Arab Spring to Occupy Wall Street organized by World Social Forum scholar and organizer Donatella della Porta could have disabused Howard of this notion. Anil Duman, a Central European University Econmics professor and supporter of Occupy the Economy could have done the same. Julia Buxton, a Central European University professor in the Political Sciences department that is an longtime expert on Venezuela – as evidenced by her giving presentations at Socialist Worker events over a decade ago and being published in the New Left Review, which is now based in Quito, Ecuador a few short blocks from the English language offices of Venezuela’s state media outlet TeleSUR – would have told Philip N. Howard the same. Austin Choi-Fitzpatrick, a founding member of the Action Network– a digital tool for organizing people online that’s published research on the processes involved in World Social Forum and that worked under Philip N Howard at the Central European University could have told him that “It’s not just about the technology, it’s about the IRL human networks”.

Philip N. Howard and Black Lives Matter Supporters

That Philip N. Howard would retweet Charlton McIlwain’s new book Black Software – which covers the Black Lives Matter (BLM) movement means nothing by itself. Investigation of aspects of the BLM project is entirely valid, and yet in the greater context of the theoretical underpinnings of Howard’s research projects and the networks he is connected to this is highly significant.

The connections between Cuban-Venezuelan intelligence and the founding of Black Lives Matters is under-reported in the academic and popular press, but begins in earnest following Hurricane Katrina. Sekou M. Franklin provides an account of Venezuela’s financial assistance via the Common Grounds Collective and People’s Hurricane Relief Fund in the chapter African Americans, Transnational Contention, and Cross National Politics in the United States and Venezuela. The condensed version of the story is that oil money started to flow to current and former Black Panther Party members such as Malcolm Suber and Malik Rahim to engage in community assistance projects and so too did black-transnational political agitators from Venezueula such as Jesus “Chucho” Garcia– who has since had his diplomatic credentials revoked. The rationale why was never publicized, but it’s likely because of his advocacy on behalf of the Pan-Africanist movement.

Alicia Garza and Opal Tometti, two of the founders of Black Lives Matter, attended the United States Social Forum in 2007 – the U.S. iteration of Sao Paulo Forum. In the ChapterFrankfurt versus Atlantain Political Translation: How Social Movement Democracies Survivethe author Nicole Doerr describes the United States Social Forum as follows: The Coalition now included job centers as well as student organizations, labor, immigrant organizations, North American indigenous people and black and Latino church-based organizations, many of them lead by women and female or queer-identified leaders.” A few years after this, in 2011 Garza, became the Chairperson of the Right to the City Steering Committee – another Social Forum front and a few years after this Tometti would personally receive an award from Nicholas Maduro. Also worth noting is that recently Philip N. Howard’s director at the CCCE, Lance Bennet, gave a talk with Opal Tometion using technology to mobilize people for protests.

Philip N. Howard: Academic Socialist Steganographist

Steganography is the practice of concealing messages or other content within another message or image in order to avoid detection. In addition to looking at the subjects that interest Philip N. Howard, the research designs errors that he makes in his investigations, the impact they have on public discourse and governmental debate, the activists he chooses not to include and exclude in his ethnographic analysis, his professional associations, the activists he promotes and the people that promote him – one can find evidence of Socialist bias within the theoretical framework he employs.

While one could argue that the unnecessary-to-the-discussion-at-hand citation of Frankfurt School’s Marxists like Adorno and Horkheimer, as Philip N Howard does in Digitizing the Social Contract: Producing American Political Culture in the Age of New Media, constitutes a tell as to his politico-epistemological orientation– this is insufficient evidence. So too is his unnecessary-to-the-discussion-at-hand citation of publications printed by the radical Zed Bookscollective and his familiarity with Marx’s personal history that he cites in his book New Media Campaigns and the Managed Citizen.

That Philip N. Howard cites Why Not Create a Shadow Government?by Michael Albert – who’s listed on TeleSUR’s websiteas a staff member – in the same article is more notable by itself, all the more so as in Howard’s in-text citation of him and in his listing of him in the References section the author is incorrectly attributed to “Alpert, M” rather than “Albert, Michael”. Without diverting at length into Freudian theories of repression and self-preservation, it’s worth wondering if this is an unconscious disassociation on the part of Howard as a means of intellectual self-preservation. Why is that? I’ll proffer two reasons why.

First is that it obfuscates the schools of thought informing Howard’s article. The first seven pages of results of Howard’s citation on Google does not detect the original article. Going to the website of the magazine listed as the publisher it is discoverable – that is if you know the correct name of the author.

Once someone goes to the ZCommunications landing page, as one needs to do to find the original source, you will learn that their slogan isThe Spirit of Resistance Lives.

ZMagazine, from whence the Albert article came is a “radical print and online periodical”. The Rebels with a Causemovie poster portion of this section’s header image was chosen because the film features Todd Gitlin, who has reviewed Howard’s book New Media Campaigns and the Managed Citizen– a fact reflected on his CV.

ZVideo, according to their write up, is a way to distribute this particular school of thought’s talks and classes that has “proven more accessible.” The speakers and subjects included in their library  are “Noam Chomsky’s [who has a] humor[ous] and casual speaking style, the dynamism of Hugo Chavez, and the atmosphere of an evening session at the World Social Forum in Mumbai, India.”

ZNet is a “community of people committed to social change” and includes people such as Boaventura de Sousa Santos– one of the founders of the World Social Forum; Medea Benjamin– whose advocacy on behalf of Venezuela has granted her audience with Hugo Chavez and Nicolas Maduro and who used to work with Deborah James, the former director of the Venezuela Information Office, someone interviewed as part of Lance Bennett’s Global Citizen Project; Greg Wilpert– who founder of VenezuelaAnalysis and the first Executive Director of TeleSUR English; Mark Weisbrot– who works at Center for Economic and Policy Research; Bill Fletcher– who had a TV show on TeleSUR English called Global African, and many more.

Marisol Sandoval, a Lecturer at the Department of Culture and Creative Industries at City University London writing in A Critical Contribution to the Foundations of Alternative Media Studies – posted in the City, University of London Institutional Repository –  agrees with me. She claims that there is “another type of alternative media that aims at establishing a counter-public sphere” and that “Examples for such a type of media are The New Internationalist, Z Magazine, Rethinking Marxism, Historical Materialism or Monthly Review.”

