Information Dominance as an Affirmative Countermeasure Against International Terrorism

Embed Size (px)

Citation preview

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    1/99

    INFORMATION DOMINANCE AS AN AFFIRMATIVE COUNTERMEASUREAGAINST INTERNATIONAL TERRORISM

    by

    Peter Reynolds Stephenson, PhD, CISSP, CISM, FICAF

    A thesis submitted to the Faculty of Norwich University

    in partial fulfillment of the requirements of the degree of

    Master of Arts in Diplomacy Program.

    June 2007

    Copyright 2006-2007 Peter R. StephensonAll rights reserved

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    2/99

    Information Dominance as an Affirmative Countermeasure against International

    Terrorism

    by

    Peter Reynolds Stephenson, PhD, CISSP, CISM, FICAF

    Reviewed: Thomas C. Wingfield, Esq., Associate Professor, US Army Command and

    General Staff College

    Approved: ________________________________________________________

    Name & Title of First Reader

    Approved: ________________________________________________________

    Name & Title of Second Reader

    Approved: _________________________________________________________

    Name & Title of Program Director

    18 June 2007

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    3/99

    Abstract

    This thesis hypothesizes that it is possible and practical to apply informationdominance as an affirmative countermeasure against terrorism by non-state actors in

    much the same manner that states use information superiority in the conduct of

    international politics and economics. The issue that it addresses is whether or not there issufficient foundational information relating to terrorism, information science,

    international law and information warfare to develop a generalized meta-framework for

    applying concepts of information dominance in a counter-terrorism context much as these

    principles are applied in modern state-on-state warfare.The thesis examines all of these foundational areas and applies the findings to the

    development of an information dominance meta-framework, or a framework of

    frameworks applied specifically to the problem of counter-terrorism. The authorconcludes that such a meta-framework is both feasible and practical. As a starting point

    for further research (outside the scope of this thesis), the author proposes such a meta-

    framework based upon established work of other researchers.The meta-framework (The Counter-Terrorism Information Dominance

    Framework, or CTIDF), is constructed based upon information, techniques and

    technologies that are well established in their various fields. Simply put, the CTIDF is a

    comprehensive, interdisciplinary, holistic approach to the application of elements ofinformation conflict to the problem of counter-terrorism.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    4/99

    Acknowledgments

    I would like to acknowledge the support and assistance of my thesis advisor,

    Thomas Wingfield. Not only is Tom the premier expert on the areas of international law

    touched by the subject matter in this thesis, he is a terrific scholar, teacher and friend. As

    well, no acknowledgement would be complete without mentioning Drs Kearsley and

    Lerche for allowing me to perform research using the field of information science, which

    I dearly love, and which is outside the mainstream of counter-terrorism and diplomacy.

    Dr. Mich Kabay, who ranks among the most intelligent and educated people I

    know (as well as the perfect gentleman), listened patiently to my theories and did not

    hesitate to debate them with me. The value of those debates and his friendship cannot be

    overstated. Phil Susmann and Eric Brahman at NUARI The Norwich University

    Applied Research Institutes added numerous opportunities for me to apply my research

    in a variety of interesting ways.

    Finally, I must credit some people with adding moral support, even if it only

    meant letting me vent my frustrations during the program. I found, well into the counter-

    terrorism part of the program, that this can be a very unpleasant subject. They listened

    even when I was, perhaps, less than clear about what was bothering me.

    Those include Elizabeth Templeton, Sophia Bennett and Kris Rowley (all of the

    Norwich School of Graduate Studies), and, of course, Deborah, my wife who would just

    as soon have tossed the whole project out and got her husband back. No matter how

    many times I do things such as this, though, she always seems to manage to suffer

    through them. Im done, Deb. This is my last degree (for a while, anyway).

    ii

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    5/99

    Contents

    ABSTRACT.....................................................................................................................................I

    ACKNOWLEDGMENTS .............................................................................................................II

    CONTENTS.................................................................................................................................. III

    FIGURES.....................................................................................................................................VII

    TABLES.....................................................................................................................................VIII

    1. INTRODUCTION.......................................................................................................................1

    1.1BACKGROUND.........................................................................................................................1

    1.2PROBLEM STATEMENT ............................................................................................................2

    1.3THESIS STATEMENT ................................................................................................................2

    1.4MOTIVATIONS .........................................................................................................................3

    1.5CONTRIBUTIONS......................................................................................................................3

    1.6SUMMARY OF THE AUTHORS RESEARCH................................................................................4

    1.7SUMMARY OF CONTENTS ........................................................................................................4

    2. LITERATURE REVIEW...........................................................................................................6

    2.1INTERNATIONAL RELATIONS...................................................................................................6

    2.2INFORMATION CONFLICT.........................................................................................................7

    2.3TERRORISM .............................................................................................................................8

    2.4IMPORTANT FOUNDATIONAL RESEARCH.................................................................................9

    iii

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    6/99

    2.6CONCLUSIONS .......................................................................................................................12

    3. THE NATURE OF INFORMATION CONFLICT ...............................................................14

    3.1THE INFOSPHERE:INFORMATION BATTLESPACE IN THE TWENTY-FIRST CENTURY...............14

    3.2INFORMATION THEORY .........................................................................................................19

    3.3SCALE-FREE NETWORKS.......................................................................................................22

    3.3.1 Social Networks as Scale-Free Networks .....................................................................23

    3.4INFORMATION SUPERIORITY..................................................................................................24

    3.4.1 Information Dominance Theory ...................................................................................25

    3.5THE COMPONENTS OF INFORMATION CONFLICT ...................................................................26

    3.5.1 Active and Passive Information Conflict ......................................................................27

    3.5.2 Information Warfare.....................................................................................................28

    3.5.3 Cyber Conflict ..............................................................................................................29

    3.5.4 Information Operations ................................................................................................29

    3.6CYBER CRIME AND ITS RELATIONSHIP TO INFORMATION CONFLICT .....................................30

    3.7CONCLUSIONS .......................................................................................................................32

    4. THE NATURE OF TERRORISM ..........................................................................................34

    4.1GOALS OF TERRORISM ..........................................................................................................34

    4.2IMPORTANT TERRORIST GROUPS...........................................................................................36

    4.3CLASSIFYING TERRORISM:ATAXONOMY.............................................................................36

    4.4CONCLUSIONS .......................................................................................................................42

    5. THE LAW AND INFORMATION CONFLICT ...................................................................44

    iv

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    7/99

    5.1MUNICIPAL OR DOMESTIC LAW ............................................................................................44

    5.1.1 Information Conflict and Cyber Crime.........................................................................46

    5.2INTERNATIONAL LAW ...........................................................................................................47

    5.2.1 Jus ad Bellum The Law of Conflict Management ......................................................48

    5.2.2 Jus in Bello The Law of Armed Conflict ....................................................................50

    5.3THE LAW AS IT IMPACTS TERRORISM....................................................................................51

    5.4CONCLUSIONS .......................................................................................................................52

    6. INFORMATION CONFLICT AND TERRORISM..............................................................53

    6.1THE TERRORIST BATTLESPACE .............................................................................................53

    6.1.1 The Physical Battlespace..............................................................................................56

    6.1.2 The Virtual Battlespace ................................................................................................56

    6.2INFORMATION WARFARE IN THE CONTEXT OF TERRORISM...................................................57

    6.2.1 Deliberate and Planned Application of Violence .........................................................58

    6.2.2 Terrorist Acts and Insurgent Acts.................................................................................58

    6.2.3 Ideological and Operational Imperatives.....................................................................59

    6.2.4 Surprise, Violence, Intimidation Hostage-Taking, etc. .................................................59

    6.2.5 Availability of Targets Carefully Planned....................................................................59

    6.2.6 Communication Between Terrorists and Dissemination of Propaganda .....................60

    6.2.7 Legitimize the Use of Violence, Recruitment ................................................................60

    6.3CONCLUSIONS .......................................................................................................................61

