Enlisting Madison Avenue

Author: Todd C. Helmus
Publisher: Rand Corporation
ISBN: 0833042750
Format: PDF, Mobi
Download Now
Virtually every action, message, and decision of a military force shapes the opinions of an indigenous population: strategic communication, treatment of civilians at vehicle checkpoints, and the accuracy or inaccuracy of aerial bombardment. Themes of U.S. goodwill mean little if its actions convey otherwise. Consequently, a unified message in both word and deed is fundamental to success. Business marketing practices provide a useful framework for improving U.S. military efforts to shape the attitudes and behaviors of local populations in a theater of operations as well as those of a broader, international audience. Enlisting Madison Avenue extracts lessons from these business practices and adapts them to U.S. military efforts, developing a unique approach to shaping that has the potential to improve military-civilian relations, the accuracy of media coverage of operations, communication of U.S. and coalition objectives, and the reputation of U.S. forces in theater and internationally. Foremost among these lessons are the concepts of branding, customer satisfaction, and segmentation of the target audience, all of which serve to maximize the impact and improve the outcome of U.S. shaping efforts.

Information Operations

Author: Christopher Paul
Publisher: Praeger Security International Reference
ISBN: 9780275995911
Format: PDF, ePub, Docs
Download Now
A no-nonsense treatment of information operations, this handbook makes clear what does and does not fall under information operations, how the military plans and executes such efforts, and what the role of IO ought to be in the war of ideas. Paul provides detailed accounts of the doctrine and practice of the five core information operations capabilities (psychological operations, military deception, operations security, electronic warfare, and computer network operations) and the three related capabilities (public affairs, civil-military operations, and military support to public diplomacy). The discussion of each capability includes historical examples, explanations of tools and forces available, and current challenges faced by that community. An appendix of selected excerpts from military doctrine ties the work firmly to the military theory behind information operations. Paul argues that contemporary IO's mixing of capabilities focused on information content with those focused on information systems conflates apples with the apple carts. This important study concludes that information operations would be better poised to contribute to the war of ideas if IO were reorganized, separating content capabilities from systems capabilities and separating the employment of black (deceptive or falsely attributed) information from white (wholly truthful and correctly attributed) information.

Foundations of Effective Influence Operations

Author:
Publisher: Rand Corporation
ISBN: 9780833044044
Format: PDF, ePub
Download Now
The authors aim to assist the U.S. Army in understanding "influence operations," capabilities that may allow the United States to effectively influence the attitudes and behavior of particular foreign audiences while minimizing or avoiding combat. The book identifies approaches, methodologies, and tools that may be useful in planning, executing, and assessing influence operations.

Influence Warfare

Author: James J. F. Forest
Publisher: Praeger Publishers
ISBN: 9780313347313
Format: PDF, Kindle
Download Now
This important work, edited by an expert on terrorism, focuses on the 21st-century struggle for strategic influence and ways in which states can neutralize the role of new media in spreading terrorist propaganda.

Ten Years on

Author: United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities
Publisher:
ISBN:
Format: PDF, ePub
Download Now

Social Science for Counterterrorism

Author: Paul K. Davis
Publisher: Rand Corporation
ISBN: 9780833047069
Format: PDF
Download Now
This monograph surveys and integrates scholarly social-science literature relevant to counterterrorism. It draws from numerous disciplines and then uses high-level conceptual models to pull the pieces together regarding root causes, individual radicalization, public support, and the ways in which terrorism fades. It identifies points of agreement and disagreement and discusses the consequences of different contexts and perspectives.