Secondly rationale is that it obfuscates the specific context which informs Philip N. Howard’s closing contentions. In the article Michael Albert is referred to as a “political hypermedia consultant” and not as the main proponent of Participatory Economics, or ParEcon, which is a form of anarchist economics. In the context of Albert’s larger body of work, he’s not just advocating some political marketing ploy but is using new language to describe V.I. Lenin’s Dual Power political structure – something much debated but groups such as the International Marxist Tendency.

Since I can imagine a reader protesting that this analysis in combination with the above network ethnography is not sufficient evidence to make my case there is, thankfully more that verifies my hypothesis.

In the article Automation, Big Data, and Politics: A Research Review, published in IJOC, Philip N. Howard argues that:

“the time is right to match dedication to critical theoryof algorithmic communication with a dedication to empirical research through audit studies, network ethnography, and investigation of the political economy of algorithmic production.”

How does he know this?

“We review[ed] the great variety of critical scholarship on algorithms, automation, and big data in areas of contemporary life…”

Philip N. Howard then expands on the lines of research he describes in that article in Creativity and Critique: Gap Analysis of Support for Critical Research on Big Data.

Anyone familiar with the Frankfurt School on reading the words I’ve bolded and put in italics and that Philip N. Howard includes in the keywords for the article should immediately pick up on what they reference. For those not familiar with compound components of critical theory one could download the Oxford Dictionary of Critical Theory, which has entries that explain “even the most complex of theoretical discourses, such as Marxism.” To keep things succinct, however, I’ll provide a brief explanation as it relates just to this case.

In Introduction: Critical Scholarship, Practice and Education by Harald Bauder and Salvatore Engel Di Mauro states that:

“The term “critical” refers to a tradition of critical theory. An often cited representative of this tradition is the so-­called Frankfurt School. This “school” consisted of a network of researchers affiliated with the Institute for Social Research in Frankfurt, Germany, which operated from 1923 to 1933, moved to New York during the Nazi regime, but reopened in Frankfurt in 1950. Although the label “Frankfurt School” is problematic and inexact, it does permit associating some basic ideas with the notion of “critical”.

And on page 4 the authors continue that: “Another important figure in critical scholarship is Karl Marx”

In the article The Problem with “Critical” Studies by Joseph Heath – professor of philosophy at the University of Toronto – Heath describes reading a number of books for a prize and noticing a number of “profoundly cringe-inducing” patterns in them:

“the ambition for “critical social science” was to have, not just social science guided by normative commitments, but for those normative commitments to be made explicit. The biggest problem with the books I read is that they almost invariably failed on the second half of this.”

Indeed, this is the assessment Jolene Zepcevski’s puts forward in her review of Philip N. Howard – Why ‘Pax Technica’ Is A Good Book with a Bad Argument.

Despite the opening claim that the book will analyze ICT policy, all it really does is advance a number of normative commitments that are socialist in nature. This is evident not only in his choice of framing the evolution of options which net technologies present to social groups – evolving from Mancur Olson’s Logic of Collective Action, to Lance Bennett’s Logic of Collective Action– but also in the wider, transnational framework which he uses.

After Philip N. Howard provides a bafflegab definition for the term Pax Technica  he states on page 147 that in this new arrangement of world power:

“In the pax technica, the core and the periphery are not territorially assigned but socially and technologically constructed.”

The concept of core and periphery emerges from World Systems Research and is strongly associated with the theorist who popularized it within the social sciences, the Marxist Immanuel Wallerstein.

Explaining all of the components of the theory and the reasons why this variant of dependency theory didn’t get the goods it’s promoters promised developing countries would fill a series of books – so here I’ll just point out that those who abided by its principles often frequently sought to apply solutions for problems based on pre-existing political commitments and thereby worsened them. There’s numerous examples of this in Pax Technica, but as it would require extensive exegesis I’ll instead point to Philip N Howard’s Political Communication, Computational Propaganda, and Autonomous Agents. There he makes an appeal to human rights that aren’t codified into law and writes that:

“social media sites and proprietary device networks can change their terms of service at any time without informing visitors, turning any speech or activity on the site into a criminal act. For Sandvig and others, this is a violation of the Fifth Amendment right to due process, which requires proper notice to the public of what constitutes criminal behavior”.

For anyone that has a basic understanding of law, there is a significant difference between the Terms of Service on a private social media platform and state and federal legal regulations.

No matter what one may say about the growth of the importance of social media in the general population’s consumption of news media – a person being kicked off Twitter or Instagram for violation of Terms of Service is worlds apart from government agents swarming a facility used to print material, confiscating the equipment and preventing them from publishing and circulating materials. These types of appeals to abstract rights abound in Philip N. Howard and helps explain why he has advocated for the Nationalization of Facebook on Slate – a policy position which is also promoted by the Communists Paul Mason and Lewis Bassett.

Philip N. Howard – Liberation Technologist

Lest this seem like an distorted reading of the Philip N. Howard’s theoretical framework it’s worth pointing out that he closes Pax Technicain praise of what he calls liberation technologies.

Whereas Liberation Theology is the importation and use of Marxist concepts absent from Christian doctrinefor the pursuit of geopolitical goals, liberation technology is a term widely used within the crypto-anarchistand cyber-communistcommunities to describe how the newest iteration of Information and Communication Technology (ICT) will be used in order to bring about the revolution.

While the modern conception is typically rooted in the speculated capabilities of present, Hungarian Marxist philosopher and People’s Commissar for Education and Culture Georg Lukas anticipated this in his notion of totality, as described in History and Class Consciousness.

Advocates of Liberation Theology and Liberation Technology share a similar worldview. Whereas the former sees the eschaton– the end of history – as emerging from mass conversion to “true” Christianity, at the end of an AK-47 if need be, the latter sees it as emerging from “true” non-mediated social relations, at the expense of breaking all existent laws, customs and social mores if need be.

For Liberation Theologists Colombia’s National Liberation Army, the ELN, is representative of such an ideologically-aligned organization. Their engagement in kidnapping, drug-trafficking, assassinations etc. is excusable as it is “God’s work”.

For Liberation Technologists Wikileaks and Anonymous, aka organizations engaged in terrorism-related activities are representative of such an ideologically-aligned organization. Indeed the Tor network, developed by Liberation Technologist Roger Dingledine, has helped facilitate drug trafficking and the financing of terrorism.