    7. COUNTERING TERRORISM WITH INFORMATION DOMINANCE ..........................62

    7.1SHANNON INFORMATION THEORY AS A BASIS FOR INFORMATION CONFLICT .......................63

    v

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    8/99

    7.2KOPPS THEORY OF INFORMATION CONFLICT .......................................................................63

    7.3APPLYING SCALE-FREE SOCIAL NETWORKS .........................................................................65

    7.4AMETA-FRAMEWORK FOR INFORMATION DOMINANCE IN COUNTER-TERRORISM ...............68

    7.4.1 What is meant by a Meta-Framework ......................................................................68

    7.4.2 Constructing a Meta-Framework.................................................................................70

    7.4.3 Counter-Terrorism Information Dominance Framework (CTIDF)..............................71

    7.4.4 How the Framework was Constructed..........................................................................72

    7.4.5 Meeting the Requirements for a Meta-Framework.......................................................73

    7.5CONCLUSIONS .......................................................................................................................74

    8. SUMMARY, CONCLUSIONS, AND FUTURE DIRECTIONS ..........................................75

    APPENDIX A A TAXONOMY OF TERRORISM ................................................................77

    WORKS CITED............................................................................................................................84

    PRIMARY SOURCES .....................................................................................................................84

    SECONDARY SOURCES (BOOKS) ..................................................................................................85

    SECONDARY SOURCES (ARTICLES)..............................................................................................86

    vi

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    9/99

    Figures

    Figure 1 - Information Continuum........................................................................ 15

    Figure 2 - Second Dimension of Information Conflict: Criminal-Warfare

    Continuum......................................................................................................................... 16

    Figure 3 - Inclusion of Terrorism in the Graphical Representation of Information

    Conflict ............................................................................................................................. 18

    Figure 4 - Shannon's Schematic Diagram of a General Communication System

    ........................................................................................................................................... 19

    Figure 5 - Shannon's Schematic Diagram of a Correction System ................... 21

    Figure 6 - Link Analysis of "Terrorism" at the Sub-Class Level.......................... 38

    Figure 7 - Relationships from Figure 6 Organized in a "Peacock" Display ......... 39

    Figure 8 - Clustering of the Elements Shown in Figure 6 and 7........................... 40

    Figure 9 Mind-Map of an Informal Taxonomy of the Concept of Battlespace. 54

    Figure 10 - A Map Showing Links Between al Qaeda and Associated Terrorist

    Groups............................................................................................................................... 66

    Figure 11 - Result of Performing a Clustering Operation on the Map in Figure 10

    ........................................................................................................................................... 67

    Figure 12 - The Zachman Framework for Information Systems Architecture

    Development..................................................................................................................... 70

    Figure 13 - The Counter-Terrorism Information Dominance Framework ........... 71

    vii

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    10/99

    Tables

    Table 1 - Characteristics of the Terrorist Battlespace........................................... 55

    Table 2 - Connections between Information Warfare and the Terrorist Battlespace

    ........................................................................................................................................... 58

    viii

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    11/99

    1

    1. INTRODUCTION

    This thesis breaks new ground in the application of several information

    technologies. Some of these technologies are what the author refers to as hard

    technologies and some are what the author considers soft technologies. Hard

    technologies are those that lean towards application of computer and communications

    systems to problems of information management. Soft technologies are those that lean

    more towards sociology and information content. When these technologies combine,

    they offer opportunities for the use of information both as an offensive weapon and as a

    defensive tool.

    In this thesis, the author explores one application of this approach that he refers to

    as information dominance. Information dominance is a term that one generally sees used

    in a state-on-state context. However, here the author attempts to generalize the term and

    codify exactly what it means. In that regard, the concept ofinformation dominance

    theory allows broad application as a framework for more common techniques of

    information warfare and information operations. Specifically, this thesis looks at the

    potential application of information dominance in the context of counter-terrorism.

    1.1 Background

    THE UNITED STATES is gradually losing theonline war againstterrorists. Rather than aggressively pursuing its enemies, the U.S.

    government has adopted a largely defensive strategy, the centerpiece ofwhich is an electronic Maginot Line that supposedly protects criticalinfrastructure (for example, the computer systems run by agencies such as

    the Department of Defense and the Federal Aviation Administration)

    againstonline attacks. In the meantime,terrorists and their sympathizers,unhindered by bureaucratic inertia and unchallenged by Western

    governments, have reorganized their operations to take advantage of the

    Internet's more prosaic properties. (Kohlmann; 2004)

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    12/99

    2

    Kohlmann goes on to say, The U.S. government is mishandling the growing

    threat because it misunderstandsterrorists. In these two comments, Kohlmann

    summarizes an important issue for counter-terrorism operations. However, other writers

    paint a somewhat gloomier picture: information terrorism attack may be state-sponsored

    and the first wave of a digital Pearl Harbor. (Devost, Houghton, and Pollard; 2002)

    While these two viewpoints frame the problem, they do not give enough

    information to understand the issues fully. Neither does either statement describe, fully

    and unambiguously, where information science fits in the overall spectrum of counter-

    terrorism issues.

    1.2 Problem Statement

    The key convergence of counter-terrorism and information science is in

    understanding how terrorist organizations use the entire spectrum of information both

    strategically and tactically, and applying effective countermeasures, both offensively and

    defensively. It is here, in this convergence of understanding and application that we see

    the real problem. The challenge of implementing that convergence as an information

    science discipline is the topic of this thesis.

    1.3 Thesis Statement

    It is possible and practical to apply information dominance as an affirmative

    countermeasure against terrorism by non-state actors in much the same manner that states

    use information superiority in the conduct of international politics and economics.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    13/99

    3

    1.4 Motivations

    Since 9/11, the Global War on Terror (GWOT) has cost hundreds of billions of

    dollars and thousands of lives. Not only is the war no closer to being won, some might

    say that it actually is being lost and may never be won. Public sentiment against the

    GWOT becomes more and more negative with every US serviceperson killed and every

    Congressional budget increase requested by the administration. Cries for a new direction,

    while well meant, do not take into account that there are very few new directions left.

    It is clear that along with what few strategies and tactics actually are working, we must

    add some new weapons to our arsenal.

    As the comments above show (section 1.1) there is a perception that the US is

    behind in areas of information warfare. This is not because American strategists do not

    understand the concept. Rather, it is because the GWOT is a different kind of war than

    we ever have fought and we have yet to understand its deeper implications, both as a war

    and as a set of enemy strategies. One area where we can improve our chances is by

    wresting control of the infosphere from the enemy. If one takes Kohlmann literally, one

    can see that this is a significant current vulnerability for the US and its Coalition partners

    in the GWOT.

    1.5 Contributions

    The contributions that this thesis makes are the analysis of information conflict in

    the context of terrorism, and the formulation and application of a set of tools that the US

    and its partners can apply in the infosphere. These tools achieve the traditional goal of

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    14/99

    4

    information operations: actions taken to affect adversary information and information

    systems while defending ones own information and information systems (Wingfield;

    2000). However, unlike other current approaches, this thesis examines information

    conflict in the context of the Global War on Terror.

    1.6 Summary of the Authors Research

    The research for this thesis was conducted in several ways. First, traditional

    literature searches provided a background and a context for the theory of Information

    Dominance. A study of terrorism, terrorist groups and terrorist strategies in the

    infosphere provided a context for the application of information dominance in the Global

    War on Terror. During that research, the author applied several tools, some of which are

    just coming into common use, to characterize the notion of terrorism and allow mapping

    of terrorist organizations.

