Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Info Ops Targeting, Internal Review Request, Illegitimacy and Illegality

Info Ops Targeting, Internal Review Request, Illegitimacy and Illegality

Ratings:

5.0

(1)
|Views: 57|Likes:
Published by IdeaTrack
text on Information Operations Targeting, Targeted individuals etc directed energy UK DEW radiation psychological warfare
text on Information Operations Targeting, Targeted individuals etc directed energy UK DEW radiation psychological warfare

More info:

Published by: IdeaTrack on Mar 03, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/05/2013

pdf

text

original

 
3-3-13
In the following text I seek to demonstrate the illegitimacy of Information Operations being used toTarget people in the UK. In order to substantiate knowledge of such practices I have quotedinformation from relevant documents and presentations made by the Ministry of Defence. Thedocument most repeatedly mentioned is 'JWP 3-80 Information Operations'. I gather it wasproduced in 2003. It is a difficult item to dissect because it often goes to some length to avoidbeing explicit, and it says things in such a way as to be hard to understand for the uninitiated. TheMOD is currently working in order to replace it with new documentation. Based on a recentresponse from MOD, it appears that one of the reasons is to take some of the information such asthe target lists (people) behind closed doors.(http://www.whatdotheyknow.com/request/132287/response/361769/attach/html/3/Mackenzie%20Q%20155824.doc.html)By claiming that JWP 3-80 has been superseded and is no longer active, this could help evadedealing with matters which I will address here. Most of the remaining documents are by MODemployees who are employed by or work closely with the Cyber and Influence department of theDefence Science and Technology Laboratory (DSTL). DSTL works with a large budget and around4000 staff. The quotes taken from these items helps give an idea of how the MOD approachestargeting in the UK and that they apply an outlook that is used in war zones across the board.To begin with, Jonathan Lyle is in charge of DSTL and he gave the following quotes for an officialinterview:“Dstl is a trading fund of the MOD. We exist to maximise the impact of science and technology forUK defence and security. We work with the best people and the best ideas in the world. Workingwith both large and small companies and with universities we develop battle-winningtechnologies.”“We provide support to UK operations both now and in the future”“We have priorities set for us by PJHQ (MOD's Permanent Joint Headquarters). Our scientists intheatre have a 24-hour reach-back service to Dstl and to our suppliers in industry and inuniversities. The scientist says ‘I have a problem’ and this intellectual network is harnessed to handback advice quickly.”(https://www.gov.uk/government/news/dstl-working-with-the-best-ideas-in-the-world)DSTL is one of many organisations which Info-Ops tap expertise from. Others include multiplespace organisations, private defence companies like Qinetiq, Thales, Finnmeccanica etc. as well asother countries.Most actions carried out in Info-Ops Targeting seem to be classified as 'Influence Activities.'To quote from page 2-6 of Joint Warfare Publication 3-80 on Information Operations:(http://www.scribd.com/doc/29082117/jwp3-80)
'Info Ops staff will make use of tools to Influence Will and will
 
affect those capabilities that allow will to be translatedinto action. These are discussed in more detail at Annex 2A. InfoOps must not be limited to these means but is constrained only byimagination and the availability of resources.A. Influence Activity. Actions to influence will traditionally makeuse of tools such as Psychological Operations (PSYOPS), Deception,Electronic Warfare (EW), specifically targeted physical destructionand Computer Network Operations (CNO), which incorporates attack,exploitation and defence. 'B. Counter Command Activity. Actions to affect capability can makeuse of any appropriate tools however they will commonly resort tospecifically targeted physical destruction, the use of emergingtechnology, offensive EW and CNO. '
As quoted, Annex 2A (section 8) is indeed entitled '
Emerging Technology
' and the first sentenceand only reference in it to the equipment used says:
'Emerging Technology includes the use of directed energy weaponssuch as Radio Frequency, Laser, and acoustic and other non lethalweapons.'
For those who might be unfamiliar with such terms. Directed energy weapons are devices whichfocus radiation at people and technology. So what the document is saying is that radiating peopleis key to achieving their objectives. Although I do not know the full extent of MOD capability in thisregard, such weapons are known to include space based military capability satellites of whichthere are thousands when pooled with other allies. Page 56 of the American Air Force ResearchLaboratory Technology Milestones Volume 14 states:'
Emerging Directed Energy Weapons (DEWs) offer virtually instant fly-out time, stealth, precisetargeting, agile re-targeting capability, operation unaffected by gravity, and lethal/less-lethaloptions.
'(www.wpafb.af.mil/shared/media/document/AFD-121001-034.pdf )The beam range on such modern satellites is known to extend from their normal operational orbitto anywhere on earth that can be seen by it, so to speak, as energy is directed in line of sight.Furthermore, page 3-4 refers to the two '
key methods for achieving objectives
' (for a campaign) asbeing:
(1) Psychological Operations (PSYOPS)(2) Electronic Warfare(EW).
 
The Autonomy of Information Operations
On page 3-4 of JWP 3-80 the documentation references the in-house responsibility taken forassimilating target lists. Under '
Information Operations Contribution to the Campaign Plan'
itstates:'
Info Ops staff will be responsible for providing the following elements as part of the CampaignPlan...............C. Details on processes such as: co-ordination measures, Info Ops target nomination procedures,nominations for inclusion in the Restricted Target List (RTL) and Joint Restricted Frequency List(JRFL), clearance and authorization requirements for themes and messages and measurementsof effectiveness will be included
.......'Page 4-3 of JWP 3-80 includes the following text on '
Clearance and Authorisation
':'
The scale, tempo and sensitivity of operations will determine the level of ministerialinvolvement in the procedure for targeting and Info Ops with, where possible, target packages(or entire target lists) and intended themes being submitted for clearance in advance of operations. Ideally, 'silence procedures' should be used wherever possible.
'These are examples of how the MOD takes responsibility for it's own activities and it's target listsare self set. It avoids exposure of these and related activities by being selective about what theychoose to reveal and using 'silence procedures' where ministers become inquisitive.Page 3-4 continues by saying:
E. The desired Influence Activity objectives, themes, messages and tasks will be listed in the 'InfoOps objectives matrix' along with the CCA objectives and tasks........These tasks will then besubmitted for inclusion in the Joint Integrated Prioritised Target List (JIPTL) to ensure coherencebetween Info Ops and broader military activity. Info Ops staff 
(JTFC)
will also contribute to otherannexes of the Campaign Plan such as targeting, media ops and CIMIC.
'Later on page 4-1 in Chapter 4 – Execution, it states that the JTFC '
gives targeting guidance,approves the draft Joint Integrated Prioritised Target List (JIPTL) and authorizes the TargetNomination List (TNL) and Joint Restricted Frequency List (JRFL).
'In November 2009 the head of Cyber and Influence at DSTL, David Ferbrache produced apresentation as an introduction to Cyber and Influence. On the last page summary he makesreference to Targeting, mentioning the '
self selection of targets
' and '
personalisation of messages
'directed at these targets within operations.(http://www.scribd.com/doc/128168751/)At the same time the Team Leader for the Influence section of C&I at DSTL Porton Down,psychologist George Brander produced a presentation titled 'Understanding and Influencing inCyberspace'.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->