While the merits of apps such as Tsunamic Democraticand other platforms aimed at uniting disparate interest groups for political protest and organization are open for debate – it is certainly clear by the above analysis of Philip N. Howard’s published academic work and the existent case-history of “liberation technology” that advocacy of such positions using such terms is akin to how “Hands Off Venezuela” is equivalent to “Viva Socialism!”.

Philip N Howard – Audience Reception

Lest my interpretation of Philip N. Howard’s oeuvre seem to improperly highlight certain elements of his work, I’ve decided to highlight below some of how other researchers interpret his work.

The following section exhibits how Philip N. Howard’s work has been interpreted by other experts in the field and provides network ethnographic descriptions of the individuals and organizations that have cited his work which help prove, along with all of the other evidence, Philip N. Howard’s membership in the REDH network.

Philip N Howard – Perceived as akin to Paulo Freire, Marxist Pedagogue

In Radical Pockets of Digital Democracy: Deleuzian Grandeur? Luke J. Heemsbergena lecturer at Deakin University and writer of WikiLeaks apologiaclaims that Philip N. Howard’s four year Network Ethnography match the views of Paulo Freire.

Paulo Freire, along with Marx, Gramsci and General Zamora, are some of the most revered thought-leaders amongst those advocating 21stcentury socialism.

While not reflective of Philip N. Howard per se, it is nevertheless interesting to note that Dr. John Asimakopoulos, a sociology professor at CUNY-Bronx who identifies as an organic intellectual– an allusion to the Marxist Antonio Gramsci – decided to advertise his book The Next Great Transformation from Kleptocracy Capitalism to Libertarian Socialism through Counter Ideology, Societal Education, & Direct Action, which has a forward by Marxist educator Peter McLaren, in the brochure for the APSA Politics After the Digital Revolution Conference– an event at which  Philip N. Howard gave a presentation.

Other academics, that have wrote long format reviews of Howard, Evgeny Morozov, for instance, identifies as a Marxist and Todd Gitlin has been named as a member of the Democratic Socialists of America.

Robinson Salazar Péreza, a Mexican Critical Theorist and Social Scientist, also promotes Howard, in the context of documents which explicitly references the Network of Intellectuals in Defense of Humanity (REDH).

 Philip N. Howard – Perceived as akin to Cristian Fuchs, Marxist Cultural Theorist

Another person with whom Philip N. Howard is frequently associated with is Christian Fuchs.

The author of books such as Social Media: A Critical Guideand Reading Marx in the Age of Digital Capitalism– after signing up to his Triple C (Communication, Capitalism, Critique) email list I learned that the email server that he uses is the same one used by the ELN (as you can see from the above) and the FARC (as you can tell by looking here).

In Data Journalism and the Regeneration of News by Alfred Hermida and Mary Lynn Young, part of a series called Disruptions put out by Routledge press, the authors similar cite Philip N Howard in the same context as Christian Fuchs.

In Rethinking Ideology in the Age of Global Discontent: Bridging Divides a book edited by by Barrie AxfordDidem Buhari-GulmezSeckin Baris Gulmez Fuchs and Howard are again placed side by side – not in contrast, but complementarily.

In Antisocial Media: How Facebook Disconnects Us and Undermines Democracy Siva Vaidhyanathan, who also authored the book The Anarchist in the Library: How the Clash Between Freedom and Control Is Hacking the Real World and Crashing the System similarly seems to think that the avowed Marxist Fuchs and Philip N. Howard have similar views.

Philip N. Howard’s Research Promoted by Methods and Organizations Connected to Cuban-Venezuelan Intelligence Agencies

As Wikipedia is an interesting place to determine an author’s reception I decided to search there for instances of Philip N. Howard’s name.

The first citation I examined was made by a Wikipedia user without a page named CWDrea whose only contributions was three edits made to the Arab Spring page.

The content of those edits were to make the claim that the Arab Spring protests were completely non-violent – an empirically false claim attested to by numerous journalists, activists and government authorities present at the events – as well as to include a citation of Philip N. Howard’s article ICT’s and the Fuzzy Causes of the Arab Spring.

A second citation of Philip N. Howard came from a student in a 2016 Columbia University Course called Order and Violence taught by Christopher Blattman.

When I looked at Blattman’s Curriculum Vitae, I learned that he’s a research fellow at the Center for Economic Policy and Research.

Joseph Stiglitz, Mark Weisbrot and Danny Glover are all members of the CEPR advisory board and all have close connections with the Venezuelan government.

The CEPR has published a number of research articles that are, according to Clifton Ross and the numerous others subject area experts he cites in his article Pandering to the Imperial Left: The New CEPR Report “crude piece[s] of gringo-chavista whitewashing aimed at gaining sympathy for “the cause”.

This isn’t surprising when one looks at the people involved in the organization. One of its board members is “Danny Glover, who received over 18 million dollars from Hugo Chavez. Joseph Stiglitz, a long-time Bolivarian Revolution defender and advocate of state-centric economic behavior is also a board member of the Center for Economic Policy and Research, as is Venezuela crisis denier Mark Weisbrot and Warden Bellow, a founding member and promoter of the Sao Paulo Forum. Mark Levinson, who is a lifelong advocate of Democratic Socialism is also on the board as is Deborah James – the former executive director of the Venezuela Information Office and a participant in Lance Bennett’s Global Voices project. Eileen Applebaum, who’s cited by TeleSUR here, is also a member.

After Ecuador’s president Rafael Correa fled the country for definitive charges of corruption and the rumors that Venezuela’s ally the FARC-EP had helped fund his campaign, three of the executive leaders of Center for Economic Policy and Research were among the signatories of a public warning about the dangers of Ecuador “returning to neoliberalism”.

Who thought fit to share this public declaration of anti-neoliberalism? Cuba’s Network of Intellectuals, Artists and Social Movements in Defense of Humanity.

This, notably, wasn’t the only Sao Paulo Forum associated intellectual to promote Philip N. Howard.

David Evan Harris, a Sao Paulo University graduate whose first writings are about the benefits of ALBA also promotes Philip N. Howard. Two of his articles appear within the syllabus for the Social Movements & Social Mediacourse he teachers. I could certainly find more evidence in the academic world that proves my point of Dr. Howard’s connections REDH, but I’ll stop for now to summarize and close my case.

Given all these overlaps in “elective” affinities it’s perhaps no surprise that Philip N. Howard’s research was cited in an editorial hosted on TeleSUR – El neoliberalismo millenial y la campaña de Bolsonaro, or The Neoliberal Millenia and Bolsonaro’s Campaignand by the Embassy of the Bolivarian Republic of Venezuela in Malaysia.