    Concurrently, the author explored emerging techniques such as social network

    mapping, scale-free networking (sometimes called small world networks) as well as the

    application of both new and traditional aspects of knowledge science. Finally, the author

    built up a theoretical tool kit of techniques with which to engage in information

    dominance in a terrorism setting. It remains, as is discussed in Chapter 8, to test these

    theoretical tools in a live environment.

    1.7 Summary of Contents

    This thesis is organized from the general to the specific. Chapter 1 opens the

    discussion by framing the problem and presenting the thesis statement, which offers a

    solution to the problem.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    15/99

    5

    Chapter 2 is a review of some of the more important literature forming the

    background, both historically and currently, for information conflict, both state-on-state

    (where practitioners of information warfare are most familiar) and in the context to

    terrorism. The author explores the literature both of terrorism issues and of historical

    issues of international relations as they apply to this problem.

    Chapter 3 lays the foundation for understanding information conflict and its

    components, as well as introducing some novel approaches using information science and

    new views of where information conflict, especially cyber conflict, is headed. This

    chapter is important because it is from these well-established core concepts that the

    approaches outlined in the final chapter emerge.

    Chapter 4 briefly introduces the cogent issues surrounding terrorism. These issues

    frame the battlespace. The author describes the terrorist battlespace here and proposes the

    aspects of that battlespace that may be vulnerable to information dominance, the key

    theme of this thesis.

    Chapter 5 is a brief review of applicable international law as it applies in

    cyberspace and as it converges with laws of conflict. Chapter 6 begins the convergence

    of the ideas in the rest of the thesis into a coherent approach. It lays the final level of the

    foundation for Chapter 7, which describes a new approach to controlling the infosphere in

    the context of terrorism. This approach the author refers to as Information Dominance.

    Chapter 8 addresses the future and draws some conclusions from the authors

    research.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    16/99

    6

    2. LITERATURE REVIEW

    There is ample literature on information conflict and a growing body of work on

    terrorism. However, there is almost nothing that brings the two together. In this chapter,

    the author explores applicable literature in three specific areas:

    1. International relations

    2. Information conflict

    3. Terrorism

    International relations (IR) forms a background for the effective use of

    information superiority and for understanding the stage upon which information conflict

    plays out globally. The many facets of information conflict are important to the theme of

    this thesis. Finally, terrorism, not a new phenomenon certainly, is the target of the

    authors research and we will seek to understand it in this thesis in the context of

    information conflict. This chapter begins with an overview of the writers that are

    important to this thesis along with some examples of their work and then discusses

    relevant contributions in the convergence of the three topic areas.

    2.1 International Relations

    The author has proposed, in a term paper for the Master of Arts in Diplomacy

    program, a theory of information dominance (Stephenson; Feb 2006) as a lens through

    which, in the information age, one may analyze international relations taking into account

    the impacts of generally available global communications technology. That paper

    references some of the primary contributors to the literature of international relations

    from the perspective of developing such a theory. Relevant authors and examples of their

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    17/99

    7

    work include:

    Mingst (Mingst; 2004)

    Morgenthau (Morgenthau; 1967)

    Nye (Nye; 1990)

    Slomanson (Slomanson; 2003)

    Waltz (Waltz; 1979)

    Haskell (Haskell; 1980)

    2.2 Information Conflict

    The literature on information conflict and related topics as a basis for international

    relations is surprisingly rich. This literature falls into two distinct categories. First, there

    is the theoretical literature. This explores various concepts of information conflict as they

    apply to international relations in the information age. The second category comprises

    operational treatises, often written by military authors. While this body of work does not

    address terrorism directly, it does lay groundwork for further discussion in that context.

    Important authors in information conflict and examples of their work include:

    Aldrich (Aldrich; 1996)

    Armistead (Armistead; 2004)

    Arquilla and Ronfeldt (Arquilla and Ronfeldt; 1999, 1993)

    Cronin and Crawford (Cronin and Crawford; 1999)

    Denning (Denning; 1999)

    DiCenso (DiCenso; 1999)

    Donskov (Donskov; 2003)

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    18/99

    8

    Dunn (Dunn; 2002)

    Erbschloe (Erbschloe; 2001)

    Eriksson (Eriksson; 2004)

    Freakley (Freakley; 2004)

    Jones, Kovacich and Luzwick (Jones, Kovacich, and Luzwick; 2002)

    Kopp (Kopp; 2005)

    Naef (Naef; 2005)

    Rosenau (Rosenau; 1998)

    Schmitt (Schmitt; 1999)

    Shen (Shen; 1995)

    Thomas (Thomas; 2006)

    Wei (Wei; 1996)

    Wingfield (Wingfield; 2000)

    2.3 Terrorism

    There is a growing body of literature on terrorism. This literature addresses the

    topic of terrorism in at least four distinct ways:

    Historical foundations for terrorism

    Terrorism motivations

    State sponsorship of terrorism

    Major terrorist groups, their histories, motivations, strategies and tactics

    Major writers and applicable representative works include:

    ONeill (O'Neill; 2005)

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    19/99

    9

    Sageman (Sageman; 2004)

    Hoffman (Hoffman; 2006)

    Byman (Byman; 2005)

    Gambill (Gambill; 1998)

    Laqueur (Laqueur; 1996)

    Ehrlich and Liu (Ehrlich and Liu; 2002)

    Mazarr (Mazarr; 2004)

    Bar (Bar; 2004)

    Crenshaw (Crenshaw; 1981)

    Guillaume (Guillaume; 2004)

    Evans (Evans; 2005)

    2.4 Important Foundational Research

    One of the earliest discussions on the convergence of terrorism and information

    systems appears on the Information Warfare Site on the Internet. Galley discusses the

    concept of computer terrorism and concludes that it is possible, even likely (Galley;

    1996). He writes: It would be suicidal for any dictator such as Saddam Hussein at the

    present time to conceive a major offensive without benefiting of the advantages from the

    principal Achilles' heel of the Western civilization: information systems.

    In retrospect, we know that Hussein did, in fact, attempt to manipulate

    information systems but not quite in the manner that Galley suggests. Rather, Hussein

    attempted to use propaganda, misinformation and disinformation to influence both his

    own people and the rest of the world.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    20/99

    10

    The first cogent public discussion of information warfare in the context of

    terrorism appeared in 1999 (Denning; 1999 pp 68-74). In her book Information Warfare

    and Security Denning discusses several facets of information warfare that range from

    cyber warfare (including what today is called computer network attack or CNA) to

    misinformation and disinformation. She quotes Mark Pollitt, then a special agent in the

    FBI but, ultimately, the chief of the FBIs computer forensics laboratory, as defining

    cyber terrorism as,

    the premeditated, politically motivated attack against information,computer systems, computer programs, and data which result in violence

    against noncombatant targets by subnational groups or clandestine agents.(Pollitt; 1997 in Denning; 1999 p 69)

    She further reports the first known instance of a cyber attack (1998) by terrorists:

    [E]thnic Tamil guerrillas were said to have swamped Sri Lankan

    embassies with thousands of electronic mail messages. The messages read"we are the Internet Black Tigers and were doing this to disrupt your

    communications." An offshoot of the Liberation Tigers of Tamil Eelam,which have been fighting for an independent homeland for minorityTamils, was responsible for the incident." (Wolf; 1998 in Denning; 1999 p

    69)

    However, Arquilla and Ronfeldt foresaw the emergence of cyber war as early as

    1993 and described it as,

    conducting, and preparing to conduct, military operations according to

    information-related principles. It means disrupting if not destroying theinformation and communications systems, broadly defined to include evenmilitary culture, on which an adversary relies in order to know itself:

    who it is, where it is, what it can do when, why it is fighting, which threats

    to counter first, etc. It means trying to know all about an adversary while

    keeping it from knowing much about oneself. It means turning thebalance of information and knowledge in ones favor, especially if the

    balance of forces is not. It means using knowledge so that less capital and

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    21/99

    11

    labor may have to be expended. (Arquilla and Ronfeldt; 1993)

    This description was important because it began the process of defining the notion of

    information conflict. This early work evolved by 1999 to include a well-formed vision of

    the realm of information conflict as we see it emerging today. Although they did not

    connect cyber war with terrorism, their description in 1993 did not preclude later

    application of information conflict in a terrorism context.

