Beruflich Dokumente
Kultur Dokumente
International Terrorism
by
Peter Reynolds Stephenson
Abstract
This paper hypothesizes that it is possible and practical to apply information
dominance as an affirmative countermeasure against terrorism by non-state actors in
much the same manner that states use information superiority in the conduct of
international politics and economics. The issue that it addresses is whether or not there is
sufficient foundational information relating to terrorism, information science,
international law and information warfare to develop a generalized meta-framework for
applying concepts of information dominance in a counter-terrorism context much as these
principles are applied in modern state-on-state warfare.
The paper examines all of these foundational areas and applies the findings to the
development of an information dominance meta-framework, or a framework of
frameworks applied specifically to the problem of counter-terrorism. The author
concludes that such a meta-framework is both feasible and practical.
The meta-framework (The Counter-Terrorism Information Dominance
Framework, or CTIDF), is constructed based upon information, techniques and
technologies that are well established in their various fields. Simply put, the CTIDF is a
comprehensive, interdisciplinary, holistic approach to the application of elements of
information conflict to the problem of counter-terrorism.
This paper is a summation of the thesis (unpublished) prepared in partial
fulfillment of the requirements for the authors Master of Arts in Diplomacy degree at
Norwich University in June of 2007.
1. INTRODUCTION
This paper breaks new ground in the application of several information
technologies. Some of these technologies are what the author refers to as hard
technologies and some are what the author considers soft technologies. Hard
technologies are those that lean towards application of computer and communications
systems to problems of information management. Soft technologies are those that lean
more towards sociology and information content. When these technologies combine,
they offer opportunities for the use of information both as an offensive weapon and as a
defensive tool.
In this paper, the author explores one application of this approach that he refers to
as information dominance. Information dominance is a term that one generally sees used
in a state-on-state context. However, here the author attempts to generalize the term and
codify exactly what it means. In that regard, the concept of information dominance
theory allows broad application as a framework for more common techniques of
information warfare and information operations. Specifically, this paper looks at the
potential application of information dominance in the context of counter-terrorism.
2. BACKGROUND
2.1 Information Conflict
The literature on information conflict and related topics as a basis for international
relations is surprisingly rich. This literature falls into two distinct categories. First, there
is the theoretical literature. This explores various concepts of information conflict as they
apply to international relations in the information age. The second category comprises
operational treatises, often written by military authors. While this body of work does not
address terrorism directly, it does lay groundwork for further discussion in that context.
2.2 Terrorism
There is a growing body of literature on terrorism. This literature addresses the
topic of terrorism in at least four distinct ways:
Terrorism motivations
Building on
Dunns work, he also expanded the seminal work of Arquilla and Ronfeldt (Arquilla and
Ronfeldt; 1999).
Arquilla and Ronfeldt developed and expanded the notion of noopolitik, which
included the notion of the noosphere. This was an important step forward because it
recognized information, not simply information systems, as a key element of information
warfare and information operations. It built upon their earlier work (Arquilla and
Ronfeldt; 1993) and of others published in a book edited by them called In Athenas
Camp (Arquilla and Ronfeldt; 2003). From a theoretical perspective, the topics addressed
in this collection of essays were seminal in shaping thinking about information conflict
but still did not address terrorism directly.
Significant, though perhaps unintended, insight on the relationships of
information warfare and terrorist insurgencies comes from work by ONeil (O'Neil; 205).
In his book, the author describes nine succinct insurgent types and a well-developed
discussion of effects of disunity within insurgent/terrorist groups. This discussion offers
insights into ways to use information warfare to disrupt terrorist groups and lessen their
effectiveness. One final important paper in this regard deserves our attention. The
Militant Ideology Atlas (Combating Terrorism Center; 2006) offers insights into
militant groups, their relationships and the nature and sources of their ideologies.
An important foundation for any discussion of conflict in cyberspace is
international law of conflict. The preeminent authority on international law in
cyberspace is Wingfield and his book The Law of Information Conflict (Wingfield; 2000)
is the authoritative reference on the topic.
Most information conflict takes place in the infosphere. However, certain forms
of information conflict operations may occur at either the hard or soft power ends of the
continuum. At the cyber end, we find computer network attack (CNA) and other
technical operations such as the development of web sites on the Internet. At the
noosphere end, we find pure information that may include propaganda, misinfor mation,
and disinformation, especially as web site content. Therefore, information conflict, and
especially information operations as waged by information warriors, 1 may occur in all
three areas of the continuum, but its results will be most observable in the infosphere.