I find this latter research-article especially revealing as it implies that the popular rejection of Evo Morales from Bolivia supported by law enforcement officers and the military due to his corrupt patronage networks and anti-democratic activities is marred as “less justified” because of Twitter bots. Like the Communists in the Chiapas, Egypt and Occupy, here again Howard presents a false picture of faceless movements. Because of this poor theoretical underpinning and reliance upon categorically invalid forms of quantitative social science he fails to investigate the much more telling facts of the matter such as disinformation networks connected to news outlets, the extensive circulation online of deepfake nudes within Pro-Nicholas Marudo Facebook groups intended to humiliate Jeanine Añez and Fabiana Rosales de Guaidó, evidence that photos claiming to be protest violence by police that are staged with makeup and actors or are from different times and locations, or going into the issues I mentioned earlier about Venezuela’s online and in real life activity. Indeed, the bullets of messages in an information warfare often comprise equally of what is not there as what is.

Philip N. Howard: Conclusion

All of the above evidence indicates that Philip N. Howard is a member of the Cuban and Venezuelan Intelligence sponsored Network of Intellectuals and that one of the activities that is required of him in exchange for professional support is for him to use his credentials as an expert to deceive the Public and to provide fraudulent or misleading testimony to government bodies perceived as enemies to REDH.

The sum rationale for this argument developed into the following propositions:

  1. Someone that had previously corrected errors in his publications, but refuses do so as it relates to research that misdirects attention from Venezuela
  2. Someone who’s faulty research findings is part of a project to invalidate the Brexit vote
  3. Someone who’s faulty research findings is part of a project to invalidate the election of U.S. president Donald Trump
  4. Someone who’s faulty research findings is part of a project to invalidate the election of Brazil’s president Jair Bolsonaro
  5. Someone whose first instance of field-research was covering a Communist insurgency (Zapatistas) in Mexico that exploited individual activists, academics and NGOs for political ends along netwar lines
  6. Someone who engaged in embedded investigation with an organization (Indymedia) formed in the wake of the Zapatista conflict to replicate their model worldwide
  7. Someone whose supervisor at the University of Washington helped organize the NorthWest Social Forum – a political organization promoted by and directly connected to Venezuelan intelligence
  8. Someone who helped found an academic program funded and promoted by George Soros, which was populated by multiple academics associated with the World Social Forum and Occupy Wall Street
  9. Someone who receives grant money from organizations that also support avowedly socialist academic projects
  10. Someone whose public political positions related to Steve Bannon are the same as the Canadian Communist Party, the Hands Off Venezuela network, and the British Socialist Workers Party
  11. Someone who – like numerous other socialist parties and academics not open as to their party affiliation – advocates for the nationalization of Facebook
  12. Someone who has published a monograph about one of the main Marxist sociologists that has multiple, active connections to the São Paulo Forum, the PSUV and the Network of Intellectuals and Artists in Defense of Humanity
  13. Someone that promotes the research of Black Lives Matters/Black Liberation Movement associated sociological research
  14. Someone whose published academic uses cryptic allusions to Communist schools of thought in their theoretical framework and avows to being a Critical Theorist
  15. Someone who promotes the Liberation Technology school of thought, which is a variation of the socialist Liberation Theology movement
  16. Someone that promotes other artists and intellectuals whose activism and political positions align with the goals of Cuban and Venezuelan Intelligence Services
  17. Someone whose published academic work is promoted via methods typical of Cuba and Venezuela’s Network of Intellectuals and Artists
  18. Someone whose published academic work is promoted by actors associated with Cuba and Venezuela’s Network of Intellectuals and Artists
  19. Someone who refuses to answer questions about their research and their political connections despite such behavior violating the spirit and letter of the appropriate academic professional code of ethics
  20. Someone whose speech acts provided to the US and UK government can be described, respectably, as misdirection and disinformation

is an enchufado scholar, that is a scholar that is “plugged in” to provide services and material support to the regime of Nicolas Maduro in exchange for the receipt of benefits and funding.

After all, it certainly appears that the effect of Howard’s academic publishing and testimony is to spread disinformation and encourage misdirection on behalf of the Socialist network which has helped make Philip N. Howard appear to be an expert in a field of ICT and not just a partisan political advocate in an Oxford robe.

Notes from A Theory of Information Warfare: Preparing For 2020

A Theory of Information Warfare: Preparing For 2020
Airpower Journal, Spring 1995

By Col Richard Szafranski (BA, Florida State University; MA, Central Michigan University) is the first holder of the Chair of National Military Strategy at the Air War College, Maxwell AFB, Alabama. Colonel Szafranski’s duties have included staff positons in the headquarters of Strategic Air Command, United States Space Command, North American Aerospace Defense Command, and Air Force Space Command. He has commanded B-52 units at the squadron and wing level, most recently as commander of the 7th Bomb Wing, Carswell AFB, Texas, from 1991 to 1993. He was also the base commander of Peterson AFB, Colorado. His writings on military strategy and operational art have appeared previously in Airpower Journal as well as in Parametersand Strategic Review. Colonel Szafranski is a graduate of Air Command and Staff College and Air War College.

Notes

Information as used here means the “content or meaning of a message.”An aim of warfare always has been to affect the enemy’s information systems. In the broadest sense, information systems encompass every means by which an adversary arrives at knowledge or beliefs.

If the moral high ground is lost, a domino effect occurs: public support is lost, the technological high ground is lost, and the armed forces are lost.

Warfare can be undertaken by or against state-controlled, state-sponsored, or nonstate groups. Warfare is hostile activity directed against an adversary or enemy. The aim of warfare is not necessarily to kill the enemy. The aim of warfare is to merely subdue the enemy. In fact, the “acme of skill” is to subdue an adversary without killing him.

In both state and nonstate warfare forms, the decisions made by group leaders define the aims, the methods, and the desired postconflict conditions of the warfare. Even so, it is a fiction, albeit a common and convenient one, to assert that “states” or “groups” wage warfare. The decision to engage in warfare, including the decision to terminate warfare, is made by leaders in the state or group.