    Jones, et al make a distinction between cyber terrorism and techno-terrorism

    (Jones, Kovacich, and Luzwick; 2002 pp 109-113). They define a techno-terrorist as ...

    those who use technology for terrorist activities.... This expanded the range of

    possibilities for the technical aspects of cyber terrorism even though the authors viewed

    the two (cyber terrorism and techno-terrorism) as separate and distinct.

    Dunn was an early leader in expanding the notions of information warfare and

    traditional international relations theory into a single, converged concept (Dunn; 2002).

    Eriksson and Giacomello (Eriksson and Giacomello; 2004) expand independently on

    Dunns theories (although they do not cite Dunn in their paper) and offer a superb

    bibliography of supporting references.

    Armistead (Armistead; 2004), however, took some of the most important steps in

    converging international relations theory, information warfare and information operations

    into a single set of converged concepts that supported practical application. Building on

    Dunns work, he also expanded the seminal work of Arquilla and Ronfeldt (Arquilla and

    Ronfeldt; 1999).

    Arquilla and Ronfeldt developed and expanded the notion of noopolitik which

    included the notion of the noosphere. This was an important step forward because it

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    22/99

    12

    recognized information, not simply information systems, as a key element of information

    warfare and information operations. It built upon their earlier work (Arquilla and

    Ronfeldt; 1993) and of others published in a book edited by them called In Athenas

    Camp (Arquilla and Ronfeldt; 2003). From a theoretical perspective, the topics addressed

    in this collection of essays were seminal in shaping thinking about information conflict

    but still did not address terrorism directly.

    Significant, though perhaps unintended, insight on the relationships of

    information warfare and terrorist insurgencies comes from work by ONeil (O'Neil; 205).

    In his book, the author describes nine succinct insurgent types and a well-developed

    discussion of effects of disunity within insurgent/terrorist groups. This discussion offers

    insights into ways to use information warfare to disrupt terrorist groups and lessen their

    effectiveness. One final important paper in this regard deserves our attention. The

    Militant Ideology Atlas (Combating Terrorism Center; 2006) offers insights into

    militant groups, their relationships and the nature and sources of their ideologies.

    An important foundation for any discussion of conflict in cyberspace is

    international law of conflict. The preeminent authority on international law in

    cyberspace is Wingfield and his book The Law of Information Conflict (Wingfield; 2000)

    is the authoritative reference on the topic.

    2.6 Conclusions

    While there is virtually nothing in the literature that addresses the convergence of

    information conflict and terrorism directly in a useful manner, there is ample foundation

    for extending existing thinking from conventional international politics to information

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    23/99

    13

    conflict involving sub-national actors. The seminal works of Dunn, Arquilla and

    Ronfeldt, Eriksson and Giacomello, Armistead, Wingfield and others offer an excellent

    platform for understanding information conflict.

    Hoffman, Byman, Laqueur, ONeil and others address Terrorism in general.

    These writers give us a solid basis for understand the motivations, politics, strategies and

    tactics of terrorists and terrorist groups, both independently and in the context of their

    state sponsors. Finally, the rich and extensive literature on international relations offers a

    context upon which to build although in many regards that context is dated as it applies to

    an information age.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    24/99

    14

    3. THE NATURE OF INFORMATION CONFLICT

    Information conflict is not well understood and has not yet reached the level of a

    formal discipline. Armistead, Dunn, and Arquilla and Ronfeldt are the primary direct

    contributors, although supporting theories from such indirect contributors as Shannon

    (information theory) are important. In this chapter, the author explores an emerging

    theory of information conflict in the context of traditional information warfare and

    information operations.

    3.1 The Infosphere: Information Battlespace in the Twenty-First Century

    One of the most important concepts when one considers information conflict is

    the difference between hard and soft power. Arquilla and Ronfeldt (Arquilla and

    Ronfeldt; 1999) introduced the concept of noopolitik. Noopolitik is defined by Arquilla

    and Ronfeldt as foreign-policy behavior for the information age that emphasizes the

    primacy of ideas, values, norms, laws and ethicsit would work through soft power

    rather than hard power.

    The author discusses this notion in detail in a paper produced as part of the Master

    of Arts in diplomacy program at Norwich University (Stephenson; 2006). Soft power, in

    the context of noopolitik, is the power of information. However, information comes in

    many guises. Even when one considers information, one may make a distinction between

    the hard power end of the information continuum and soft power. Thus, we describe the

    information continuum as bipolarextending from the hard power pole in the context of

    information (cyber conflict) to the soft power pole (pure information and thought). In the

    center of the continuum is the space where hard and soft power converges. The soft

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    25/99

    15

    power pole of the continuum we refer to as the noosphere. The convergence we refer to

    as the infosphere. The hard power pole comprises cyber events (i.e., those actions that

    predominantly involve technology). We may represent this bipolar information

    continuum graphically as shown in Figure one.

    Figure 1 - Information Continuum

    Most information conflict takes place in the infosphere. However, certain forms

    of information conflict operations may occur at either the hard or soft power ends of the

    continuum. At the cyber end, we find computer network attack (CNA) and other

    technical operations such as the development of web sites on the Internet. At the

    noosphere end, we find pure information that may include propaganda, misinformation,

    and disinformation, especially as web site content. Therefore, information conflict, and

    especially information operations as waged by information warriors,1

    may occur in all

    three areas of the continuum, but its results will be most observable in the infosphere.

    We may break information conflict into the subsets of offensive conflict and

    defensive conflict. While this thesis will address both of these subsets, the author is most

    concerned with the application of offensive information conflict in the context of

    counterterrorism.

    1 Information warriors include those individuals with specialized capabilities such as experts in

    cyber conflict, hackers, propagandists, public relations experts, intelligence analysts, and political analysts.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    26/99

    16

    We may apply the concept of the information continuum to describe the

    interactions of hard and soft power within a second continuum: that of criminal activity

    and warfare. Information conflict is present in contexts other than war. One can observe

    the effects of information conflict even in the corporate world. For example, the

    manipulation of information that positively portrays one organization and negatively

    portrays that organization's competition is a form of information conflict.

    Criminal organizations such as gangs may use elements of information conflict

    for intimidation (e.g., gang graffiti) at the soft end of the continuum. The author has

    direct experience with the use of information conflict in an attempt by a fraudster to

    implicate his partner in a federal crime. In this example, the fraudster used a trivial

    example of an information operation to penetrate his partner's computer and place

    incriminating evidence in the form of documents on that computer.

    Because information conflict can apply to the second continuum of criminal

    activity to warfare, we may add a dimension to the graphical representation in Figure one.

    We illustrate that additional dimension in Figure 2.

    Figure 2 - Second Dimension of Information Conflict: Criminal-Warfare Continuum

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    27/99

    17

    Any operation, tactic, or strategy that includes or depends for its success on the

    manipulation of information in any form and the subsequent manipulation of individuals,

    groups of individuals, or populations is an example of information conflict. For reasons

    that this thesis will examine in a later chapter, the application of the tactics and strategies

    of information conflict to the problem of counterterrorism may be promising.

