Culture

Military Deception and Strategic Culture: The Soviet Union and Russian Federation

Abstract:

Strategic culture shapes political-military organizational activity through a process of socialization, yet little is known about strategic culture’s impact on information operations. This paper explores the influence of Russian-Soviet strategic culture on military deception operations during World War II, the Soviet Afghan War, and the conflict in Ukraine. It finds that the hierarchical characteristic of Russian-Soviet strategic culture contributes to the centralization of deception operations. This work shows that, in the context of foreign policy toward Russia, not only does one need to consider technological innovations for traditional military use, but also advances below the threshold of declared war.

Using Values-Based Cultural Data to Shape Information Operations Strategies

Abstract:

People are important: they design, use, and defend information systems, and are the targets of ‘softer’ information operations. People can be understood from many different perspectives, including national culture characteristics, personality traits, and cultural history. An intriguing research question to explore is how values, beliefs, and cultures affect the design, strategy, and implementation of information operations.

Manipulating the Architecture of Cultural Control: A Conceptual Model for Strategic Influence Operations in North Korea

ABSTRACT

The deep structural and cultural changes taking place in North Korea provide an opportunity to conduct influence operations to shape that country’s culture and society, either to destabilize the government or to prepare the population for a regime change. This paper presents a conceptual model of how contradictions between top down, imposed culture and organic, indigenous culture can be exploited to destabilize the system, and eventually re-pattern the culture.  The process includes the following steps: identification of the cultural type; understanding relevant cultural forms; identification of vulnerable targets; evaluation of the information system; identification of effective elements of persuasion; mapping of the architecture of social control; and introduction of new “attractors” to damage or destroy the constituent cultural myths.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com