Knowledge systems are those systems organized and operated to sense or observe verifiable phenomenological indicators or designators, translate these indicators into perceived realities, and use these perceptions to make decisions and direct actions

Belief systems are those implicit or explicit orientations both to empirical data in the form of verifiable perceptions and to other data or awareness (nightmares, phobias, psychoses, neuroses, and all the other creatures living in the fertile swamp of the subconscious, the collective unconscious, or Jung’s “unconscious psyche”) that are not verifiable or, at least, are less easily verifiable.According to John Boyd, the process or act of orientation (what Boyd calls “the Big O” in the OODA [observation-orientation-decision-action] loop) also is influenced by genetic heritage and cultural traditions… Unlike knowledge systems, belief systems are highly individualized.

it is glib reductionism to think of the enemy as being of “one mind.” The enemy is really many individual enemies, many minds… For example, if the enemy is dispersed, separate minds can be attacked separately, using the fact of isolation to the attacker’s advantage. If the enemy is concentrated (and over half the people on the planet will live in metropolitan complexes by the year 2020 and will be accessible in large numbers by way of information technology), the attack can be prosecuted against large groups. Even so, the aim of warfare is to subdue the hostile will of leaders and decision makers.

What is known, including the methods by which it came to be known, can be tested by its relation to something else and determined to be valid or invalid, true or false, real or unreal. What is believed is not subject to all the same tests.

If an adversary is organized as a coalition of multiple and cooperative centers of gravity, many culturally conditioned belief systems may exist within the coalition. These may be engaged and defeated in detail.

At the strategic level, the aim of a “perfect” information warfare campaign is to influence adversary choices, and hence adversary behavior, without the adversary’s awareness that choices and behavior are being influenced. Even though this aim is difficult to attain, it remains the goal of a perfect information warfare campaign at the strategic level. A successful, although not necessarily perfect, information warfare campaign waged at the strategic level will result in adversary decisions (and hence actions) that consistently mismatch or fail to support the intentions or aims of the adversary leader.

At the operational level, the leaders responsible for prosecuting the “grand tactics” also need the answers to some questions. Will there be any withheld targets or prohibited weapons in the information warfare attacks? Is the epistemological endstate to be reached all at once, everywhere, or are there interim states that need to be reached in specific geographical areas, in a specific sequence, or in specific sectors of information activity?

information weapons, depending on the weapons used, may cause collateral damage to the attacker’s knowledge and belief systems.In the worst case, the adversary’s response could include counterattacks against

“friendly” information systems that are somehow indistinguishable from collateral damage caused by the information analog of “friendly fire.”

information attacks have stochastic effects and that unless these are considered and evaluated in advance, an information attack may not have the effect ultimately desired.

In the case of advanced societies or groups, attacks against telecommunications systems can wreak havoc with an adversary’s ability to make effective decisions in warfare. Yet… Totems and taboos might function equally as well as the targets or the tools of information warfare against a primitive group. Thus, vulnerability to information warfare is nearly universal, the differences being only a matter of degree.

The Sepoy Mutiny of 1857-58 provides an example of the complexity. The mutiny reportedly was triggered by a rumor that the British were coating rifle cartridges in animal fat. It was the sepoy leaders who started the rumor, and in so doing attacked the belief systems of both Hindu and Muslim sepoys to spur them to rebel against their British masters.

The higher its technomic capability and the greater the number of its interactions with other groups (including internal groups) or states, the greater the state or group’s potential vulnerability to information warfare. The vulnerability may increase as network size increases, dependence on the information transacted increases, or the number or volume of transactions increases. Consequently, a state or group “engaged” worldwide may be exposed or vulnerable worldwide.

A cautionary note: because an information warfare campaign at the strategic level aims to subdue hostile will by affecting the knowledge and beliefs of the adversary, it cannot discriminate between combatants and noncombatants.

As outsourcing and contractingout initiatives increase, the Congress also can be expected to act to prevent some commercial enterprise from developing such weapons. (Have not news stories and “exposés” produced by commercial news enterprises proven to be contrived, aimed at influencing our knowledge and beliefs? Have not subliminal messages been used in the past in attempts to influence our purchasing behavior? Have not hackers entered and affected–or infected–databases already? We need to consider that there may be only a slim difference between a hacker and a terrorist in the information age.

When they come, the attacks will be prosecuted against both knowledge systems and belief systems, aimed at influencing leadership choices. The knowledge and beliefs of leaders will be attacked both directly and indirectly. Noncombatants, those upon whom leaders depend for support and action, will be targets. This is what we have to look forward to in 2020 or sooner.

Notes

1. Information warfare sometimes is erroneously referred to as command and control warfare, or C2W. The aim of C2W is to use physical and radioelectronic combat attacks against enemy information systems to separate enemy forces from enemy leadership. In theory, information warfare actually is a much larger set of activities aimed at the mind and will of the enemy.

2. Chris Mader, Information Systems: Technology, Economics, Applications (Chicago: Science Research Associates, Inc., 1974), 3.

3. The “waves” of societies are described by Alvin Toffler in The Third Wave (New York: William Morrow and Company, Inc., 1980). See also Alvin and Heidi Toffler, War and AntiWar: Survival at the Dawn of the 21st Century (Boston: Little, Brown and Company, 1993). A seminal work on institutional forms is forthcoming from David Ronfeldt.

4. John Arquilla and David Ronfeldt, “Cyberwar is Coming!” Comparative Strategy 2 (April-June 1993): 141-65.

5.Martin van Creveld, The Transformation of War (New York: Free Press, 1991), 196-205. Words like warand the lately contrived warfighter confuse the warriors in a democracy by misuse. In the United States, War (with a big W ) is declared by the Congress: the people representing all the people. Executive War Powers are really warfare powers. The days of Clausewitzian, trinitarian W ars may very well be over, as van Creveld suggests. The days of warfare, however, are not over.

6. Sun Tzu, The Art of War, trans. Samuel B. Griffith (New York: Oxford University Press, 1971), 77.

7. Richard Szafranski, “Toward a Theory of Neocortical Warfare: Pursuing the Acme of Skill,” Military Review, November 1994; and idem, “When Waves Collide: Conflict in the Next Century,” JFQ: Joint Force Quarterly, Winter 1994-95.

8. Joseph A. Engelbrecht, “War Termination: Why Does a State Decide to Stop Fighting?” (PhD diss., Columbia University, 1992). Colonel Engelbrecht is a colleague at the Air University’s Air War College.

9. Arquilla and Ronfeldt, note 9, 162. According to this definition, a message with no discernible “meaning” is still “information.” This definition is useful when contemplating the tactics of information warfare.

10.Ibid.