    It also is practical to superimpose the notion of terrorism upon the representation

    in Figure 2. Some have suggested that terrorism has strong criminal elements associated

    with it. For example, the Interparliamentary Union, an international organization of

    parliaments of sovereign states:

    Unequivocally condemns terrorism as a criminal act, noting that terrorism

    endangers the territorial integrity of countries and their national and

    international security, destroys innocent lives and the physical andeconomic infrastructure, and destabilises not only legitimately constituted

    governments but society as a whole. (Interparliamentary Union; 2003)

    Terrorism, as well, is a criminal act as determined in the Article 155 of the

    Criminal Code of the Republic Uzbekistan (Uzbekistan; 2005). Many other countries

    including Australia, France, Germany, Greece, Norway, Spain, Sweden, and the United

    States consider terrorism to be a criminal act (The Secretary of State for Foreign and

    Commonwealth Affairs; 2005). With that characterization in mind, we can superimpose

    the notion of terrorism as a criminal act on the graphical representation of Figure 2.

    Figure 3 now shows a nearly complete graphical representation of information conflict.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    28/99

    18

    Figure 3 - Inclusion of Terrorism in the Graphical Representation of Information Conflict

    From Figure 3 we can see that terrorism falls in the continuum between criminal

    activity and warfare containing elements of both. We may also surmise that information

    conflict relating to terrorism, as with the rest of the continuum between criminal activity

    and warfare, appears largely in the infosphere. However, this is not to imply that there

    are no elements of information conflict relating to terrorism at either of the opposite poles

    of the continuum.

    We could add a third dimensiona Z-axisthat relates to other uses of the

    continuum, intelligence, for example. One might think of the Z-axis as consisting of

    slices that mirror and are behind the continuum of Figure 3. We position these slices

    along the Z-axis extending from operational intelligence (closest to the front) to pure

    intelligence that consists largely of situation reports without any direct resultant action

    implied. Each slice stands alone as an explicit definition of an intelligence goal within

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    29/99

    19

    the overall continuum illustrated in Figure 3.

    3.2 Information Theory

    Claude E. Shannon first expounded the notion of information theory in 1948

    (Shannon; 1948). According to Shannon: The fundamental problem of communication

    is that of reproducing at one point either exactly or approximately a message selected at

    another point. Frequently the messages have meaning; that is they refer to or are

    correlated according to some system with certain physical or conceptual entities.

    While Shannon concentrated largely on the engineering problems associated with

    communication, the basic description of the communication problem leads to an

    understanding of how one may apply elements of both offensive and defensive

    information conflict to one's benefit. Shannon provides a graphical representation of a

    generalized communication system. His representation is reproduced in Figure 4.

    Figure 4 - Shannon's Schematic Diagram of a General Communication System

    Shannon applies the notion of entropy to his theory of information systems.

    Shannon's definition of information entropy is the measure of the average information

    content that may be associated with a random outcome. If, probabilistically, there is an

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    30/99

    20

    equal likelihood of all potential outcomes, the value of entropy is at the maximum. If, on

    the other hand, the outcome is a probabilistic certainty, the value of entropy is zero. The

    objective of the communication system is to achieve entropy of zero.

    However, as we can see from Figure 4, the potential for the injection of noise in

    the signal path between the transmitter and the receiver exists. By way of clarification,

    the notions of an information transmitter and an information receiver do not necessarily

    connote technical objects.

    Consider the child's game of telephone. As a simple message passes from one

    end of a line of children to the other, it is likely that the message received at the distant

    end will not be the same message sent from the original transmitter. In this case, each

    child with the exception of the first and last in the row is both a transmitter and a

    receiver. Each child receives the message and passes it to the next child in line. The

    process continues until the final child (receiver) receives the message. Because each

    child is not only a transmitter and a receiver, but also a noise source, entropy generally is

    greater than zero.

    One might also interpret this process as consisting of a transmitter (first child in

    the row), a receiver (last child in the row) and a noise source (all of the other children

    between the transmitter and the receiver). This analysis allows us to hypothesize that by

    controlling the noise source one might control the entropy of the information at the

    receiver, achieving the level of entropy desired. This has interesting implications in the

    use of information conflict as a countermeasure to terrorism.

    For example, one might insert misinformation or disinformation (noise) in the

    transmission path (web site, communications link, or other means of conveying

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    31/99

    21

    information) from a terrorist leader (ideological leaders such as political theorists,

    religious figures, etc.) to terrorist groups in the field. As well, one might reinterpret

    ideological mandates. Transmitting credible analyses of fundamental ideological tenets

    with the analysis slightly shifted (noise) to one's benefit might well have an impact upon

    an ideologically driven enemy.

    Additionally, when it is to ones benefit, one might insure that there is no noise in

    the transmission and that a clear message with entropy of zero arrives at the receiver.

    Shannon graphically describes how to accomplish this. His representation appears in

    Figure 5.

    Figure 5 - Shannon's Schematic Diagram of a Correction System

    Notice in Figure 5 that a correction System requires an observer, the role of which

    is to (1) collect information from the source (prior to transmission) and the destination

    (after receiving), (2) compare the two versions of the information and (3) submit the

    corrected version to a correcting device that delivers the information to the destination.

    Consider the following example.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    32/99

    22

    A terrorist group kidnaps an American soldier. The group kills the soldier and

    beheads him while recording the entire process on video. The group delivers the video to

    al Jazeera and eventually the video finds its way to CNN. CNN televises the video but

    deletes the portion where the soldier is beheaded. The producer of the newscast (noise)

    distorts the content of the video between the transmitter (the source of the video,

    presumably al Jazeera) and the receiver (the newscast audience). A voyeuristic, and, one

    might assume, sympathetic blogger (observer) obtains the original video, places it on his

    web site (correcting device), and advertises it for all to see.

    Considering figures 4 and 5 one might conjecture that the management of

    information based upon Shannon information theory is not simply interesting but,

    arguably, useful as a tool of information conflict. Managing information becomes an

    exercise in managing entropy. One may manage entropy at multiple points on the

    information continuum shown in Figure 3. This thesis explores these concepts in Chapter

    7.

    The mathematical analyses in the Shannon paper are rigorous and are beyond the

    scope of this thesis.

    3.3 Scale-Free Networks

    Barabasi and Albert first described the concept of scale-free networks in 1999

    (Barabasi and Albert; 1999). In their early descriptions, Barabasi and others demonstrate

    the concept through examples including the Internet, World Wide Web, and certain types

    of social networks (Barabasi, Ravasz, and Vicsek; 2001). These networks contradicted

    earlier views of network growth (Erdos and Renyi; 1959, Arquilla and Ronfeldt 1-25;

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    33/99

    23

    2002) that viewed networks as growing like chains, stars or all-channel networks where

    all nodes connect more or less randomly to each other. Erdos graphed these networks as

    a typical bell curve while Barabasi, et al described them as power law networks.

    An important aspect of scale-free, or power law, networks is the concept of

    preferential attachments. These networks are characterized by growth (continued

    expansion) and preferential attachment (new nodespreferto attach to nodes with the

    largest number of already connected nodes) (Barabasi and Jeong; 2003).

    Besides a new view of the growth of scale-free networks, Barabasis and his

    colleagues described another important factor. Scale-free networks are extremely

    resistant to error and failure but are not resistant to attack (Barabasi, Albert, and Jeong;

    2000). These factors (preferential attachment and error/attack tolerance) become

    extremely important when using information superiority as a countermeasure against a

    terrorist network.

    3.3.1 Social Networks as Scale-Free Networks

    While Barabasi et al described social networks in general as scale-free, other

    researchers extended that concept to include, explicitly, terrorist groups and terrorist acts

    (Matthew and Shambaugh; 2005, Clauset and Young; 2005, Stripling; 2007). Of these,

    the Stripling paper may prove the most valuable in that it extends and updates Barabasis

    theory relative, explicitly, to terrorist networks and, more specifically, to the al Qaeda

    network.