We may break information conflict into the subsets of offensive conflict and
defensive conflict. While this paper will address both of these subsets, the author is most
concerned with the application of offensive information conflict in the context of
counterterrorism.
We may apply the concept of the information continuum to describe the
interactions of hard and soft power within a second continuum: that of criminal activity
and warfare. Information conflict is present in contexts other than war. One can observe
the effects of information conflict even in the corporate world. For example, the
manipulation of information that positively portrays one organization and negatively
portrays that organization's competition is a form of information conflict.
Criminal organizations such as gangs may use elements of information conflict
for intimidation (e.g., gang graffiti) at the soft end of the continuum. The author has
direct experience with the use of information conflict in an attempt by a fraudster to
Information warriors include those individuals with specialized capabilities such as experts in
cyber conflict, hackers, propagandists, public relations experts, intelligence analysts, and political analysts.
1
implicate his partner in a federal crime. In this example, the fraudster used a trivial
example of an information operation to penetrate his partner's computer and place
incriminating evidence in the form of documents on that computer.
Because information conflict can apply to the second continuum of criminal
activity to warfare, we may add a dimension to the graphical representation in Figure one.
We illustrate that additional dimension in Figure 2.
Any operation, tactic, or strategy that includes or depends for its success on the
manipulation of information in any form and the subsequent manipulation of individuals,
groups of individuals, or populations is an example of information conflict. For reasons
that this paper will examine in a later section, the application of the tactics and strategies
of information conflict to the problem of counterterrorism may be promising.
It also is practical to superimpose the notion of terrorism upon the representation
in Figure 2. Some have suggested that terrorism has strong criminal elements associated
with it. For example, the Interparliamentary Union, an international organization of
parliaments of sovereign states:
Unequivocally condemns terrorism as a criminal act, noting that terrorism
endangers the territorial integrity of countries and their national and
international security, destroys innocent lives and the physical and
From Figure 3 we can see that terrorism falls in the continuum between criminal
activity and warfare containing elements of both. We may also surmise that information
conflict relating to terrorism, as with the rest of the continuum between criminal activity
and warfare, appears largely in the infosphere. However, this is not to imply that there
are no elements of information conflict relating to terrorism at either of the opposite poles
of the continuum.
of social networks (Barabasi, Ravasz, and Vicsek; 2001). These networks contradicted
earlier views of network growth (Erdos and Renyi; 1959, Arquilla and Ronfeldt 1-25;
2002) that viewed networks as growing like chains, stars or all-channel networks where
all nodes connect more or less randomly to each other. Erdos graphed these networks as
a typical bell curve while Barabasi, et al described them as power law networks.
An important aspect of scale-free, or power law, networks is the concept of
preferential attachments. These networks are characterized by growth (continued
expansion) and preferential attachment (new nodes prefer to attach to nodes with the
largest number of already connected nodes) (Barabasi and Jeong; 2003).
Besides a new view of the growth of scale-free networks, Barabasi and his
colleagues described another important factor. Scale-free networks are extremely
resistant to error and failure but are not resistant to attack (Barabasi, Albert, and Jeong;
2000). These factors (preferential attachment and error/attack tolerance) become
extremely important when using information superiority as a countermeasure against a
terrorist network.
2.4.3.1 Social Networks as Scale-Free Networks
While Barabasi et al described social networks in general as scale-free, other
researchers extended that concept to include, explicitly, terrorist groups and terrorist acts
(Matthew and Shambaugh; 2005, Clauset and Young; 2005, Stripling; 2007). Of these,
the Stripling paper may prove the most valuable in that it extends and updates Barabasis
theory relative, explicitly, to terrorist networks and, more specifically, to the al Qaeda
network.
In his paper, Stripling adds the notion of directed links between nodes showing
that not all terrorist links are two-way. This accounts for different types of interactions
within the same network (financial support, logistical support, training support,
operational support, etc.). These interactions characterize the state of global terrorist
networks well. Since the early years of this century, terrorist networks have tended to
become far less centralized than they were in the 1990s and earlier.
Because a successful attack against a scale-free network depends upon disabling a
critical number of nodes, and because other nodes tend to attempt to rebuild the network
after a failure, two important points emerge. First, disabling links is not an effective way
to disable a scale-free network because the links will re-establish wherever possible.
Second, a critical mass of node destruction must occur before the network becomes
effectively disabled. Two groups of researchers have shown that careful selection
(targeting) of nodes can cause a cascading effect that will bring down the network
(Motter and Lai; 2002, Moreno, Gomez, and Pacheco; 2002). Inducement of a cascading
effect using information superiority may affect terrorist networks and may offer an
effective countermeasure against them.
