Skip to main content

Item category 1: Thematic Display

Filter results

Loading...

Search results

List view record 1: Refocusing concepts of security : the convergence of military and non-military tasksList view anchor tag for record 1: Refocusing concepts of security : the convergence of military and non-military tasks
List view record 2: Maskirovka In The Information AgeList view anchor tag for record 2: Maskirovka In The Information Age
Thumbnail for Maskirovka In The Information Age

Maskirovka In The Information Age

LTA(NS) Chin, Hui HanIn: Pointer Vol. 42, No. 1
The author examines the power of deception in the context of information operations in the modern hybrid battlespace. Examples discussed include the Normandy landings in World War Two (WWII) and the use of the Russian Maskirovka doctrine in the ongoing conflict in the Donbass regions. The author ...
List view record 3: Information warfareList view anchor tag for record 3: Information warfare
List view record 4: The Chinese People's Liberation Army and information warfareList view anchor tag for record 4: The Chinese People's Liberation Army and information warfare
Thumbnail for The Chinese People's Liberation Army and information warfare

The Chinese People's Liberation Army and information warfare

Wortzel, Larry M.2014
On November 23, 2013, the Chinese government announced plans to establish a new air defense intercept zone which will include the Diaoyu or Senkaku Islands, sovereignty over which is disputed by Japan, China, and Taiwan. Due to complaints of cyber penetrations attributed to the Chinese People's L...
List view record 5: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantagesList view anchor tag for record 5: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
List view record 6: A study on six types of political warfareList view anchor tag for record 6: A study on six types of political warfare
List view record 7: Cyber war : the next threat to national security and what to do about itList view anchor tag for record 7: Cyber war : the next threat to national security and what to do about it
List view record 8: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homelandList view anchor tag for record 8: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
List view record 9: U.S. governmental information operations and strategic communications : a discredited tool or user failure? : implications for future conflictList view anchor tag for record 9: U.S. governmental information operations and strategic communications : a discredited tool or user failure? : implications for future conflict
Thumbnail for U.S. governmental information operations and strategic communications : a discredited tool or user failure? : implications for future conflict

U.S. governmental information operations and strategic communications : a discredited tool or user failure? : implications for future conflict

Tatham, Steve2013
Through the prism of operations in Afghanistan, the author examines how the U.S. Government's Strategic Communication (SC) and, in particular, the Department of Defense's (DoD) Information Operations (IO) and Military Information Support to Operations (MISO) programs, have contributed to U.S. str...
List view record 10: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and GazaList view anchor tag for record 10: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Clear current selections
items currently selected
View my active Pick list
0Items in my active Pick list