    In his paper, Stripling adds the notion of directed links between nodes showing

    that not all terrorist links are two-way. This accounts for different types of interactions

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    34/99

    24

    within the same network (financial support, logistical support, training support,

    operational support, etc.). These interactions characterize the state of global terrorist

    networks well. Since the early years of this century, terrorist networks have tended to

    become far less centralized than they were in the 1990s and earlier.

    Because a successful attack against a scale-free network depends upon disabling a

    critical number of nodes, and because other nodes tend to attempt to rebuild the network

    after a failure, two important points emerge. First, disabling links is not an effective way

    to disable a scale-free network because the links will re-establish wherever possible.

    Second, a critical mass of node destruction must occur before the network becomes

    effectively disabled. Two groups of researchers have shown that careful selection

    (targeting) of nodes can cause a cascading effect that will bring down the network

    (Motter and Lai; 2002, Moreno, Gomez, and Pacheco; 2002). Inducement of a cascading

    effect using information superiority may affect terrorist networks and may offer an

    effective countermeasure against them.

    Another strong proponent of the notion of scale-free social networks (although he

    refers to them as small world networks) is Sageman (Sageman; 2004). Sageman has

    taken the work of Barabasi et al and applied it to his seminal work on characterizing

    terrorist networks.

    3.4 Information Superiority

    The notion of soft power is a staple in the writings of Dunn (Dunn; 2002) and

    Arquilla and Ronfeldt (Arquilla and Ronfeldt; 1999). Additionally, Armistead wrote an

    entire book on the topic of soft power and its role in modern warfare (Armistead; 2004),

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    35/99

    25

    building upon the work of Dunn and Arquilla and Ronfeldt. This author explored these

    writers in the context of various lenses on international relations and proposed a theory of

    information dominance that builds upon prior work in the field (Stephenson; 2007).

    Armistead, however, did not expand extensively on why traditional views of

    international relations are limited in the context of the information age. For that we must

    turn to the writings of Eriksson and Giacomello (Eriksson and Giacomello; 2004).

    Another challenge is that virtually all theories of international relations, including

    those proposed by the above writers and researchers do well at analyzing events that have

    passed but have proven, based upon this writers research, to be weak at anticipating

    trends or events of interest. Thus, beyond providing basic understanding of why things

    happened the way that they happened, virtually no current theory offers a direct path to

    actionable intelligence.

    3.4.1 Information Dominance Theory

    This author proposed a theory of information dominance that takes into account

    the need to anticipate the actions of an organization or state. Information dominance

    theory uses Rosens definition of anticipatory systems for the purpose of expanding upon

    the past and anticipating the future (Rosen; 1985). Rosen defines an anticipatory system,

    An anticipatory system is a system containing a predictive model of itself and/or of its

    environment that allows it to change state at an instant in accord with the models

    predictions pertaining to a later instant.

    We also may turn to Rosen for a concrete description of complexity (Rosen;

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    36/99

    26

    1998), A system is simple if all its models are simulable. A system that is not simple,

    and that accordingly must have a nonsimulable model, is complex.

    This is important because this author speculates (Stephenson; Feb 2006) that part

    of the difficulty in developing an anticipatory international relations theory is the

    complexity of such systems. This complexity increases when the target is not a well-

    defined nation-state, but, rather, is a non-state entity such as a terrorist group or network.

    However, the success of a program of information dominance as an affirmative

    countermeasure against terrorism requires an anticipatory system to be useful. The

    authors paper proposes:

    [A] theory of IR that views international politics viewed through the

    lens of information operations as a Theory of Information Dominance. By

    its name, one can see that this theory would share concepts with structuralrealism in that it seeks to explain the relationship of an actor to its

    environment from the perspective of power. This is consistent with

    Dunns thinking.Information Dominance Theory must account for a broad discourse on

    international politics, economy, law, military power and other elements ofinternational relations. It also would be useful if such a theory couldanticipate the behavior of actors on the international stage.

    The application of Rosens theory of anticipatory systems to create appropriate

    models, along with information dominance and social network theory may offer the

    underpinnings of an actionable response to extremist terrorism using information warfare

    and operations.

    3.5 The Components of Information Conflict

    Kopp defines information conflict as a more generalized term used to

    describe what most of the literature calls Information Warfare, InfoWar, or IW

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    37/99

    27

    (Kopp; 2006). In turn, Wingfield gives the definition of information warfare as

    [i]nformation operations conducted during a time of crisis or conflict to achieve or

    promote specific objective over a specific adversary or adversaries. To understand this

    definition, Wingfield also provides a definition of information operations as [a]ctions

    taken to affect adversary information and information systems while defending ones

    own information and information systems. (Wingfield; 2000)

    If we look at a somewhat more generalized characterization of information

    conflict, we find that it contains elements of information warfare, information operations

    and cyber warfare or cyber conflict (information warfare restricted to cyberspace).

    3.5.1 Active and Passive Information Conflict

    We may characterize information conflict in other ways as well. One

    differentiator is whether the operations involved are active or passive. Active

    information conflict includes actions taken in the context of exploiting an adversary

    directly. These are actions taken against the adversary.

    Passive information conflict includes defensive action and actions taken against

    an adversary without the intent of direct exploitation using those actions. An example of

    such an action is reconnaissance or spying. This could involve such activities as

    intercepting communications and breaking their cipher if necessary, monitoring public

    information from and about the adversary. It might also include accessing information

    provided by insiders and espionage agents placed inside the adversarys ranks. Active

    and passive information conflict may exist in the context of either offensive or defensive

    information conflict.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    38/99

    28

    3.5.2 Information Warfare

    Information warfare as a concept is not new. Several writers have attempted to

    define it and the most common definitions combine the definitions of information warfare

    and information operations in section 3.5. Conceptually, information warfare is

    exploiting an adversarys information systems while protecting our own. Information

    warfare generally is thought of in terms of active, ongoing conflict the same as

    conventional warfare.

    However, information warfare is not always a hot war. For example, there are

    writers who believe that China, although not engaged in a shooting war with the US,

    none-the-less, believe that we are at war with China (Jones, et al; 2002, Exhibit 7). The

    Chinese view of information warfare focuses, in part, upon preemption or, in terms used

    by Sun Tzu, winning war without fighting (Yoshihara; 2000). Yoshihara describes six

    pillars of information warfare:

    1. Physical Attack/Destruction Use of kinetic (physical) attack to render

    offensive IW systems unusable.

    2. Electro-Magnetic Warfare Undermining the adversarys IW

    capabilities through use of electro-magnetic energy.

    3. Computer Network Attack (CNA) Using computers to attack

    computers and computer systems.

    4. Military Deception Manipulation and falsification of information

    misinformation, disinformation, etc.)

    5. Psychological Operations use of mechanisms such as propaganda to

    influence perceptions.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    39/99

    29

    6. Operations Security Defensive mechanisms that prevent the adversary

    from collecting or analyzing your information.

    3.5.3 Cyber Conflict

    Rattray defines cyber conflict as Efforts to dominate/gain advantage in

    cyberspace to achieve objectives (Rattray; 2006). In simple terms, cyber conflict is

    information conflict in cyber space. Cyber conflict tends toward the technical end of the

    information warfare spectrum.

    3.5.4 Information Operations

    Information operation is, arguably, the best understood of the terms related to

    information conflict. However, it also is the least stable in terms of solid definitions

    because the concepts that make it up are in a constant state of flux.

    Generally, information operations are considered part of an information war. The

    difficulty with this, however, is that a war implies an ongoing declared conflict with an

    identifiable enemy. Information operations may or may not fit cleanly within that

    paradigm. Information operations may be carried out as part of a war, to be sure, but they

    also may be carried out as individual skirmishes in a propaganda war between states

    where no declared hot war exists.

    This should not be confused, however, with the notion that information operations

    are a subset of information warfare. In fact, in todays parlance, quite the opposite is

    true. Information warfare grows out of information operations, not the other way round.