Another strong proponent of the notion of scale-free social networks (although he
refers to them as small world networks) is Sageman (Sageman; 2004). Sageman has
taken the work of Barabasi et al and applied it to his seminal work on characterizing
terrorist networks.
2.4.4 Information Superiority
The notion of soft power is a staple in the writings of Dunn (Dunn; 2002) and
Arquilla and Ronfeldt (Arquilla and Ronfeldt; 1999). Additionally, Armistead wrote an
entire book on the topic of soft power and its role in modern warfare (Armistead; 2004),
building upon the work of Dunn and Arquilla and Ronfeldt. This author explored these
writers in the context of various lenses on international relations and proposed a theory of
information dominance that builds upon prior work in the field (Stephenson; 2007).
Armistead, however, did not expand extensively on why traditional views of
international relations are limited in the context of the information age. For that we must
turn to the writings of Eriksson and Giacomello (Eriksson and Giacomello; 2004).
Another challenge is that virtually all theories of international relations, including
those proposed by the above writers and researchers do well at analyzing events that have
passed but have proven, based upon this writers research, to be weak at anticipating
trends or events of interest. Thus, beyond providing basic understanding of why things
happened the way that they happened, virtually no current theory offers a direct path to
actionable intelligence.
2.4.4.1 Information Dominance Theory
This author proposed a theory of information dominance that takes into account
the need to anticipate the actions of an organization or state. Information dominance
theory uses Rosens definition of anticipatory systems for the purpose of expanding upon
the past and anticipating the future (Rosen; 1985). Rosen defines an anticipatory system:
An anticipatory system is a system containing a predictive model of itself and/or of its
environment that allows it to change state at an instant in accord with the models
provided by insiders and espionage agents placed inside the adversarys ranks. Active
and passive information conflict may exist in the context of either offensive or defensive
information conflict.
2.4.5.2 Information Warfare
Information warfare as a concept is not new. Several writers have attempted to
define it and the most common definitions combine the definitions of information warfare
and information operations. Conceptually, information warfare is exploiting an
adversarys information systems while protecting our own. Information warfare
generally is thought of in terms of active, ongoing conflict the same as conventional
warfare.
However, information warfare is not always a hot war. For example, there are
writers who believe that China, although not engaged in a shooting war with the US,
none-the-less, believe that we are at war with China (Jones, et al; 2002, Exhibit 7). The
Chinese view of information warfare focuses, in part, upon preemption or, in terms used
by Sun Tzu, winning war without fighting (Yoshihara; 2000). Yoshihara describes six
pillars of information warfare:
1. Physical Attack/Destruction Use of kinetic (physical) attack to render
offensive IW systems unusable.
2. Electro-Magnetic Warfare Undermining the adversarys IW
capabilities through use of electro-magnetic energy.
3. Computer Network Attack (CNA) Using computers to attack
computers and computer systems.
are a subset of information warfare. In fact, in todays parlance, quite the opposite is
true. Information warfare grows out of information operations, not the other way round.
Armistead (Armistead, Chapter 1; 2004) describes information operations both
vertically and horizontally. Vertically, he describes [c]apabilities and related activities
for IO as:
Civil affairs
Deception
Destruction
Electronic warfare
Operations security
Public affairs
Psychological operations
One particularly useful open source for this type of information is MITB Terrorism Knowledge
Base - http://www.tkb.org/Home.jsp
counter-terrorism.
The context for this section is counter-terrorism, terrorist groups and sub-national
actors. The question to be answered is, does international or domestic law prohibit the use
of elements of information dominance, especially cyber conflict, in the context of
counter-terrorism? The primary reference for this section is Wingfield; 2000.
Wingfield is very clear:
International communications law contains no direct and specific
prohibition against the conduct of information operations by military
forces, even in peacetime. The established practice of nations provides
persuasive evidence that telecommunications treaties are regarded as
suspended among belligerents during international armed conflicts.
Domestic communications laws do not prohibit properly authorized
military information operations. Accordingly, neither international nor
domestic communications law presents a significant barrier to information
operations by US military forces. (Wingfield, 473; 2000)
What is still unclear is how this affects the use of information operations against a
sub-state actor where there can be no official war in the traditional sense. In this case,
perhaps one must fall back on domestic law, because acts involving telecommunications
and cyber space, originating within that countrys borders, are controlled by that
countrys laws. However, in the absence of any direct prohibitions, we must accept for
now that there are no reasons, either in international or domestic law, why information
operations may not be used, by authorized military personnel, in a conflict against
terrorist groups.