11. Phenomenology can be defined as “the theory of the appearances fundamental to all empirical knowledge.” Dorion Cairns, in Dagobert D. Runes, ed., Dictionary of Philosophy (Totowa, N.J.: Littlefield, Adams & Co., Ltd., 1962), 231-34.

12. C. G. Jung, The Undiscovered Self (New York: The New American Library, Mentor Book, 1958), 102.

13. Information warfare requires that philosophers, cultural anthropologists, area specialists, linguists, and semanticists join the “operations” staff. The days have passed when war colleges or staff colleges could neglect these other disciplines.

14. John R. Boyd, briefing slides, subject: A Discourse On Winning and Losing, August 1987. Maxwell AFB, Alabama.

15. Ibid.

16. Carl von Clausewitz, On War, ed. and trans. Michael Howard and Peter Paret (Princeton: Princeton University Press, 1976), book 6, chapter 6, 372-76.

17. Ledger Wood, in Runes, 94-96.

18. The effects to which I refer are more complicated than the inability to prevent your own jamming from interfering with your own communications systems. These unconfinable, spillover effects of stray electrons can be modeled and some compensation can be made for their effects. The weapons and effects of information warfare are not so easily confinable or controllable. In warfare it is common to both demonize and ridicule the enemy. Ridicule often takes the form of jokes. If these jokes ridicule an enemy from a different ethnic group, these jokes become officially sanctioned racist jokes. If the ethnic group is part of our own citizenry, such attacks can cause collateral damage. The collateral damage to the armed forces may have effects as farreaching as the appearance of officially condoned racism. If one accepts that weapons and attacks have stochastic effects, then some consequences are unpredictable.

19. Van Creveld, 35.

20. Grant T. Hammond, “Paradoxes of War,” JFQ: Joint Forces Quarterly, Spring 1994. Dr Hammond is a colleague on Air University’s Air War College faculty.

21. George C. Kohn, Dictionary of Wars (New York: Facts On File Publications, 1986), 214. 22.Technomic is a word coined by Col Joseph A. Engelbrecht. He defines it to mean “of or relating to progress in the development of the application of scientific principle (technology), and in the development of wealth (economics), and in the interrelationship between advances in science and the spread and increase of economic wealth. Technomic vitality. Technomic proliferation.”

23. Gerald R. Hurst, “Taking down Telecommunications” (Thesis, School of Advanced Airpower Studies, Air University, Maxwell Air Force Base, Ala., 28 May 1993).

24.Ibid.

25. Iran provides a good example. The Majles investigation into the Iranian department of “Voice and Vision” illuminates Iran’s sensitivity to the content and meaning of pictorial messages. Consider these comments from the investigation:

A basic criticism of the pictorial programs of the Voice and Vision is lack of attention to full veiling of women, lack of attention to the chador, and spreading of the culture of the “manteau” and scarves of the immoral kind.

The grand leader on occasions has given opinions and directives to the Voice and Vision organization or its director. Unfortunately, the instructions and directives of his honor were not implemented. For example: . . . . From 1368 [21 March 198920 March 1990] to 1370 [21 March 199020 March 1991], he made reminders to the Voice and Vision on 14 occasions, the most important of which concern: A) Misinformation. B) The low level of quality of the beyondtheborder programs and failure to propagate and spread Islamic views in them. C) The broadcast of blasphemous sentences concerning the Sire of the Pious. . . . E) Showing actual persons in the role of the infallible imams.

See “Majles Investigates Activities of Voice and Vision,” 3, 4, 15 November 1993, 5-6, in Foreign Broadcast Information Service Report: Near East and South Asia (FBISNES94016S), 25 January 1994, 6-8. I am grateful to Dr George Stein of the Air University’s Air War College faculty for pointing out this example of what simultaneously might be internal information warfare and potential vulnerability to external information warfare. Saudi Arabia recently joined China as the most recent nation to outlaw satellite television receivers. One can easily appreciate the effects that Music Television (MTV) might have on such cultures.

26. A telecommunications executive speaking in an Air University forum under the promise of nonattribution disclosed these estimated figures.

Critical Guide to Venezuelan State Media Operations

TeleSUR English’s Poor Bolsonaro Analogy and their Partners in Messaging

Real Nudes with False Attribution to Delegitimize Female Politicians and their Husbands

Bolivarian News Networks Spreading Anti-Christian Disinformation in Defense of Evo Morales

Viral Libel Against Police: Manufacturing Indignation in Chile through Coordinated Inauthentic Behavior

Operation InfeKtion: How Russia Perfected the Art of War + It’s Relation to Bolivarianism

TeleSUR: A Case Study in Unethical Journalism

TeleSUR or TellaSLUR?: Anti-Zionist News, Anti-Semitic Coordinated Inauthentic Behavior

“Venezuela’s PSUV is a Fascist Political Party and Nicolas Maduro is a Hitler Want-to-be.” – Chris Hedges*

Silence of the Professors: Mark Crispin Miller

Correcting Ben Norton’s Retweet Commentary of Newsweek

When a YouTube Chat Turns to “Ciao!”: On the Cowardice of Caleb Maupin

Occupy Unmasked: Steve Bannon, Andrew Breitbart & Evidence of Foreign Influence in OWS

While Russia’s SciHub Subliminally Spreads Socialism, GrayZone Spreads Stupidity

TeleSUR English Related Research YouTube List

WSWS: Coordinated Inauthentic Behavior, Unethical Journalism, Fundraising Fraud

On Social Media’s False Democratic Promise: Virality, Newsworthiness, and Propaganda

Algorithms, Authenticity, and Coordinated, Inauthentic Behavior: A Case Study in Caitlin Johnstone

The Movement of Movements Thesis: Invisibility Mapping and the Connection Between Venezuela and Antifa

Kultural Marxism: Digital Evidence of Venezuela’s Attempt to Influence American Elections

Censorship or Community Standards?: An Evidence based Answer to the Question of “Why Did Facebook Purge TeleSUR English?” 

Orwellian Irony: A Case Study in TeleSUR English Editorial Aesthetics

Potential Book Titles on Venezuela’s Intelligence Operations in America

Cultural Marxism vs. Kultural Marxism

Cultural Marxism in America: A Historic Overview of its Origins

TeleSUR English: Junk News, Fake News and Russian Propaganda

TeleSUR – Working Directory of Associates

Abstract for Marxist Reading Group Conference

Dinero por Preguntas Respondidas Sobre TeleSUR, el Ministerio del Poder Popular para Comunicación e Información, el Ministerio Público, y la Contraloría General de la Repúblic

Money for Questions Answered about TeleSUR, The Ministry of Popular Power for Communication and Information, The Public Ministry, and the Office of the Comptroller General of the Republic

TeleSUR English: Onsite Audit Overview

TeleSUR English: Ciudadano teleSUR or Ten Cuidado Con TeleSUR?