    Armistead (Armistead, Chapter 1; 2004) describes information operations both

    vertically and horizontally. Vertically, he describes [c]apabilities and related activities

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    40/99

    30

    for IO as:

    Civil affairs

    Computer network attack

    Deception

    Destruction

    Electronic warfare

    Operations security

    Public affairs

    Psychological operations

    He differentiates information warfare and information operations based upon the

    notion that a war is narrow while information operations are broad. Armisteads

    information warfare focuses upon a military infrastructure while information operations

    generalizes across economic, political, information and military infrastructures. We may

    say, however, that in the context of information conflict, an information operation may

    be, but must not necessarily be, part of an information war.

    3.6 Cyber Crime and its Relationship to Information Conflict

    People often attempt to characterize cyber crime as a form of information conflict.

    However, some distinguishing factors make this association inaccurate. First, one cannot

    equate cyber crime to any type of war, formal or informal. Second, the notion of

    information operations is inconsistent with the characteristics of cyber crime. Third, and

    perhaps most important, no contemporary characterization of cyber crime addresses

    either the six pillars of information warfare or the capabilities and related activities of

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    41/99

    31

    information operations. Revisiting Rattrays definition of cyber conflict, again, we see no

    consistent connection.

    One tends to think of cyber crime as actions in cyber space that support illegal

    activities. This is inconsistent with all notions of information conflict.

    Generally, one equates the notion of cyber crime with definitions of electronic or

    computer crime. The national Institute of Justice provides a working definition of

    electronic crime that one can use to compare cyber crime with information conflict:

    Crimes including but not limited to fraud, theft, forgery, childpornography or exploitation, stalking, traditional white-collar crimes,

    privacy violations, illegal drug transactions, espionage, computerintrusions, or any other offenses that occur in an electronic environment

    for the express purpose of economic gain or with the intent to destroy or

    otherwise inflict harm on another person or institution. (National Instituteof Justice 2; 2001)

    From this definition and those of the various aspects of information conflict, one

    can see that there is virtually no connection between the two concepts. However, as

    shown in Figures 2 and 3, criminal activity is part of the information conflict continuum.

    This is an important distinction because although information warfare, information

    operations and cyber conflict are not directly considered to be criminal activities under

    current definitions, if one approaches the problem in the reverse one sees that there is, in

    fact, a connection.

    The connection between information conflict and cyber crime (or electronic

    crime) comes in the effect, not the cause. In other words, while current definitions

    consider the motivation for a criminal act ( fraud, theft, forgery, child pornography or

    exploitation, stalking, traditional white-collar crimes, privacy violations, illegal drug

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    42/99

    32

    transactions) they do not consider the outcome (e.g., terrorist funding from illegal

    drug trafficking) which may be both a criminal act and an act of information operations.

    Consider the example of the Internet as a tool for raising money to fund terrorist

    activities through the illegal production and sale of drugs. The Internet may be used as a

    communications mediaelectronic mail, for examplebetween drug suppliers and

    terrorist groups. Another example is the use of terrorist web sites to advertise the results

    of a kidnapping for propaganda purposes, clearly an aspect of cyber conflict. However,

    the kidnapping itself is a violation of law in most states. Thus, the continuum between

    crime and war, especially where the traditional paradigms of war break down, is valid

    and, beyond typical definitions of both one finds common ground that must be addressed.

    3.7 Conclusions

    Understanding information conflict requires an understanding of its components

    and of theories that contribute to it. The components of information conflict include

    information warfare, information operations and cyber conflict. However, new theories

    are emerging that attempt to explain the environment in which information conflict

    exists. The notion of information conflict policy seems, from the literature, to be

    secondary to the theories of how information conflict works..

    The author takes the position that policy follows understanding. Operational

    theories follow definitional theories. At this writing, definitional and operational theories

    are just beginning to evolve into a state of usefulness. Additionally, an understanding of

    various aspects of terrorism and counter-terrorism are crucial to the development of a

    meta-framework for the application of information dominance theory to counter-

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    43/99

    33

    terrorism. Finally, contributing theories such as information theory, game theory and

    scale-free social network theory may play a significant role in evolving such a meta-

    framework. The rest of this thesis explores those contributions and develops a meta-

    framework for using information dominance as a counter-terrorism tool.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    44/99

    34

    4. THE NATURE OF TERRORISM

    An understanding of terrorism in depth is beyond the scope of this thesis.

    However, a few key elements determine how one might approach an effective use of

    information superiority as a counter-terrorism tactic. The first of these elements is an

    understanding of terrorist goals and objectives. This is an element that is not well

    understood by most Westerners and it is key to any successful information warfare effort.

    The second element is some detail as to the target. While there are hundreds of

    terrorist organizations (over 70 in Iraq alone) ranging in size from a few members to al

    Qaeda with over 50,000 members worldwide, only a few are of real consequence. As we

    will discuss in Chapter 7, scale-free social network theory implies that by attacking some

    key groups successfully, we can disable most of the terrorist infrastructure.

    The third element is understanding the tools that terrorists use to plan and execute

    their attacks. Finally, a concise characterization of terrorist tactics and motivations is

    important. Sun Tzu said, If you know the enemy and know yourself, you need not fear

    the result of a hundred battles.2 Understanding what drives terrorists, what their tools are

    and how they operate will assist in understanding where their weaknesses are. In this

    chapter, we consider these issues briefly.

    4.1 Goals of Terrorism

    Todays terrorists have multiple goals and their goals have multiple aspects.

    Sageman produced a concise study of why Salafist terrorists perform acts of terrorism

    2 There are dozens, perhaps hundreds, of translations of this venerable classic on The Art of War.

    This one is the 1910 translation from the Chinese by Lionel Giles. It may be found at

    http://www.chinapage.com/sunzi-e.html.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    45/99

    35

    (Sageman; 2004). He characterized this group of terrorists, the most prominent of todays

    terrorist networks, in the preface to his book as the global Salafi jihad. Sagemans

    study was unique in that it drew from detailed first person information about more

    than170 mujahadin. It also was unique in that it was the first to explore seriously the

    notion of social networks based upon scale-free network theory (referred to by Sageman

    as small world networks). This thesis explores that approach in more detail in Chapter

    7.

    Hoffman characterizes terrorist goals as political (Hoffman, 40; 2006). However,

    when one examines contemporary terrorism and terrorist groups, one finds that

    Sagemans Salafists dominate them. Thus, for the purposes of this thesis we will focus

    upon Salafists (or as some refer to them, Islamist fundamentalists) and their

    motivations.

    Islamist motivations are complex and are rooted in strict fundamentalist

    interpretation of the Koran and the teachings of Muhammad. Various sects, such as the

    Wahabist sect, interpret these teachings so strictly that they have added to and augmented

    Islamic teaching to include the duty of jihad. In the early 1900s Sayyid Qtub took up the

    Wahabist teachings and proclaimed that there must be jihad to establish a true Muslim

    state, a departure from traditional Wahabist doctrine (Sageman, 10ff; 2004).

    The duty of jihad consists of the near jihad and the far jihad. The far jihad

    aims to create a global jihad with the goal of a global Muslim state. This fundamentalist

    interpretation is at the heart of most of the Islamist terrorism seen today. There are other

    aspects, such as poverty, a view that justice has bypassed Muslims and other socio-

    economic factors. However, before one can address those factors using information

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    46/99

    36

    warfare, one must understand the cultural underpinnings of Islamist terrorism. This issue

    suggests one fertile target for information operations. Another fertile target, affected by

    all of the other factors, is terrorist fund-raising and other support or sponsorship from

    individuals, groups and states.

    One observable facet of the jihad is its dependence upon communications.

    Communications allow the jihadists to plan terrorist acts, obtain funding, spread

    propaganda, proselytize, and recruit followers. These communications comprise every

    type from mouth-to-ear conversations to sophisticated use of the Internet and the World

    Wide Web. Clearly, Islamist communications fall well within both Shannon

    communication theory and the political theories of Dunn, Arquilla and Ronfeldt, and

    others.

    4.2 Important Terrorist Groups

    Based upon the authors research and open source data, there are over 70 terrorist

    groups in Iraq alone.3 Globally, there are at least 76 terrorist groups aligned in one way

    or another with al Qaeda. This makes al Qaeda, with an estimated 50,000 members

    worldwide, arguably the most important terrorist organization within the Islamist

    terrorism networks (MITB; 2007).

    4.3 Classifying Terrorism: A Taxonomy

    The author published a paper that addresses in depth the topic of a taxonomy of

    terrorism (Stephenson; Nov. 2006). Much of this section references that paper. The

    3 One particularly useful open source for this type of information is MITB Terrorism Knowledge

    Base - http://www.tkb.org/Home.jsp

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    47/99

    37

    complete taxonomy appears in Appendix A.1.

    One of the key difficulties in developing a counter-terrorism strategy is

    understanding terrorism itself. Simplistic issues such as a universally accepted definition,

    obviously a requirement for beginning any sort of understanding, are problematic when

    one discusses terrorism. Different states have different definitions for terrorism and its

    associated concepts. Often these definitions aim to serve national, political or religious

    objectives rather than contribute to a clearer understanding of the phenomenon. For

    example, Jenkins addresses the problem repeatedly (Jenkins; 1986).

    The author extracted definitions of terrorism from 33 international documents that

    included laws, treaties and other defining information (JUSTICE; 2006) along with

    definitions from some of the important writers on the subject. While there is no

    universally accepted definition of terrorism, there are several defining characteristics. A

    few of these characteristics, such as violence against non-combatants and ideological or

    political motivation, seem to appear regularly in the literature. It was the authors intent

    to extract all of the relevant characteristics and, through a series of extractions,

    refinements and analyses, develop a taxonomy that allowed a more useful analysis of

    such things as terrorist acts and motivations.

    Although the author describes the entire process in detail in his paper, it is useful

    to summarize here. The steps involved in extracting and analyzing the characteristics of

    terrorism are:

    1. Extraction of key definitional elements from a variety of sources

    2. Broad classification using CATA (Computer Aided Thematic Analysis)

    (Kabay; 2006)

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    48/99

    38

    3. Development of stratified ontology

    4. Extraction as a taxonomy

    5. Refinement into a paired representation

    6. Link analysis to discover non-obvious relationships

    The full taxonomy in Appendix A.1 reflects the extraction referenced in step 4.

    The link analysis (step 6) appears in Figure 6 below.

    Figure 6 - Link Analysis of "Terrorism" at the Sub-Class Level

    Figure 6 represents the definitional elements of terrorism present in the literature

    illustrated hierarchically. This is useful for demonstrating definitional dependencies. The

    key elements of terrorism those elements that provided a context for analysis include:

    Internationally protected persons

    Justifiability

    Targeting aircraft and ships

    Hostage-taking

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    49/99

    39

    Means of invoking terrorist acts

    Targeting the general public (i.e., non-combatants)

    Causing damage to property or the environment

    Invoking a state of terror or fear

    The individual relationships become more obvious if the link analysis is displayed

    slightly differently as in Figure 7.

    Figure 7 - Relationships from Figure 6 Organized in a "Peacock" Display

    A yet more meaningful analysis emerges when we extract clusters from the

    overall analysis. The authors paper describes clustering in detail and illustrates the

    clustering of the data at one level deeper then illustrated here. However, clustering of the

    elements shown in Figures 6 and 7 is instructive. That clustering appears in Figure 8.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    50/99

    40

    Figure 8 - Clustering of the Elements Shown in Figure 6 and 7

    Clustering analysis reveals those elements or groupings with the tightest

    interconnections. Thus, we may think of a cluster as a representation of the important

    relationships in a link analysis. As shown in Figure 8, there are six important

    relationships to the core term: hostage-taking, damage to property or the environment,

    targeting the general public, damage to aircraft and ships, the means of performing

    terrorist acts, and the invocation of a state of terror in victims. This cluster aids in the

    analysis of acts suspected to be of terrorist origin. However, it does less to help us

    understand what, exactly, terrorism is.

    The authors paper goes into detail regarding the second level analysis of the

    ontological data extracted in step 3 above. However, from that analysis eight core

    characteristics emerged:

    1. Threatens International Peace and Security

    2. Effects Are Psychological

    3. Threat of Violence

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    51/99

    41

    4. Induces Fear

    5. Use of Force

    6. Conspiracy

    7. Financing

    8. Targets General Population

    From these eight core determinants one begins to see the emergence of a

    definition that addresses the most nearly universally accepted elements of terrorism. The

    author, in his paper, proposed an axiom that is necessary but not necessarily sufficient to

    characterize terrorism based upon this analysis:

    Axiom 1 Universal Characteristics of Terrorism

    Terrorism must be comprised of at least all of the following

    characteristics:

    Consists minimally of acts that threaten international peace and

    security, that depend upon psychological effects for their success and that

    induce fear through the use of force or threat of violence against the general

    population. Terrorism is financed and is characterized by conspiracy among

    participants.

    Here, then, we have the beginnings of a universally acceptable definition by virtue

    of the strong interconnections between the most frequently appearing elements in the

    literature. However, from the literature we also find that terrorism is ideological or

    political in its underpinnings (appearing in the ontology as a slot under motive and not

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    52/99

    42

    shown at the analysis level of Figures 6 and 7).

    Therefore, in the context of this thesis, the author will use the following definition

    of terrorism. This definition seems well supported by the literature.

    Definition 1 - Terrorism

    Terrorism consists of violent acts, ideologically or

    politically motivated, that threaten international peace and

    security, that depend upon psychological effects for their

    success and that induce fear through the use or threat of

    violence against non-combatants.

    4.4 Conclusions

    The nature of terrorism in todays global environment is that it is, by a large

    majority, Islamist in nature. While Islamist fundamentalism is at the core of global

    terrorism, however, other socio-political-economic factors also offer opportunities for

    applying information dominance as a soft counter-terrorism measure successfully.

    A key factor in understanding the cultural and religious differences between

    fundamentalist Islamists and the Western world in the context of terrorism is a clear

    understanding of terrorism itself. There are no globally accepted definitions of terrorism

    that are useful to us, but we can characterize factors and aspects of terrorist acts and

    motivations. We have extracted a profile of terrorism from a variety of acceptable

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    53/99

    43

    sources and from that, we have evolved a useful definition. Using that definition and the

    taxonomy of terrorism, we can begin to address countermeasures in a meaningful way.

  • 8/14/2019 Information Dominance as an Affirmative Countermeasure Against International Terrorism

    54/99

    44

    5. THE LAW AND INFORMATION CONFLICT

    In the context of this thesis, there is little need to explore this area in depth. Most

    of the seminal work on this topic has been done by Wingfield (Wingfield; 2000).

    However, it is useful to note where the law and information conflict either are adequate

    or are inadequate to address terrorist activities.

    Many analysts address terrorism and the law both domestically and

    internationallyby viewing terrorist acts as criminal acts. In this regard, it may be useful

    to analyze the convergence of the law, information conflict and terrorism. To that

    purpose, this chapter offers a brief discussion of the legal issues potentially involved in

    the use of information warfare, information operations and cyber conflict as tools for

    counter-terrorism.

    The context for this chapter is counter-terrorism, terrorist groups and sub-national

    actors. The question to be answered is, does international or domestic law prohibit the use

    of elements of information dominance, especially cyber conflict, in the context of

    counter-terrorism? The primary reference for this chapter is Wingfield; 2000.

    5.1 Municipal or Domestic Law

    Domestic law