 

TeleSUR English: Facebook Bot Network and The Case for Resetting Their Follower Numbers

TeleSUR English: Appalling App Adoption and Security Settings

TeleSUR English: Lying, Misleading, Useless and Ugly Infographic

TeleSUR English: Elitism, Non-Engagement and Fake Followers

TeleSUR English: Bibliography

Foro de São Paulo Forum Slogans: Another World is Possible

Foro de São Paulo

President Donald Trump, Civic Responsibility and Espionage: A Case Study in Fake News and Political Polarization Promoted by Venezuela

Debunking Richard Wolff’s Debunking of Jordan Peterson’s “Cultural Marxism”

Russian AND Venezuelan Bots; and How I’m Ahead of my Time

TeleSUR Employees Who’ve Refused to Answer my Questions

Why I Write: To Avoid Criminal Charges

Definitions, Laws and Precedent: An FARA Amicus Curiae for the DOJ

Cultural Analysis

Pusha T’s Daytona as Confession of Collaboration with Venezuela’s Cartel of the Suns

Is Killer Mike’s Trigger Warning Venezuelan Propaganda? A Historical Media Analysis of PanAfricanist Digital Media

Trigger Warning and the Radical Atlanta-Caracas Axis

Collected English-Translation Poems of Jesus Santrich

 

Review of Red Cocaine: The Drugging of America

Review of “Venezuela in Light of Anti-American Parties and Affiliations in Latin America”

 

English Translations from Spanish

“Union Leadership and Prostitution in El Alto, Bolivia” by Franco Limbe

“Ex-FARC fighters say: “Former President Correa was funded by Raúl Reyes and Jojoy.”

 

TeleSUR English’s Bolsonaro Analogy and their Partners in Messaging

Was Luis Fernando Camacho ever a member of a national political body? No.
Was Luis Fernando Camacho ever in the military? No.
Did Luis Fernando Camacho run for president? No.
Did Luis Fernando Camacho someone become president? No.

Then what does Luis Fernando Camacho has in common with Brazilian President Jair Bolsonaro?
According to TeleSUR, it’s because he uses religious discourse…

Which – to me – begs two questions.

(1) Given these vast divergences in biographical backgrounds, what is a likely explanation as to why such a facile association would be made.

(2) Who are the other people claiming that Luis Fernando Camacho is “known” as Bolivia’s Bolsonaro.

Searching for TeleSUR’s Partners in Messaging

To answer why TeleSUR would have an interest in making such a connection the answer is pretty easy – Venezuela was surprised by the sudden turn of events in Bolivia, had limited knowledge about Luis Fernando Camacho, and needed a way in with which to quickly demonize him.

Making this facile analogy is appropriate from the perspective of a propaganda model (1) Given TeleSUR’s extensive portrayal of Bolsonaro as Hitler and (2) Bolsonaro’s pro-capitalist Alliance for Brazil replaced the Communist Workers Party out of power in Brazil and their attempt to simplify the situation in Bolivia as Camacho doing the same to MAS. It’s an incredibly poor analogy that doesn’t serve to inform the reader, only distort reality, but it’s understandable.

Trevor FitzGibbon, who did PR for Venezuela, Wikileaks, and Chelsea Manning, and Glenn Greenwald of The Intercept at a meeting. Date unknown.

As can be seen from the above Google News Screenshot not many news outlets use that terminology. That this is so made me wonder a third question: Is it possible that there’s some deeper relation between TeleSUR and those using such a poorly-conceived moniker?

The answer is a resounding yes.

Glenn Greenwald of The Intercept appeared multiple time on TeleSUR in the early 2010s, has partnered with them in covering various matter, has met with Venezuela’s Public Relations manager on at least one occasion and – surely not just coincidentally – has expressed a number of political committmens that happens to align with Venezuela’s long term geopolitical strategies. Al Jazeera is TeleSUR’s former partner. The World Socialist Web Site has long been politically aligned with the Bolivarian Republic of Venezuela – much like TeleSUR’s favorite American political group, the Workers World Party.

mitu is a relatively new outlet, and but based a brief overview of a few of their Anti-ICE/ pro-immigration/trans-liberation articles – platforms that are held by the Party for Socialism and Liberation, Workers World Party, etc. – and that they use slogans associated with People’s Power Assemblies and the Black Lives Matters movements within their coverage it seems likely that this is a sort of “soft propaganda” website. The purpose of such a culturally oriented website it to drive traffic to the website for content on, for example, vegan taco recipes, and then encourage viewers via suggested articles panels to content aligned with the Workers Party platform.

Another article that used the phrase Bolivian Bolsonaro which I didn’t include in a screen above was a BBC article with the title “Evo Morales renuncia a la presidencia de Bolivia: Luis Fernando Camacho, el “Bolsonaro boliviano” que protagonizó las protestas que forzaron la dimisión del líder indígena.”

The autor of the article is Boris Miranda, an “international analyst” that has  also contracting with Iran’s HispanTV and Russia’s RT. The far right clip comes from Ojo Con Los Medios, which given it’s content and subscriptions seems to be associated with Venezuela state media.

Wikipedia and “Bolivia’s Bolsonaro”

I looked at the Wikipedia page of Luis Fernando Camacho and decided to do a search as to who made the effort at inserting the “Bolivia’s Bolsonaro” descriptor – and it’s someone with a lot of knowledge of communist theory and history and a whole lot of time on their hands…

That said, I think I’ve shown enough of a slice of how Venezuela not only promotes disinformation themselves, but through a network of partners, associates, allies and accomplices promotes certain messages.

Real Nudes with False Attribution to Delegitimize Female Politicians and their Husbands

If you are an attractive female politician, or are a female involved with a politician, that wants to help your country seperate from one or all of several Venezuela-sponsored supranational projects – then prepare to have deep fakes made about you and be disseminated online.

Someone somewhere is getting paid to look through pornographic videos to find look-alikes of female politicians, to look through old videos of female politicians or the WAGs of politicians so that they can add text and music to give the impression that they were involved in the sex-industry or have cuckolded their husband.

Below are two examples of Venezuela’s Guerilla Mediatica online activists attempting to silence women or their husbands by deep-fakes.

Fabiana Rosales – First Lady of Venezuela

A small sample of the PSUV-related groups that sharing falsely attributed pornography and poor attempts at deep-fake videos to humiliate the wife of Juan Guaido.

The wife of the President of Venezuela, Juan Guaido, Fabiana Rosales’ is so attractive she could be a model.  Her Instagram has over 800K followers, which is nearly 20 times that of Cilia Flores – wife of  Nicholas Maduro. While this may not matter, her looks and appeals to genuine Christian values  makes her a good spokesperson for those who wish to see the Bolivarian Socialist Project end.

Last month, in an attempt to delegitimize her messaging and that of her husband, an anonymously authored video was posted to Lechinigos which claimed to be of Fabiana Rosales engaged in sexual acts with someone that wasn’t her husband.

The fact that it’s only a 30-second clip along with several other markers in the video clearly indicate that it isn’t actually her – and yet through number Chavista groups on Facebook this was promoted as truth.

A few days ago another video of Fabiana Rosales was posted. This time  the video itself was not explicit, but contained the logo of an adult website and music which gave the impression that sexual activity was featured in the video.

This time, the video was actually of Fabiana Rosales – but the markers and music was false.

How do I know, becase here is the real video…

I’m not going to link to any of the adult sites hosting these deep fakes, but if you want to review the veracity of the screenshots at the top then follow this link to Contacto Con Maduro post and do some searching through the Facebook groups listed.

Jeanine Áñez – President of Bolivia

A small sampling of the many Bolivarian Bolivians and Venezuelans posting falsely attributed nudes of Jeanine Áñez and implying that she has a sex tape.

Another attractive woman who defers to Christian values to inform their political worldview, and who is a politician herself, Jeanine Áñez became president of Bolivia after Evo Morales renounced the office and fled to Mexico.

As soon as this happened propagandists connected to the Bolivarian Republic of Venezuela start spreading disinformation about her. They did this by falsely attributing quotes to her, as in the below, and by repeating the typical, tired Bolivarian propaganda tactic of depicting those that disagree with their politics as Nazis.

And, like with Fabiana, links to clips of videos were shared that claimed to be of the new president.

According to the news organization 24CN, they aren’t. These photos are connected to a Mexican woman.

Coordinated Inauthentic Boobhavior

The above images of semi-nude women are substantially different from the deep-fake cases of Jeanine Áñez and Fabiana Rosales, yet it does provide insight into the minds of those that support the PSUV’s digital media strategy.

Coordinated Inauthentic Boobhavior is a term that I used to descibe the sharing of sexually provocative content in order to boost engagement on Facebook.

As time spent fixated on an image is one of the factors that adds into the algorithm for placement on Facebook’s Feed, posting photos that catches the interest of the male gaze raises the likelihood of other posts appearing in the Feed.

 

 

Bolivarian News Networks Spreading Anti-Christian Disinformation in Defense of Evo Morales

AFP is a global news agency that delivers fast, accurate, in-depth coverage of the events shaping our world. From conflicts to politics, economics, entertainment and the latest breakthroughs in health, science and technology – they cover it all. They also have a Fact Check division which covers their

I’m glad they recently published the article These are the anti-indigenous tweets that Bolivia’s interim president deleted as it means I don’t have to write about the numerous fake tweets being circulated related to the return of democracy to Bolivia.

The writings of Fausto Reinaga has found a large audience in MAS, Evo Morales party, and is important to understanding their political policies over the past ten years.

If I had more time and energy – I’d translate Indianismo, política y religión en Bolivia (2006-2016) as it’s an incredibly insightful article. Or I’d write something on how Evo Morales’ world view relates to the writings of Fausto Reinaga and that this, combined with the views of Álvaro García Linera, Marxist intellectual and Bolivian vice-president, made for policies which no longer cared about democracy.

Alas, I don’t. So instead, I will just cover who’s sharing it…

Eva Golinger: Chavista “Media Personality”, not a Journalist

Interesting to note how despite this “media personality” being informed that the information the promoted is factually incorrect, they still leave it up.

One of the persons cited in the above AFP article, which even including a screenshot of their original Tweet, is Eva Golinger.

Eva Golinger used to work as legal council for Hugo Chavez, so given this former principal – and that she doesn’t claim to be a journalist – it’s perhaps not surprising that she shows no principle related to truth-telling and does not take the two seconds required to correct their claim after others have pointed it out. According to other’s which have investigated her writings with greater depth then myself, this isn’t the first time that Eva Golinger has promoted a gross misrepresentation of reality.

George Ciccariello-Maher: Chavista Activist with Academic Characteristics

Then there’s George Ciccariello-Maher. This is the “Political Science” Professor (I put this in quotations as after readings his PhD dissertation this doesn’t seem an appropriate title. Comparative Literature, maybe…) who once made news headlines following Russian sock puppets extensively re-tweeting his trolling Chavista messages and the left Twitter after Left-Twitter started harassing him for dating someone much younger than him.

After leaving his position for reasons that have never been clarified, he then got a titular role at one of NYU’s art school and UNAM – the Mexican University whose political science department isn’t credentialed with the state and has longstanding connections with the FARC.

He too posts disinformation and then leaves it up after followers point out it’s falsity.

TeleSUR English: Disinformation, not Journalism

Given the long time love affair between Hugo Chavez and Nicholas Maduro and their PSUV with Evo Morales and his MAS, unsurprisingly TeleSUR English too got in on the action. An authentic screen shot of TeleSUR’s inauthentic reporting can be viewed here.

Jacobin, Democratic Socialists of America and Disinformation

Jacobin, the Democratic Socialists of America, and a “Leftist activist” all sharing the same incorrect information.

I’ve noticed that Jacobin’s editorial line has become significantly more alinged with that with Venezuela as Bhaskar Sunkara started to expand the organization. Branko Marcetic’s article “Why Did Facebook Purge TeleSUR English“, which is passed off as insightful editorial commentary when it is just uninformed braingarbage remixed from RT and Sputnik talking points, was the first indicator for me.

Regardless of their past – here we can see that Jacobin and the Democratic Socialists of America, along with accounts connected to Venezuela’s large coordinated, inauthentic behavior network are all sharing this as well.

Conclusion

So, en toto, who’s spreading anti-Christian disinformation?

Socialists and Bolivarians.